IJSRSET calls volunteers interested to contribute towards the scientific development in the field of Science, Engineering and Technology

Home > IJSRSET151173                                                     


Secure and Efficient Collaborative Load Balancing for Cluster-based MANETs

Authors(3):

Kannan Sekar, Kannan VS, Kalaivani M
  • Abstract
  • Authors
  • Keywords
  • References
  • Details
Mobile ad hoc networks (MANETs) are becoming increasingly common, and typical network loads considered for MANETs are increasing as applications evolve. Coordinated channel access protocols have been shown to be well suited for highly loaded MANETs under uniform load distributions. However, these protocols are in general not as well suited for non-uniform load distributions as uncoordinated channel access protocols due to the lack of on-demand dynamic channel allocation mechanisms that exist in infrastructure based coordinated protocols. In this paper, we present a lightweight dynamic channel allocation mechanism and a cooperative load balancing strategy that are applicable to cluster based MANETs to address this problem. We present protocols that utilize these mechanisms to improve performance in terms of throughput, energy consumption and inter-packet delay variation. A secure data transmission for cluster-based WSNs, where the clusters are formed dynamically and periodically. We propose two secure and efficient data transmission (SET) protocols for CWSNs, called SET-IBS and SET-IBOOS, by using the identity-based digital signature (IBS) scheme and the identity-based online/ offline digital signature (IBOOS) scheme, respectively. In SET-IBS, security relies on the hardness of the Diffie-Hellman problem in the pairing domain. SET-IBOOS further reduces the computational overhead for protocol security, which is crucial for WSNs, while its security relies on the hardness of the discrete logarithm problem. We show the feasibility of the SET-IBS and SET-IBOOS protocols with respect to the security requirements and security analysis against various attacks.

Kannan Sekar, Kannan VS, Kalaivani M

Identity based digital signature, identity based online offline digital signature, hyper split module.

'

 

  1. B. Karaoglu, T. Numanoglu, and W. Heinzelman, “Analytical

  2. performance of soft clustering protocols,” Ad Hoc Networks, vol. 9, no. 4, pp. 635–651, Jun. 2011. [Online]. Available: http://dx.doi.org/10.1016/j.adhoc.2010.08.008

  3. IEEE 802.15.3 Working Group, “Part 15.3: Wireless medium access control (MAC) and physical layer (PHY) specifications for high rate wireless personal area networks (WPAN).” IEEE Draft Standard, Draft P802.15.3/D16, Feb 2003.

  4. Institute of Electrical and Electronics Engineers, “IEEE Std 802.15.4-2006,” Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (WPANs), September 2006.

  5. B. Tavli and W. B. Heinzelman, “MH-TRACE: Multi hop time

    reservation using adaptive control for energy efficiency,” IEEE

    Journal on Selected Areas of Communications, vol. 22, no. 5, pp. 942–953, June 2004.

  6. M. Kappes, “An experimental performance analysis of fMACg

    multicast in 802.11b networks for voip traffic,” Computer Communications, vol. 29, no. 8, pp. 938 – 948, 2006, ¡ce:title¿Performance Evaluation of Wireless Networks and Communications¡/ce:title¿. [Online]. Available: http://www.

    sciencedirect.com/science/article/pii/S0140366405002161

  7. B. Leiner, D. Nielson, and F. Tobagi, “Issues in packet radio

    network design,” Proceedings of the IEEE, vol. 75, no. 1, pp. 6 –20, jan. 1987.

  8. I. Cidon and M. Sidi, “Distributed assignment algorithms for

    multi-hop packet-radio networks,” in INFOCOM ’88. Networks: Evolution or Revolution, Proceedings. Seventh Annual Joint Conference of the IEEE Computer and Communcations Societies, IEEE, march 1988,  pp. 1110 –1118.

  9. L. Gao and X. Wang, “A game approach for multi-channel allocation in multi-hop wireless networks,” in Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing, ser. MobiHoc ’08. New York, NY,

    USA: ACM, 2008, pp. 303–312. [Online]. Available: http: //doi.acm.org/10.1145/1374618.1374659

  10. M. Felegyhazi, M. Cagalj, S. Bidokhti, and J.-P. Hubaux, “Noncooperative multi-radio channel allocation in wireless networks,” in INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE, May 2007, pp. 1442 –1450.

  11. R. Ramaswami and K. Parhi, “Distributed scheduling of broadcasts in a radio network,” in INFOCOM ’89. Proceedings of the Eighth Annual Joint Conference of the IEEE Computer and Communications Societies. Technology: Emerging or Converging, IEEE, april 1989, pp. 497 –504 vol.2.

  12. A. Ephremides and T. Truong, “Scheduling broadcasts in multihop radio networks,” Communications, IEEE Transactions on, vol. 38, no. 4, pp. 456 –460, apr 1990.

  13. A. Sen and M. Huson, “A new model for scheduling packet radio networks,” in INFOCOM ’96. Fifteenth Annual Joint Conference of the IEEE Computer Societies. Networking the Next Generation. Proceedings IEEE, vol. 3, mar 1996, pp. 1116 –1124 vol.3.

  14. A. Raniwala and T. cker Chiueh, “Architecture and algorithms for an ieee 802.11-based multi-channel wireless mesh network,” in INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE, vol. 3, march 2005, pp. 2223 – 2234 vol. 3.

