4.6 Article

A competent three-tier fuzzy cluster algorithm for enhanced data transmission in cluster EAACK MANETs

Journal

SOFT COMPUTING
Volume 22, Issue 19, Pages 6545-6565

Publisher

SPRINGER
DOI: 10.1007/s00500-017-2704-6

Keywords

Mobile ad hoc network; Clustered enhanced adaptive acknowledgment (CEAACK); Cluster; Base station (BS); Centralized three-tier filter; Fuzzy logic; Three-tier fuzzy cluster (3TFC)

Ask authors/readers for more resources

Security is a major issue that is being constantly addressed in infrastructure less networks. An ad hoc network like MANET faces several issues that can jeopardize the transmissions in the network. A MANET can be made manageable by clustering it and appointing a cluster head. The cluster head communicates with the other cluster heads through base station. The cluster head routes all traffic from its members with the help of the base station, both within and outside the cluster. Several schemes have been suggested to find and eliminate malicious nodes that may hinder transmission. However, when the cluster member or the cluster head turns malicious, it may damage the transmission by tampering with the data and the routing policies. Though the security schemes target the nodes, they do not have specific techniques to handle a situation where the cluster member and cluster head turn malicious. Because of the constraints prevalent in the election of the cluster head and the selection of the cluster member, an intruder can penetrate and be elected as the cluster head or a member. Our proposed approach tries to counteract this situation by using a two-phase approach. The first phase uses fuzzy rules to form clusters and the second phase uses an efficient three-tier filtering methodology to identify the reliable nodes within the network. For the clustering process, a modified fuzzy C-means clustering algorithm (MFCM) is used to form the clusters. The three-tier filtering methodology decides the authenticity of the nodes by using an efficient filtering process. Our proposed technique can assure a better performance and enhanced throughput when compared to the existing techniques of EAACK.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available