ArticlePDF Available

Improved route selection algorithm based on TORA over mobile adhoc network

Authors:

Abstract and Figures

MANETs are used in a variety of applications due to their ability to establish and release networks instantly without the need for a pre-established network or infrastructure. Here the challenging task is to search for the most efficient routing Energy is the main source of MANET and each node consumes energy during transmission. Energy-efficient protocols like AODV, DSR, TORA, etc. have already been proposed. In our proposed work we are using TORA to improve route selection. “Temporarily Ordered Routing Algorithm (TORA) is an adaptive loop-free routing protocol that works on route reversal method. The protocol is based on a link reversal algorithm and uses a direct acyclic graph (DAG) for route finding. As TORA maintains multi routes from source to destination, the energy drain is an issue so energy efficiency is of utmost importance. In this work, Mod TORA work as a load balancer with successor and feasible successor path for each connection considers the energy parameter & modifies the routing table. The purpose of selecting load balance is for the Fair battery consumption of the nodes and link failure purpose. We are changing the route selection mechanism. Mod TORA used Energy and multipath mechanism with optimized routing. The two best routes are found and if the first one fails then the second route is selected, to improve the performance of TORA and thus ultimately leading to load balancing.
Content may be subject to copyright.
Full Terms & Conditions of access and use can be found at
https://www.tandfonline.com/action/journalInformation?journalCode=tdmc20
Journal of Discrete Mathematical Sciences and
Cryptography
ISSN: 0972-0529 (Print) 2169-0065 (Online) Journal homepage: https://www.tandfonline.com/loi/tdmc20
Improved route selection algorithm based on
TORA over mobile adhoc network
Payal M Thakrar, Vijander Singh & Ketan Kotecha
To cite this article: Payal M Thakrar, Vijander Singh & Ketan Kotecha (2020) Improved route
selection algorithm based on TORA over mobile adhoc network, Journal of Discrete Mathematical
Sciences and Cryptography, 23:2, 617-629, DOI: 10.1080/09720529.2020.1729508
To link to this article: https://doi.org/10.1080/09720529.2020.1729508
Published online: 14 May 2020.
Submit your article to this journal
View related articles
View Crossmark data
©
Improved route selection algorithm based on TORA over mobile adhoc
network
Payal M Thakrar
Amity Institute of Information Technology
Amity University Jaipur
Jaipur 303007
Rajasthan
India
Vijander Singh *
Department of Computer Science and Engineering
Manipal University Jaipur
Jaipur 303007
Rajasthan
India
Ketan Kotecha §
Faculty of Engineering
Symbiosis Institute of Technology
Pune 412115
Maharastra
India
Abstract
MANETs are used in a variety of applications due to their ability to establish and
release networks instantly without the need for a pre-established network or infrastructure.
Here the challenging task is to search for the most efficient routing Energy is the main
source of MANET and each node consumes energy during transmission. Energy-efficient
protocols like AODV, DSR, TORA, etc. have already been proposed. In our proposed work
we are using TORA to improve route selection. “Temporarily Ordered Routing Algorithm
(TORA) is an adaptive loop-free routing protocol that works on route reversal method. The
protocol is based on a link reversal algorithm and uses a direct acyclic graph (DAG) for route
finding. As TORA maintains multi routes from source to destination, the energy drain is an
E-mail: payal.mashru@yahoo.com
*E-mail: vijan2005@gmail.com (Corresponding Author)
§E-mail: drketankotecha@gmail.com
Journal of Discrete Mathematical Sciences & Cr yptography
ISSN 0972-0529 (Print), ISSN 2169-0065 (Online)
Vol. 23 (2020), No. 2, pp. 617–629
DOI : 10.1080/09720529.2020.1729508
618 P. M. THAKRAR, V. SINGH AND K. KOTECHA
issue so energy efficiency is of utmost importance. In this work, Mod TORA work as a load
balancer with successor and feasible successor path for each connection considers the energy
parameter & modifies the routing table. The purpose of selecting load balance is for the
Fair battery consumption of the nodes and link failure purpose. We are changing the route
selection mechanism. Mod TORA used Energy and multipath mechanism with optimized
routing. The two best routes are found and if the first one fails then the second route is
selected, to improve the performance of TORA and thus ultimately leading to load balancing.
