Journal of Northeastern University ›› 2009, Vol. 30 ›› Issue (9): 1257-1261.DOI: -

• OriginalPaper • Previous Articles     Next Articles

Security clustering algorithm based on reputation in mobile ad hoc networks

Yu, Yao (1); Li, Zhe (1); Liu, Jun (1)   

  1. (1) School of Information Science and Engineering, Northeastern University, Shenyang 110004, China
  • Received:2013-06-22 Revised:2013-06-22 Online:2009-09-15 Published:2013-06-22
  • Contact: Yu, Y.
  • About author:-
  • Supported by:
    -

Abstract: By analyzing the security problem of the hierarchical mobile Ad Hoc networks, a security clustering algorithm based on reputation (SCAR) is presented. In the algorithm, the nodes' reputation is acquired through monitoring the network behaviors by neighboring nodes so as to improve the security of the clustered architecture. The mechanism of reputation exchange between nodes increases the accuracy of reputation evaluation, and the stability of clusters is ensured by the two evaluation indices, i.e., correlation and relative mobility. The weight of each node is computed according to the demand for communication and running condition of networks, with the reputation correlation and relative mobility mentioned above considered comprehensively. Then, the clustered architectures are built, maintained and updated by modul weights to strengthen the security supervision of the cluster head and gateway. Simulation results showed that the proposed algorithm improves the system security and stability.

CLC Number: