Show simple item record

dc.contributor.convenorGuojun Wang
dc.contributor.authorFerdous, Raihana
dc.contributor.authorMuthukkumarasamy, Vallipuram
dc.contributor.authorSithirasenan, Elankayer
dc.contributor.editorWang, G
dc.contributor.editorTate, SR
dc.contributor.editorChen, JJ
dc.contributor.editorSakurai, K
dc.date.accessioned2017-05-03T14:27:42Z
dc.date.available2017-05-03T14:27:42Z
dc.date.issued2011
dc.date.modified2012-02-20T05:47:54Z
dc.identifier.isbn9780769546001
dc.identifier.issn2324-898X
dc.identifier.refurihttp://trust.csu.edu.cn/conference/trustcom2011/
dc.identifier.doi10.1109/TrustCom.2011.76
dc.identifier.urihttp://hdl.handle.net/10072/42976
dc.description.abstractMobile Ad hoc Networks (MANETs) consist of a large number of relatively low-powered mobile nodes communicating in a network using radio signals. Clustering is one of the techniques used to manage data exchange amongst interacting nodes. Each group of nodes has one or more elected Cluster head(s), where all Cluster heads are interconnected for forming a communication backbone to transmit data. Moreover, Cluster heads should be capable of sustaining communication with limited energy sources for longer period of time. Misbehaving nodes and cluster heads can drain energy rapidly and reduce the total life span of the network. In this context, selection of best cluster heads with trusted information becomes critical for the overall performance. In this paper, we propose Cluster head(s) selection algorithm based on an efficient trust model. This algorithm aims to elect trustworthy stable cluster head(s) that can provide secure communication via cooperative nodes. Simulations were conducted to evaluate trusted Cluster head(s) in terms of clusters stability, longevity and throughput.
dc.description.peerreviewedYes
dc.description.publicationstatusYes
dc.format.extent514609 bytes
dc.format.mimetypeapplication/pdf
dc.languageEnglish
dc.publisherIEEE
dc.publisher.placeUSA
dc.relation.ispartofstudentpublicationY
dc.relation.ispartofconferencenameInt Joint Conference of 10th IEEE Int Conf on Trust, Security and Privacy in Computing and Communications (TrustCom) / 8th IEEE Int Conf on Embedded Software and Systems (ICESS) / 6th Int Conf on Frontier of Computer Science and Technology (FCST)
dc.relation.ispartofconferencetitleTRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11
dc.relation.ispartofdatefrom2011-11-16
dc.relation.ispartofdateto2011-11-18
dc.relation.ispartoflocationChangsha, PEOPLES R CHINA
dc.relation.ispartofpagefrom589
dc.relation.ispartofpagefrom8 pages
dc.relation.ispartofpageto596
dc.relation.ispartofpageto8 pages
dc.rights.retentionY
dc.subject.fieldofresearchCommunications engineering not elsewhere classified
dc.subject.fieldofresearchcode400699
dc.titleTrust-based Cluster head Selection Algorithm for Mobile Ad hoc Networks
dc.typeConference output
dc.type.descriptionE1 - Conferences
dc.type.codeE - Conference Publications
gro.facultyGriffith Sciences, School of Information and Communication Technology
gro.rights.copyright© 2011 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
gro.date.issued2011
gro.hasfulltextFull Text
gro.griffith.authorMuthukkumarasamy, Vallipuram


Files in this item

This item appears in the following Collection(s)

  • Conference outputs
    Contains papers delivered by Griffith authors at national and international conferences.

Show simple item record