Access the full text.
Sign up today, get DeepDyve free for 14 days.
He has to his credit 28? years of service in teaching IT related subjects. He has published a number of articles in leading national and international journals
Fatma Bouabdallah, N. Bouabdallah, R. Boutaba (2012)
Efficient reporting node selection-based MAC protocol for wireless sensor networksWireless Networks, 19
Qi Jing, A. Vasilakos, J. Wan, Jingwei Lu, Dechao Qiu (2014)
Security of the Internet of Things: perspectives and challengesWireless Networks, 20
R. Kulkarni, Anna Förster, G. Venayagamoorthy (2011)
Computational Intelligence in Wireless Sensor Networks: A SurveyIEEE Communications Surveys & Tutorials, 13
J. Sathiamoorthy, B. Ramakrishnan (2016)
CEAACK – A Reduced Acknowledgment for Better Data Transmission for MANETsInternational Journal of Computer Network and Information Security, 8
H. Halabian, Reyhaneh Changiz, F. Yu, I. Lambadaris, Helen Tang (2012)
Optimal reliable relay selection in multiuser cooperative relaying networksWireless Networks, 18
Mentari Djatmiko, R. Boreli, A. Seneviratne, S. Ries (2013)
Resources-aware trusted node selection for content distribution in mobile ad hoc networksWireless Networks, 19
M. Youssef, Mohamed Ibrahim, M. Latif, Lin Chen, A. Vasilakos (2014)
Routing Metrics of Cognitive Radio Networks: A SurveyIEEE Communications Surveys & Tutorials, 16
A. Attar, Helen Tang, A. Vasilakos, F. Yu, Victor Leung (2012)
A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research DirectionsProceedings of the IEEE, 100
W. Heinzelman, A. Chandrakasan, H. Balakrishnan (2002)
An application-specific protocol architecture for wireless microsensor networksIEEE Trans. Wirel. Commun., 1
Xinming Zhang, Yue Zhang, Fan Yan, A. Vasilakos (2015)
Interference-Based Topology Control Algorithm for Delay-Constrained Mobile Ad Hoc NetworksIEEE Transactions on Mobile Computing, 14
Jin-Shyan Lee, Wei Cheng (2012)
Fuzzy-Logic-Based Clustering Approach for Wireless Sensor Networks Using Energy PredicationIEEE Sensors Journal, 12
J. Sathiamoorthy, B. Ramakrishnan (2015)
Energy and delay efficient dynamic cluster formation using hybrid AGA with FACO in EAACK MANETsWireless Networks, 23
Z. Fadlullah, T. Taleb, A. Vasilakos, M. Guizani, N. Kato (2010)
DTRAB: Combating Against Attacks on Encrypted Protocols Through Traffic-Feature AnalysisIEEE/ACM Transactions on Networking, 18
M. Pravalika, Chikati Kumar (2017)
Passive Ip Trace back: Disclosing the Locations of Ip Spoofers from Path BackscatterInternational Journal of Research, 4
E. Shakshuki, Nan Kang, T. Sheltami (2013)
EAACK—A Secure Intrusion-Detection System for MANETsIEEE Transactions on Industrial Electronics, 60
J. Sathiamoorthy, B. Ramakrishnan, M. Usha (2015)
A reliable and secure data transmission in CEAACK MANETs using Distinct Dynamic Key with classified Digital Signature Cryptographic Algorithm2015 International Conference on Computing and Communications Technologies (ICCCT)
Indranil Gupta, Denis Riordan, S. Sampalli (2005)
Cluster-head election using fuzzy logic for wireless sensor networks3rd Annual Communication Networks and Services Research Conference (CNSR'05)
S. Manvi, L. Bhajantri, V. Vagga (2010)
Routing Misbehavior Detection in MANETs Using 2ACKJournal of telecommunications and information technology
Hui Xia, Ruihua Zhang, Jia Yu, Zhen-Kuan Pan (2016)
Energy-Efficient Routing Algorithm Based on Unequal Clustering and Connected Graph in Wireless Sensor NetworksInternational Journal of Wireless Information Networks, 23
Bingyang Liu, J. Bi, A. Vasilakos (2014)
Toward Incentivizing Anti-Spoofing DeploymentIEEE Transactions on Information Forensics and Security, 9
Liang Zhao, Q. Liang (2004)
Distributed and Energy Efficient Self-Organization for On–Off Wireless Sensor NetworksInternational Journal of Wireless Information Networks, 12
G Yao (2015)
Passive IP trace back: Disclosing the locations of IP spoofers from path backscatterIEEE Transactions on Information Forensics and Security, 10
Jun Zhou, Z. Cao, Xiaolei Dong, N. Xiong, A. Vasilakos (2015)
4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networksInf. Sci., 314
A. Dvir, A. Vasilakos (2010)
Backpressure-based routing protocol for DTNs
Zheng Yan, Peng Zhang, A. Vasilakos (2014)
A survey on trust management for Internet of ThingsJ. Netw. Comput. Appl., 42
Hao-miao Yang, Yaoxue Zhang, Yuezhi Zhou, Xiaoming Fu, Hao Liu, A. Vasilakos (2014)
Provably secure three-party authenticated key agreement protocol using smart cardsComput. Networks, 58
(2017)
MULTI-OBJECTIVE CLUSTERING BASED ON HYBRID OPTIMIZATION ALGORITHM (MO-CS-PSO)
Hoda Taheri, Peyman Neamatollahi, O. Younis, S. Naghibzadeh, M. Moghaddam (2012)
An energy-aware distributed clustering protocol in wireless sensor networks using fuzzy logicAd Hoc Networks, 10
G. Acampora, M. Gaeta, V. Loia, A. Vasilakos (2010)
Interoperable and adaptive fuzzy services for ambient intelligence applicationsACM Trans. Auton. Adapt. Syst., 5
C. Nayak, G. DaSH, Kharabela parida, Satyabrata Das (2011)
Detection of Routing Misbehavior in MANETs with 2ACK schemeInternational Journal of Advanced Computer Science and Applications, 2
Yucheng Kao, Chien-Chih Chen (2013)
A differential evolution fuzzy clustering approach to machine cell formationThe International Journal of Advanced Manufacturing Technology, 65
Ad hoc networks like MANETs can be made manageable by clustering the network where a cluster head is given the responsibility of an arbitrator. To make clustering more efficient, fuzzy clusters can be used to ensure faster cluster formation and reliable data delivery. A wireless sensor network such as MANETs can then have an extended lifetime with the workload being distributed evenly. This paper proposes a competent fuzzy approach in cluster formation. The proposed approach has two significant stages, one which helps in the formation of fuzzy clusters and the other introduces a 3-level filtering technique. The former makes MANETs efficient and manageable and the latter helps in identifying trusted nodes for communication. The modified Fuzzy C-means clustering technique is entrusted with the task of assigning membership to each and every data point linked to each singular cluster center used in the formation of clusters, while a special filter scheme is used to distinguish between the trusted nodes and the malicious nodes. This helps is determining the identity and authenticity of the cluster members’. Eventually only the trusted nodes will be part of the communication range. The filter based fuzzy clustering approach can be used to determine the perfect nodes, which will reflect in the network performance. This also helps in improving the packet transmission in ad hoc networks like MANETs.
Wireless Personal Communications – Springer Journals
Published: Aug 16, 2017
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.