首页> 外文期刊>Soft computing: A fusion of foundations, methodologies and applications >A competent three-tier fuzzy cluster algorithm for enhanced data transmission in cluster EAACK MANETs
【24h】

A competent three-tier fuzzy cluster algorithm for enhanced data transmission in cluster EAACK MANETs

机译:群体eAAck船只增强数据传输的主管三层模糊群算法

获取原文
获取原文并翻译 | 示例
           

摘要

Security is a major issue that is being constantly addressed in infrastructure less networks. An ad hoc network like MANET faces several issues that can jeopardize the transmissions in the network. A MANET can be made manageable by clustering it and appointing a cluster head. The cluster head communicates with the other cluster heads through base station. The cluster head routes all traffic from its members with the help of the base station, both within and outside the cluster. Several schemes have been suggested to find and eliminate malicious nodes that may hinder transmission. However, when the cluster member or the cluster head turns malicious, it may damage the transmission by tampering with the data and the routing policies. Though the security schemes target the nodes, they do not have specific techniques to handle a situation where the cluster member and cluster head turn malicious. Because of the constraints prevalent in the election of the cluster head and the selection of the cluster member, an intruder can penetrate and be elected as the cluster head or a member. Our proposed approach tries to counteract this situation by using a two-phase approach. The first phase uses fuzzy rules to form clusters and the second phase uses an efficient three-tier filtering methodology to identify the reliable nodes within the network. For the clustering process, a modified fuzzy C -means clustering algorithm (MFCM) is used to form the clusters. The three-tier filtering methodology decides the authenticity of the nodes by using an efficient filtering process. Our proposed technique can assure a better performance and enhanced throughput when compared to the existing techniques of EAACK.
机译:安全性是基础设施较少的网络中不断解决的主要问题。像MANET这样的ad hoc网络面临几个可以危及网络中传输的问题。可以通过群集并指定群集头来管理MANET。群集头通过基站与其他群集头通信。群集头在群集中和外部的基站的帮助下将所有流量从其成员路由。已经提出了几个方案来查找和消除可能阻碍传输的恶意节点。但是,当群集成员或群集头转动恶意时,它可能通过篡改数据和路由策略来损坏传输。虽然安全方案目标节点,但它们没有特定的技术来处理集群成员和群集头变为恶意的情况。 Because of the constraints prevalent in the election of the cluster head and the selection of the cluster member, an intruder can penetrate and be elected as the cluster head or a member.我们建议的方法试图通过使用两阶段方法来抵消这种情况。第一阶段使用模糊规则来形成群集,第二阶段使用有效的三层滤波方法来标识网络内的可靠节点。对于群集过程,使用修改的模糊C-MEALS聚类算法(MFCM)来形成群集。三层滤波方法通过使用有效的过滤过程来确定节点的真实性。与现有的Eaack技术相比,我们所提出的技术可以确保更好的性能和增强的吞吐量。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号