A secure dominating set based routing and key management scheme in mobile ad hoc network

作者: R. Pushpalakshmi , A. Vincent Antony Kumar

DOI:

关键词:

摘要: In Mobile Ad hoc Network (MANET) nodes communicate with each other using shared wireless medium. Due to their distributed nature and dynamic topology, MANET is less secured than wired network. To enhance the security of MANET, it important establish routing path based on trustworthiness node in Most existing protocols mainly focus at finding efficient path. deal effect malicious node, can be taken into consideration decision making. A protocol dominating set clustering algorithm presented this paper. The dominator formed trust ability probability future contact This paper present a adaptive neuro fuzzy logic controller evaluate level composite key management technique used for effective within cluster. Simulation results show that proposed provides bypass

参考文章(14)
Jie Wu, Hailan Li, A Dominating-Set-Based Routing Scheme in Ad Hoc Wireless Networks Telecommunication Systems. ,vol. 18, pp. 13- 36 ,(2001) , 10.1023/A:1016783217662
Yi Zhang, Lina Zhu, Li Feng, Key Management and Authentication in Ad Hoc Network based on Mobile Agent Journal of Networks. ,vol. 4, pp. 487- 494 ,(2009) , 10.4304/JNW.4.6.487-494
Jie Wu, Hailan Li, On calculating connected dominating set for efficient routing in ad hoc wireless networks international workshop on discrete algorithms and methods for mobile computing and communications. pp. 7- 14 ,(1999) , 10.1145/313239.313261
Hongjun Dai, Zhiping Jia, Zhiwei Qin, Trust Evaluation and Dynamic Routing Decision Based on Fuzzy Theory for MANETs Journal of Software. ,vol. 4, pp. 1091- 1101 ,(2009) , 10.4304/JSW.4.10.1091-1101
Wassim El-Hajj, Zouheir Trabelsi, Dionysios Kountanis, None, Fast distributed dominating set based routing in large scale MANETs Computer Communications. ,vol. 30, pp. 2880- 2891 ,(2007) , 10.1016/J.COMCOM.2007.03.011
S.S. Manvi, P. Venkataram, Mobile agent based approach for QoS routing Iet Communications. ,vol. 1, pp. 430- 439 ,(2007) , 10.1049/IET-COM:20050457
R. PushpaLakshmi, A. Vincent Antony Kumar, Security aware minimized dominating set based routing in MANET 2010 Second International conference on Computing, Communication and Networking Technologies. pp. 1- 5 ,(2010) , 10.1109/ICCCNT.2010.5591709
Ariyam Das, Manish Aasawat, Chittaranjan Mandal, Chris Reade, An improved greedy construction of minimum connected dominating sets in wireless networks wireless communications and networking conference. pp. 790- 795 ,(2011) , 10.1109/WCNC.2011.5779233
Lidong Zhou, Z.J. Haas, Securing ad hoc networks IEEE Network. ,vol. 13, pp. 24- 30 ,(1999) , 10.1109/65.806983
Anuradha Banerjee, Paramartha Dutta, Link Stability and Node Energy Conscious Local Route-Repair Scheme for Mobile Ad Hoc Networks American Journal of Applied Sciences. ,vol. 7, pp. 1139- 1147 ,(2010) , 10.3844/AJASSP.2010.1139.1147