scispace - formally typeset
Journal ArticleDOI

Cross Layer Integrated Approach for Secured Cluster Selection in Ad Hoc Networks

TLDR
This paper stresses that secure cluster head selection in MANETs has an intense effect on network performance and proposes a secure and effective cluster-head Selection scheme using a cross-layer approach that integrates cluster- head discovery and selection functionality with network ad hoc routing mechanisms and the lower layer drivers built-in the system.
Abstract
Mobile Ad hoc Network (MANET) basically, is a collection of mobile hosts incorporating wireless interfaces that forms a transitory autonomous network. They do not base on fixed infrastructure or central administration, rather work on the principle of self-organized interconnections among mobile nodes. Fundamentally, in MANET when nodes come inside the transmission range of neighboring nodes', they can be detected by each other and can communicate directly. However for communication outside this range they have to depend on some other nodes to relay the messages .This is where routing protocols have to play a very important role. Literature for improving the performance of routing protocol is available in abundance. Among these comes, the hierarchical/cluster-based routing protocols that claim to reduce control overheads. Clustering in Mobile Ad hoc Networks (MANETs) has proved to be advantageous compared to the traditional networks. However the highly dynamic and unstable nature of MANETs makes it intricate for the cluster based routing protocols to split a mobile network into clusters and determination of cluster heads for each cluster. Although much previous research has concentrated on cluster-head selection in MANETs, not much effort has been done on the security side of cluster-head selection. This paper emphasize that secure cluster head selection in MANETs has an intense effect on network performance. Specifically, we stress that in ad hoc network where all the participants are self controlled, security is an essential aspect and the effective cluster-head selection can improve network throughput. We propose a secure and effective cluster-head Selection scheme using a cross-layer approach that integrates cluster-head discovery and selection functionality with network ad hoc routing mechanisms and the lower layer drivers built-in the system. Besides, proposed scheme handle the disconnections in ad hoc network due to the effects of topology changes and battery depletion. This scheme allows clients to switch to better cluster-head nodes as network topology changes. Hence, provides better performance to network.

read more

Citations
More filters
Journal ArticleDOI

ISFC-BLS (Intelligent and Secured Fuzzy Clustering Algorithm Using Balanced Load Sub-Cluster Formation) in WSN Environment

TL;DR: Experimental results and performance analysis demonstrate that ISFC-BLS is more effective and secure than energy efficient heterogeneous ring clustering and other existing clustering techniques, for enhancing the networks lifetime and achieving better energy efficiency by decreasing the number of control messages and the node energy consumption.
Proceedings ArticleDOI

Clustering Algorithms in MANETs: A Review

TL;DR: The various approaches for clustering focus on different performance metrics such as mobility, energy, degree, weight etc are considered and their advantages and disadvantages are discussed.
Proceedings ArticleDOI

A Fuzzy Approach for Secure Clustering in MANETs: Effects of Distance Parameter on System Performance

TL;DR: This paper introduces various approaches for clustering focused on different performance metrics and presents and compares two Fuzzy based systems for improving the security of cluster nodes in MANETs.
Proceedings ArticleDOI

Improving Node Security in MANET Clusters: A Comparison Study of Two Fuzzy-Based Systems

TL;DR: This paper introduces various approaches for clustering focus on different performance metrics and presents and compares two Fuzzy based systems for improving the security of cluster nodes in MANETs.
References
More filters
Book

Computer Security

TL;DR: This new edition of this self-study guide includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection.

Routing in Clustered Multihop, Mobile Wireless Networks With Fading Channel

C C. Chiang
TL;DR: A packet delay improvement up to fourfold has been observed in the authors' simulations compared with shortest-path scheme, making multimedia tra c viable and a radio channel model has been included to investigate the impact of channel fading on their protocols.
Posted Content

Survey of clustering algorithms for MANET

TL;DR: A survey of different clustering schemes for ad hoc networks, developed by researchers which focus on different performance metrics is presented.
Book

Security in wireless ad hoc networks

TL;DR: This survey chapter aims to provide a state-of-the-art view of security in wireless ad hoc networks, followed by the current state of research and development in this area, which includes algorithms, architectures, and network management schemes.
Related Papers (5)
Trending Questions (1)
What is the name of network topology in which each node is connected independently using a switch or hub?

This scheme allows clients to switch to better cluster-head nodes as network topology changes.