Loading…
Multi objective trust optimization for efficient communication in wireless M learning applications
Mobile learning (M learning) supports ubiquitous learning thus is a strong contender in distance learning. One of the challenge faced in development of m learning is an efficient and secure communication network. Mobile ad hoc network (MANET) refers to a set of wireless mobile nodes possessing no ce...
Saved in:
Published in: | Cluster computing 2019-09, Vol.22 (Suppl 5), p.10687-10695 |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Mobile learning (M learning) supports ubiquitous learning thus is a strong contender in distance learning. One of the challenge faced in development of m learning is an efficient and secure communication network. Mobile ad hoc network (MANET) refers to a set of wireless mobile nodes possessing no centralized architecture as well as a dynamic topology. One of the fast evolving application in MANET is mobile-learning (m learning). Security in MANET’s is a challenge due to its open medium. The routing assumes that all the nodes in the network are trustworthy which leaves the network vulnerable to attacks. Trust management schemes are popularly used for secure routing, verification, interruption location, and access control. In this work, clustering and trust is used for mitigating maliciousness and formation of clusters is optimized using heuristic method. Swarm intelligence (SI) is an efficient option for optimizing routing in a complex network situation, where traditional routing strategies come up short. Particle swarm optimization (PSO) employs the concept of social interactions to get optimal solutions. Simulation results proved that the proposed PSO with weighted trust model achieves better performance for packet delivery ratio, end to end delays as well as cluster formation in malicious environment. |
---|---|
ISSN: | 1386-7857 1573-7543 |
DOI: | 10.1007/s10586-017-1158-z |