Subject Classification: 68M12 network protocols
Keywords: TORA, Load balancing, Energy, Multipath.
1. Introduction
Infrastructure less wireless network is also known as Mobile Ad
Network (MANET). These are the systems which are having no fixed
nodes [3]. The association and control of the network is simply the duty
shared by the nodes themselves. The entire network is portable and the
individual nodes are permitted to move freely communicate to each other
[9].Network nodes have an additional capacity of being switches, which
are capable of finding and keeping up the courses to different nodes in the
network [11]. A variety of areas of the nodes are found for instance the
node might be situated in or on planes, ships, trucks, autos, maybe even
on individuals or little gadgets.
1.1 Routing Protocol
Routing is an important concern because of MANET’s distributed
and dynamic nature[1]. There are two types of routing schemes supported
by MANET as shown in Fig 1.
[Source : Self]
Figure 1
Types of Routing Protocols.
IMPROVED ROUTE SELECTION ALGORITHM 619
1.2 Objective
The aim of this research is to study the Energy Efficiency in TORA
routing protocol and its effects on the network performance and finding a
feasible solution to overcome this problem of energy drainage and to find
the optimal path for efficient routing.
2. Introduction of TORA
The Temporally Ordered Routing Algorithm (TORA) is a profoundly
versatile circle free disseminated steering calculation dependent on
the connection inversion idea. TORA is intended to limit response to
topological changes. [5] The design idea of TORA is to decouple the age
of possibly spread-out control messages from the pace of topological
changes. [10]
2.1 TORA Algorithm
TORA uses route creation, maintains and deletion base on DAG. For
every node in the network, a different coordinated non-cyclic diagram
(DAG) is kept up for every goal. At the point when a node needs a course to
a specific goal, it communicates a QUERY parcel containing the location of
the goal for which it requires a course. This bundle engenders through the
system until it comes to either the goal or a halfway node having a course
to the goal [10]. The benefit of the QUERY at that point communicates an
UPDATE bundle posting its tallness regarding the goal as shown in Fig.
2. As this parcel spreads through the network, every node that gets the
UPDATE sets its tallness to a worth more prominent than the stature of
the neighbor from which the UPDATE has been gotten. [5][10] This has the
impact of making a progression of coordinated connections from the first
sender of the QUERY to the node that at first created the UPDATE. At the
point when a node finds that a course to a goal is never again substantial, it
modifies its tallness so it is a nearby most extreme regarding its neighbors
and transmits an UPDATE parcelas shown in Fig.3. On the off chance
that the node has no neighbors of limited tallness regarding this goal, at
that point the node rather endeavors to find another course as depicted
previously. [10] When a node identifies a system segment, it produces a
CLEAR parcel that resets directing state and expels invalid courses from
the systemas shown in Fig.4.The three fundamental capacities conveyed
by TORA are route creation, maintenance, and erasure [5].
620 P. M. THAKRAR, V. SINGH AND K. KOTECHA
2.1.1 Route creation
[Source : self]
Figure 2
Route Creation
2.1.2 Route Maintenance
[Source : self]
Figure 3
Route Maintenance
2.1.3 Route Erasure
[Source : self]
Figure 4
Route Erasure
IMPROVED ROUTE SELECTION ALGORITHM 621
3. Literature review
“Improving TORA Protocol using Ant Colony Optimization
Algorithm” [1]
Merril Roshini Mathias et.al in 2018 presents a QoS empowered
Temporally Ordered Routing Algorithm utilizing Ant Colony
Optimization called AntTORA. ACO calculations have demonstrated to
be a decent technique for creating directing calculations for impromptu
arranges. ACO based directing is a productive steering plan dependent
on the conduct of scrounging ants. The aggregate conduct of ants finds
the smallest way from the home to a nourishment source, by affidavit of
a synthetic substance called pheromone on the visited nodes. It’s used in
the TORA convention to enhance numerous QoS measurements like start
to finish delay, throughput, jitter, etc.
“A Stable TORA Based for Routing in Mobile Ad Ηoc Networks” [2].
Sajjad Jahanbakhsh et.al in 2017 presents stable steering is one
technique to face directing difficulties in versatile specially appointed
systems. The goal of this examination is to balance out the TORA
convention which is a conveyed steering convention, with high
adjustment, effectiveness, and reasonableness for enormous and thick
versatile specially appointed systems and along these lines to give another
high productivity convention.
