Dynamic Monitoring in Ad Hoc Network


Article Preview

This paper, present a novel model to resolve the problems of evaluating trust value of nodes, and prepare a dynamic supervising in ad hoc network as well. Trust evaluation is not only based on direct interactions among nodes, but also observing previous behaviors of nodes, which come from all interactions through the network. This model specially decreases the delay time of selecting a new head for each cluster, which leads to prepare a dynamic monitoring in intra cluster and inter cluster in ad hoc network.



Edited by:

Mohamed Othman




H. Shohreh et al., "Dynamic Monitoring in Ad Hoc Network", Applied Mechanics and Materials, Vols. 229-231, pp. 1481-1486, 2012

Online since:

November 2012




[1] Hongmei Deng, Routing Security in Wireless Ad hoc Networks. , IEEE Communications Magazine, Vol .  40, Oct. 2002, pp.70-74.

DOI: https://doi.org/10.1109/mcom.2002.1039859

[2] Chen Aiguo, Xu Guoai, Yang Yixian, A Cluster-Based Trust Model for Mobile Ad hoc Network, IEEE Wireless Communications, Networking Mobile Computing, Oct. 2008, pp.1-4.

DOI: https://doi.org/10.1109/wicom.2008.1095

[3] M. Gerla, and J. T. C Tsai, Multicluster, Mobile, Multimedia Radio Network, ACM Wireless Networks, Vol. 1, No. 3, 1995, pp.255-265.

DOI: https://doi.org/10.1007/bf01200845

[4] D. J. Baker, and A. Ephremides, The Architectural Organization of a Mobile Radio Network via a Distributed Algorithm, IEEE Transactions on Communications, Vol. 29, No. 11, 1981, pp.1694-1701.

DOI: https://doi.org/10.1109/tcom.1981.1094909

[5] Er, and W. K. G. Seah, Mobility-Based D-Hop Clustering Algorithm for Mobile Ad Hoc Networks, Proceedings of 2004 IEEE Wireless Communications & Networking Conference (WCNC 2004), Atlanta, USA, Vol. 4, March 2004, pp.2359-2364.

DOI: https://doi.org/10.1109/wcnc.2004.1311457

[6] M. Chatterjee, S. K. Das, and D. Turgut, WCA: A Weighted Clustering Algorithm for Mobile Ad Hoc Networks, Journal of Clustering Computing, Vol. 5, No. 2, April 2002, pp.193-204.

DOI: https://doi.org/10.1109/glocom.2000.891926

[7] B. Kadri, A. M'hamed, and M. Feham, Secured Clustering Algorithm for Mobile Ad Hoc Networks, International Journal of Computer Science and Network Security, Vol. 7, No. 3, March 2007, pp.27-34.

[8] Y. Choi and D. Park, Associativity Based Clustering and Query Stride for On-demand Routing Protocols in Ad Hoc Networks,. Journal of Communications and, vol. 4, Mar. (2002).

DOI: https://doi.org/10.1109/jcn.2002.6596931

[9] Jin. Tao and Chigan. Chunxio, A Security-Enabled Wireless Token Cluster MAC Protocol with Intelligent Token Policy, IEEE Military Communications Conderence, Oct 2007, pp.1-7.

DOI: https://doi.org/10.1109/milcom.2007.4455030

[10] Chin. Yu and Sethares W.A., Adaptive Decentralized Re-Clustering for Wireless Sensor Network, IEEE system, Man and Cybernetics, vole. 4, Oct. 2006, pp.2709-2716.

DOI: https://doi.org/10.1109/icsmc.2006.385283

[11] Wendy Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan, Energy-Efficient Communication Protocol for Wireless Microsensor Networks, IEEE Proceeding of the 33rd Annual Hawaii International conference, vol. 2, Jan 2000, pp.1-10.

DOI: https://doi.org/10.1109/hicss.2000.926982

[12] Hossein Rouhani Zeidanloo, Mohammad Jorjor Zadeh shooshtari, Payam Vahdani Amoli, M. Safari and Mazdak Zamani, A Taxonomy of Botnet Detection Techniques,. International Conference on the 3nd IEEE International Conference on Computer Science and Information Technology.  Chengdu, China, July (2010).

DOI: https://doi.org/10.1109/iccsit.2010.5563555

[13] Maziar Janbeglou, Mazdak Zamani, and Suhaimi Ibrahim. Redirecting Network Traffic toward a Fake DNS Server on a LAN. 2010 3rd IEEE International Conference on Computer Science and Information Technology (ICCSIT 2010). July 9 - 11, 2010. Chengdu, China.

DOI: https://doi.org/10.1109/iccsit.2010.5565196

[14] Maziar Janbeglou, Mazdak Zamani, and Suhaimi Ibrahim. Redirecting Outgoing DNS Requests toward a Fake DNS Server in a LAN. IEEE International Conference on Software Engineering and Service Science (ICSESS2010). July 16-18, 2010, Beijing, China.

DOI: https://doi.org/10.1109/icsess.2010.5552339

[15] Somayeh Nikbakhsh, Mazdak Zamani, Azizah Abdul Manaf, and Maziar Janbeglou. A Novel Approach for Rogue Access Point Detection on the Client-Side. The 26th IEEE International Conference on Advanced Information Networking and Applications (AINA-2012). Fukuoka, Japan, March 26-29, (2012).

DOI: https://doi.org/10.1109/waina.2012.108