SlideShare a Scribd company logo
1 of 5
Download to read offline
International INTERNATIONAL Journal of Electronics and JOURNAL Communication Engineering OF ELECTRONICS & Technology (IJECET), AND 
ISSN 0976 – 
6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 6, June (2014), pp. 75-79 © IAEME 
COMMUNICATION  
ENGINEERING  TECHNOLOGY (IJECET) 
ISSN 0976 – 6464(Print) 
ISSN 0976 – 6472(Online) 
Volume 5, Issue 6, June (2014), pp. 75-79 
© IAEME: http://www.iaeme.com/IJECET.asp 
Journal Impact Factor (2014): 7.2836 (Calculated by GISI) 
	
	 
75 
 
IJECET 
© I A E M E 
SECURE CLUSTER BASED APPROACH FOR MANETS 
Syeda Kausar Fatima#, Dr. Syed Abdul Sattar##, Dr. D. Srinivas Rao### 
#ECE Dept., Research Scholar JNTUH 
##Prof.  Dean, RITS, Chevella 
###Prof.  Head ECE Dept, JNTUH 
ABSTRACT 
Mobile adhoc networks eliminate the need for pre-existing infrastructure by relying on the 
nodes to carry all network activities. 
The mobile ad hoc networks are more prone to suffer from malicious behaviors than the 
traditional wired networks. Therefore, there is a need to pay more attention to the security issues in 
the mobile ad hoc networks. Clustered Manets is a very promising area of research due to its 
infrastructure less capability. They have many advantages such as improved bandwidth, power 
consumption and QoS of the network but one disadvantage is security. This paper has been prepared 
keeping in mind that it needs to prove itself to be a valuable resource dealing with both the important 
core and the specialized security issues in this area. 
Keywords: MANETs, QoS, Clustering, Security. 
1. INTRODUCTION 
1.1 MANET 
MANETs are autonomous systems comprising of mobile nodes connected by wireless links; 
each node operates as an end system and a router for all other nodes in the network. 
The network topology, due to the mobility in the network, is dynamic and may change 
rapidly and unpredictably over time. Hence, the connectivity among the nodes may vary with time 
because of node departures, new node arrivals, and the possibility of having mobile nodes. As there 
is no fixed infrastructure in mobile ad hoc network the mobile hosts communicate over multi-hop 
wireless link. The nodes in MANET act as host as well as router and hence, they are responsible for 
dynamically discovering other nodes for forwarding packets to their destination.
International Journal of Electronics and Communication Engineering  Technology (IJECET), ISSN 0976 – 
6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 6, June (2014), pp. 75-79 © IAEME 
 
Manets have the following inherent Characteristics: open medium, lack of fixed central structure, 
dynamically changing topology, constrained capability, less bandwidth, rely on batteries etc. So 
MANETs are highly vulnerable to various security attacks. Providing secure Communication in 
MANET is proved to be a significant challenge. An ad hoc network may consist of hundreds or even 
thousands of nodes. Security mechanisms should be scalable to handle such a large network. 
Authentication and Trust Model which are developed for wired network cannot be used in wireless 
network. Common authentication schemes are not applicable in Ad hoc network. 
Threats in MANET 
The threats can be divided into two categories passive attack and active attack. 
• Passive attack is only able to listen or surveillance the network traffic to obtain some secret, 
without disrupting protocol operation and uses the information gained to breach network 
security violating confidentiality. 
• Active attack will control the communication channel by tampering data stream. The active 
attack might allow adversary to delete messages, and to impersonate a node, thus violating 
availability, integrity, authentication and non-repudiation. 
76 
1.2 Cluster Concept in Manets 
A cluster is one of the ad hoc networks architecture where cluster head (CH) responsible of 
management of cluster and other nodes that are members to a particular cluster. Clustering is 
commonly used to limit the amount of routing information. It enhances the routing process and can 
be used as a framework for key management and distribution. A cluster is formed by a set of nodes 
gathered around anode which is named as cluster head. The choice of the cluster head is done 
according to some QoS defined criteria [3]. 
Cluster heads and gateways are used as special nodes which have added responsibilities over 
the ordinary participating nodes in the network. A cluster head keeps track of all the members 
(nodes) in a cluster, and the routing information needed. The gateways are the nodes at the border or 
edge of a cluster and communicate with the gateways of neighboring clusters. 
Clustering management has five outstanding advantages over other protocols. First, it uses 
multiple channels effectively and improves system capacity. Second, it reduces the exchange 
overhead of control messages and strengthens node management. Third, it is very easy to implement 
the local synchronization of network. Fourth, it provides quality of service (QoS) routing for 
multimedia services efficiently. Finally, it can support the wireless networks with a large number of 
nodes [4] [7]. 
Figure 1.2: Cluster Manets
International Journal of Electronics and Communication Engineering  Technology (IJECET), ISSN 0976 – 
6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 6, June (2014), pp. 75-79 © IAEME 
 