“CO-TORA On-demand Routing Protocol for Cognitive RANET” [3]
Lamia El Garoui et.al in 2014 presents a strong and proficient steering
arrangement as far as throughput. The recommendation is a receptive
directing convention (named subjective impermanent requesting steering
calculation) CO-TORA dependent on the exemplary TORA convention
proposed for non-intellectual remote specially appointed systems.
“Mechanism of IMEP on Performance of TORA under different
Mobility models”. [4]
Amardeep Kaur et.al in 2014 presents an Increment in most extreme
number of OBM (BEACON) retransmissions to improve TORA execution.
More than one portability models considered. Random course Model gave
best predictable execution.italsoIncrease in maximum number of OBM
(BEACON) retransmissions, decrease Routing Overhead, and increase
Packet Delivery Ratio and detection of link.ModTORA perform fast and
less energy consumption.
“The Application and Improvement of TORA in Swarm Network
with Unmanned Aerial Vehicle Nodes”. [5]
Zhongqiang Zhai et.al in 2013 present a TORA used reorder
mechanism and change cost value for routing. Here TORA adds cost
622 P. M. THAKRAR, V. SINGH AND K. KOTECHA
value in the routing table and base on that finds the best path. IMEP also
modified and modified hello packet for sent cost value over a neighbor
node.
“An In-depth analysis of Effects of IMEP on TORA protocol”. [6]
K.Hui Lim Et.al in 2012 presents a link/Connection statusSensing :
Connection/association status detecting gives TORA exact and current
connection status data of a hub to its neighbors and whether the
connections are bi-directional or unidirectional.
“Efficient Routing Protocols for Mobile Ad Hoc Network’s”. [7]
R. Thiagarajan et.al in 2013 presents a TORA user advertisement
message for making a neighbor relationship. For best pathfinding change
echanism and remove the IMEP process and instead use hello mechanism
for sending cost value. Delay and bandwidth use as cost function with
this TORA.
4. Modified TORA(Mod -TORA) Algorithm:
4.1 Proposed Algorithm
[1] If a node has greater residual energy than the threshold, the node
sends modify Query message with its residual energy appended to
it.
[2] After receiving multiple mod Qry packet destinations follow the
link reversal algorithm and send back upped packet with whole
path information to the source.
[3] With the help of this modified Update message source node first
stores the energy of the individual node & calculates the energy of
the whole path. Finally, calculate the cost function. [st = a [Emin/
Etotal] + (1 - a) [1/hc] ] : Where a is constant 0 to 1.
[4] Using this cost function each node creates an entry in the routing
table and maintains successor and feasible successor paths for
particular destination Successor and Feasible successor paths are
selected as the highest cost path and Next highest cost path. This
multipath mechanism used during link failure and in loadbalancing.
IMPROVED ROUTE SELECTION ALGORITHM 623
4.2 Proposed flowchartas shown in Fig. 5
[Source : Self]
Figure 5
Flow chart
5. Simulation Setup
In this study, the developed algorithm is stimulated in ns3 simulator.
5.1 Simulation setup are given in Table 1 :
Table 1
Parameter Value
Terrain area 500*500
Protocol TORA
Traffic CBR
Antenna Omnidirectional
Packet size 500 bytes
Packet Queue Size 50
Time 15 sec
No.of. nodes Varying from 7,14,21 & 28
624 P. M. THAKRAR, V. SINGH AND K. KOTECHA
6. Result Analysis
[1] Performance analysis of throughput (Kbps)are given in Table 2.
Table 2
[Source: self]
No. of node TORA M-TORA
7 2404.92 2407.56
14 2386.71 2393.64
21 2233.64 2393.64
28 2807.45 3141.39
Correct start time.
[2] Performance analysis of Good put (Kbps) are given in Table 3.
Table 3
[Source: self]
No. of node TORA M-TORA
7 1802.70 1804.51
14 1716.03 1718.95
21 1424.89 1718.95
28 1557.41 1841.51
IMPROVED ROUTE SELECTION ALGORITHM 625
Goodput= pkt_size-hdr_size (pkt_size%512)
[3] Performance analysis of Packet delivery ratio (%) are given in Table 4
Table 4
[Source: self]
No. of node TORA M-TORA
7 98.38 98.60
14 99.88 99.90
21 99.49 99.90
28 99.26 99.63
pdr=(received line/send line) *100
626 P. M. THAKRAR, V. SINGH AND K. KOTECHA
[4] Performance analysis of Residual Energy (J) are given in Table 5.
