Trust-Based Clustering in Mobile Ad Hoc Networks: Challenges and Issues

Mehdi Maleknasab, Moazam Bidaki, Ali Harounabadi
2013 International Journal of Security and Its Applications  
Mobile ad hoc networks are prone to various security attacks of malicious nodes and attackers. To protect the network clustering from security attacks, numerous trust-based clustering schemes have been presented in the literature. Analyzing the existing trust-based clustering solutions, the researchers illustrated their primary features and properties in this paper and mainly discussed about the trust management mechanisms which are integrated in each trust-based clustering solution. Besides it
more » ... was illuminated how trust and reputation are used in the cluster formation and maintenance phases. At the end, all of their trust computation methods were compared and concluded with open research issues. 323 helpful to understand the limitations of existing solutions and design new and low overhead trust-based clustering schemes which can be resilient against internal misbehaving nodes as well as external attackers. Table 1 shows the acronyms and abbreviation used in this paper. The rest of this paper is organized as follows: Section 2 discusses about the cryptographicbased clustering in mobile ad hoc Networks. Section 3 illustrates trust-based clustering schemes and cluster management operation of each scheme and determines their advantages and disadvantages in detail.
doi:10.14257/ijsia.2013.7.5.30 fatcat:fl73c2gxobfypp7oaqn3dj7frq