Research Article | Open Access | Download PDF
Volume 4 | Issue 6 | Year 2013 | Article Id. IJCTT-V4I6P140 | DOI : https://doi.org/10.14445/22312803/IJCTT-V4I6P140
The Cluster Leader Election in Manets
Mrs.P.Radhadevi, Sathish Ravula
Citation :
Mrs.P.Radhadevi, Sathish Ravula, "The Cluster Leader Election in Manets," International Journal of Computer Trends and Technology (IJCTT), vol. 4, no. 6, pp. 1742-1746, 2013. Crossref, https://doi.org/10.14445/22312803/IJCTT-V4I6P140
Abstract
A mobile ad-hoc network (MANET) is a self-configuring network of mobile routers connected by wireless links—the union of which form an arbitrary topology. When the size of the network grows, the amount of signaling overhead also increases to maintain the topology updates. One of the main issues of a MANET`s routing protocol is hence its capacity to scale on large and dense networks. In this paper, we investigate the problems of cluster head selection for large and dense MANETs in the presence of selfish nodes for intrusion detection. One of the variants of cluster head selection Examined is: The size-constrained selection where each cluster is only allowed to have a limited number of members. To balance the resource consumption among all nodes and prolong the lifetime of an MANET, there are two main obstacles in achieving this goal: First, without incentives for serving others, a node might behave selfishly by lying about its remaining resources. Second, electing an optimal collection of leaders to minimize the overall resource consumption may incur a prohibitive performance overhead. To address the issue of selfish nodes, we present a solution based on mechanism design theory.
Keywords
MANET, Leader election, intrusion detection systems, mechanism design.
References
[1] T. Anantvalee and J. W , “A Survey on Intrusion Detection inMobile Ad HocNetworks,” Wireless/Mobile Network Security, Springer, 2006.
[2] F. Anjum and P. Mouchtaris, Security for Wireless Ad Hoc Networks.John Wiley and Sons, Inc, 2007. [3] Noman Mohammed, “Mechanism designbased secure leader election model for intrusion detection IEEE,2011.
[4] in Manet”Proc. Dang Nguyen1, “On the Selection of Cluster Heads in MANETs” Proc. IEEE,2011.
[5] A. P. Chandrakasan, A. C. Smith, W. B. Heinzelman, and W. B. Heinzelman, “An application-specific protocol architecture for wireless microsensor IEEETransactions on networks,” Wireless Communications, vol. 1, no. 4, pp. 660–670, 2002.
[6] H. Chen and S. Megerian, “Cluster sizing and head selection for efficient data aggregation and routing in sensor networks,” in IEEE Wireless Communications and Networking Conference, WCNC 2006, vol. 4, April 2006, pp. 2318–2323.
[7] P. Brutch and C. Ko, “Challenges in Intrusion Detection forWireless Ad-Hoc Networks,” Proc. IEEE Symp. Applications and theInternet (SAINT) Workshop, 2003.