Optimising on trust value-based clustering using trust evaluation scheme for ad hoc network Online publication date: Wed, 02-Mar-2016
by P. Annadurai; S. Yazhini
International Journal of Security and Networks (IJSN), Vol. 11, No. 1/2, 2016
Abstract: In ad hoc networks, routing and security are a very challenging task due to their peculiar characteristics. Among various routing schemes and providing security for optimising on trust value-based clustering using trust evaluation scheme (CTES) for ad hoc network is based on an efficient trust model. This algorithm aims to elect trustworthy cluster heads that can provide secure communication via cooperative nodes and is used to settle down many secured applications in ad hoc networks. Thus, the trust level of a node must be dynamically taken into consideration in the parameter used for cluster head election. Furthermore, nodes energy, mobility, distance to neighbours and connectivity degree are also used for cluster heads election to make CTES result in a trustworthy, stable and high-energy cluster heads. Simulations were conducted to evaluate trusted cluster head(s) in terms of cluster stability, packet delivery ratio and an average end to end delivery.
Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Security and Networks (IJSN):
Login with your Inderscience username and password:
Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.
If you still need assistance, please email subs@inderscience.com