2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI) 2015
DOI: 10.1109/icacci.2015.7275742
|View full text |Cite
|
Sign up to set email alerts
|

Weightage based Secure Energy Efficient Clustering algorithm in MANET

Abstract: the research in Mobile Ad-hoc Network remains winsome due to the crave to obtain better performance and scalability. Mobile ad hoc network is an unstructured selfforming radio mesh of moving nodes. There is no median approach for interaction of mobile nodes. In MANET nodes are mobile in nature and it became challenging to handle them while preserving the energy. Misbehavior, Mobility, Congestion are some factors that always degrade the performance of network.In this paper we propose a WSEEC (Weightage based Se… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…If the masterkey is compromised it does not affect the network resisting from outside nodes and stop producing the keys for further communication but on the whole it lacks inside security to enhance the network performance. An authentication mechanism to secure AODV protocol was designed by Preet.et.al., which focused to differentiate unauthorized user to authorized one using the principle of prime factorization [5]. This process may suffer from RREQ flooding which may affect the secure routing and degrade the performance of the network.…”
Section: Literature Surveymentioning
confidence: 99%
“…If the masterkey is compromised it does not affect the network resisting from outside nodes and stop producing the keys for further communication but on the whole it lacks inside security to enhance the network performance. An authentication mechanism to secure AODV protocol was designed by Preet.et.al., which focused to differentiate unauthorized user to authorized one using the principle of prime factorization [5]. This process may suffer from RREQ flooding which may affect the secure routing and degrade the performance of the network.…”
Section: Literature Surveymentioning
confidence: 99%
“…Roda implemented an energy‐aware clustering technique and used weighted approach for the selection of CH. Alghamdi et al proposed an energy‐efficient adaptive forwarding scheme that divides the network into groups based on their transmission‐power rate.…”
Section: Related Workmentioning
confidence: 99%