Table 5
[Source: self]
No. of node TORA M-TORA
7 84.601051 87.402903
14 87.091508 90.331697
21 87.592470 90.331697
28 87.228005 89.171248
[5] Performance analysis of Consume Energy (J) are given in Table 6.
Table 6
[Source: self]
No. of node TORA M-TORA
7 15.398948 12.597097
14 12.908492 9.668303
21 12.40753 9.668303
28 12.771995 10.828752
IMPROVED ROUTE SELECTION ALGORITHM 627
6. Conclusion & future work
Mobile Ad-Hoc Networks (MANETs) have become an important
part of wireless networking due to advantages like ease of deployment,
decentralization, self-configuring, etc. With detail study about Mobile
Ad hoc network, working of the ad hoc networks, types of protocols,
various benefits and applications of mobile ad hoc network is known with
the limitations of the network. There are mainly two kinds of protocols
reactive and proactive, by detail study of literature review and research
gap of various protocols, TORA protocol is taken, the detailed study of the
protocol and functionalities of the protocol are observed. The simulation
in ns2 of the original protocol is observed and after that energy field is
introduced. The parameters are throughput, goodput, packet delivery
ratio, residual energy and consume energy. There will be an improvement
in the results of a modified version of the protocol.
References
 [1] Mathias, Merril Roshini, Rayan Rahul D’Souza, Sanjana Bhat, Savina
Jassica Colaco, and Renuka Tantry. “Improving TORA Protocol using
Ant Colony Optimization Algorithm.” (2017).
 [2] Gudakahriz, S. Jahanbakhsh, Shahram Jamali, M. Vajed Khiavi, and
A. Soleimany. “A Stable TORA Based for Routing in Mobile Ad Ηoc
Networks.”Engineering, Technology & Applied Science Research8, no. 1
(2018): 2532-2536.
628 P. M. THAKRAR, V. SINGH AND K. KOTECHA
 [3] El Garoui, Lamia, Wessam Ajib, and Halima Elbiaze. “CO-TORA
on-demand routing protocol for cognitive radio ad-hoc networks.
In 2014 International Wireless Communications and Mobile Com-
puting Conference (IWCMC), pp. 654-659. IEEE, 2014.
 [4] Kaur, Amandeep, and Meenakshi Mittal. “Influence of link sensing
mechanism of IMEP on the performance of TORA under different
mobility models.” In2014 International Conference on Parallel, Dis-
tributed and Grid Computing, pp. 16-21. IEEE, 2014.
 [5] Zhai, Z., J. Du, and Y. Ren. “The application and improvement of
temporally ordered routing algorithm in swarm network with un-
manned aerial vehicle nodes.” InProc. IEEE ICWMC, pp. 7-12. 2013.
 [6] Lim, Kwan Hui, and Amitava Datta. “An In-depth Analysis of the
Effects of IMEP on TORA Protocol.” In2012 IEEE Wireless Commu-
nications and Networking Conference (WCNC), pp. 3051-3056. IEEE,
2012.
 [7] Gouda, Bhabani Sankar, Ashish Kumar Dass, and K. Lakshmi Na-
rayana. “A comprehensive performance analysis of energy efficient
routing protocols in different traffic based mobile ad-hoc networks.”
In 2013 International Mutli-Conference on Automation, Comput-
ing, Communication, Control and Compressed Sensing (iMac4s), pp.
306-312. IEEE, 2013.
 [8] Kumar, Ankit, Pankaj Dadheech, Vijander Singh, Linesh Raja, and
Ramesh C. Poonia. “An enhanced quantum key distribution protocol
for security authentication.”Journal of Discrete Mathematical Sciences
and Cryptography22, no. 4 (2019): 499-507.
 [9] Jha, Govind Kumar, Neeraj Kumar, Himanshu Sharma, and K. G.
Sharma. “Improvement of QoS performance in MANET by QoS-TO-
RA: A TORA Based QoS Routing Algorithm.” InInternational Con-
ference on Network Security and Applications, pp. 89-99. Springer,
Berlin, Heidelberg, 2011.
