ArticlePDF Available

Development of Hybrid Ad Hoc on Demand Distance Vector Routing Protocol in Mobile Ad hoc Network

Authors:

Abstract and Figures

MANET include wirelessly in a self-configured, self-healing network while not having permanent communication that is linked in a collection of mobile networks. The network topology varies normally in MANET nodes and is free to stir erratically and individually. In the existing technique, Ad hoc On-Demand Distance Vector (AODV) was employed for node selection to attain the shortest path strategy. In this technique, huge amount of control messages are transferred which consumed bandwidth of the network and increase congestion. In the proposed system, the hybrid AODV technique incorporates the MFR (Most Forward within Radius) technique is utilizing to detect the shortest path routing algorithm. The MFR technique has been performed for the neighbor node selection whereas Hybrid AODV has been performed for the shortest path routing algorithm. Firefly algorithm is also incorporate in Hybrid AODV to find out the optimum path based on the updating equation. The performance analysis and the comparative analysis of this paper are measured by using End to End delay, Average Routing Overhead, Throughput. Proposed algorithm (HAODV) shows improvement in all these parameters.
Content may be subject to copyright.
Goyal et al., International Journal on Emerging Technologies 11(2): 135-139(2020) 135
International Journal on Emerging Technologies 11(2): 135-139(2020)
ISSN No. (Print): 0975-8364
ISSN No. (Online): 2249-3255
Development of Hybrid Ad Hoc on Demand Distance Vector Routing Protocol in
Mobile Ad hoc Network
Ankur Goyal1, Vivek Kumar Sharma2 and Sandeep Kumar3
1Research Scholar, Department of Computer Science Engineering,
Jagannath University, Jaipur (Rajasthan), India.
2Professor, Department of Engineering and Technology, Jagannath University, Jaipur (Rajasthan), India.
3Assistant Professor, Department of Computer Science Engineering, Amity University, Jaipur (Rajasthan), India.
(Corresponding author: Ankur Goyal)
(Received 09 December 2019, Revised 05 February 2020, Accepted 10 February 2020)
(Published by Research Trend, Website: www.researchtrend.net)
ABSTRACT: MANET include wirelessly in a self-configured, self-healing network while not having permanent
communication that is linked in a collection of mobile networks. The network topology varies normally in
MANET nodes and is free to stir erratically and individually. In the existing technique, Ad hoc On-Demand
Distance Vector (AODV) was employed for node selection to attain the shortest path strategy. In this
technique, huge amount of control messages are transferred which consumed bandwidth of the network and
increase congestion. In the proposed system, the hybrid AODV technique incorporates the MFR (Most
Forward within Radius) technique is utilizing to detect the shortest path routing algorithm. The MFR
technique has been performed for the neighbor node selection whereas Hybrid AODV has been performed
for the shortest path routing algorithm. Firefly algorithm is also incorporate in Hybrid AODV to find out the
optimum path based on the updating equation. The performance analysis and the comparative analysis of
this paper are measured by using End to End delay, Average Routing Overhead, Throughput. Proposed
algorithm (HAODV) shows improvement in all these parameters.
Keywords: AODV, End to end delay, Firefly algorithm, Hybrid AODV, MFR, MANET, Routing overhead, Throughput.
I. INTRODUCTION
A MANET can be described as a system that includes
wirelessly connected hosts. A gathering of more
terminals with wireless interactions along with network
capability is referred in MANET [1, 2]. That
communicates with each other without any consolidated
supervisor. Wireless links are free changeable and also
occasionally acts as a router at the similar time are
linked with mobile hosts [3]. In MANET, it is a sovereign
methodology along with the nodes is shared in wireless
standard. The concern of the network varies arbitrarily
as well as actively. A communication link is frequently
busted in MANET because the nodes are liberated to
move wherever [4].
The most popular routing protocol is AODV and it is also
simple along with a well-organized on-demand MANET
routing protocol [5, 6]. To supports unicast along with
multicast routing and routes to destinations on demand
recognized in the protocol. The MANET routing protocol
urbanized because of particularly in AODV [7]. The
route discovery methodology operation and therefore
the route maintenance operation is the two various
operations to seek out and maintain in AODV. It’s a
desired algorithm for MANET also further as acquires
the routes strictly on-demand [8].
