Two phases based cluster formation scheme for mobile ad hoc networks

被引:0
|
作者
Wang, KC [1 ]
Cho, GW [1 ]
机构
[1] Chonbuk Natl Univ, Dept Comp Sci, Chonju, South Korea
关键词
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
In mobile ad hoc network, most of the cluster formation schemes consider host connectivity as a criterion for clusterhead election. However, since the highest connectivity hosts initiate the cluster formation and affiliate the neighbor hosts using a greedy method, the lowest connectivity hosts in network tend to become clusterheads. This phenomenon acts as an obstacle against producing a few clusters. In this paper, two phases based cluster formation scheme is proposed to resolve this problem. In the first phase, the lowest connectivity hosts in the neighborhood start the cluster formation, and an adjustment procedure is employed to affiliate the lowest connectivity hosts. In the second phase, the hosts not affiliated to the first phase clusters are grouped into one or more clusters based on host connectivity and host ID. The simulation results show that the proposed scheme is better and more scalable than HCCP[3].
引用
收藏
页码:194 / 203
页数:10
相关论文
共 50 条
  • [31] FUZZY-BASED ROUTING SCHEME IN MOBILE AD HOC NETWORKS
    Wang, Jin-Long
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2012, 18 (03): : 297 - 305
  • [32] A novel caching scheme for Internet based mobile ad hoc networks
    Lim, SH
    Lee, WC
    Cao, GH
    Das, CR
    [J]. ICCCN 2003: 12TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, PROCEEDINGS, 2003, : 38 - 43
  • [33] Cluster maintenance in mobile ad-hoc networks
    Wang, L
    Olariu, S
    [J]. CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2005, 8 (2-3): : 111 - 118
  • [34] Mobile cluster protocol in wireless ad hoc networks
    Liu, K
    Li, JD
    [J]. 2000 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY PROCEEDINGS, VOLS. I & II, 2000, : 568 - 573
  • [35] Cluster Maintenance in Mobile Ad-hoc Networks
    Lan Wang
    Stephan Olariu
    [J]. Cluster Computing, 2005, 8 : 111 - 118
  • [36] Optimized Broadcast Scheme for Mobile Ad hoc Networks
    Amari, Ahmed
    Achir, Nadjib
    Muhlethaler, Paul
    Laouiti, Anis
    [J]. 2014 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2014, : 2594 - 2598
  • [37] Distributed security scheme for mobile ad hoc networks
    Nargunam, A. Shajin
    Sebastian, M. P.
    [J]. 2006 IEEE INTERNATIONAL CONFERENCE ON INFORMATION ACQUISITION, VOLS 1 AND 2, CONFERENCE PROCEEDINGS, 2006, : 166 - 171
  • [38] Message authentication scheme for mobile ad hoc networks
    Sato, F
    Takahira, H
    Mizuno, T
    [J]. 11TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL I, PROCEEDINGS, 2005, : 50 - 56
  • [39] A limited flooding scheme for mobile ad hoc networks
    Chiang, TC
    Wu, PY
    Huang, YM
    [J]. WIMOB 2005: IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS, VOL 3, PROCEEDINGS, 2005, : 473 - 478
  • [40] Hybrid Flooding Scheme for Mobile Ad Hoc Networks
    Reina, D. G.
    Toral, S. L.
    Jonhson, P.
    Barrero, F.
    [J]. IEEE COMMUNICATIONS LETTERS, 2013, 17 (03) : 592 - 595