[10] Park, Vincent. “Temporally-ordered routing algorithm (TORA) ver-
sion 1 functional specification.”Internet Draft, draft-ietf-manet-tora-
spec-04. Txt(2001).
[11] Liu, Qiang, Hua Wang, Jingming Kuang, Zheng Wang, and Zhim-
ing Bi. “WSNp1-1: M-TORA: a TORA-based multi-path routing algo-
rithm for mobile ad hoc networks.” InIEEE Globecom 2006, pp. 1-5.
IEEE, 2006.
IMPROVED ROUTE SELECTION ALGORITHM 629
[12] Panwar, Deepak, Pradeep Tomar, and Vijandra Singh. “Hybridiza-
tion of Cuckoo-ACO algorithm for test case prioritization.”Journal of
Statistics and Management Systems21, no. 4 (2018): 539-546.
[13] Gupta, Shaurya, Ramesh C. Poonia, and X. Z. Gao. “Relative study of
steering protocols in delay tolerant network.”Journal of Statistics and
Management Systems20, no. 4 (2017): 669-679.
[14] Kalra, Manish, and Ramesh C. Poonia. “Simulation of BB84 and pro-
posed protocol for quantum key distribution.”Journal of Statistics and
Management Systems21, no. 4 (2018): 661-666.
... The common on-demand routing protocols in practice are Dynamic Source Routing (DSR) [47], [48]. Ad-hoc On-Demand Distance Vector (AODV) [49], [50], Dynamic MANET On-demand (DYMO) [51], [52], Location-Aided Routing (LAR) [53], and Temporally-ordered routing algorithm (TORA) [54]. DSR [47] is an on-demand reactive routing protocol that uses source routing rather than depending on the routing table information at each intermediate node. ...
... TORA [54] is an adaptive routing protocol designed to restrict the propagation of control messages in the highly www.ijacsa.thesai.org dynamic context of mobile computing. ...
Article
Full-text available
Mobile Ad Hoc Network (MANET) is a group of wireless mobile nodes that can connect with each other over a number of hops without the need for centralized management or pre-existing infrastructure. MANET has been used in several commercial areas such as intelligent shipping systems, ad hoc gaming, and clever agriculture, and non-commercial areas such as army applications, disaster rescue, and wildlife observing domains. One of the main challenges in MANET is routing mobility management which affects the performance of MANET seriously. The routing protocols have been functionally classified into proactive routing protocols, reactive routing protocols, and hybrid routing protocols. The objective of this paper is to create observations about the advantages and disadvantages of these protocols. Thus, the aim of this paper is to conduct a comparative analysis of the three groups of MANET routing protocols by comparing their features and methods in terms of routing overhead, scalability, delay, and other factors. It was shown that the proactive protocols guarantee the availability of the routes. However, it suffers from scalability and overhead. Whereas, reactive protocols initiate route discovery only when data needs to be sent. However, reactive protocols introduce an undesirable delay due to route establishment, which affects the network performance. Hybrid protocols, attempt to utilize the beneficial features of both reactive and proactive protocols, hybrid protocols are suitable for large networks and keep up-to-date information, but they increase operational complexity. It was concluded that MANET needs enhancement with regard to routing in order to meet the required performance.
... The common on-demand routing protocols in practice are Dynamic Source Routing (DSR) [47], [48]. Ad-hoc On-Demand Distance Vector (AODV) [49], [50], Dynamic MANET On-demand (DYMO) [51], [52], Location-Aided Routing (LAR) [53], and Temporally-ordered routing algorithm (TORA) [54]. DSR [47] is an on-demand reactive routing protocol that uses source routing rather than depending on the routing table information at each intermediate node. ...
... TORA [54] is an adaptive routing protocol designed to restrict the propagation of control messages in the highly www.ijacsa.thesai.org dynamic context of mobile computing. ...
... based intelligent routing protocol [12] is validate the coordinator nodes matrices through intermediate hops that reduce the network delays and link failure for MANET's energyefficient routing. There are mainly two different types of agent base routing logic that are applied here, one is a single-agent and another one is a multi-agent system. ...
