Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 608984, 6 pages
http://dx.doi.org/10.1155/2014/608984
Research Article

Secure and Fair Cluster Head Selection Protocol for Enhancing Security in Mobile Ad Hoc Networks

1Department of Computer Science and Engineering, National Engineering College, Kovilpatti, Tamil Nadu 628503, India
2Department of Information Technology, National Engineering College, Kovilpatti, Tamil Nadu 628503, India

Received 27 December 2013; Accepted 6 March 2014; Published 27 March 2014

Academic Editors: Z. Yu and W. Zhang

Copyright © 2014 B. Paramasivan and M. Kaliappan. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. I. Chlamtac, M. Conti, and J. J. Liu, “Mobile Ad Hoc networking: imperatives and challenges,” Ad Hoc Networks, vol. 1, no. 1, pp. 13–64, 2003. View at Publisher · View at Google Scholar · View at Scopus
  2. C. Tselikis, S. Mitropoulos, N. Komninos, and C. Douligeris, “Degree-based clustering algorithms for wireless Ad Hoc networks under attack,” IEEE Communications Letters, vol. 16, no. 5, pp. 619–621, 2012. View at Publisher · View at Google Scholar · View at Scopus
  3. J. Y. Yu and P. H. J. Chong, “A survey of clustering schemes for mobile Ad Hoc networks,” IEEE Communications Surveys and Tutorials, vol. 7, no. 1, pp. 32–48, 2005. View at Publisher · View at Google Scholar
  4. M. Bechler, H. Hof, D. Kraft, F. Pählke, and L. Wolf, “A cluster-based security architecture for Ad Hoc networks,” in Proceedings of the 23rd AnnualJoint Conference of the IEEE Computer and Communications Societies (INFOCOM '04), vol. 4, pp. 2393–2403, March 2004. View at Publisher · View at Google Scholar · View at Scopus
  5. W. J. Adams and N. J. Davis, “Toward a decentralized trust-based access control system for dynamic collaboration,” in Proceedings of the 6th Annual IEEE System, Man and Cybernetics Information Assurance Workshop (SMC '05), pp. 317–324, June 2005. View at Publisher · View at Google Scholar · View at Scopus
  6. A. Boukerche and Y. Ren, “A security management scheme using a novel computational reputation model for wireless and mobile Ad Hoc networks,” in Proceedings of the 5th ACM International Symposium on Performance Evaluation of Wireless Ad-Hoc, Sensor, and Ubiquitous Networks (PE-WASUN '08), pp. 88–95, October 2008. View at Publisher · View at Google Scholar · View at Scopus
  7. R. Li, J. Li, P. Liu, and H. Chen, “An objective trust management framework for mobile Ad Hoc networks,” in Proceedings of the IEEE 65th Vehicular Technology Conference (VTC '07), pp. 56–60, April 2007. View at Publisher · View at Google Scholar · View at Scopus
  8. G. Theodorakopoulos and J. S. Baras, “Trust evaluation in ad-hoc networks,” in Proceedings of the ACM Workshop on Wireless Security (WiSe '04), pp. 1–10, October 2004. View at Scopus
  9. T. Jiang and J. S. Baras, “Ant-based adaptive trust evidence distribution in MANET,” in Proceedings of the 24th International Conference on Distributed Computing Systems Workshops, pp. 588–593, March 2004. View at Scopus
  10. Z. Yan, P. Zhang, and T. Virtan, “Trust evaluation based security solution in Ad Hoc networks,” in Proceedings of 7th Nordic Workshop on Secure IT Systems, 2003.
  11. A. A. Pirzada and C. McDonald, “Establishing trust in pure ad-hoc networks,” in Proceedings of the 27th Australasian Conference on Computer Science (ACSC '04), vol. 26, pp. 47–54, 2004.
  12. T. Ghosh, N. Pissinou, and K. Makki, “Collaborative trust-based secure routing in multihop Ad Hoc networks,” in NETWORKING 2004. Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communications: Proceedings of the 3rd International IFIP-TC6 Networking Conference, Athens, Greece, May 9–14, 2004, vol. 3042 of Lecture Notes in Computer Science, pp. 1446–1451, 2004. View at Publisher · View at Google Scholar
  13. T. Ghosh, N. Pissinou, and K. Makki, “Towards designing a trusted routing solution in mobile Ad Hoc networks,” Mobile Networks and Applications, vol. 10, no. 6, pp. 985–995, 2005. View at Publisher · View at Google Scholar · View at Scopus
  14. F. Milan, J. J. Jaramillo, and R. Srikant, “Achieving cooperation in multihop wireless networks of selfish nodes,” in Proceedings of the Workshop on Game Theory for Communications and Networks (GameNets '06), October 2006. View at Publisher · View at Google Scholar · View at Scopus
  15. H. Safa, H. Artail, and D. Tabet, “A cluster-based trust-aware routing protocol for mobile Ad Hoc networks,” Wireless Networks, vol. 16, no. 4, pp. 969–984, 2010. View at Publisher · View at Google Scholar · View at Scopus
  16. M. Chatterjee, S. K. Das, and D. Turgut, “WCA: a weighted clusrering algorithm for mobile Ad Hoc networks,” Journal of Cluster Computing, vol. 5, no. 2, pp. 193–204, 2002. View at Publisher · View at Google Scholar
  17. P. Chatterjee, I. Sengupta, and S. K. Ghosh, “STACRP: a secure trusted auction oriented clustering based routing protocol for MANET,” Cluster Computing, vol. 15, pp. 303–320, 2012. View at Publisher · View at Google Scholar · View at Scopus
  18. M. Chatterjee, S. K. Das, and D. Turgut, “WCA: a weighted clustering algorithm for mobile Ad Hoc networks,” Journal of Cluster Computing, vol. 5, no. 2, pp. 193–204, 2002. View at Publisher · View at Google Scholar
  19. NS-2 Simulator, 2006, http://www.isi.edu/nsnam/ns.