alexa EFFICIENT SECURE CLUSTERING PROTOCOL FOR MOBILE AD-HOC
ISSN: 1948-1432

Journal of Global Research in Computer Sciences
Open Access

OMICS International organises 3000+ Global Conferenceseries Events every year across USA, Europe & Asia with support from 1000 more scientific Societies and Publishes 700+ Open Access Journals which contains over 50000 eminent personalities, reputed scientists as editorial board members.

Open Access Journals gaining more Readers and Citations

700 Journals and 15,000,000 Readers Each Journal is getting 25,000+ Readers

This Readership is 10 times more when compared to other Subscription Journals (Source: Google Analytics)

Research Article

EFFICIENT SECURE CLUSTERING PROTOCOL FOR MOBILE AD-HOC NETWORK

Shubha Mishra*1 and Dr. Manish Shrivastava2
Department of Information Technology, Lakshmi Narain College of Technology, Bhopal, M.P., India
Corresponding Author: Shubha Mishra, E-mail: [email protected]
Related article at Pubmed, Scholar Google
 

Abstract

A Mobile ad hoc Network is an autonomous network comprised of free roaming nodes which communicate wireless by radio transmission. MANETs are already ubiquitous and their range of use will spread in the near future. In this thesis proposed an efficient dynamic clustering protocol for MANET. In our dynamic clustering protocol have five state interactions. These are un-clustered state, orphan state, election state, cluster node state, and cluster head state. Also, we develop key distribution method for the distribution of symmetric keys in MANETs. Our dynamic clustering protocol is designed to verify the protocol and have an estimate of the cost to gather the density information. We did the analysis from our dynamic clustering protocol different perspectives, in terms of time, clustering, and network packets. For evaluating in terms of time, time spent as part of cluster was measured. From clustering perspective, number of clusters, and number of nodes per cluster were measured. To estimate the network performance, number of protocol packets, and application packets transmitted were measured. And simulate the key distribution process to built authentication. Our results show the effectiveness and more efficient comparatively with previous work.

Keywords

Share This Page

Additional Info

Loading
Loading Please wait..
Peer Reviewed Journals
 
Make the best use of Scientific Research and information from our 700 + peer reviewed, Open Access Journals
International Conferences 2017-18
 
Meet Inspiring Speakers and Experts at our 3000+ Global Annual Meetings

Contact Us

 
© 2008-2017 OMICS International - Open Access Publisher. Best viewed in Mozilla Firefox | Google Chrome | Above IE 7.0 version
adwords