77 
Securing Cluster Manets 
 
Secure routing is an important and complicated issue. Clustering is commonly used in order 
to limit the amount of secure routing information. Here the election process is one of the optimal 
issues. Also any unknown node (not confident) can be eavesdrop the communication and find the 
identity of these important nodes. This information can be useful for the attacker to plan attacks 
against the (Certification Authority) CA node in order to disturb the cluster operation. Therefore, if 
the CA node is compromised, that means that the security of the cluster is calling into question. 
Therefore clustering based on multi-hop and network reliability has been developed. By this reduced 
and less mobile cluster heads that will serve for keys exchange is made [5] [6]. 
2. LITERATURE REVIEW 
Heenavarshney and Pradeep Kumar et al [1] have proposed a Secure Communication 
architecture based on “BBCMS” clustering algorithm. Here the cluster head (CH) is elected 
according to its weight computed by combining a set of system parameters. In the proposed 
architecture, the overall network is divided into clusters where the cluster-heads (CH) are connected 
by virtual networks. For secure data transmission, credential authority (CA) issues a certificate 
(X.509) to the requested node for authentication. The certificate of a node is renewed or rejected by 
CH, based on its trust counter value. 
Noman Mohammed et al [6] have proposed a solution for balancing there source 
consumption of IDSs among all nodes while preventing nodes from behaving selfishly. To address 
the selfish behavior, they design incentives in the form of reputation to encourage nodes to honestly 
participate in the election scheme by revealing their cost of analysis. 
To address the optimal election issue, they propose a series of local election algorithms that can lead 
to globally optimal election results with a lowcost. However the percentage of leaders is less in this 
model. 
Abderrezak Rachedi and Abderrahim Benslimane [7] have proposed an anonymous protocol 
to secure nodes which have important roles in the network. Also they presented an Anonymous 
Dynamic Demilitarized Zone (ADDMZ)to protect the CA node identity and to avoid the single point 
of failure in the cluster. ADDMZ is formed by a set of confident nodes which have a high trust level 
between them and their goal is to filter the communication between the cluster member node and the 
CA node. They present protocol to realize these mechanisms byusing the identity based 
cryptographic from bilinear maps. However, it is possible to attack RA nodes by selecting randomly 
nodes at the attacker’s neighborhood, but the risk to detect the attacker is high. 
YoHan Park et al [9] have proposed a security system for ID-based anonymous cluster-based 
MANETs to protect the privacy of nodes. Moreover, they propose a threshold signature scheme 
without pairing computations, which diminishes the computation load on each node. Their proposal 
satisfies most properties for an anonymous security system and effectively copes with dynamic 
environments with greater efficiency by using secret sharing schemes. As long as the CH does not 
reveal the respective polynomials, anonymity of each node is guaranteed. 
Raihana Ferdous et al [10] have proposed a Cluster head(s) selection algorithm based on an 
efficient trust model. This algorithm aims to elect trustworthy stable cluster head(s) that can provide 
secure communication via cooperative nodes. However the way the messages passed through may 
overload the Cluster head, creating a bottleneck due to additional message exchanges. Another 
possible limitation is the way that the message authentication between intermediate Cluster heads are 
treated, where there can be a delay in identifying a malicious neighboring node. 
Wei Liu et al [11] to enhance the accuracy, they propose the threshold-based mechanism to 
assess and vindicate warned nodes as legitimate nodes or not, before recovering them. Also they 
have proposed a new incentive method to release and restore the legitimate nodes, and to improve
International Journal of Electronics and Communication Engineering  Technology (IJECET), ISSN 0976 – 
6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 6, June (2014), pp. 75-79 © IAEME 
 
the number of available normal nodes in the network. The proposed certificate revocation scheme is 
effective and efficient to guarantee secure communications in mobile ad hoc networks. However, if 
the number of these nodes is below the threshold, they cannot collude with the false accusations 
successfully. 
78 
 
