Dominating Set Algorithm and Trust Evaluation Scheme for Secured Cluster Formation and Data Transferring
This paper describes the proficient way of choosing the cluster head based on dominating set algorithm in a wireless sensor network (WSN). The algorithm overcomes the energy deterioration problems by this selection process of cluster heads. Clustering algorithms such as LEACH, EEHC and HEED enhance scalability in WSNs. Dominating set algorithm keeps the first node alive longer than the other protocols previously used. As the dominating set of cluster heads are directly connected to each node, the energy of the network is saved by eliminating the intermediate nodes in WSN. Security and trust is pivotal in network messaging. Cluster head is secured with a unique key. The member can only connect with the cluster head if and only if they are secured too. The secured trust model provides security for data transmission in the dominated set network with the group key. The concept can be extended to add a mobile sink for each or for no of clusters to transmit data or messages between cluster heads and to base station. Data security id preferably high and data loss can be prevented. The simulation demonstrates the concept of choosing cluster heads by dominating set algorithm and trust evaluation using DSTE. The research done is rationalized.
Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1124755Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 772
 Shengbo Yang, Chai Kiat Yeo, and Bu Sung Lee, “Toward Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks”, IEEE Transactions on Mobile Computing, Vol. 11, No. 1, Jan 2012
 Harold Robinson, Y., & Rajaram, M. (2015). “Trustworthy link failure recovery algorithm for highly dynamic mobile adhoc networks”, World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering, vol.9, no.2, 233–236.
 Kai Zeng, Wenjing Lou, Jie Yang, Donald R. Brown III, “On Throughput Efficiency of Geographic Opportunistic Routing in Multihop Wireless Networks”, Springer, Mobile Networks Application (2007) 12:347–357, 2007
 Robinson, Y. H., & Rajeswari, S. R. (2011). “Energy-based dynamic encryption for wireless sensor networks. Wireless Communication”, vol.3, no.9, pp. 661–663.
 Golden Julie, E., Tamil Selvi, S., & Harold Robinson, Y. (2014). Opportunistic routing with secure coded wireless multicast using MAS approach. World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering, vol. 8, no.7, pp. 1247–1250.
 Sanjit Biswas, Robert Morris, “ExOR: opportunistic multi-hop routing for wireless networks”, Proceedings of conference on Applications, technologies, architectures, and protocols for computer communications, Pages 133-144, 2005
 A. Trivino-Cabrera, S. Canadas-Hurtado, “Survey on Opportunistic Routing in Multihop Wireless Networks”, International Journal of Communication Networks and Information Security (IJCNIS), Vol. 3, No. 2, August 2011
 Harold Robinson, Y., & Rajaram, M. (2016), “A memory aided broadcast mechanism with fuzzy classification on a device-to-device mobile Ad Hoc network”, Wireless Personal Communications, 1–23, doi:10.1007/s11277-016-3213-0.
 Harold Robinson, Y., & Rajaram, M. (2014). “A novel approach to allocate channels dynamically in wireless mesh networks”, World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering, 8(10), 1865–1868.
 Stepanov, D. Herrscher, K. Rothermel, “On the impact of radio propagation models on MANET simulation results”, Proceedings of 7th International Conference on Mobile and Wireless Communications Networks (MWCN 2005), Marrakech, Morocco, September 2005.
 Harold Robinson, Y., & Rajaram, M. (2015), “Energy-aware multipath routing scheme based on particle swarm optimization in mobile ad hoc networks”, The Scientific World Journal, 1–9. doi:10.1155/2015/284276.
 Harold Robinson, Y., & Rajaram, M. (2015), “Establishing pairwise keys using key Predistribution schemes for sensor networks”, World Academy of Science, Engineering and Technology International Journal of Computer, Electrical, Automation, Control and Information Engineering, 9(2), 608–612.