On calculating connected dominating set for efficient routing in ad hoc wireless networks
DIALM '99 Proceedings of the 3rd international workshop on Discrete algorithms and methods for mobile computing and communications
Dominating Sets and Neighbor Elimination-Based Broadcasting Algorithms in Wireless Networks
IEEE Transactions on Parallel and Distributed Systems
New Distributed Algorithm for Connected Dominating Set in Wireless Ad Hoc Networks
HICSS '02 Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS'02)-Volume 9 - Volume 9
Fast distributed dominating set based routing in large scale MANETs
Computer Communications
DTN Based Dominating Set Routing for MANET in Heterogeneous Wireless Networking
Mobile Networks and Applications
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
In Mobile Ad hoc Network (MANET) nodes communicate with each other using shared wireless medium. Due to their distributed nature and dynamic topology, MANET is less secured than wired network. To enhance the security of MANET, it is important to establish routing path based on the trustworthiness of each node in the network. Most existing routing protocols in MANET mainly focus at finding efficient routing path. To deal with the effect of malicious node, trustworthiness of node can be taken into consideration in routing decision making. A routing protocol based on distributed dominating set based clustering algorithm is presented in this paper. The dominator set is formed based on the trust ability of the node and probability of future contact of the node in the network. This paper present a adaptive neuro fuzzy logic controller to evaluate the trust level of each node and a composite key management technique used for effective key management within cluster. Simulation results show that proposed routing protocol provides efficient routing path that bypass malicious nodes in the network.