Article
Full-text available
Real-time data transmission is one of the objectives of MANET (mobile ad-hoc network) to handle emergencies like a forest fire, flood, and earthquake. In this scenario, quick delivery of data is itself a challenging task for MANET and there is a possibility of load imbalance due to packet transmission in between source-destination pairs via the shortest path due to congestion or control overhead. In this paper, a novel routing protocol, called ACOLBR (ACO based load balancing routing), is design to control the congestion and balancing the load among the multiple paths in between source to destination. The similarity between the environment of Ant Colony and the MANET inspires the authors to apply ACO (Ant colony optimization) technique during routing in MANET to control congestion and balance the load in the network. In our proposal, two colonies of ants (red/blue) carry their packets based on the network condition. A decision variable is designed to select red/blue ant for transferring packets based on different network parameters such as bandwidth, energy, mobility, and distance. The selection of red ant means the route where the concentration of red pheromone is maximum and reverse is true for blue ant. This protocol is also concerns about the link failure during packet transmission in a route. Simulation results using OMNET++ show that ACOLBR outperforms ARA, ANTHOCNET, FACO, AODV, DSDV, DSR, CA-ARTT, and MOAODV in terms of load balancing efficiently in the route for data transmission in between source to destination.
... The main source of inspiration of ACO [9] [10] [31] is its foraging behavior of real ant colonies. Presently ACO based intelligent routing protocol [28] is validate the coordinator nodes matrices through intermediate hops that reduce the network delays and link failure for MANETs energy-efficient routing. ...
Preprint
Full-text available
Real-time data transmission is one of the objectives of MANET (mobile ad-hoc network) to handle emergencies like a forest fire, flood, and earthquake. In this scenario, quick delivery of data is itself a challenging task for MANET and there is a possibility of load imbalance due to packet transmission in between source-destination pairs via the shortest path due to congestion or control overhead. In this paper, a novel routing protocol, called ACOLBR (ACO based load balancing routing), is design to control the congestion and balancing the load among the multiple paths in between source to destination. The similarity between the environment of Ant Colony and the MANET inspires the authors to apply ACO (Ant colony optimization) technique during routing in MANET to control congestion and balance the load in the network. In our proposal, two colonies of ants (red/blue) carry their packets based on the network condition. A decision variable is designed to select red/blue ant for transferring packets based on different network parameters such as bandwidth, energy, mobility, and distance. The selection of red ant means the route where the concentration of red pheromone is maximum and reverse is true for blue ant. This protocol is also concerns about the link failure during packet transmission in a route. Simulation results using OMNET++ show that ACOLBR outperforms ARA, ANTHOCNET, FACO, AODV, DSDV, DSR, CA-ARTT, and MOAODV in terms of load balancing efficiently in the route for data transmission in between source to destination.
... ese protocols had shown good potential in dense UAV networks that are not addressed by other routing protocols. Temporary Ordered Routing Protocol (TORA) is one such protocol invented by V. Park and M. Sco [18], that is highly recommended for the dynamic networks. Overhead problems are addressed in this protocol by adopting a locally changing information mechanism (control packets) when UAV changes its physical location and informs its neighbor to avoid ooding into the network [4]. ...
Conference Paper
Full-text available
Flying Ad-hoc Networks creates rapid topology changes that causes routing problems between Unmanned Aerial Vehicle and ground base station. Mobile Ad-hoc networks and Vehicular Ad-hoc network protocols are conventionally adopted to overcome routing issues. But Still, they do not fully address the routing problem in Flying Ad-hoc Networks. In this paper, Fisheye state routing protocol is implemented and evaluated to fully overcome routing issues in a Flying Ad-hoc Network and fully utilize the limited resource of Unmanned Aerial Vehicles. Performance evaluation is measured in terms of throughput, average end-to-end delay, packet drop analysis as congestion measure with Ad-Hoc On-Demand Distance Vector (AODV), Distance Sequence Distance Vector (DSDV), Optimized Link State Routing (OLSR), Temporary Ordered Routing Protocol (TORA) and Dynamic Source Routing (DSR). Fisheye state routing protocol showed promising results regarding throughput, packet drop rate, and average end-to-end delay compared with traditional protocols. Moreover, with the suggested improvement of the parameters, network lifetime is increased, and resources harvesting becomes under control.
... First, the Proactive routing protocol includes the Destination-Sequenced Distance-Vector routing (DSDV), the Optimized Link State Routing protocol (OLSR), with Wireless Routing Protocol (WRP) [9], [10]. Also, Reactive routing protocol instances are Ad-hoc ondemand Distance Vector (AODV) routing, Dynamic Source Routing (DSR) and Temporarily Ordered Routing Protocol (TORA) [11]. ...