  15. L. Kleinrock and F. Tobagi, “Packet switching in radio channels: Part i–carrier sense multiple-access modes and their throughputdelay characteristics,” Communications, IEEE Transactions on, vol. 23, no. 12, pp. 1400 – 1416, dec 1975.

  16. F. Tobagi and L. Kleinrock, “Packet switching in radio channels: Part ii–the hidden terminal problem in carrier sense multipleaccess and the busy-tone solution,” Communications, IEEE Transactions on, vol. 23, no. 12, pp. 1417 – 1433, dec 1975.

  17. P. Karn, “Maca-a new channel access method for packet radio,”

    in ARRL/CRRL Amateur radio 9th computer networking conference, vol. 140, 1990, pp. 134–140.

  18. S. Toumpis and A. Goldsmith, “New media access protocols

    for wireless ad hoc networks based on cross-layer principles,”

    Wireless Communications, IEEE Transactions on, vol. 5, no. 8, pp.2228 –2241, aug. 2006.

  19. D. Shukla, L. Chandran-Wadia, and S. Iyer, “Mitigating the exposed node problem in ieee 802.11 ad hoc networks,” in Computer Communications and Networks, 2003. ICCCN 2003. Proceedings. The 12th International Conference on, oct. 2003, pp. 157 – 162.

  20. N. Jain, S. Das, and A. Nasipuri, “A multichannel csma mac protocol with receiver-based channel selection for multihop wireless networks,” in Computer Communications and Networks, 2001. Proceedings. Tenth International Conference on, 2001, pp. 432 –439.

  21. A. Nasipuri and S. Das, “Multichannel csma with signal powerbased channel selection for multihop wireless networks,” in Vehicular Technology Conference, 2000. IEEE-VTS Fall VTC 2000. 52nd, vol. 1, 2000, pp. 211 –218 vol.1.

  22. J. So and N. H. Vaidya, “Multi-channel mac for ad hoc networks: handling multi-channel hidden terminals using a

    single transceiver,” in Proceedings of the 5th ACM international

    symposium on Mobile ad hoc networking and computing, ser.

    MobiHoc ’04. New York, NY, USA: ACM, 2004, pp. 222–233.

    [Online]. Available: http://doi.acm.org/10.1145/989459.989487

  23. K. Tang and M. Gerla, “Mac layer broadcast support in 802.11

    wireless networks,” in MILCOM 2000. 21st Century Military Communications Conference Proceedings, vol. 1, 2000, pp. 544–548 vol.1.

  24. J. Zhu and S. Roy, “Mac for dedicated short range communications in intelligent transport system,” Communications Magazine, IEEE, vol. 41, no. 12, pp. 60–67, 2003.

  25. Institute of Electrical and Electronics Engineers, “IEEE Std 802.11-2007,” Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, June 2007.

  26. M. Torrent-Moreno, D. Jiang, and H. Hartenstein, “Broadcast reception rates and effects of priority access in 802.11-based vehicular ad-hoc networks,” in Proceedings of the 1st ACM 1536-1233 (c) 2013 IEEE.: DOI 10.1109/TMC.2014.2339215, IEEE Transactions on Mobile Computing 14 international workshop on Vehicular ad hoc networks, ser. VANET ’04. New York, NY, USA: ACM, 2004, pp. 10–18. [Online]. Available: http://doi.acm.org/10.1145/1023875.1023878

  27. J. Xie, A. Das, S. Nandi, and A. Gupta, “Improving the reliability of ieee 802.11 broadcast scheme for multicasting in mobile ad hoc networks,” in Wireless Communications and Networking Conference, 2005 IEEE, vol. 1, 2005, pp. 126–131 Vol. 1.

  28. X. Ma and X. Chen, “Performance analysis of ieee 802.11 broadcast scheme in ad hoc wireless lans,” Vehicular Technology, IEEE Transactions on, vol. 57, no. 6, pp. 3757–3768, 2008.

  29. V. H. MacDonald, “Advanced mobile phone service: The cellular concept,” Bell Syst. Tech. J., vol. 58, pp. 15–41, 1979.

  30.  E. Standard, “Global system for mobile communications (gsm) standard for mobile phones,” 1990.

  31. I. Katzela and M. Naghshineh, “Channel assignment schemesfor cellular mobile telecommunication systems: a comprehensive survey,” Personal Communications, IEEE, vol. 3, no. 3, pp. 10 –31, Jun. 1996.

'

Publication Details

Published in : Volume 1 | Issue 1 | January-Febuary - 2015
Date of Publication Print ISSN Online ISSN
2015-02-25 2395-1990 2394-4099
Page(s) Manuscript Number   Publisher
330-334 IJSRSET151173   Technoscience Academy

Cite This Article

Kannan Sekar, Kannan VS, Kalaivani M, "Secure and Efficient Collaborative Load Balancing for Cluster-based MANETs", International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 1, Issue 1, pp.330-334, January-Febuary-2015.
URL : http://ijsrset.com/IJSRSET151173.php

IJSRSET Xplore

Subscribe

Conferences

National Conference on Advances in Mechanical Engineering 2017(NCAME 2017)

National Conference on Emerging Trends in Civil Engineering 2017( NCETCE 2017)