scholarly journals Cluster Optimization in Mobile Ad Hoc Networks Based on Memetic Algorithm: memeHoc

Complexity ◽  
2020 ◽  
Vol 2020 ◽  
pp. 1-12
Author(s):  
Masood Ahmad ◽  
Abdul Hameed ◽  
Fasee Ullah ◽  
Atif Khan ◽  
Hashem Alyami ◽  
...  

In mobile ad hoc networks (MANETs), the topology differs very often due to mobile nodes (MNs). The flat network organization has high topology maintenance messages overload. To reduce this message overload in MANET, clustering organizations are recommended. Grouping MANET into MNs has the advantage of controlling congestion and easily repairing the topology. When the MANET size is large, clustered MN partitioning is a multiobjective optimization problem. Several evolutionary algorithms such as genetic algorithms (GAs) are used to divide MANET into clusters. GAs suffer from premature convergence. In this article, a clustering algorithm based on a memetic algorithm (MA) is proposed. MA uses local exploration techniques to reduce the likelihood of early convergence. The local search function in MA is to find the optimal local solution before other evolutionary algorithms. The optimal clusters in MANET can be achieved using MA for dynamic load balancing. In this work, the network is considered a graph G (V, E), where V represents MN and E represent the communication links of the neighboring MNs. The aim of this study is to find the cluster headset (CH) as early as possible when needed. High-quality individuals are selected for the new population in the next generation. New individuals are generated using the crossover mechanism on the chromosome once the two parents have been selected. Data are communicated via CHs between other clusters. The proposed technique is compared with existing techniques such as DGAC, MobHiD, and EMPSO. The proposed technique overcomes the state-of-the-art clustering schemes in terms of cluster counting, reaffiliation rate, cluster life, and overload of control messages.

2011 ◽  
Vol 2011 ◽  
pp. 1-10
Author(s):  
Suchismita Chinara ◽  
Santanu Kumar Rath

The growth of interest and research on multihop wireless network is exponential in recent years. In mobile ad hoc networks (MANET), the nodes play the role of routers to forward the packets of neighbor nodes as there is no fixed infrastructure available to do so. Clustering is a proven solution that maps the architecture of cellular networks into ad hoc networks. Here, selected nodes form the virtual backbone of the network and take part in packet routing. This achieves faster packet delivery as limited nodes are responsible for the same even though the network is not strongly connected. In this paper, a distributed topology adaptive clustering algorithm is designed that requires local information by the nodes for the formation of clusters. The role of cluster head is fairly distributed among the nodes to obtain a longer network lifetime. The change of cluster heads and the mobility of nodes disturb the node connectivity resulting in communication instability. To overcome such situations, a topology control protocol is developed that adjusts the transmission range of concerned mobile nodes to achieve local connectivity among nodes within the clusters even after the hand-off by the heads takes place.


Author(s):  
Sunil Kumar ◽  
Kamlesh Dutta

A Mobile Ad hoc NETwork (MANET) is a self-organizing, infrastructure-less network of mobile nodes connecting by wireless links. In operation, the nodes of MANETs do not have a central control mechanism. It is known for its properties of routable network, where each node acts as a router to forward packets to other specific nodes in the network. The unique properties of MANET have made it useful for large number of applications and led to a number of security challenges. Security in the mobile ad hoc network is a very critical job and requires the consideration of different security issues on all the layers of communication. The countermeasures are the functions that reduce or eliminate security vulnerabilities and attacks. This chapter provides a comprehensive study of all prominent attacks in Mobile Ad Hoc Networks described in the literature. It also provides various proactive and reactive approaches proposed to secure the MANETs. Moreover, it also points to areas of research that need to be investigated in the future.


Sign in / Sign up

Export Citation Format

Share Document