Skip to main content

Maximum-Objective-Trust Clustering Solution and Analysis in Mobile Ad Hoc Networks

  • Conference paper
High Performance Computing and Communications (HPCC 2007)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4782))

Abstract

In mobile-AdHoc networks (MANETs), many applications need the support of layer-structure. Clustering solution is the most widely used layer-structure and the choosing of clusterheads is the key problem of all. Traditional ways of clustering lack of instructions of trust mechanisms. This paper presents a maximum-objective-trust-based clustering solution (MOTBCS), which aims at the opinion of maximum stable links and energy viewpoint and gives nodes their objective trust estimation. This solution can be better suitable for the realistic working environments for MANETs. We make necessary simulations for our design and results show that MOTBCS can generate more stable clustering groups. It also has less communication costs and better efficiency than other clustering algorithms.

This research was supported by the National Grand Fundamental Research 973 Program of China under Grant No. 2003CB314802 and the National 863 Development Plan of China under Grant No. 2006AA01Z401.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Varadharajan, V., Shankaran, R., Hitchens, M.: Security for Cluster Based Ad hoc Networks. Computer Communications 27(5), 488–501 (2004)

    Article  Google Scholar 

  2. Ephrem ides, A., Wieselth ier, J.E., Baker, D.J.: A design concept for reliable mobile radio networks with frequency hopping signaling[A]. Proceedings of IEEE[C] 75(1), 56–73 (1987)

    Article  Google Scholar 

  3. Gerla, M., sai, T., Multicluster, J.T.C.: mobile, multimedia radio network [J ]. Wireless Networks 1, 255–265 (1995)

    Article  Google Scholar 

  4. Parekh, A.K.: Selecting Routers in Ad-Hoc Wireless Networks. In: Proceeding of the SBT/IEEE International Tele. Symposium (1994)

    Google Scholar 

  5. Basagni, S.: Distributed clustering for ad hoc networks[C]. In: Proceedings of International Symposium on Parallel Architectures[C], Algorithms and Networks, pp. 310–315 (1999)

    Google Scholar 

  6. Chatterjee, M., Das, S.K., Turgut, D.: WCA: a weighted clustering algorithm for mobile Ad Hoc networks [J ]. Journal of Cluster computing, Special issue on Mobile Ad hoc Networking, 193–204 (2002)

    Google Scholar 

  7. Chatterjee, M., Das, S.K., Turgut, D.: An on-demand weighted clustering algorithm (WCA ) for ad hoc networks[A]. In: Proceedings of IEEE GLOBECOM 2000 [C], San Francisco, pp. 1697–1701. IEEE Computer Society Press, Los Alamitos (2000)

    Google Scholar 

  8. Krishna, P., Vaidya, N.H., Chatterjee, M., et al.: A cluster based approach for routing in Ad Hoc networks[J ]. ACM SIGCOMM Computer Communication Review (CCR) (1997)

    Google Scholar 

  9. Amis, A.D., Prakash, R., Vuong, T.H., Huynh, D.T.: Max-M in D-Cluster formation in wireless Ad Hoc networks [C]. In: Proceedings IEEE INFOCOM 2000, Israel (2000)

    Google Scholar 

  10. Basu, P., Khan, N., Little, T.D.C.: Amobility based metric for clustering in mobile Ad Hoc networks [C]. In: Proceedings of IEEE ICDCS 2001 Workshop on Wireless Networks and Mobile computing, Phoenix, A Z, pp. 413–418. IEEE Computer Society Press, Los Alamitos (2001)

    Google Scholar 

  11. Zhang, Q., Li, D., Gong, Z., et al.: EDDTSTM: A Time-Nonlinear-Sensitive Trust Model Based on Human Mental Peculiarity in Virtual Computing Environments. Guangzhou, China. In: Proceeding of CIS. vol. 1, pp. 62–67 (2006)

    Google Scholar 

  12. Kuang, X.-H.: Research of Group Key Management in Mobile Ad hoc Networks. PhD thesis, National University of Defense Technology, Changsha, Hunan, P.R. China (2003)

    Google Scholar 

  13. Hu, G.-M.: Research on Key Security Issues in Clustered Mobile Ad hoc Networks. PhD thesis, National University of Defense Technology, Changsha, Hunan, P.R. China (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Ronald Perrott Barbara M. Chapman Jaspal Subhlok Rodrigo Fernandes de Mello Laurence T. Yang

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhang, Q., Hu, G., Gong, Z. (2007). Maximum-Objective-Trust Clustering Solution and Analysis in Mobile Ad Hoc Networks. In: Perrott, R., Chapman, B.M., Subhlok, J., de Mello, R.F., Yang, L.T. (eds) High Performance Computing and Communications. HPCC 2007. Lecture Notes in Computer Science, vol 4782. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-75444-2_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-75444-2_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-75443-5

  • Online ISBN: 978-3-540-75444-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics