In this paper we investigate the behavior of degree-based clustering algorithms with respect to their stability and attack-resistance. Our attack scenario tries to bias the clustering head selection procedure by sending faulty degree claims. We propose a randomized variant of the highest degree algorithm which is proved, through experimental results, attack-resistant without imposing significant overhead to the clustering performance. In addition, we extend our proposal with a cooperative consistent clustering algorithm which integrates security into the clustering decision achieving attacker identification and classification
wireless communication is easy to use, rapid implementable and low cost communication technique as c...
A novel cluster-head selection and update algorithm “Type-based Cluster-forming Algorithm (TCA)” is ...
The ad hoc networks are vulnerable to attacks due to distributed nature and lack of infrastructure. ...
In this paper we revisit some considerations relative to the performance of re-clustering algorithms...
Mobile ad-hoc networks (MANETs) are temporary wireless networks useful in emergency rescue services,...
This paper proposes a thechnique for election od nodes called clusterhead to cordinate the cluster a...
The clustering allows dividing the geographical region to be covered into small zones in which each ...
AbstractWe consider the problem of appropriate clusterhead selection in wireless ad-hoc networks whe...
Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, p...
AbstractA new strategy for clustering a wireless AD HOC network is proposed. The main contribution o...
A wireless ad-hoc network is a cooperative communication network deployed with a specific purpose. I...
Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devi...
SUMMARY The social network model has been re-garded as a promising mechanism to defend against Sybil...
Cognitive radio network (CRN) is the next generation wireless network that allows unlicensed users [...
International audienceIn this paper, we propose a new architecture based on an efficient trust model...
wireless communication is easy to use, rapid implementable and low cost communication technique as c...
A novel cluster-head selection and update algorithm “Type-based Cluster-forming Algorithm (TCA)” is ...
The ad hoc networks are vulnerable to attacks due to distributed nature and lack of infrastructure. ...
In this paper we revisit some considerations relative to the performance of re-clustering algorithms...
Mobile ad-hoc networks (MANETs) are temporary wireless networks useful in emergency rescue services,...
This paper proposes a thechnique for election od nodes called clusterhead to cordinate the cluster a...
The clustering allows dividing the geographical region to be covered into small zones in which each ...
AbstractWe consider the problem of appropriate clusterhead selection in wireless ad-hoc networks whe...
Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, p...
AbstractA new strategy for clustering a wireless AD HOC network is proposed. The main contribution o...
A wireless ad-hoc network is a cooperative communication network deployed with a specific purpose. I...
Mobile ad hoc networks (MANETs) are wireless networks consisting of number of autonomous mobile devi...
SUMMARY The social network model has been re-garded as a promising mechanism to defend against Sybil...
Cognitive radio network (CRN) is the next generation wireless network that allows unlicensed users [...
International audienceIn this paper, we propose a new architecture based on an efficient trust model...
wireless communication is easy to use, rapid implementable and low cost communication technique as c...
A novel cluster-head selection and update algorithm “Type-based Cluster-forming Algorithm (TCA)” is ...
The ad hoc networks are vulnerable to attacks due to distributed nature and lack of infrastructure. ...