Briefly, the main contributions of this paper are as
follows:
– Proposing a Hybrid AODV routing algorithm based on
shortest path selection strategy.
It improves end to end delay, throughput and routing
overhead with the traditional AODV.
Section I talks about the introduction and the research
study and survey of the work have been written in
section II. Section III discusses about the related work
used in proposed method. Section IV discusses the
proposed technique and Section V discusses the
performance investigation and result. Finally, in section
VI, the conclusion of the paper is given.
II. LITERATURE SURVEY
The AODV routing protocol creates the shortest path
which depends on the best signal as well as strength
quality. The routing process is happening when the path
attain to best signal strength will leads to increasing in
the Packet delivery ratio (PDR). The foremost concept
of this network is to deliver packets with minimum
losses which lead to improved Quality of Service (QoS).
The minimization of link failure for routing is very difficult
in this technique. The minimum losses and minimum
link failure was explained by Devika and Sudha (2019)
[1].
AODV and DSR are the on-demand unicasting routing
protocols to evaluate their performance based on
Quality of Service (QoS). For MANETs, together AODV
and DSR routing algorithms are executed on the root of
an on-demand gateway discovery algorithm anywhere
every other through the entry and exit point of a system
and where required. Through simulation with increasing
the node density using the ns-2 network simulator, we
perceive that the performance of AODV and DSR
routing protocols are varying according to the situation
as directed to premier the performance level for both of
these protocols is produced by Robinson et al., (2019)
[4]. The consequences give out in this paper decorate
the significance of carefully assessing and executing
both of these protocols for MANETs.
e
t
Goyal et al., International Journal on Emerging Technologies 11(2): 135-139(2020) 136
The hybrid Ant Colony Optimization (ACO) along with
Firefly optimization technique along with swarming
algorithm (FA) is used in Ad-Hoc On-Demand Distance
Vectoring (AODV) routing protocol to transmitted of
signals in a MANET model to increase the efficiency
along with decreasing the losses to overcomes the
drawbacks of ACO based AODV was described by Rath
et al., (2017) [6]. The execution study of the hybrid
routing protocols was compared with the traditional ACO
and traditional AODV by ensuring a lessening of
network load by neglecting re-discovery endeavors
among the paths.
Reactive routing protocols are used, at the same time
source requirements to throw a packet to the destination
so the process of the searching route resolve initialize,
till it discovers the optimal path [7, 8]. Since it, a lot
concentrates on less reliable routes important to
elevated control overhead and packet loss.
Raw et al., (2015) was explained the MFR technique in
which the investigation of position-based routing in
vehicular ad hoc network (VANET) to attain the optimal
route amid the vehicles [10]. The node-based MFR has
been performed by the mathematical expression which
is mainly designed for avoiding the internal nodes
depend on the transmission assortment for
supplementary transferring the packets. The outcomes
of this technique explain the performance of the border
nodes which is advantage of the routing algorithm with
less delay.
III. RELATED WORK USED IN METHODOLOGY
The main purpose of the MANET is to diminish the link
breakage because of the mobility of paths in the
protocol. An acceptable time in favor of broadcast is
established in the stable route in MANETs. In the
traditional AODV, it won’t check the route in a periodic
manner. So that the transmission of data after discovers
the rate is taking more delay. The locally repair a busted
connection does not continue the routing mechanism.
Hence, the proposed HAODV based protocols; the route
detection process is on-demand, which is more efficient
in the dynamic nature of MANET. The rate is created
only when it is required. In table-driven protocols the
delay is advanced.
A. MFR
The MFR routing algorithm is accessible in an
investigative technique. The execution of the MFR
routing strategy is estimated. The amount of time in the
bond is offered for transmission is resulting in as the
lifetime of a wireless connection and also its unit is
seconds. The network maintains the random variable is
considering in the duration of a wireless connection
among bi nodes. From an origin device S to destination
device D are further considered which comprises of
series of m wireless connections form-1 midway nodes.
The duration of the ݅௧௛ link in the route is X. The
lifetimes of ܺ, ݅ = 1,2,… …. ,݉ − 1 are identically
disseminated (iid) arbitrary variables, each within rate μ
are implicit [9, 10]. The path fails among the origin S
along with destination D when any link of the route
breaks. Therefore it consists of m links is a arbitrary
variable articulated as follows in the duration of this
route r.