Yao Yu and Lincong Zhang et al [12] have proposed a secure clustering algorithm based on 
reputation in defense of threats in clustering. In the algorithm, the nodes reputation is used to 
improve security, which is evaluated by combining the experience of the node in the routing process. 
In addition, they consider degree and relative mobility in the clustering to guarantee the stability of 
clusters. Moreover, it is efficient in the cluster rebuilding and healing. 
The proposed algorithm can effectively improve the security and stability of network. 
However there occurs overhead in the system. 
3. PROBLEM IDENTIFICATION AND SOLUTION 
Security supports are a significant factor in the design of security system in ad hoc networks. 
It is important to protect the identities of individual nodes to avoid personal privacy concerns. For 
this, a security system for ID-based anonymous cluster-based MANETs and a threshold signature [9] 
is proposed to protect the privacy of nodes. Here the basic operations consist of generating pairing 
parameters, private keys, and secret sharing. Cluster key distribution scheme ensures that the 
compromise of an arbitrary number of nodes outside the target cluster does not expose the secrecy of 
non-compromised nodes. 
Key agreement scheme also ensures secure communication between nodes in intra- and inter 
clusters. Threshold signature is used such that to verify the cluster member. This scheme support 
entity anonymity. Only the entities especially of the matched session can know the identity of others 
with who they are in communication. However the selection of cluster heads is not efficient such that 
it drains the energy. Also it is not stated about the revoking certificates of malicious nodes which 
lead to attacks. For providing all these, a solution based upon this has to be provided. 
Solution 
The existing schemes are not sufficient for security in MANETs. Main goal is to deploy the 
secure clustering concept to routing protocol. A proposal regarding an enhanced solution for ad hoc 
clustering based on multi hops and network density will be used as a framework which takes into 
account the node mobility and gives major improvements regarding the number of elected cluster 
heads. Objective is to elect a reduced and less mobile cluster heads that will serve for keys exchange. 
The idea is to simulate the clustered MANETs, using NS-2 and the performance evaluation is done 
on basis of security by taking throughput, and packet delivery ratio into consideration. 
In our solution, first, a trust based cluster head selection algorithm is proposed. Here Cluster 
head is selected by the mobility of nodes in such a way that, if the nodes with one hop distance are 
cooperative, the trust matrix of nodes is generated and the TRUST VALUE is computed from the 
neighbor nodes [10]. Each node monitors others nodes and collects the direct and indirect trust 
values by means of using mobile agents (ME). This way of cluster head selection improves the 
network life time. Next, for authentication and confidentiality, cluster set up with pseudonym 
generation using an ID-based secured system [9] can be used. 
The nodes that are member of the same cluster try to send the same message by generating a 
threshold signature and send the message with a threshold signature toa verifier and the CH. Then, 
the CH checks the validity of messages and signatures and generates and sends additional points to a 
verifier. Finally, a verifier checks the validity of signatures. 
Based on the estimated trust values, then a Certificate Revocation technique is used to revoke 
the certificates of low trusted nodes [11]. To revoke a malicious attacker’s certificate three stages
International Journal of Electronics and Communication Engineering  Technology (IJECET), ISSN 0976 – 
6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 6, June (2014), pp. 75-79 © IAEME 
 
such as accusing, verifying, and notifying are used here. This in turn improves the accuracy and 
reliability of the network. 
79 
 
On the whole, a secured clustering based approach is provided with key exchange, with 
improved accuracy and reliability. 
REFERENCES 
[1] Heenavarshney and Pradeep Kumar, “Secure Communication Architecture Based On 
“BBCMS” Clustering Algorithm for Mobile Adhoc Network (MANET)”, International 
Journal of Innovative Technology and Exploring Engineering (IJITEE), ISSN: 2278-3075, 
Volume-3, Issue-2, July 2013. 
[2] Sandeep Kr. Agarwal, Amit Garg and K. V. Arya, “Security Issues  Clustering Based 
Solutions in Mobile Ad-hoc Networks - A Survey”, Journal of International Academy of 
Physical Sciences, Vol. 16 No.3 (2012). 
[3] Abdelmajid HAJAMI, Kamal OUDIDI and Mohammed ELKOUTBI, “A Distributed Key 
Management Scheme based on Multi hop Clustering Algorithm for MANETs”, IJCSNS 
International Journal of Computer Science and Network Security, VOL.10 No.2, February 
2010. 
[4] R. Shanthy and J. Suji Priya, “An Enhanced Cluster-Based Multi-hop Multipath Routing 
Protocol for MANETs”, IJCST Vol. 2, Issue 3, September 2011. 
[5] Hajami, Abdelmajid, Kamal Oudidi, and Mohammed ElKoutbi. “An enhanced algorithm for 
MANET clustering based on multi hops and network density”, New Technologies of 
Distributed Systems (NOTERE), 2010 10th Annual International Conference on. IEEE, 2010. 
[6] Noman Mohammed, Hadi Otrok, Lingyu Wang, Mourad Debbabi and Prabir Bhattacharya, 
“Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in 
MANET”, Dependable and Secure Computing, IEEE Transactions on 8.1 (2011). 
[7] Abderrezak Rachedi and Abderrahim Benslimane, “Security and Pseudo-Anonymity with a 
Cluster-based approach for MANET”, Global Telecommunications Conference, 2008, IEEE 
GLOBECOM 2008, IEEE, 2008. 
[8] V. Anil Kumar, K.Praveen Kumar Rao, E.prasad and N.Gowtham Kumar, “Clustering Based 
Certificate Revocation in Mobile Ad Hoc Networks”, International Journal of Computer 
Science and Management Research Vol. 2 Issue 1 January 2013. 
[9] YoHan Park, YoungHo Park and SangJae Moon, “Anonymous Cluster-Based MANETs with 
Threshold Signature”, Hindawi Publishing Corporation International Journal of Distributed 
Sensor Networks Volume 2013, Article ID 374713. 
[10] Raihana Ferdous, Vallipuram Muthukkumarasamy and Elankayer Sithirasenan, “Trust-based 
Cluster head Selection Algorithm for Mobile Ad hoc Networks”, Trust, Security and Privacy 
in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference 
on. IEEE, 2011. 
[11] Wei Liu, Hiroki Nishiyama, Nirwan Ansari, Jie Yang, and Nei Kato, “Cluster-based 
Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks”, Parallel 
and Distributed Systems, IEEE Transactions on 2013. 
[12] Yao Yu and Lincong Zhang, “A Secure Clustering Algorithm in Mobile Ad Hoc Networks”, 
IPCSIT vol. 29 (2012). 
[13] Rakesh Kumar, Dr Piush Verma and Dr Yaduvir Singh, “A Review and Comparison of 
Manet Protocols with Secure Routing Scheme Developed using Evolutionary Algorithms”, 
International journal of Computer Engineering  Technology (IJCET), Volume 3, Issue 2, 
2012, pp. 167 - 180, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.

