Open Access
Subscription Access
Delay Aware Clustered Service Discovery Scheme Based on Trust for Mobile Ad Hoc Networks (MANET)
Service discovery is one of the most difficult aspects of MANETs. The primary concern is the assignment of the optimal service to the service requester. This work intends to address this issue by proposing a clustered trustworthy service discovery scheme. The Cluster Head (CH) node selection and recycling, πΊπ¬πΉπ½π¨π«, request, response and service ranking are the crucial phases of this work. The CH node is chosen by considering the trust parameters like mobility, energy and number of neighbors. The selected CH node calculates the level of trust for each of its member nodes by employing trust criteria such as energy consumption, packet forwarding ratio, and node behavior. The node responsible for requesting services delivers the πΊπ¬πΉπ½πΉππ packet to the CH node, which thereafter searches its local memory for the corresponding service. Finally, the matching services are evaluated based on the distance of the service, the level of trust and the workload of the service provider. As significant metrics are considered for recommending service, the service requester is assured with reliable and faster service provisioning, which is proven by the experimental results.
Keywords
MANET, Service Discovery, Service Provision, Service Ranking, Trust, Energy Efficiency.
User
Font Size
Information
- N. Veeraiah and B. Tirumala Krishna, βTrust-aware fuzzyclus-fuzzy NB: Intrusion detection scheme based on fuzzy clustering and Bayesian ruleβ, Wireless Netw., vol. 25, pp. 4021β4035, Jan. 2019, doi: 10.1007/s11276-018-01933-0.
- N. Veeraiah, ββA comparative analysis of energy efficient multipath routing in MANET,ββ J. Adv. Res. Dyn. Control Syst., vol. 12, no. 3, pp. 261β267, Mar. 2020.
- Quy, V. K., Nam, V. H., Linh, D. M., Ban, N. T., & Han, N. D. (2021). A survey of QoS-aware routing protocols for the MANET-WSN convergence scenarios in IoT networks. Wireless Personal Communications, 120(1), 49-62.
- Kurian, S., & Ramasamy, L. (2021). Securing Service Discovery from Denial of Service Attack in Mobile Ad Hoc Network (MANET). International Journal of Computer Networks and Applications, 8(5), 619-633.
- Islam, N. (2019, December). A secure service discovery scheme for mobile ad hoc network using artificial deep neural network. In 2019 International Conference on Frontiers of Information Technology (FIT) (pp. 133-1335). IEEE.
- Veeresh, P., Praveen Sam, R., & Shoba Bindhu, C. (2018). Energy Constraint Service Discovery and Composition in Mobile Ad Hoc Networks. In Proceedings of the Second International Conference on Computational Intelligence and Informatics (pp. 175-187). Springer, Singapore.
- Jayapal, C., Jayavel, S., & Sumathi, V. P. (2018). Enhanced service discovery protocol for MANET by effective cache management. Wireless Personal Communications, 103(2), 1517-1533.
- Ramalingam, R., Muniyan, R., Dumka, A., Singh, D. P., Mohamed, H. G., Singh, R., ... & Noya, I. D. (2022). Routing Protocol for MANET Based on QoS-Aware Service Composition with Dynamic Secured Broker Selection. Electronics, 11(17), 2637.
- J. Manoranjini, A. Chandrasekar and S. Jothi, "Improved QoS and avoidance of black hole attacks in MANET using trust detection framework", Automatika, vol.60, no. 3, pp. 274-284, 2019. [Online]. https://doi.org/10.1080/00051144.2019.1576965.
- Setijadi, E., Purnama, I. K. E., & Purnomo, M. H. (2019, September). Analysis of reactive routing protocols in MANET based on quality of service. In 2019 International Seminar on Application for Technology of Information and Communication (iSemantic) (pp. 342-345). IEEE.
- R. Popli, V. Juneja, K. Garg, and D. V. Gupta, βFuzzy based trust evaluation models for enhancing security in MANETs,β International Journal of Engineering and Advanced Technology (IJEAT), vol. 8, no. 5, pp. 506β510, 2019.
- H. Jiang, Y. Sun, R. Sun, and H. Xu, βFuzzy-logic-based energy optimized routing for wireless sensor networks,β International Journal of Distributed Sensor Networks, vol. 9, no. 8, 2013.
- S. K. Gupta, P. Kuila, and P. K. Jana, βGenetic algorithm approach for k-coverage and m-connected node placement in target based wireless sensor networks,β Computers and Electrical Engineering, vol. 56, pp. 544β556, 2016.
- S. Amri, F. Khelifi, A. Bradai, A. Rachedi, M. L. Kaddachi, and M. Atri, βA new fuzzy logic based node localization mechanism for wireless sensor networks,β Future Generation Computer Systems, vol. 93, pp. 799β813, 2019.
- Kumanan, T., & Duraiswamy, K. (2010, February). Reinforcement learning for quality of service in mobile ad hoc network (MANET). In Proceedings of the 12th international conference on Networking, VLSI and signal processing (pp. 250-257).
- S. Chettibi and S. Chikhi, βRouting in mobile ad-hoc networks as a reinforcement learning task,β in Networked Digital Technologies. NDT 2011. Communications in Computer and Information Science, S. Fong, Ed., vol. 136, Springer, Berlin, Heidelberg, 2011.
- F. Dong, O. Li, and M. Tong, βIntelligent routing control for MANET based on reinforcement learning,β MATEC Web of Conferences, vol. 232, article 04002, 2018.
- A. Ghaffari, βReal-time routing algorithm for mobile ad hoc networks using reinforcement learning and heuristic algorithms,β Wireless Networks, vol. 23, no. 3, pp. 703β714, 2017.
- M. Maleki, V. Hakami, and M. Dehghan, βA model-based reinforcement learning algorithm for routing in energy harvesting mobile ad-hoc networks,β Wireless Personal Communications, vol. 95, no. 3, pp. 3119β3139, 2017.
- G. Jinarajadasa, L. Rupasinghe, and I. Murray, βA reinforcement learning approach to enhance the trust-level of MANETs,β in 2018 National Information Technology Conference (NITC), pp. 3119β3138, Colombo, Sri Lanka, October 2018.
- Juneja, K., & Singh, Y. (2021). Trust-adaptive Fuzzy-Statistical Protocol for Optimizing the Communication in Attacked Network. IETE Journal of Research, 1-18.
Abstract Views: 164
PDF Views: 1