z-logo
open-access-imgOpen Access
Security-aware Localized Topology Control Algorithm for Mobile Ad-hoc Networks
Author(s) -
Wenjian Wang,
Feng Ran,
Min Zhu,
Wu Yue,
Yadong Liu,
Yafeng Ye
Publication year - 2019
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/1302/2/022094
Subject(s) - computer science , topology control , node (physics) , network topology , computer network , topology (electrical circuits) , tree (set theory) , wireless ad hoc network , spanning tree , metric (unit) , mobile ad hoc network , distributed computing , set (abstract data type) , algorithm , mathematics , wireless network , discrete mathematics , engineering , wireless , network packet , telecommunications , mathematical analysis , operations management , key distribution in wireless sensor networks , structural engineering , combinatorics , programming language
In this paper, we extend the topology control schemes by making security the primary concern. For this purpose, we propose a security-aware localized topology control algorithm that can maximally avoid making malicious nodes into intermediate nodes. In order to marginalize malicious nodes, we introduce a new metric for characterizing the security status of each link in the network. Each node independently builds a local spanning tree for finding a reduced neighbor set. In the meantime, we maximally avoid using insecurity links in their neighborhood for the local spanning tree construction. Simulation results show that our algorithm significantly improves the security of a network.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here