Re-Clustering Approach using WCA in DSR and OLSR Routing Protocols in MANET
Journal: Bonfring International Journal of Networking Technologies and Applications (Vol.3, No. 2)Publication Date: 2016-06-30
Authors : Harshit Prakash Patidar; Neetu Sharma;
Page : 04-12
Keywords : Mobile Ad-hoc Network; Clustering; Clusterhead; Key-server;
Abstract
Based on the characteristic of the Mobile Ad-hoc Network (MANET), this paper recommends a secure protocol of MANET by the uses of the Weighted Clustering Algorithm. All the nodes within the networks are flustered into several clusters in the protocols. Here, we analyze how to compute the genuine value between the nodes according to their communication performances. We can justify where the connection between the two nodes is trustable or not by the genuine value. According to the number of the trustable connections, we can choose the clusterhead within the cluster and the nodes which have trustable connection with clusterhead will be the core nodes. The clusterhead and core nodes can work together to be the service group for the cluster; the service group is in charge of giving service for various requests from cluster members. Each node will share a secret information which will be a part of a secret key for itself and come into being the authentication factor in the proceeding of investigation about the update requirement in the next circle. The secret share can also be authenticated by the node itself. Once a node has been confirmed as a malicious node, clusterhead will broadcast the information to all the cluster members and refuse to provide update services for that particular malicious node. The protocol has absolute forward and backward privacy. The keys of nodes and cluster are generated after conversation among the service group members, man-in-the-middle attack can be resisted by this way. At the same time, the cluster can complete the periodic update, the clusterhead will be re-selected, the service group will be reformed, consequently, the key of cluster and nodes will update as well. Above all, what we have done in this paper will make assure the MANET will run in a safe mode and more efficient way.
Other Latest Articles
- DETERMINANTS OF VOLUNTARY DISCLOSURE QUALITY IN EMERGING ECONOMIES: EVIDENCE FROM FIRMS LISTED IN NIGERIA STOCK EXCHANGE
- Analysis and Motivation for Green Computing, an Approach in India
- Geometric and Physical Modeling of Natural Intelligence
- Secondary Traumatic Stress: The Impact of Exposure to Indirect Trauma on Helping Professionals and Students in Training
- E-WASTE MANAGEMENT SYSTEM: NEGROS ORIENTAL STATE UNIVERSITY, DUMAGUETE CITY, PHILIPPINES
Last modified: 2016-07-14 19:47:18