A Survey of Clustering Scheme for Manets
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 6
Abstract
Abstract: Mobile adhoc network is a network in which nodes are dynamic in nature and has limited bandwidth and battery power. They are used in different situations such as military services, medical or embedded applications. For providing the scalable routing the nodes are divided into clusters, in clusters there should be a cluster head which contains all the information of nodes of its cluster, as in the flat routing every node perform the same role therefore network lifetime is less. The different schemes in clustering are based on differentcriteria. A cluster head is selected according to specific combination or metric such as identity, degree, energy,weight, mobility etc. clustering is useful to increase life time of network, this survey paper gives a survey of different clustering schemes based on connectivity, dominating set, maintenance, load balancing, weight based, power, identifier, mobility and energy.
Authors and Affiliations
Sanehi Sirohi, Manoj Yadav
Prevention and Detection of Wormhole Attack in Mobile Adhoc Network Using Clustering and RTT
Abstract: A security constraint in mobile adhoc network is very critical task. Some critical security issue such as black hole attack, wormhole attack, sinkhole attack, prevention and detection of attack is major challen...
Prospective Utilization of Elliptic Curve Cryptography for Security: Authentication, Encryption and Decryption
Abstract : Public key cryptography is typically used in the field of mathematical, which consist of factors decomposition problem of huge numbers and discrete logarithm problem in finite field. For huge numbers in...
“Design and Detection of Mobile Botnet Attacks”
Abstract: A mobile botnet is a type of bot that runs automatically when installed on a mobile phone, which does not have any anti-malware. The botnet gains complete access over our mobile device. The common propagation m...
Cryptanalysis of Efficient Unlinkable Secret Handshakes forAnonymous Communications
Abstract: Several unlinkable secret handshakes schemes have been proposed in recent years. As performingthe successful secret handshakes is essentially equivalent to computing a common key between two interactiveme...
A Tutorial of Mobile Ad-Hoc Network (Manet) Routing Protocols
Abstract: In mobile adhoc network nodes dynamically forms networks, there is no any central infrastructure, thus routing becomes a very important issue. Routing protocols used in mobile ad hoc networks (MANET) must...