X= min൫X,X, … … X (1)
Where Xr is identically distributed arbitrary variable with
rate m µ. The life span of utilizing a solitary route r is a
random variable R within the rate m µ, where R = X
During a lifetime L, the clear successful message
delivery may terminate. The probabilities Q that
communication delivery terminates within L are
consequent. The duration of message rescue is an
identically distributed arbitrary variable D within rate λ is
implicit. D and L are separately sustained via
unsystematic variables the probability of successful
message delivery is articulated [6, 8].
The analysis has been examined by MFR routing
algorithm and also considering the probability of
flourishing message delivery. This analysis indicates the
duration of a path is superior to the duration of message
delivery.
Initially, the AODV defines a route which has less
number of hops to accomplish the target. Due to the
execution elapse mobility, the optimal path converted to
suboptimal paths. Hence, the essential nodes have turn
into relay nodes. The AODV cannot believe
supplementary optimal routes dynamically it accessible
only smaller hop calculations. Hence, the relay nodes
determine per hop delay and depletion of nodes energy
and bandwidth. To overcome the drawbacks of the
AODV, the proposed hybrid AODV routing procedure
has been designed for the dynamic routing algorithm.
By utilizing dynamic and optimal routing protocol, the
unwanted relay nodes get eradicated from the energetic
path and shortcut discovery is agreed.
IV. PROPOSED METHODOLOGY
A hybrid AODV protocol of the MANET is based on the
boundary nodes of the network. The dimension of the
boundary is computed by means of the radius of the
boundary B, where B is the perimeter of the region.
There are overlapping nodes between the nodes and
each node is different in dimension.
In the proposed methodology, each interior node is
communicating with its boundary node using MFR
protocol and the nodes are clustered between the
cluster head by utilizing optimal AODV protocol. The
central node is accurately equivalent to zone radius with
the minimum distance of the nodes which is the
peripheral nodes of the individual boundary. If the nodes
minimum distance is less than the radius of the interior
nodes, then the nodes is said to be exterior nodes. The
cluster boundary routing is done by utilizing the
gateway.
In the proposed hybrid routing algorithm, the MFR
incorporate with optimal AODV routing beneath dynamic
cluster head path for the distributed networks, the
primary issues of the distributed network is the
occurrence of the shortest path and it depend on
chosen neighbors in the network. The information is
transferred to the destination based on the neighbor
nodes and each data packet must have a destination
identifier and it will continue still it’s accomplishing the
target. After receiving the packet, to attain the common
purpose of routing packets along the optimal path so
that the routing tables are constructed, maintained and
updated. Routing table update and path finding are the
two main sections in the hybrid routing methods.
Goyal et al., International Journal on Emerging Technologies 11(2): 135-139(2020) 137
A. Calculation of fireflies count
In the proposed HAODV, the firefly optimization
technique is used for the HAODV routing protocol in
which the optimal shortest path has been selected to
transmit the packets from source to the destination to
avoid the routing overhead and increase in packet
deliver ratio.
Fig. 1. Flow chart of the optimization algorithm.
B. Routing Process
In the projected hybrid routing algorithm, the procedure
of routing comprises of six sections. They are route
demand initialization method, route demand forwarding
method; route demand receives method, route respond
sending method, route respond forwarding method
along with route respond receiving process. When the
node desires to transfer the packets from starting place
to target, it will initially verify the available path. If it is
available, the information is transferred from source to
the target if not the route discovery process is activated.
In the path finding procedure, initially the source nodes
verify the boundary nodes acknowledgement signal
strength is greater than or equal to the signal threshold
(SIGNAL_THR) [11, 12]. If it is greater than or equal to
the signal threshold, the boundary nodes find out the
RSSM esteem therefore the routing table calling of the
neighbors has been formed in addition to stored the
attained RSSM esteem in the RSSM field with respect
to the calling of the boundary nodes.
