[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Performance of Optimized Security Overhead Using Clustering Technique Based on Fuzzy Logic for Mobile ad hoc Network

Published: 01 March 2023 Publication History

Abstract

MANET is an autonomous wireless network without any centralized authority, consisting of a dynamic topology with a multi-hop scenario. Clustering provides centralized authority within MANET and makes the network stable up to some extent. Security is one of the most challenging aspects, directly proportional to load and overhead over the network. The model being proposed uses a cluster-based technique and modified secure routing protocol, which minimizes the network’s load and overhead, improving the network’s security and performance. Two major factors are used as contribution level and stability factor for the choice of cluster head, which minimizes the method of re-selection for cluster head. The node addition using authentication and the Modified Secure Routing Protocol increases the security of the network. The Modified Secure Routing Protocol, based on limited and efficient use of the certificates with encryption and decryption of packets, minimizes the overhead and load over the network. Hence, it provides more efficiency and security.

References

[1]
Sen, J. Security and Privacy Issues in Wireless Mesh Networks: A Survey. – Wireless Networks and Security: Issues, Challenges and Research Trends, 2013, pp. 189-272.
[2]
Shivangi, S., A. K. Daniel. Fuzzy Logic Based Clusterhead Selection Protocol under Competence Level, Goodness Funciton and Mobility for Mobile ad hoc Network. – In: Proc. of Conference on IT in Business, Industry and Government (CSIBIG’14), 2014, pp. 1-6.
[3]
Shivangi, S., A. K. Daniel. Cluster Head Selection Protocol under Node Degree, Competence Level and Goodness Factor for Mobile ad hoc Network Using AI Technique. – In: Proc. of 4th International Conference on Advanced Computing & Communication Technologies, 2014, pp. 415-420.
[4]
Xukai, Z., B. Ramamurthy. A Simple Group Diffie-Hellman Key Agreement Protocol without Member Serialization. – In: Proc. of 1st International Symposium, Computational and Information Science (CIS’04), Shanghai, China, 16-18 December 2004. Berlin, Heidelberg, Springer, 2005, pp. 725-731.
[5]
Kafhali, S. E., A. Haqiq. Effect of Mobility and Traffic Models on the Energy Consumption in MANET Routing Protocols. – arXiv preprint arXiv, 2013, pp. 1304-3259.
[6]
Kumar, C. K., A. K. S. Sanger. Securing Mobile ad hoc Networks: Key Management and Routing. – arXiv preprint arXiv, 2012, pp. 1205-2432.
[7]
Houssein, H., S. A. Shahrestani. Fuzzy Trust Approach for Wireless ad hoc Networks. – Communications of the IBIMA, Vol. 1, 2008, pp. 212-218.
[8]
Vijayan, R., V. Mareeswari, K. Ramakrishna. Energy Based Trust Solution for Detecting Selfish Nodes in MANET Using Fuzzy Logic. – International Journal of Research and Reviews in Computer Science, Vol. 2, 2011, No 3, pp. 647-652.
[9]
Brust, M. R., et al. Topology-Based Clusterhead Candidate Selection in Wireless ad hoc and Sensor Networks. – In: Proc. of 2nd International Conference on Communication Systems Software and Middleware, IEEE, 2007, pp. 1-8.
[10]
Yang, Ya-tao, et al. A Feasible Key Management Scheme in Adhoc Network. – In: Proc. of 9th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD’07), Vol. 1, IEEE, 2007, pp. 300-303.
[11]
Singh, Y. A., et al. Increasing Efficiency of Sensor Nodes by Clustering in Section Based Hybrid Routing Protocol with Artificial Bee Colony. – Procedia Computer Science, Vol. 171, 2020, pp. 887-896.
[12]
Gurumoorthy, K. B., et al. A Novel Clustering Method for Fault Recovery and Routing in Mobile ad hoc Networks. – International Journal of Communication Systems, Vol. 34, 2021, No 15, e4937.
[13]
Mohammed, A. S., et al. FCO – Fuzzy Constraints Applied Cluster Optimization Technique for Wireless ad hoc Networks. – Computer Communications, Vol. 154, 2020, pp. 501-508.
[14]
Boddu, N., V. Boba, R. Vatambeti. A Novel Georouting Potency Based Optimum Spider Monkey Approach for Avoiding Congestion in Energy Efficient Mobile ad hoc Network. – Wireless Personal Communications, Vol. 127, 2022, No 2, pp. 1157-1186.
[15]
Fatemidokht, H., M. K. Rafsanjani. QMM-VANET: An Efficient Clustering Algorithm Based on QoS and Monitoring of Malicious Vehicles in Vehicular ad hoc Networks. – Journal of Systems and Software, Vol. 165, 2020, pp. 3-16.
[16]
Nagendranath, M. V. S. S., A. Ramesh Babu. An Efficient Mobility Aware Stable and Secure Clustering Protocol for Mobile ADHOC Networks. – Peer-to-Peer Networking and Applications, Vol. 13, 2020, pp. 1185-1192.

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Cybernetics and Information Technologies
Cybernetics and Information Technologies  Volume 23, Issue 1
Mar 2023
175 pages
ISSN:1314-4081
EISSN:1314-4081
Issue’s Table of Contents
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.

Publisher

Walter de Gruyter GmbH

Berlin, Germany

Publication History

Published: 01 March 2023

Author Tags

  1. Security
  2. overhead
  3. load
  4. cluster
  5. fuzzy logic
  6. goodness factor
  7. competence level
  8. stability factor
  9. mobility
  10. contribution level

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 0
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 17 Jan 2025

Other Metrics

Citations

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media