4.5 Article

Real-time reliable clustering and secure transmission scheme for QoS development in MANET

期刊

PEER-TO-PEER NETWORKING AND APPLICATIONS
卷 14, 期 6, 页码 3502-3517

出版社

SPRINGER
DOI: 10.1007/s12083-021-01175-6

关键词

MANET; Cluster routing; RRCST; RTS; Secure transmission; CH selection; Secure routing

向作者/读者索取更多资源

This paper presents an efficient Real-time Reliable Clustering and Secure Transmission (RRCST) approach for Mobile Adhoc Networks (MANET), improving data security and QoS performance through clustering nodes and selecting routes based on various support measures.
The Quality of Service (QoS) of the Mobile Adhoc Network (MANET) is dependent on various factors like clustering nodes, route selection, and how data transmission is performed. Towards this, there exist numerous techniques in clustering the mobile nodes and securely performing data transmission. Still, the methods struggle to achieve expected QoS performance. When it comes to data communication, MANETs often struggle to provide better QoS while still meeting security requirements. The MANET is vulnerable to different kinds of attacks because it lacks a reliable authority. To overcome this issue, an efficient Real-time Reliable Clustering and Secure Transmission (RRCST) approach is presented in this paper. The method starts with clustering the nodes in a region where the selection of cluster head is performed according to the previous transmission behavior and node statistics. The nodes are clustered based on their geographic features, and the cluster head is chosen from each cluster based on various support measures computed over energy, transmission, and geographic features. In addition, the routing is implemented using a novel method that selects the route based on the reliable transmission support (RTS) value calculated for different routes. In addition, the method selects a route based on various QoS support values computed for each route. The proposed RRCST technique offers a clustering accuracy of 97% for 200 nodes. The proposed method improves the performance in data security and QoS parameters.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.5
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据