Article
The master node selection in the existing work is solely dependent on the energy of the node. The enhanced flower pollination algorithm is employed in this case to choose the master node based on its energy and load. The modified cuckoo search method is then used to choose the routing path. The routing path is determined by the characteristics of active nodes, and it is implemented using a cluster-based path allocation approach that uses the AODV protocol to optimize the precise path of mobile ad hoc nodes. The experimental findings indicate clustering, optimization-based path selection, packet loss rate, transmission efficiency, and packet delivery rate. By comparing it to current and proposed work, the proposed path allocation on mobile sensor node optimizes the routing way with better master node selection approach to improve performance results.
Article
Position based routing has increasingly captured the focus of scientific researchers over the last decade. It is an issue in wireless ad hoc network since the nodes to collect the information about their positions as they have limited energy, consume extra energy. Therefore, MANET needs to develop innovative algorithms to deal with node positioning, communication and processing, to use energy efficiently. This paper presents fuzzy energy optimized position-based routing (FEPR) algorithm which selects a optimum path that minimize the distance between source node to destination node by selecting the next best forwarder node thereby reducing the unnecessary transmissions, leads to increase in network lifetime. Parameters such as degree of node, energy balance factor of a node, and forward distance to destination are supplied as the input to the fuzzy logic system. A proposed routing algorithm is presented to achieve fuzzy routing decision. Simulation results that FEPR outperforms MFR and LAR1 in terms of number of dead node, energy consumption, network lifetime and energy balance factor.
Conference Paper
Full-text available
The Temporally-Ordered Routing Algorithm (TORA) is a highly adaptive distributed routing algorithm used in Mobile Ad hoc Networks (MANET) that provides multiple loop-free routes to a destination. TORA is very dependent on the services provided by the Internet MANET Encapsulation Protocol (IMEP) to carry out its three main functions: route creation, route maintenance, and route erasure. In this paper, we study how certain behaviour of IMEP leads to the poor performance of TORA and narrow down the problems of IMEP. We also proposed two modifications to IMEP that resulted in an overall performance improvement of TORA in terms of packet delivery, routing overhead and average packet latency. The original TORA and TORA based on our two IMEP modifications were also benchmarked against two other on-demand routing protocols: the Dynamic Source Routing (DSR) protocol and Ad-hoc On-demand Distance Vector (AODV) protocol.
Article
A mobile ad hoc network (MANET) is defined as a set of mobile nodes which communicate through wireless links with no central infrastructure. In these networks nodes are always moving and could enter to or exit from the network at any time. Therefore, network topology is completely dynamic. Another characteristic of these networks is the low node energy level, resulting from inherent node limitations. Stable routing is one method to face routing challenges in mobile ad hoc networks. The objective of this study is to stabilize TORA protocol which is a distributed routing protocol, with high adaptation, efficiency, and suitability for large and dense mobile ad hoc networks and thus to provide a new high efficiency protocol. The proposed protocol introduced as Stable-TORA has been compared with base protocol TORA in different scenarios via NS-2 simulator environment and its efficiency is evaluated.
Article
Quantum Cryptography is revolutionary discovery in the field of network security. Quantum cryptography promises to provide sophisticated functionality for security issues but it also leads to unbelievable increment in computational parallelism which is helpful for potential cryptanalytic attacks. Some of the associated properties of Quantum Key Distribution protocol that provide security that is deficient for the shared key to be transmitted securely. The identity verification process attempts to maximize success in interpreting the EPR protocol for distribution of Quantum.
Article
Regression testing is one of the types of maintenance testing and it is performed in case of bug-fixing or whenever there is any new functionality incorporate in the dynamic environment of software development process. Due to which the cost of development process increases because it directly affects the validation process. The addition of the new requirements with limited resources of development process in a time constrained environment definitely increase the cost. Efficient and effective test case selection from the available test suite becomes very critical problem in this scenario and this situation makes it important to applying of some techniques which are prioritization of test cases and selection of test cases for re-arrangement of test cases in a particular schedule and these test cases are selected in a particular sequence order to fulfillment of some selected criteria. This paper suggests Cuckoo Search (CS) algorithm followed by Modified Ant Colony Optimization (M-ACO) algorithm to conclude the test cases in an optimized order in time constrained environment. CS algorithm is inspired by some species of cuckoos having constrained brood lethargy and laying of their eggs in other host bird’s nest. Due to dependency of this algorithm on one single parameter, cuckoo search unlike other optimization algorithms, is more efficient and very easy to implement. But the hybrid Cuckoo-ACO optimization technique is more appropriate for the test case selection and prioritization according to the proposed empirical study.
