FINDING SHORTEST ROUTING SOLUTION IN MOBILE AD HOC NETWORKS USING FIREFLY ALGORITHM AND QUEUING NETWORK ANALYSIS

2015 ◽  
Vol 77 (18) ◽  
Author(s):  
Aznida Hayati Zakaria ◽  
Md. Yazid Mohd Saman ◽  
Ahmad Shukri M Noor ◽  
Hasni Hassan

Mobile ad hoc network (MANET) is a group of mobile nodes establishing a wireless network without using centralized and fixed infrastructure.  In MANET, nodes may function as hosts and routers. The nodes can move freely and in arbitrary ways. The network topology in MANET is dynamic because of the frequent mobility of nodes, thus routing is challenging aspects in MANET.  Routing protocol plays a role in choosing and selecting the optimal route for transferring the packets of data from the source node to the destination node efficiently. Mostly the previous routing protocols are not practical to this dynamic network topology. Therefore designing an efficient routing protocol for this dynamic network is vital issue. In this paper, the author has proposed an approach, which selects shortest route for transferring the packets of data from source node to the destination node combining firefly algorithm and queuing network analysis. Firefly algorithm can be applied to find the shortest route in this routing problem. The response times taken to send packets of data can be calculated using the suggested queuing model. The result reveals that attractiveness of node in MANET decreases with the increasing value of response time.

2020 ◽  
Vol 2020 ◽  
pp. 1-14
Author(s):  
Haifeng Jiang ◽  
Xiaoxiao Liu ◽  
Shuo Xiao ◽  
Chaogang Tang ◽  
Wei Chen

Mobile Ad Hoc Network (MANET) is suitable for complex environment communication in coal mine. The processes of nutrient flux transfer and path choice in Physarum networks are similar to data transmission and routing decision in MANET. In this paper, we use a Physarum optimization model to design Physarum-inspired autonomous optimized routing (PIAOR) protocol to adapt to the dynamic network topology in underground mine. PIAOR introduces the status of MANET into the Poisson equation in the Physarum model, selects reasonable parameters to represent the transmission performance of the network, and uses the differential evolution equation of the Physarum model to evolve the parameters. PIAOR has achieved the distributed routing decision by automatically reconstructing the optimal routing path, which has reduced the algorithm complexity. Based on NS2, simulation experiments are performed to evaluate the performance of PIAOR, and the results are compared with GPSR, PIMAR, and P-IRP routing algorithms. The experimental results show that the routing path selected by PIAOR is better than that selected by the other three protocols in the performance of average end-to-end delay, delivery ratio, and throughput. The balance of energy consumption and network load is reached, and the network lifetime is effectively prolonged when using the PIAOR protocol.


2018 ◽  
Vol 7 (1.9) ◽  
pp. 6 ◽  
Author(s):  
Pandi Selvam Raman ◽  
Shankar K ◽  
Ilayaraja M

Mobile ad hoc networks (MANETs) are wireless infrastructure-less network consisting collection of autonomous nodes that communicate with each other in decentralized manner. Security remains major challenge due to its some unique characteristics like open medium, mobility and hence topology changes. Therefore, routing protocol for MANETs is much vulnerable to attacks. Black Hole is a type of attack, where malicious node falsely advertises itself having the shortest or optimal path to the destination node. This attack is more dangerous while a group of nodes are cooperating with each other.The objective of this paper is to design cluster based routing protocol and prevent it from the black hole attack. The simulation results show improvement in packet delivery ratio and control overhead.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Francis H. Shajin ◽  
Paulthurai Rajesh

Purpose This study aims to evaluate the direct trust value for each node and calculate the trust value of all nodes satisfying the condition and update the trust value and value each trust update interval for a secure and efficient communication between sender and destination node. Hence, a Trusted Secure Geographic Routing Protocol (TSGRP) has been proposed for detecting attackers (presence of the hacker), considering the trust value for a node produced by combining the location trusted information and the direct trusted information. Design/methodology/approach Amelioration in the research studies related to mobile ad hoc networks (MANETs) and wireless sensor networks has shown greater concern in the presence of malicious nodes, due to which the delivery percentage in any given network can degrade to a larger extent, and hence make the network less reliable and more vulnerable to security. Findings TSGRP has outperformed the conventional protocols for detecting attacks in MANET. TSGRP is establishing a trust-based secure communication between the sender and destination node. The evaluated direct trust value is used after the transmission of route-request and route-reply packets, to evaluate the direct trust value of each node and a secure path is established between the sender and the destination node. The effectiveness of the proposed TSGRP is evaluated through NS-2 simulation. Originality/value The simulation results show the delay of the proposed method is 92% less than PRISM approach and the overhead of the proposed TSGRP approach is 61% less than PRISM approach.


