{"title":"Dominating Set Algorithm and Trust Evaluation Scheme for Secured Cluster Formation and Data Transferring","authors":"Y. Harold Robinson, M. Rajaram, E. Golden Julie, S. Balaji","volume":110,"journal":"International Journal of Computer and Information Engineering","pagesStart":413,"pagesEnd":419,"ISSN":"1307-6892","URL":"https:\/\/publications.waset.org\/pdf\/10004646","abstract":"
This paper describes the proficient way of choosing the cluster head based on dominating set algorithm in a wireless sensor network (WSN). The algorithm overcomes the energy deterioration problems by this selection process of cluster heads. Clustering algorithms such as LEACH, EEHC and HEED enhance scalability in WSNs. Dominating set algorithm keeps the first node alive longer than the other protocols previously used. As the dominating set of cluster heads are directly connected to each node, the energy of the network is saved by eliminating the intermediate nodes in WSN. Security and trust is pivotal in network messaging. Cluster head is secured with a unique key. The member can only connect with the cluster head if and only if they are secured too. The secured trust model provides security for data transmission in the dominated set network with the group key. The concept can be extended to add a mobile sink for each or for no of clusters to transmit data or messages between cluster heads and to base station. Data security id preferably high and data loss can be prevented. The simulation demonstrates the concept of choosing cluster heads by dominating set algorithm and trust evaluation using DSTE. The research done is rationalized.<\/p>\r\n","references":"[1]\tShengbo Yang, Chai Kiat Yeo, and Bu Sung Lee, \u201cToward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks\u201d, IEEE Transactions on Mobile Computing, Vol. 11, No. 1, Jan 2012\r\n[2]\tHarold Robinson, Y., & Rajaram, M. (2015). \u201cTrustworthy link failure recovery algorithm for highly dynamic mobile adhoc networks\u201d, World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering, vol.9, no.2, 233\u2013236.\r\n[3]\tKai Zeng, Wenjing Lou, Jie Yang, Donald R. Brown III, \u201cOn Throughput Efficiency of Geographic Opportunistic Routing in Multihop Wireless Networks\u201d, Springer, Mobile Networks Application (2007) 12:347\u2013357, 2007\r\n[4]\tRobinson, Y. H., & Rajeswari, S. R. (2011). \u201cEnergy-based dynamic encryption for wireless sensor networks. Wireless Communication\u201d, vol.3, no.9, pp. 661\u2013663.\r\n[5]\tGolden Julie, E., Tamil Selvi, S., & Harold Robinson, Y. (2014). Opportunistic routing with secure coded wireless multicast using MAS approach. World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering, vol. 8, no.7, pp. 1247\u20131250.\r\n[6]\tSanjit Biswas, Robert Morris, \u201cExOR: opportunistic multi-hop routing for wireless networks\u201d, Proceedings of conference on Applications, technologies, architectures, and protocols for computer communications, Pages 133-144, 2005\r\n[7]\tA. Trivino-Cabrera, S. Canadas-Hurtado, \u201cSurvey on Opportunistic Routing in Multihop Wireless Networks\u201d, International Journal of Communication Networks and Information Security (IJCNIS), Vol. 3, No. 2, August 2011\r\n[8]\tHarold Robinson, Y., & Rajaram, M. (2016), \u201cA memory aided broadcast mechanism with fuzzy classification on a device-to-device mobile Ad Hoc network\u201d, Wireless Personal Communications, 1\u201323, doi:10.1007\/s11277-016-3213-0.\r\n[9]\tHarold Robinson, Y., & Rajaram, M. (2014). \u201cA novel approach to allocate channels dynamically in wireless mesh networks\u201d, World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering, 8(10), 1865\u20131868.\r\n[10]\tStepanov, D. Herrscher, K. Rothermel, \u201cOn the impact of radio propagation models on MANET simulation results\u201d, Proceedings of 7th International Conference on Mobile and Wireless Communications Networks (MWCN 2005), Marrakech, Morocco, September 2005.\r\n[11]\tHarold Robinson, Y., & Rajaram, M. (2015), \u201cEnergy-aware multipath routing scheme based on particle swarm optimization in mobile ad hoc networks\u201d, The Scientific World Journal, 1\u20139. doi:10.1155\/2015\/284276.\r\n[12]\tHarold Robinson, Y., & Rajaram, M. (2015), \u201cEstablishing pairwise keys using key Predistribution schemes for sensor networks\u201d, World Academy of Science, Engineering and Technology International Journal of Computer, Electrical, Automation, Control and Information Engineering, 9(2), 608\u2013612.","publisher":"World Academy of Science, Engineering and Technology","index":"Open Science Index 110, 2016"}