| Literature DB >> 25143986 |
Abstract
Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devices temporarily interconnected into a network by wireless media. MANETs become one of the most prevalent areas of research in the recent years. Resource limitations, energy efficiency, scalability, and security are the great challenging issues in MANETs. Due to its deployment nature, MANETs are more vulnerable to malicious attack. The secure routing protocols perform very basic security related functions which are not sufficient to protect the network. In this paper, a secure and fair cluster head selection protocol (SFCP) is proposed which integrates security factors into the clustering approach for achieving attacker identification and classification. Byzantine agreement based cooperative technique is used for attacker identification and classification to make the network more attack resistant. SFCP used to solve this issue by making the nodes that are totally surrounded by malicious neighbors adjust dynamically their belief and disbelief thresholds. The proposed protocol selects the secure and energy efficient cluster head which acts as a local detector without imposing overhead to the clustering performance. SFCP is simulated in network simulator 2 and compared with two protocols including AODV and CBRP.Entities:
Mesh:
Year: 2014 PMID: 25143986 PMCID: PMC3988938 DOI: 10.1155/2014/608984
Source DB: PubMed Journal: ScientificWorldJournal ISSN: 1537-744X
Algorithm 1Secure cluster head selection algorithm.
Figure 1Byzantine agreement classification system.
Algorithm 2Byzantine agreement node classification algorithm.
Simulation parameters.
| Parameter | Value |
|---|---|
| Simulation area | 900 m × 900 m |
| Simulation time | 800 Sec |
| Number of nodes | 50, 100, and 150 |
| Transmission range | 200 m |
| Movement model | Random waypoint model |
| Initial energy | 100 joules |
| Packet size | 512 bytes |
| Pause time | 200 Sec |
Figure 2Packet delivery ratio versus malicious nodes.
Figure 3Routing overhead versus malicious nodes.
Figure 4Routing latency versus malicious nodes.