More Related Content

What's hot

IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...IRJET Journal
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMIJNSA Journal
 
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...IJCNCJournal
 
A Trust Conscious Secure Route Data Communication in MANETS
A Trust Conscious Secure Route Data Communication in MANETSA Trust Conscious Secure Route Data Communication in MANETS
A Trust Conscious Secure Route Data Communication in MANETSCSCJournals
 
Secure signature based cedar routing in mobile adhoc networks
Secure signature based cedar routing in mobile adhoc networksSecure signature based cedar routing in mobile adhoc networks
Secure signature based cedar routing in mobile adhoc networkseSAT Journals
 
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...IRJET Journal
 
Secure and Trustable Routing in WSN for End to End Communication
Secure and Trustable Routing in WSN for End to End CommunicationSecure and Trustable Routing in WSN for End to End Communication
Secure and Trustable Routing in WSN for End to End CommunicationIJMTST Journal
 
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONranjith kumar
 
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...ijasuc
 
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...IJNSA Journal
 
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENTUSING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENTIJNSA Journal
 
Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...IJERA Editor
 
AN EFFICIENT KEY AGREEMENT SCHEME FOR WIRELESSSENSOR NETWORKS USING THIRD PAR...
AN EFFICIENT KEY AGREEMENT SCHEME FOR WIRELESSSENSOR NETWORKS USING THIRD PAR...AN EFFICIENT KEY AGREEMENT SCHEME FOR WIRELESSSENSOR NETWORKS USING THIRD PAR...
AN EFFICIENT KEY AGREEMENT SCHEME FOR WIRELESSSENSOR NETWORKS USING THIRD PAR...ijasuc
 
A DISTRIBUTED TRUST MANAGEMENT FRAMEWORK FOR DETECTING MALICIOUS PACKET DROPP...
A DISTRIBUTED TRUST MANAGEMENT FRAMEWORK FOR DETECTING MALICIOUS PACKET DROPP...A DISTRIBUTED TRUST MANAGEMENT FRAMEWORK FOR DETECTING MALICIOUS PACKET DROPP...
A DISTRIBUTED TRUST MANAGEMENT FRAMEWORK FOR DETECTING MALICIOUS PACKET DROPP...IJNSA Journal
 
A trust-based authentication framework for security of WPAN using network sli...
A trust-based authentication framework for security of WPAN using network sli...A trust-based authentication framework for security of WPAN using network sli...
A trust-based authentication framework for security of WPAN using network sli...IJECEIAES
 
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...IJNSA Journal
 

What's hot (20)

IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
IRJET- Detection and Prevention Methodology for Dos Attack in Mobile Ad-Hoc N...
 
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHMY-HAMILTONIAN LAYERS BROADCAST ALGORITHM
Y-HAMILTONIAN LAYERS BROADCAST ALGORITHM
 
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...
CLBNSRM - CONFIDENCE LEVEL BASED UNBLEND NEIGHBOR SELECTION &BLEND NODE REPOR...
 
A Trust Conscious Secure Route Data Communication in MANETS
A Trust Conscious Secure Route Data Communication in MANETSA Trust Conscious Secure Route Data Communication in MANETS
A Trust Conscious Secure Route Data Communication in MANETS
 
Secure signature based cedar routing in mobile adhoc networks
Secure signature based cedar routing in mobile adhoc networksSecure signature based cedar routing in mobile adhoc networks
Secure signature based cedar routing in mobile adhoc networks
 
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
 
Secure and Trustable Routing in WSN for End to End Communication
Secure and Trustable Routing in WSN for End to End CommunicationSecure and Trustable Routing in WSN for End to End Communication
Secure and Trustable Routing in WSN for End to End Communication
 
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTIONIEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
IEEE NS2 PROJECT@ DREAMWEB TECHNO SOLUTION
 
A Survey on Energy Efficient and Key Based Approach for Data Aggregation in WSN
A Survey on Energy Efficient and Key Based Approach for Data Aggregation in WSNA Survey on Energy Efficient and Key Based Approach for Data Aggregation in WSN
A Survey on Energy Efficient and Key Based Approach for Data Aggregation in WSN
 
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
Optimizing On Demand Weight -Based Clustering Using Trust Model for Mobile Ad...
 
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
AUTHENTICATION USING TRUST TO DETECT MISBEHAVING NODES IN MOBILE AD HOC NETWO...
 
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENTUSING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
USING A DEEP UNDERSTANDING OF NETWORK ACTIVITIES FOR SECURITY EVENT MANAGEMENT
 
Dt36717722
Dt36717722Dt36717722
Dt36717722
 
Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...Link Reliability based Detection and Predecessor base Route Establishment for...
Link Reliability based Detection and Predecessor base Route Establishment for...
 
AN EFFICIENT KEY AGREEMENT SCHEME FOR WIRELESSSENSOR NETWORKS USING THIRD PAR...
AN EFFICIENT KEY AGREEMENT SCHEME FOR WIRELESSSENSOR NETWORKS USING THIRD PAR...AN EFFICIENT KEY AGREEMENT SCHEME FOR WIRELESSSENSOR NETWORKS USING THIRD PAR...
AN EFFICIENT KEY AGREEMENT SCHEME FOR WIRELESSSENSOR NETWORKS USING THIRD PAR...
 
A DISTRIBUTED TRUST MANAGEMENT FRAMEWORK FOR DETECTING MALICIOUS PACKET DROPP...
A DISTRIBUTED TRUST MANAGEMENT FRAMEWORK FOR DETECTING MALICIOUS PACKET DROPP...A DISTRIBUTED TRUST MANAGEMENT FRAMEWORK FOR DETECTING MALICIOUS PACKET DROPP...
A DISTRIBUTED TRUST MANAGEMENT FRAMEWORK FOR DETECTING MALICIOUS PACKET DROPP...
 
A trust-based authentication framework for security of WPAN using network sli...
A trust-based authentication framework for security of WPAN using network sli...A trust-based authentication framework for security of WPAN using network sli...
A trust-based authentication framework for security of WPAN using network sli...
 
vanderMerweMScEngThesis
vanderMerweMScEngThesisvanderMerweMScEngThesis
vanderMerweMScEngThesis
 
Fv3510271037
Fv3510271037Fv3510271037
Fv3510271037
 
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
PERFORMANCE ANALYSIS OF THE NEIGHBOR WEIGHT TRUST DETERMINATION ALGORITHM IN ...
 

Viewers also liked (9)

10120140507006
1012014050700610120140507006
10120140507006
 
50120140507014
5012014050701450120140507014
50120140507014
 
20320130406018
2032013040601820320130406018
20320130406018
 
40120140507007
4012014050700740120140507007
40120140507007
 
20320140503023
2032014050302320320140503023
20320140503023
 
F0963440
F0963440F0963440
F0963440
 
30120140507014
3012014050701430120140507014
30120140507014
 
50320140501004 2
50320140501004 250320140501004 2
50320140501004 2
 
10220140504001
1022014050400110220140504001
10220140504001
 

Similar to 40120140506010

Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...CSCJournals
 
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc NetworksA Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc NetworksBRNSSPublicationHubI
 
Paper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_Networks
Paper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_NetworksPaper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_Networks
Paper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_NetworksZainab Nayyar
 
A secure trust-based protocol for hierarchical routing in wireless sensor ne...
A secure trust-based protocol for hierarchical routing in  wireless sensor ne...A secure trust-based protocol for hierarchical routing in  wireless sensor ne...
A secure trust-based protocol for hierarchical routing in wireless sensor ne...IJECEIAES
 
Secure Data Communications in Mobile Ad-Hoc Networks
Secure Data Communications in Mobile Ad-Hoc NetworksSecure Data Communications in Mobile Ad-Hoc Networks
Secure Data Communications in Mobile Ad-Hoc NetworksIRJET Journal
 
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsDesign and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsijsrd.com
 
Security issues performance in ad hoc oddv
Security issues performance  in ad hoc oddvSecurity issues performance  in ad hoc oddv
Security issues performance in ad hoc oddvEditor Jacotech
 
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORKTRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORKIAEME Publication
 
Design and development of anonymous location based routing for mobile ad-hoc...
Design and development of anonymous location based routing  for mobile ad-hoc...Design and development of anonymous location based routing  for mobile ad-hoc...
Design and development of anonymous location based routing for mobile ad-hoc...IJECEIAES
 
SURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORKSURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORKIAEME Publication
 
IRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networks
IRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networksIRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networks
IRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networksIRJET Journal
 
Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...
Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...
Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...Editor IJMTER
 
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...IJNSA Journal
 
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...IRJET Journal
 
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...IJNSA Journal
 
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...IJNSA Journal
 

Similar to 40120140506010 (20)

Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
 
ant2
ant2ant2
ant2
 
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc NetworksA Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
A Survey on Secure Routing Protocol for Data Transmission in ad hoc Networks
 
Paper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_Networks
Paper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_NetworksPaper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_Networks
Paper_38-Secure_Clustering_in_Vehicular_Ad_Hoc_Networks
 
A secure trust-based protocol for hierarchical routing in wireless sensor ne...
A secure trust-based protocol for hierarchical routing in  wireless sensor ne...A secure trust-based protocol for hierarchical routing in  wireless sensor ne...
A secure trust-based protocol for hierarchical routing in wireless sensor ne...
 
Secure Data Communications in Mobile Ad-Hoc Networks
Secure Data Communications in Mobile Ad-Hoc NetworksSecure Data Communications in Mobile Ad-Hoc Networks
Secure Data Communications in Mobile Ad-Hoc Networks
 
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNsDesign and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
Design and Implementation of TARF: A Trust-Aware Routing Framework for WSNs
 
40120140507001
4012014050700140120140507001
40120140507001
 
40120140507001
4012014050700140120140507001
40120140507001
 
Security issues performance in ad hoc oddv
Security issues performance  in ad hoc oddvSecurity issues performance  in ad hoc oddv
Security issues performance in ad hoc oddv
 
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORKTRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
TRUST MANAGEMENT FOR DELAY TOLERANT NETWORK
 
Ijciet 08 02_002
Ijciet 08 02_002Ijciet 08 02_002
Ijciet 08 02_002
 
Design and development of anonymous location based routing for mobile ad-hoc...
Design and development of anonymous location based routing  for mobile ad-hoc...Design and development of anonymous location based routing  for mobile ad-hoc...
Design and development of anonymous location based routing for mobile ad-hoc...
 
SURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORKSURVEY ON MOBILE AD HOC NETWORK
SURVEY ON MOBILE AD HOC NETWORK
 
IRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networks
IRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networksIRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networks
IRJET- Gray-Hole Attack Minimization based on contradiction for ad-hoc networks
 
Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...
Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...
Different Approaches for Secure and Efficient Key Management in Mobile Ad-Hoc...
 
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...
 
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
Detecting Various Black Hole Attacks by Using Preventor Node in Wireless Sens...
 
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...
 
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
DSSS with ISAKMP Key Management Protocol to Secure Physical Layer for Mobile ...
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 

Recently uploaded (20)

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 

40120140506010

  • 1. International INTERNATIONAL Journal of Electronics and JOURNAL Communication Engineering OF ELECTRONICS & Technology (IJECET), AND ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 6, June (2014), pp. 75-79 © IAEME COMMUNICATION ENGINEERING TECHNOLOGY (IJECET) ISSN 0976 – 6464(Print) ISSN 0976 – 6472(Online) Volume 5, Issue 6, June (2014), pp. 75-79 © IAEME: http://www.iaeme.com/IJECET.asp Journal Impact Factor (2014): 7.2836 (Calculated by GISI) 75 IJECET © I A E M E SECURE CLUSTER BASED APPROACH FOR MANETS Syeda Kausar Fatima#, Dr. Syed Abdul Sattar##, Dr. D. Srinivas Rao### #ECE Dept., Research Scholar JNTUH ##Prof. Dean, RITS, Chevella ###Prof. Head ECE Dept, JNTUH ABSTRACT Mobile adhoc networks eliminate the need for pre-existing infrastructure by relying on the nodes to carry all network activities. The mobile ad hoc networks are more prone to suffer from malicious behaviors than the traditional wired networks. Therefore, there is a need to pay more attention to the security issues in the mobile ad hoc networks. Clustered Manets is a very promising area of research due to its infrastructure less capability. They have many advantages such as improved bandwidth, power consumption and QoS of the network but one disadvantage is security. This paper has been prepared keeping in mind that it needs to prove itself to be a valuable resource dealing with both the important core and the specialized security issues in this area. Keywords: MANETs, QoS, Clustering, Security. 1. INTRODUCTION 1.1 MANET MANETs are autonomous systems comprising of mobile nodes connected by wireless links; each node operates as an end system and a router for all other nodes in the network. The network topology, due to the mobility in the network, is dynamic and may change rapidly and unpredictably over time. Hence, the connectivity among the nodes may vary with time because of node departures, new node arrivals, and the possibility of having mobile nodes. As there is no fixed infrastructure in mobile ad hoc network the mobile hosts communicate over multi-hop wireless link. The nodes in MANET act as host as well as router and hence, they are responsible for dynamically discovering other nodes for forwarding packets to their destination.
  • 2. International Journal of Electronics and Communication Engineering Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 6, June (2014), pp. 75-79 © IAEME Manets have the following inherent Characteristics: open medium, lack of fixed central structure, dynamically changing topology, constrained capability, less bandwidth, rely on batteries etc. So MANETs are highly vulnerable to various security attacks. Providing secure Communication in MANET is proved to be a significant challenge. An ad hoc network may consist of hundreds or even thousands of nodes. Security mechanisms should be scalable to handle such a large network. Authentication and Trust Model which are developed for wired network cannot be used in wireless network. Common authentication schemes are not applicable in Ad hoc network. Threats in MANET The threats can be divided into two categories passive attack and active attack. • Passive attack is only able to listen or surveillance the network traffic to obtain some secret, without disrupting protocol operation and uses the information gained to breach network security violating confidentiality. • Active attack will control the communication channel by tampering data stream. The active attack might allow adversary to delete messages, and to impersonate a node, thus violating availability, integrity, authentication and non-repudiation. 76 1.2 Cluster Concept in Manets A cluster is one of the ad hoc networks architecture where cluster head (CH) responsible of management of cluster and other nodes that are members to a particular cluster. Clustering is commonly used to limit the amount of routing information. It enhances the routing process and can be used as a framework for key management and distribution. A cluster is formed by a set of nodes gathered around anode which is named as cluster head. The choice of the cluster head is done according to some QoS defined criteria [3]. Cluster heads and gateways are used as special nodes which have added responsibilities over the ordinary participating nodes in the network. A cluster head keeps track of all the members (nodes) in a cluster, and the routing information needed. The gateways are the nodes at the border or edge of a cluster and communicate with the gateways of neighboring clusters. Clustering management has five outstanding advantages over other protocols. First, it uses multiple channels effectively and improves system capacity. Second, it reduces the exchange overhead of control messages and strengthens node management. Third, it is very easy to implement the local synchronization of network. Fourth, it provides quality of service (QoS) routing for multimedia services efficiently. Finally, it can support the wireless networks with a large number of nodes [4] [7]. Figure 1.2: Cluster Manets
