CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Permutation based K-Means Clustering Approach for Energy Conservation in MANETs

by Ankita Chouhan, Sunil Phulre, Vineet Richhariya
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 127 - Number 3
Year of Publication: 2015
Authors: Ankita Chouhan, Sunil Phulre, Vineet Richhariya
10.5120/ijca2015906349

Ankita Chouhan, Sunil Phulre, Vineet Richhariya . Permutation based K-Means Clustering Approach for Energy Conservation in MANETs. International Journal of Computer Applications. 127, 3 ( October 2015), 20-25. DOI=10.5120/ijca2015906349

@article{ 10.5120/ijca2015906349,
author = { Ankita Chouhan, Sunil Phulre, Vineet Richhariya },
title = { Permutation based K-Means Clustering Approach for Energy Conservation in MANETs },
journal = { International Journal of Computer Applications },
issue_date = { October 2015 },
volume = { 127 },
number = { 3 },
month = { October },
year = { 2015 },
issn = { 0975-8887 },
pages = { 20-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume127/number3/22709-2015906349/ },
doi = { 10.5120/ijca2015906349 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:18:54.493382+05:30
%A Ankita Chouhan
%A Sunil Phulre
%A Vineet Richhariya
%T Permutation based K-Means Clustering Approach for Energy Conservation in MANETs
%J International Journal of Computer Applications
%@ 0975-8887
%V 127
%N 3
%P 20-25
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

One of the important issue in MANETs is an energy saving and security. Each node in MANETs has limited energy resource, so that the lifetime of the network is one of the major critical issues. This paper studied SVM data aggregation method for classifying nodes according to their threshold values, this method eliminated the data redundancy and outliers but classification method is not much enough to reserve energy by power degradation on nodes in MANET. The sources of energy conservation are transmission cost, encryption/decryption, reducing data redundancy and transmission time in MANETs. Here P-coding can offered security based on symmetric key encryption, but symmetric key algorithms are not sufficient to provide security in MANETs. This paper introduce new scheme of energy saving called “Permutation based K-means Clustering” (PKMC) proposed for MANETs, which improves overheads, packet drops, transparency, security and energy efficiency. By the use of Permutation and K-means clustering, multiple clusters can be form with similar objects and each object provides security to data during data transmission. Thus, Permutation based K-means clustering contains minimum energy conservation as compares to previous data aggregation and encryption/decryption methods.

References
  1. Peng Zhang, Chuang Lin, Yixin Jiang, Yanfei Fan, and Xuemin (Sherman) Shen “A Lightweight Encryption Scheme for Network-Coded Mobile Ad Hoc Networks,” IEEE Trans. Parallel and Distributed Systems, Vol. 25, No. 9, September 2013.
  2. Prakashgoud Patil, Umakant Kulkarni “SVM based Data Redundancy Elimination for Data Aggregation in Wireless Sensor Network”, International Conference of Advance in Computing Communication and Informatics, IEEE, 2013
  3. Ajay Kushwaha, Hariram Sharma, “Enhancing Selective Encryption Algorithm for Secured MANET”, 2012 Fourth International Conference on Computational Intelligence, Modelling and Simulation
  4. Emiliano De Cristofaro and Claudio Soriente, “Participatory Privacy:Enabling Privacy in Participatory Sensing”, IEEE TRANSACTIONS ON NETWORKING VOL.27 NO.1 YEAR 2013
  5. QUANSHENG GUAN, F. RICHARD YU, SHENGMING JIANG, VICTOR C. M. LEUNG, HAMID MEHRVAR, “TOPOLOGY CONTROL IN MOBILE AD HOC NETWORKS WITH COOPERATIVE COMMUNICATIONS”, IEEE Wireless Communications April 2012
  6. Adel ECHCHAACHOUI, Ali CHOUKRI, Ahmed HABBANI and Mohamed ELKOUTBI, “Asymmetric and Dynamic Encryption for Routing Security in MANETs”, IEEE 2014
  7. Hongwei Li, “A Hierarchical Identity-Based Encryption for MANETs”, IEEE 2011, ICCP2011
  8. Adarsh Kumar, Krishna Gopal and Alok Aggarwal, “A Complete, Efficient and Lightweight Cryptography Solution for Resource Contrainst Mobile Ad-Hoc Networks”, 2012 2nd IEEE International Conference on Parallel, Distributed and Grid Computing
  9. Chun Yuan, Hongyang Gao, Wenshuo Zhou, “Lightweight identity-based broadcast encryption over wireless ad hoc Networks”, IEEE 2011
  10. GU Hong , ZHAO Guangzhou , QIU Jun, “One-Class Support Vector Machine with Relative Comparisons”, TSINGHUA SCIENCE AND TECHNOLOGY ISSNll1007-0214ll08/16llpp190-197 Volume 15, Number 2, April 2010
  11. Kyung Tae Kim, Man Youn Kim, Ji Hyeon Choi, Hee Yong Youn, “An Energy Efficient and Optimal Randomized Clustering for Wireless Sensor Networks”, 2015 IEEE SNPD 2015, June 1-3 2015, Takamatsu, Japan
  12. Obaida Mohammad Awad Al-Hazaimeh, “A NEW APPROACH FOR COMPLEX ENCRYPTING AND DECRYPTING DATA”, International Journal of Computer Networks & Communications (IJCNC) Vol.5, No.2, March 2013
  13. Data Mining - Cluster Analysis. Available online: http://www.tutorialspoint.com/data_mining/dm_cluster_analysis.htm
  14. k-means clustering. Available online: https://en.wikipedia.org/wiki/K-means_clustering
  15. Book: Data Mining, Southeast Asia Edition: Concepts and Techniques By Jiawei Han, Micheline Kamber, Jian Pei
  16. Book : Data Clustering: Theory, Algorithms, and Applications By Guojun Gan, Chaoqun Ma, Jianhong Wu
Index Terms

Computer Science
Information Sciences

Keywords

MANETs Permutation Encryption SVM K-means Clustering Energy saving.