Loading…

Multi objective trust optimization for efficient communication in wireless M learning applications

Mobile learning (M learning) supports ubiquitous learning thus is a strong contender in distance learning. One of the challenge faced in development of m learning is an efficient and secure communication network. Mobile ad hoc network (MANET) refers to a set of wireless mobile nodes possessing no ce...

Full description

Saved in:
Bibliographic Details
Published in:Cluster computing 2019-09, Vol.22 (Suppl 5), p.10687-10695
Main Authors: Ashwin, M., Kamalraj, S., Azath, M.
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Mobile learning (M learning) supports ubiquitous learning thus is a strong contender in distance learning. One of the challenge faced in development of m learning is an efficient and secure communication network. Mobile ad hoc network (MANET) refers to a set of wireless mobile nodes possessing no centralized architecture as well as a dynamic topology. One of the fast evolving application in MANET is mobile-learning (m learning). Security in MANET’s is a challenge due to its open medium. The routing assumes that all the nodes in the network are trustworthy which leaves the network vulnerable to attacks. Trust management schemes are popularly used for secure routing, verification, interruption location, and access control. In this work, clustering and trust is used for mitigating maliciousness and formation of clusters is optimized using heuristic method. Swarm intelligence (SI) is an efficient option for optimizing routing in a complex network situation, where traditional routing strategies come up short. Particle swarm optimization (PSO) employs the concept of social interactions to get optimal solutions. Simulation results proved that the proposed PSO with weighted trust model achieves better performance for packet delivery ratio, end to end delays as well as cluster formation in malicious environment.
ISSN:1386-7857
1573-7543
DOI:10.1007/s10586-017-1158-z