Author(s):  
Seyedakbar Mostafavi ◽  
Vesal Hakami ◽  
Fahimeh Paydar

In Mobile Ad Hoc Networks (MANETs), lack of a fixed infrastructure, dynamic network topology, device mobility and data communication over wireless channels make the multi-hop routing a very challenging task. Due to mission-critical applications of MANET, dealing with these challenges through the design of a Quality of Service (QoS)-assured protocol is a substantial problem. Mobility in MANETs is commonly considered as a negative factor on quality, although we suggest that the right approach to mobility awareness using wisely selected metrics can lead to a robust and QoS-assured protocol. In this paper, we propose QMAR-AODV, a QoS-assured Mobility-Aware Routing protocol which is an optimized version of AODV protocol. We utilize a combination of stability and quality metrics including Mobility Ratio (MR(C,E)) between nodes in a route, Energy Efficiency and congestion load to choose the most stable and QoS-assured routes. Our simulation results show that QMAR-AODV protocol outperforms E2E-LREEMR and reduces route instability, end-to-end delay, data retransmissions and packet loss by 8.3% 10.9% 10.6% and 5.4 respectively, while increases data reception and network throughput by 5.1% and 4.8% respectively, compared to E2E-LREEMR routing protocol.


Author(s):  
Hicham Zougagh ◽  
Noureddine Idboufker ◽  
Rida Zoubairi ◽  
Rachid El Ayachi

In a mobile ad hoc network, a source node must rely on intermediate nodes to forward its packets along multi-hop routes to the destination node. The performance of a mobile ad hoc network is closely related to the capability of the implemented routing protocol to adapt itself to unpredictable changes of topology network and link status. One of these routing protocols is optimized link state routing protocol which assumes that all nodes are trusted. However, in a hostile environment, the OLSR is known to be vulnerable to various kinds of malicious attacks. Without having any control on packet forwarding, an intermediate node can behave selfishly or maliciously to drop packets going through it. Therefore, in this article, the authors propose a new technique for the selection of multipoint relays whose aims to provide each node the ability to select alternative paths in order to reach any destination two hops away.


A mobile ad hoc network (MANET) is a combination of multiple mobile nodes, which are interconnected by radio link. In MANET, sensor nodes are free to move, and each node can act as a host or router. Routing is one of the most challenging tasks because nodes move frequently. Therefore, in MANET, the routing protocol plays an important role in selecting the best route to efficiently transmit data from the source node to the destination node. In this paper, the best path with efficient Ad Hoc on Demand Distance Vector (AODV) routing protocol is chosen as the routing mechanism. The properties of each node are categorized using firefly algorithm. The Artificial Neural Network (ANN) is trained as per these properties and hence in case if the gray hole node is detected within the route, it is identified and the route between the source and the destination is changed. At last, to show how effectively the proposed AODV with Firefly and ANN works is computed in terms of performance parameters. The throughput and PDR is increased by 4.13 % and 3.15 % compared to the network which is affected by gray hole attack. The energy up to 44.02 % has been saved.


Author(s):  
Meeta Singh ◽  
Sudeep Kumar

Mobile ad hoc network (MANET) is a group of self-organised nodes which behaves as a transceiver. The data will pass through intermediate nodes from a source node to the destination node using communication links. The main problem arises if the communication link is broken or going to be broken soon. A new algorithm is proposed that uses a link failure avoidance mechanism (LFAM) and a route availability check mechanism (RACM), for the development of a new secure and efficient AODV routing protocol. The goal of a LFAM mechanism is to locate a new path to the preferred destination when the connection to the next hop is going to be broken and the RACM mechanism is to find an alternate route to the destination.


2015 ◽  
Vol 719-720 ◽  
pp. 727-731 ◽  
Author(s):  
Jian Xu

An energy-aware and congestion-avoidance routing protocol for mobile Ad Hoc network is proposed in this paper. The protocol modifies RREQ of AODV by adding some fields including energy and load information. When nodes forward RREQ they also rewrite these fields with their own situation. So the destination node can find a shortest route without low-power nodes and high-load nodes to avoid instable route most probably. On the other hand, the protocol can protect low-level energy nodes and avoid congestion.


2014 ◽  
Vol 989-994 ◽  
pp. 4482-4487
Author(s):  
Xiao Jing Meng ◽  
De Yu Lin ◽  
De Qin Lin ◽  
Rong Hua

Mobile Ad Hoc network is a self-composing network with a highly dynamic network topology. Although it has many advantages, there are still some safety problems in it. One of these problems is the black hole attack. The black hole attack is a typical attack to the Ad Hoc network and is also the main threat facing it. In this paper, the safety problems exist in the AODV protocol, which is a kind of routing protocol in the Ad Hoc, has been analyzed in detail. In the meanwhile, an improved Secure Ad Hoc On-Demand Distance Vector Routing called OSAODV has been proposed and realized based on the NS2. Finally, three set of experiments have been made, the results have shown that the OSADOV can avoid the black hole attack very well.


Author(s):  
Ali Ayid Ahmad ◽  
Ahmed Chalak Shakir

Mobile Ad Hoc Network is an infrastructure less wireless network where the mobile nodes leaves and joins the mobile network very frequently. The routing of the packets from source node to destination node, the routing protocol is used. On Demand Distance Vector Routing protocol is very common and implemented with Mobile Ad Hoc Network nodes to handle the operations of packet routing from by any node as a source node to destination node. In this paper prevention of black hole attack by modifying the On Demand Distance Vector routing protocol. The sequence number of 32 bit is initiated with the Route Reply and route sequence packet broadcast to determine the request reply from black hole node under the Mobile Ad Hoc Network. The sequence number and On demand Distance Vector Routing protocol are integrated with a mechanism to find the Request Reply of message containing routing information from source to destination node in Mobile Ad Hoc Network.


Sign in / Sign up

Export Citation Format

Share Document