We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

An Adaptive Clustering Scheme for Mobile Ad-Hoc Networks

by Nayeema Sadeque, Neva Agarwala, Mohammad Rashedul Hasan
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 47 - Number 1
Year of Publication: 2012
Authors: Nayeema Sadeque, Neva Agarwala, Mohammad Rashedul Hasan
10.5120/7156-9867

Nayeema Sadeque, Neva Agarwala, Mohammad Rashedul Hasan . An Adaptive Clustering Scheme for Mobile Ad-Hoc Networks. International Journal of Computer Applications. 47, 1 ( June 2012), 50-56. DOI=10.5120/7156-9867

@article{ 10.5120/7156-9867,
author = { Nayeema Sadeque, Neva Agarwala, Mohammad Rashedul Hasan },
title = { An Adaptive Clustering Scheme for Mobile Ad-Hoc Networks },
journal = { International Journal of Computer Applications },
issue_date = { June 2012 },
volume = { 47 },
number = { 1 },
month = { June },
year = { 2012 },
issn = { 0975-8887 },
pages = { 50-56 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume47/number1/7156-9867/ },
doi = { 10.5120/7156-9867 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:40:49.840744+05:30
%A Nayeema Sadeque
%A Neva Agarwala
%A Mohammad Rashedul Hasan
%T An Adaptive Clustering Scheme for Mobile Ad-Hoc Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 47
%N 1
%P 50-56
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

While Mobile Ad-Hoc Networks (MANET) has many characteristics that are a challenge to manage, like bandwidth and power constraints, dynamic topology, etc adaptability is a key issue in the successful operation of a MANET. Unfortunately, this feature of MANET have not been investigated and optimized in great detail in the past. Hence, this provides an ideal opportunity and so forms the heart of this paper. It attempts to initiate such an adaptability study, by introducing a performance metric called Performance Factor (PF). The PF directly investigates the performance of a link by considering the bandwidth available to a link and distance between the Cluster head and the user node. An algorithm is proposed that utilizes this performance metric to ensure that all nodes receive optimum performance while ensuring an optimum number of clusters is maintained.

References
  1. Abusalah, L. Khokhar, A. Guizani, M. ," A survey of secure mobile Ad Hoc routing protocols," Univ. of Illinois at Chicago, Chicago, IL, USA, vol. 10, pp. 78¬-93, 2008.
  2. S. Mangai, A. Tamilarasi, "Evaluation of the Performance Metrics in Improved Location Aided Cluster based Routing Protocol for GPS Enabled MANETs," European Journal of Scientific Research, Vol. 46, , pp. 296-308, 2010.
  3. R. Misra, C. R. Mandal, "Performance Comparison of AODV/DSR On Demand Routing Protocols for Ad Hoc Networks in Constrained Situation", IEEE ICPWC, 2005.
  4. Project on Wireless Adhoc Networking and Clustering, http://www. cse. chalmers. se/~tsigas/Courses/DCDSeminar/Files/adhocproject. pdf
  5. S. R. Das, R. Casta˜neda and J. Yan, R. Sengupta, "Comparative Performance Evaluation of Routing Protocols for Mobile, Ad hoc Networks," LA , pp. 153- 161, October 1998.
  6. P. Basu, N. Khan and T. D. C Little, "A Mobility Based Metric for Clustering in Mobile Ad hoc Network," Boston University, MCL Technical Report No. 01-15-2001.
  7. P. Chenna Reddy, Dr. P. Chandrasekhar Reddy, "Performance Analysis of Ad-hoc Routing protocols," American Open Internet Journal, Vol. 17, 2006.
  8. B. Awerbuch et al. , "An On-Demand Secure Routing Resilient to Byzantine Failures," Proc. ACM Wksp. Wireless Security 2002, Sept. 2002, pp. 21–30.
  9. B. Bhargava et al. , "Trust, Privacy, and security. Summary of Workshop Breakout session," NSF Information and DATA Management (IDM) Wksp. held in Sept. 2003 in Seattle, Technical Report, CERIAS, Purdue University, West Lafayettte, IN, Dec. 2003.
  10. B. Bhargava and Y. Zhong, "Authorization Based on Evidence and Trust," Proc. Data Warehouse and Knowledge Management Conf. (DaWaK), Aix-en-rovence, France, Sept. 2002.
Index Terms

Computer Science
Information Sciences

Keywords

Clustering Manet Multi-hop Performance Factor Routing Protocols