International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

International Journal of Computer Networks and Applications (IJCNA)

International Journal of Computer Networks and Applications (IJCNA)

Published By EverScience Publications

ISSN : 2395-0455

Delay Aware Clustered Service Discovery Scheme Based on Trust for Mobile Ad Hoc Networks (MANET)

Author NameAuthor Details

Prabu B, G. Jagatheeshkumar

Prabu B[1]

G. Jagatheeshkumar[2]

[1]PG & Research Department of Computer Science, Karuppannan Mariappan College, Muthur, Tamil Nadu, India

[2]PG & Research Department of Computer Science, Karuppannan Mariappan College, Muthur, Tamil Nadu, India

Abstract

Service discovery is one of the most difficult aspects of MANETs. The primary concern is the assignment of the optimal service to the service requester. This work intends to address this issue by proposing a clustered trustworthy service discovery scheme. The Cluster Head (CH) node selection and recycling, ?SERV?_AD, request, response and service ranking are the crucial phases of this work. The CH node is chosen by considering the trust parameters like mobility, energy and number of neighbors. The selected CH node calculates the level of trust for each of its member nodes by employing trust criteria such as energy consumption, packet forwarding ratio, and node behavior. The node responsible for requesting services delivers the SERV_Req packet to the CH node, which thereafter searches its local memory for the corresponding service. Finally, the matching services are evaluated based on the distance of the service, the level of trust and the workload of the service provider. As significant metrics are considered for recommending service, the service requester is assured with reliable and faster service provisioning, which is proven by the experimental results.

Index Terms

MANET

Service Discovery

Service Provision

Service Ranking

Trust

Energy Efficiency

Reference

  1. 1.
    N. Veeraiah and B. Tirumala Krishna, “Trust-aware fuzzyclus-fuzzy NB: Intrusion detection scheme based on fuzzy clustering and Bayesian rule”, Wireless Netw., vol. 25, pp. 4021–4035, Jan. 2019, doi: 10.1007/s11276-018-01933-0.
  2. 2.
    N. Veeraiah, ‘‘A comparative analysis of energy efficient multipath routing in MANET,’’ J. Adv. Res. Dyn. Control Syst., vol. 12, no. 3, pp. 261–267, Mar. 2020.
  3. 3.
    Quy, V. K., Nam, V. H., Linh, D. M., Ban, N. T., & Han, N. D. (2021). A survey of QoS-aware routing protocols for the MANET-WSN convergence scenarios in IoT networks. Wireless Personal Communications, 120(1), 49-62.
  4. 4.
    Kurian, S., & Ramasamy, L. (2021). Securing Service Discovery from Denial of Service Attack in Mobile Ad Hoc Network (MANET). International Journal of Computer Networks and Applications, 8(5), 619-633.
  5. 5.
    Islam, N. (2019, December). A secure service discovery scheme for mobile ad hoc network using artificial deep neural network. In 2019 International Conference on Frontiers of Information Technology (FIT) (pp. 133-1335). IEEE.
  6. 6.
    Veeresh, P., Praveen Sam, R., & Shoba Bindhu, C. (2018). Energy Constraint Service Discovery and Composition in Mobile Ad Hoc Networks. In Proceedings of the Second International Conference on Computational Intelligence and Informatics (pp. 175-187). Springer, Singapore.
  7. 7.
    Jayapal, C., Jayavel, S., & Sumathi, V. P. (2018). Enhanced service discovery protocol for MANET by effective cache management. Wireless Personal Communications, 103(2), 1517-1533.
  8. 8.
    Ramalingam, R., Muniyan, R., Dumka, A., Singh, D. P., Mohamed, H. G., Singh, R., ... & Noya, I. D. (2022). Routing Protocol for MANET Based on QoS-Aware Service Composition with Dynamic Secured Broker Selection. Electronics, 11(17), 2637.
  9. 9.
    J. Manoranjini, A. Chandrasekar and S. Jothi, "Improved QoS and avoidance of black hole attacks in MANET using trust detection framework", Automatika, vol.60, no. 3, pp. 274-284, 2019. [Online]. https://doi.org/10.1080/00051144.2019.1576965.
  10. 10.
    Setijadi, E., Purnama, I. K. E., & Purnomo, M. H. (2019, September). Analysis of reactive routing protocols in MANET based on quality of service. In 2019 International Seminar on Application for Technology of Information and Communication (iSemantic) (pp. 342-345). IEEE.
  11. 11.
    R. Popli, V. Juneja, K. Garg, and D. V. Gupta, “Fuzzy based trust evaluation models for enhancing security in MANETs,” International Journal of Engineering and Advanced Technology (IJEAT), vol. 8, no. 5, pp. 506–510, 2019.
  12. 12.
    H. Jiang, Y. Sun, R. Sun, and H. Xu, “Fuzzy-logic-based energy optimized routing for wireless sensor networks,” International Journal of Distributed Sensor Networks, vol. 9, no. 8, 2013.
  13. 13.
    S. K. Gupta, P. Kuila, and P. K. Jana, “Genetic algorithm approach for k-coverage and m-connected node placement in target based wireless sensor networks,” Computers and Electrical Engineering, vol. 56, pp. 544–556, 2016.
  14. 14.
    S. Amri, F. Khelifi, A. Bradai, A. Rachedi, M. L. Kaddachi, and M. Atri, “A new fuzzy logic based node localization mechanism for wireless sensor networks,” Future Generation Computer Systems, vol. 93, pp. 799–813, 2019.
  15. 15.
    Kumanan, T., & Duraiswamy, K. (2010, February). Reinforcement learning for quality of service in mobile ad hoc network (MANET). In Proceedings of the 12th international conference on Networking, VLSI and signal processing (pp. 250-257).
  16. 16.
    S. Chettibi and S. Chikhi, “Routing in mobile ad-hoc networks as a reinforcement learning task,” in Networked Digital Technologies. NDT 2011. Communications in Computer and Information Science, S. Fong, Ed., vol. 136, Springer, Berlin, Heidelberg, 2011.
  17. 17.
    F. Dong, O. Li, and M. Tong, “Intelligent routing control for MANET based on reinforcement learning,” MATEC Web of Conferences, vol. 232, article 04002, 2018.
  18. 18.
    A. Ghaffari, “Real-time routing algorithm for mobile ad hoc networks using reinforcement learning and heuristic algorithms,” Wireless Networks, vol. 23, no. 3, pp. 703–714, 2017.
  19. 19.
    M. Maleki, V. Hakami, and M. Dehghan, “A model-based reinforcement learning algorithm for routing in energy harvesting mobile ad-hoc networks,” Wireless Personal Communications, vol. 95, no. 3, pp. 3119–3139, 2017.
  20. 20.
    G. Jinarajadasa, L. Rupasinghe, and I. Murray, “A reinforcement learning approach to enhance the trust-level of MANETs,” in 2018 National Information Technology Conference (NITC), pp. 3119–3138, Colombo, Sri Lanka, October 2018.
  21. 21.
    Juneja, K., & Singh, Y. (2021). Trust-adaptive Fuzzy-Statistical Protocol for Optimizing the Communication in Attacked Network. IETE Journal of Research, 1-18.
SCOPUS
SCImago Journal & Country Rank