  • 3. International Journal of Electronics and Communication Engineering Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 6, June (2014), pp. 75-79 © IAEME 77 Securing Cluster Manets Secure routing is an important and complicated issue. Clustering is commonly used in order to limit the amount of secure routing information. Here the election process is one of the optimal issues. Also any unknown node (not confident) can be eavesdrop the communication and find the identity of these important nodes. This information can be useful for the attacker to plan attacks against the (Certification Authority) CA node in order to disturb the cluster operation. Therefore, if the CA node is compromised, that means that the security of the cluster is calling into question. Therefore clustering based on multi-hop and network reliability has been developed. By this reduced and less mobile cluster heads that will serve for keys exchange is made [5] [6]. 2. LITERATURE REVIEW Heenavarshney and Pradeep Kumar et al [1] have proposed a Secure Communication architecture based on “BBCMS” clustering algorithm. Here the cluster head (CH) is elected according to its weight computed by combining a set of system parameters. In the proposed architecture, the overall network is divided into clusters where the cluster-heads (CH) are connected by virtual networks. For secure data transmission, credential authority (CA) issues a certificate (X.509) to the requested node for authentication. The certificate of a node is renewed or rejected by CH, based on its trust counter value. Noman Mohammed et al [6] have proposed a solution for balancing there source consumption of IDSs among all nodes while preventing nodes from behaving selfishly. To address the selfish behavior, they design incentives in the form of reputation to encourage nodes to honestly participate in the election scheme by revealing their cost of analysis. To address the optimal election issue, they propose a series of local election algorithms that can lead to globally optimal election results with a lowcost. However the percentage of leaders is less in this model. Abderrezak Rachedi and Abderrahim Benslimane [7] have proposed an anonymous protocol to secure nodes which have important roles in the network. Also they presented an Anonymous Dynamic Demilitarized Zone (ADDMZ)to protect the CA node identity and to avoid the single point of failure in the cluster. ADDMZ is formed by a set of confident nodes which have a high trust level between them and their goal is to filter the communication between the cluster member node and the CA node. They present protocol to realize these mechanisms byusing the identity based cryptographic from bilinear maps. However, it is possible to attack RA nodes by selecting randomly nodes at the attacker’s neighborhood, but the risk to detect the attacker is high. YoHan Park et al [9] have proposed a security system for ID-based anonymous cluster-based MANETs to protect the privacy of nodes. Moreover, they propose a threshold signature scheme without pairing computations, which diminishes the computation load on each node. Their proposal satisfies most properties for an anonymous security system and effectively copes with dynamic environments with greater efficiency by using secret sharing schemes. As long as the CH does not reveal the respective polynomials, anonymity of each node is guaranteed. Raihana Ferdous et al [10] have proposed a Cluster head(s) selection algorithm based on an efficient trust model. This algorithm aims to elect trustworthy stable cluster head(s) that can provide secure communication via cooperative nodes. However the way the messages passed through may overload the Cluster head, creating a bottleneck due to additional message exchanges. Another possible limitation is the way that the message authentication between intermediate Cluster heads are treated, where there can be a delay in identifying a malicious neighboring node. Wei Liu et al [11] to enhance the accuracy, they propose the threshold-based mechanism to assess and vindicate warned nodes as legitimate nodes or not, before recovering them. Also they have proposed a new incentive method to release and restore the legitimate nodes, and to improve
  • 4. International Journal of Electronics and Communication Engineering Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 6, June (2014), pp. 75-79 © IAEME the number of available normal nodes in the network. The proposed certificate revocation scheme is effective and efficient to guarantee secure communications in mobile ad hoc networks. However, if the number of these nodes is below the threshold, they cannot collude with the false accusations successfully. 78 Yao Yu and Lincong Zhang et al [12] have proposed a secure clustering algorithm based on reputation in defense of threats in clustering. In the algorithm, the nodes reputation is used to improve security, which is evaluated by combining the experience of the node in the routing process. In addition, they consider degree and relative mobility in the clustering to guarantee the stability of clusters. Moreover, it is efficient in the cluster rebuilding and healing. The proposed algorithm can effectively improve the security and stability of network. However there occurs overhead in the system. 