2015
DOI: 10.1007/s11277-015-3010-1
|View full text |Cite
|
Sign up to set email alerts
|

A Preference-Based Protocol for Trust and Head Selection for Cluster-Based MANET

Abstract: Privacy is vital for outsized and opaque ad hoc networks. A preference-based protocol for trust and head selection (2PTH) algorithm is proposed for communication privacy from intermediate malicious nodes. A 2PTH algorithm is a combination of preference-based trust selection algorithm (PTA) and preference-based head election algorithm (PHA). To discover routes with trusted nodes, PTA is proposed for determining a route without malevolent nodes for forwarding packets based on Weight assignment to trust parameter… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 15 publications
(11 citation statements)
references
References 29 publications
0
11
0
Order By: Relevance
“…The difficulties in implementation and debugging routing protocols in real networks, raises the necessity to consider simulations as a fundamental design tool. The main advantage of simulation is simplifying analysis and protocol verification, mainly in large-scale systems [20][21][22][23][24][25][26][27][28][29][30][31][32][33]. It is possible to employ a NAM in the NS-2 to visualize the results.…”
Section: B Simulation Setup and Comparing Algorithmsmentioning
confidence: 99%
“…The difficulties in implementation and debugging routing protocols in real networks, raises the necessity to consider simulations as a fundamental design tool. The main advantage of simulation is simplifying analysis and protocol verification, mainly in large-scale systems [20][21][22][23][24][25][26][27][28][29][30][31][32][33]. It is possible to employ a NAM in the NS-2 to visualize the results.…”
Section: B Simulation Setup and Comparing Algorithmsmentioning
confidence: 99%
“…It may be classified as one hop clustering [25], [29], [30], [40], [45]- [53], multi hop clustering [28], [31], [34]- [36], [39], [42], [43], [54], [55], transmission range or signal strength based clustering [32], [33], [56]- [58] and zone based clustering [38]. MANETs can be classified based on a mobility model such as group mobility [51], [56], [59], [60], regular mobility [46] and random mobility [25], [28], [29], [31], [34], [35], [39], [40], [42], [44], [45], [48], [50], [52], [53], [55], [58], [61]- [64]. The nature of events that take place in MANETs has a very strong impact on clustering process and the clustering process can be classified into proactive clustering [25], [26],…”
Section: How To Classify Clustering Schemes?mentioning
confidence: 99%
“…The values for the weights are purely decided by the empirical way. At the same time, they are decided by MANET application and QoS parameters that a user would give higher priority [24].…”
Section: Trust Updatementioning
confidence: 99%