Title | ||
---|---|---|
REputation based Clustering Algorithm for security management in ad hoc networks with liars. |
Abstract | ||
---|---|---|
Clustering in ad hoc networks consists in dividing the network into clusters (groups) managed by elected nodes called clusterheads. This technique has been used for different goals as routing efficiency, transmission management and information collection. As far as we know, no existing clustering algorithms have taken into account the existence of malicious nodes for clusterheads election and maintenance. These nodes can lie to be elected as clusterheads. Consequently the network might be managed by most of them. To solve this problem, we propose a reputation based clustering algorithm (RECA) that aims to elect trustworthy, stable and high energy clusterheads that can be used to manage the security of the network. Simulations were conducted to evaluate RECA performances in the presence of liars. Results show that it converges to a stable and convenient network division into clusters with no untrustworthy clusterheads and mainly one hop members. |
Year | DOI | Venue |
---|---|---|
2009 | 10.1504/IJICS.2009.031032 | International Journal of Information and Computer Security |
Keywords | DocType | Volume |
security management,clusterheads election,high energy clusterheads,existing clustering algorithm,untrustworthy clusterheads,reca converges,convenient network division,different goal,hop member,malicious node,simulation result,protocols,trust,clustering algorithms,network simulator,security,ad hoc network,algorithm design and analysis,clustering,ad hoc networks | Journal | 3 |
Issue | ISBN | Citations |
3/4 | 978-1-4244-3309-4 | 3 |
PageRank | References | Authors |
0.41 | 8 | 3 |
Name | Order | Citations | PageRank |
---|---|---|---|
Mohamed Elhoucine Elhdhili | 1 | 26 | 6.25 |
Lamia Ben Azzouz | 2 | 26 | 4.26 |
Farouk Kamoun | 3 | 548 | 213.48 |