2012
DOI: 10.1109/lcomm.2012.031912.112484
|View full text |Cite
|
Sign up to set email alerts
|

Degree-Based Clustering Algorithms for Wireless Ad Hoc Networks Under Attack

Abstract: Abstract-In this paper we investigate the behavior of degreebased clustering algorithms with respect to their stability and attack-resistance. Our attack scenario tries to bias the clustering head selection procedure by sending faulty degree claims. We propose a randomized variant of the highest degree algorithm which is proved, through experimental results, attack-resistant without imposing significant overhead to the clustering performance. In addition, we extend our proposal with a cooperative consistent cl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
6
3
1

Relationship

2
8

Authors

Journals

citations
Cited by 31 publications
(16 citation statements)
references
References 4 publications
0
14
0
Order By: Relevance
“…b) Secondly, by exploiting the inherent characteristics of the wireless ad hoc network. To reduce the expensive rekeying calculations, we recommend to utilize the periodic hello messages which the ad hoc nodes (e.g., sensors) broadcast for building their two-hop Neighboring Lists [15]. The cluster head can utilize the Neighboring Lists to predict which are the distant mobile nodes that have the largest probability to join the cluster.…”
Section: Re-keying and Ckdsmentioning
confidence: 99%
“…b) Secondly, by exploiting the inherent characteristics of the wireless ad hoc network. To reduce the expensive rekeying calculations, we recommend to utilize the periodic hello messages which the ad hoc nodes (e.g., sensors) broadcast for building their two-hop Neighboring Lists [15]. The cluster head can utilize the Neighboring Lists to predict which are the distant mobile nodes that have the largest probability to join the cluster.…”
Section: Re-keying and Ckdsmentioning
confidence: 99%
“…The authors discussed in detail different type of node misbehaviors in MANET and WSN, bootstrapping mechanisms, trust evidence, trust computation and interactive decision making methods. Tselikis et al [5] developed degree-based clustering algorithm for the nodes in MANET. This method was attack-resistant without imposing significant overhead to the clustering performance.…”
Section: Literature Surveymentioning
confidence: 99%
“…We adopt here for candidate selection a weighted clustering variable V i which is a simplified variation of the clustering criterion defined in [8]. In more detail, we assume that the energy e i along with the connectivity degree d i of each node i are included in the hello broadcasts.…”
Section: A Local Candidate Selectionmentioning
confidence: 99%