Article
Quantum key distribution is a secure way of transferring the keys among entities involved in communication. BB84 is the first protocol for QKD in year 1984. In this paper we are giving the simulation process of BB84 protocol in C++ and also the simulation of proposed protocol in C++ using object oriented approach. Proposed protocol uses a two-way quantum channel and also generates an additional initial bits sequence at another end for polarization.
Article
Networks which are lacking in uninterrupted back-to-back links amongst their nodes due to node movement, controlled power sources or restricted data storage space are called DTNs. To rise above this irregular connectivity, DTN nodes stock up and hold the data packets they accept until they come into communication range of each other. In addition, they extend many copies of the same packet on the network to increase the deliverance prospect. In recent time, several routing protocols have been developed specifically for DTNs. These protocols differ in the number of copies they extend and the information they use to guide the packets to their destinations. This paper studies four recognized DTN routing protocols i.e. EPIDEMIC, Spray-and-Wait, PROPHET and MAXPROP. In this paper, DTN is studied along with its protocols and measured in environment of packet deliverance, delivery cost and average packet delay and finally finding out the best protocol under certain networking parameters.
Conference Paper
Cognitive radio networks are emerging kind of wireless networks with cognitive radio nodes able to have dynamic spectrum access in order to make use more efficiently of the spectrum. The routing problem in such networks is quite complex due to the dynamic nature of the spectral environment where the availability of frequency bands for cognitive radio nodes is opportunistic. In this paper, we propose a robust and efficient routing solution in terms of throughput. Our proposition is a reactive routing protocol (named cognitive temporary ordering routing algorithm) CO-TORA based on the classic TORA protocol proposed for non cognitive wireless ad-hoc networks. We also implement CO-TORA in largely used NS-2 simulator. The utilization of CO-TORA protocol brings to the system many performance improvements that are evaluated by simulations and shown by comparing it with classical TORA.
Article
The performance evaluation of Mobile Ad Hoc Network (MANET) routing protocols is an important as well as open area of research worldwide. Temporally Ordered Routing Algorithm (TORA) is an adaptable and distributed MANET routing protocol which is dependent on the services of Internet MANET Encapsulation Protocol (IMEP) for its various necessary functions like link status detection. The incorrect link failure detection by IMEP leads to creation of congested network and initiation of avoidable route maintenance in TORA. Thus changes need to be introduced in the link sensing mechanism provided by IMEP to improve the detection of links in TORA. According to previously available research, if the maximum number of OBM retransmissions is increased, significant improvement in the performance of TORA is noticed. This modification has been implemented in this paper and performance of Enhanced TORA is evaluated under Random-Waypoint model, Manhattan-Grid mobility model and Random-Direction model using FTP traffic with 10 connections. The results are then compared with those of original TORA using various performance metrics like Packet Delivery Ratio, Average End to End Delay and Routing Overhead.
Conference Paper
In Mobile Ad hoc network, nodes are connected through a wireless are formed a fast changed network structure and it is a infrastructure less, can be set up anytime, anywhere. The nodes are mobile based on battery operated and nodes have limited battery resources. Routing protocol selection in Mobile Ad Hoc Network is a big challenge, because of its regular topology changes and routing overhead. In Manet, energy efficient protocols are used to forward data packets one to another without much packet loss. Energy reactive routing protocol is effective routing protocol in Manet and nodes are requires energy efficient routing protocols to bound the power consumption, and lengthen the battery life to improve the life time of the network. The main objective of this paper is to enhance the network performance of different routing protocols, when frequent link failure in network due to mobility of the nodes in the network. The performance analysis and simulation are carried out to evaluate network performance using Network Simulator (NS-2), based on the different load, node mobility, delay, packet sending rate and energy consumption. It has been verified through various simulations, which represent a wide range of network conditions that energy AODV deliver the better performance as that of the modern protocols DSDV, TORA, DSDV, DSR and AODV in terms of energy efficiency but it is observed that DSR needs significantly smaller energy overheads than other protocols.