dc.contributor.convenor | Guojun Wang | |
dc.contributor.author | Ferdous, Raihana | |
dc.contributor.author | Muthukkumarasamy, Vallipuram | |
dc.contributor.author | Sithirasenan, Elankayer | |
dc.contributor.editor | Wang, G | |
dc.contributor.editor | Tate, SR | |
dc.contributor.editor | Chen, JJ | |
dc.contributor.editor | Sakurai, K | |
dc.date.accessioned | 2017-05-03T14:27:42Z | |
dc.date.available | 2017-05-03T14:27:42Z | |
dc.date.issued | 2011 | |
dc.date.modified | 2012-02-20T05:47:54Z | |
dc.identifier.isbn | 9780769546001 | |
dc.identifier.issn | 2324-898X | |
dc.identifier.refuri | http://trust.csu.edu.cn/conference/trustcom2011/ | |
dc.identifier.doi | 10.1109/TrustCom.2011.76 | |
dc.identifier.uri | http://hdl.handle.net/10072/42976 | |
dc.description.abstract | Mobile Ad hoc Networks (MANETs) consist of a large number of relatively low-powered mobile nodes communicating in a network using radio signals. Clustering is one of the techniques used to manage data exchange amongst interacting nodes. Each group of nodes has one or more elected Cluster head(s), where all Cluster heads are interconnected for forming a communication backbone to transmit data. Moreover, Cluster heads should be capable of sustaining communication with limited energy sources for longer period of time. Misbehaving nodes and cluster heads can drain energy rapidly and reduce the total life span of the network. In this context, selection of best cluster heads with trusted information becomes critical for the overall performance. In this paper, we propose Cluster head(s) selection algorithm based on an efficient trust model. This algorithm aims to elect trustworthy stable cluster head(s) that can provide secure communication via cooperative nodes. Simulations were conducted to evaluate trusted Cluster head(s) in terms of clusters stability, longevity and throughput. | |
dc.description.peerreviewed | Yes | |
dc.description.publicationstatus | Yes | |
dc.format.extent | 514609 bytes | |
dc.format.mimetype | application/pdf | |
dc.language | English | |
dc.publisher | IEEE | |
dc.publisher.place | USA | |
dc.relation.ispartofstudentpublication | Y | |
dc.relation.ispartofconferencename | Int Joint Conference of 10th IEEE Int Conf on Trust, Security and Privacy in Computing and Communications (TrustCom) / 8th IEEE Int Conf on Embedded Software and Systems (ICESS) / 6th Int Conf on Frontier of Computer Science and Technology (FCST) | |
dc.relation.ispartofconferencetitle | TRUSTCOM 2011: 2011 INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11 | |
dc.relation.ispartofdatefrom | 2011-11-16 | |
dc.relation.ispartofdateto | 2011-11-18 | |
dc.relation.ispartoflocation | Changsha, PEOPLES R CHINA | |
dc.relation.ispartofpagefrom | 589 | |
dc.relation.ispartofpagefrom | 8 pages | |
dc.relation.ispartofpageto | 596 | |
dc.relation.ispartofpageto | 8 pages | |
dc.rights.retention | Y | |
dc.subject.fieldofresearch | Communications engineering not elsewhere classified | |
dc.subject.fieldofresearchcode | 400699 | |
dc.title | Trust-based Cluster head Selection Algorithm for Mobile Ad hoc Networks | |
dc.type | Conference output | |
dc.type.description | E1 - Conferences | |
dc.type.code | E - Conference Publications | |
gro.faculty | Griffith Sciences, School of Information and Communication Technology | |
gro.rights.copyright | © 2011 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. | |
gro.date.issued | 2011 | |
gro.hasfulltext | Full Text | |
gro.griffith.author | Muthukkumarasamy, Vallipuram | |