3. PROBLEM IDENTIFICATION AND SOLUTION Security supports are a significant factor in the design of security system in ad hoc networks. It is important to protect the identities of individual nodes to avoid personal privacy concerns. For this, a security system for ID-based anonymous cluster-based MANETs and a threshold signature [9] is proposed to protect the privacy of nodes. Here the basic operations consist of generating pairing parameters, private keys, and secret sharing. Cluster key distribution scheme ensures that the compromise of an arbitrary number of nodes outside the target cluster does not expose the secrecy of non-compromised nodes. Key agreement scheme also ensures secure communication between nodes in intra- and inter clusters. Threshold signature is used such that to verify the cluster member. This scheme support entity anonymity. Only the entities especially of the matched session can know the identity of others with who they are in communication. However the selection of cluster heads is not efficient such that it drains the energy. Also it is not stated about the revoking certificates of malicious nodes which lead to attacks. For providing all these, a solution based upon this has to be provided. Solution The existing schemes are not sufficient for security in MANETs. Main goal is to deploy the secure clustering concept to routing protocol. A proposal regarding an enhanced solution for ad hoc clustering based on multi hops and network density will be used as a framework which takes into account the node mobility and gives major improvements regarding the number of elected cluster heads. Objective is to elect a reduced and less mobile cluster heads that will serve for keys exchange. The idea is to simulate the clustered MANETs, using NS-2 and the performance evaluation is done on basis of security by taking throughput, and packet delivery ratio into consideration. In our solution, first, a trust based cluster head selection algorithm is proposed. Here Cluster head is selected by the mobility of nodes in such a way that, if the nodes with one hop distance are cooperative, the trust matrix of nodes is generated and the TRUST VALUE is computed from the neighbor nodes [10]. Each node monitors others nodes and collects the direct and indirect trust values by means of using mobile agents (ME). This way of cluster head selection improves the network life time. Next, for authentication and confidentiality, cluster set up with pseudonym generation using an ID-based secured system [9] can be used. The nodes that are member of the same cluster try to send the same message by generating a threshold signature and send the message with a threshold signature toa verifier and the CH. Then, the CH checks the validity of messages and signatures and generates and sends additional points to a verifier. Finally, a verifier checks the validity of signatures. Based on the estimated trust values, then a Certificate Revocation technique is used to revoke the certificates of low trusted nodes [11]. To revoke a malicious attacker’s certificate three stages
  • 5. International Journal of Electronics and Communication Engineering Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 6, June (2014), pp. 75-79 © IAEME such as accusing, verifying, and notifying are used here. This in turn improves the accuracy and reliability of the network. 79 On the whole, a secured clustering based approach is provided with key exchange, with improved accuracy and reliability. REFERENCES [1] Heenavarshney and Pradeep Kumar, “Secure Communication Architecture Based On “BBCMS” Clustering Algorithm for Mobile Adhoc Network (MANET)”, International Journal of Innovative Technology and Exploring Engineering (IJITEE), ISSN: 2278-3075, Volume-3, Issue-2, July 2013. [2] Sandeep Kr. Agarwal, Amit Garg and K. V. Arya, “Security Issues Clustering Based Solutions in Mobile Ad-hoc Networks - A Survey”, Journal of International Academy of Physical Sciences, Vol. 16 No.3 (2012). [3] Abdelmajid HAJAMI, Kamal OUDIDI and Mohammed ELKOUTBI, “A Distributed Key Management Scheme based on Multi hop Clustering Algorithm for MANETs”, IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.2, February 2010. [4] R. Shanthy and J. Suji Priya, “An Enhanced Cluster-Based Multi-hop Multipath Routing Protocol for MANETs”, IJCST Vol. 2, Issue 3, September 2011. [5] Hajami, Abdelmajid, Kamal Oudidi, and Mohammed ElKoutbi. “An enhanced algorithm for MANET clustering based on multi hops and network density”, New Technologies of Distributed Systems (NOTERE), 2010 10th Annual International Conference on. IEEE, 2010. [6] Noman Mohammed, Hadi Otrok, Lingyu Wang, Mourad Debbabi and Prabir Bhattacharya, “Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET”, Dependable and Secure Computing, IEEE Transactions on 8.1 (2011). [7] Abderrezak Rachedi and Abderrahim Benslimane, “Security and Pseudo-Anonymity with a Cluster-based approach for MANET”, Global Telecommunications Conference, 2008, IEEE GLOBECOM 2008, IEEE, 2008. [8] V. Anil Kumar, K.Praveen Kumar Rao, E.prasad and N.Gowtham Kumar, “Clustering Based Certificate Revocation in Mobile Ad Hoc Networks”, International Journal of Computer Science and Management Research Vol. 2 Issue 1 January 2013. [9] YoHan Park, YoungHo Park and SangJae Moon, “Anonymous Cluster-Based MANETs with Threshold Signature”, Hindawi Publishing Corporation International Journal of Distributed Sensor Networks Volume 2013, Article ID 374713. [10] Raihana Ferdous, Vallipuram Muthukkumarasamy and Elankayer Sithirasenan, “Trust-based Cluster head Selection Algorithm for Mobile Ad hoc Networks”, Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on. IEEE, 2011. [11] Wei Liu, Hiroki Nishiyama, Nirwan Ansari, Jie Yang, and Nei Kato, “Cluster-based Certificate Revocation with Vindication Capability for Mobile Ad Hoc Networks”, Parallel and Distributed Systems, IEEE Transactions on 2013. [12] Yao Yu and Lincong Zhang, “A Secure Clustering Algorithm in Mobile Ad Hoc Networks”, IPCSIT vol. 29 (2012). [13] Rakesh Kumar, Dr Piush Verma and Dr Yaduvir Singh, “A Review and Comparison of Manet Protocols with Secure Routing Scheme Developed using Evolutionary Algorithms”, International journal of Computer Engineering Technology (IJCET), Volume 3, Issue 2, 2012, pp. 167 - 180, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375.