C. Optimal AODV routing process
Initially, the calling of the boundary nodes are set to 0
which is corresponding to the firefly counts, and demand
firefly message has been transferred to the boundary
nodes in which the initial firefly count set as 0. If the
respond node of the demand firefly is a destination, it
generate a access of demand fireflies designer in the
routing table and therefore it counts the firefly and
append it through the content of fireflies count field of
responded demand firefly. Finally, the outcome of the
firefly count is appended in the routing table entry.
The destination node might be retrieved multiple
demand fireflies after remaining from the particular
duration. It updates the firefly counts of the source
nodes in the routing table which has higher firefly count
esteem among multiple demand fireflies.
The nodes verify the reply firefly which is received from
some other nodes and it is verified the nodes which
beneath to destination node. If not, then it computes the
fireflies count with the content of firefly count field of the
reply fireflies and stored the count esteem in the routing
table access and also store the outcomes of firefly count
of reply fireflies. Finally, it forwards the reply fireflies to
the neighbor node to achieve the target.
The nodes verify the reply firefly which is received from
some other nodes and it is verified the nodes which
beneath to destination node. If it is a destination, then it
generates a routing table access of the reply fireflies’
designer and therefore it update the firefly count in the
routing table access. Finally, the information packet is
transferred from source to the destination.
In the proposed hybrid routing protocol, the MFR
incorporate with optimal AODV using firefly optimization
algorithm is computed to transfer the data packets
beginning source to the destination. The neighbor nodes
are computed based on the MFR techniques and the
overall routing protocol is generated based on the
optimal AODV using firefly optimization algorithm.
V. PERFORMANCE ANALYSIS
In the projected hybrid routing protocol, the throughput,
packet delivery ratio along with routing overhead has
been performed for the performance analysis. The
comparative analysis of the proposed routing procedure
comprises of traditional DSR and traditional AODV
protocols. The performance analysis has been
computed it for varying number of devices. The
simulation results have been designed by using
MATLAB 2016a version. Node velocity is taken as 10
m/s and data velocity as 16 kbps. The maximum
number of connections to CBR traffic is taken as 10.
In this study, the proposed system had shown good
results when compared with the previous technique.
Some of the initialization parameters of the node
selection process have been explained as follows
Table 1: Initialization Parameters.
Number of wireless
hosts 50 100 150 200
Mobility Model Random Walk
upper limit Channel
Power 2mW
Radio Bitrate 100kbps
Execution period(s): 3400
overall Packets
transmit: 3397
Execution Style: Cmdenv-fast-mode
Routing Overhead: The average amount of
information packets might be transferred in single
information packet in this routing protocol which
consumes additional bandwidth by overhead to bring
information traffic.
Table 2: Routing Overhead with different amount of
nodes.
Technique N=50 N=100 N=150 N=200
HAODV 2.98 4.35 5.95 7.05
AODV 9.79 12.61 17.18 22.85
Table 2 demonstrates the routing overhead for the
different amount of nodes. The average value of
HAODV is of 5.082. The ADOV average value is
15.607. As a result, the HAODV obtained a better
performance measure than AODV technique.
Fitness
Calculation
Initialization
Best Storage
Goyal et al., International Journal on Emerging Technologies 11(2): 135-139(2020) 138
Fig. 2. Routing Overhead.
Fig. 2 illustrates the routing overhead of HAODV has
been diminish when compared with other routing
protocol. This data reflects that improvement of HAODV
in terms of Routing overhead is 67.43% with AODV.
Throughput (messages/second): The complete
amount of retrieved information packets separated by
overall duration of execution period. For the throughput
of this network, messages are delivered per one
second.
Throughput = Number of bytes received × 8
execution time × 1024 Kbps
Table 3: Throughput with varying number of nodes
Technique N=50 N=100 N=150 N=200
HAODV 315.34 345.92 365.98 370.11
AODV 276.17 309.29 320.85 321.76
Table 3 demonstrates the throughput versus different
amount of nodes with the comparative analysis with
traditional AODV technique. HAODV shows 12.11%
increased the throughput as comparison to AODV. The
better outcomes of the HAODV are attained because of
the optimal path selection in the AODV routing network.
Fig. 3. Throughput.
Fig. 3 demonstrate the throughput of the network with
different amount of nodes. In the proposed HAODV, the
parallel computation of neighbor node selection along
with optimal path selection has been performed which
leads to less power consumption hence the throughput
of the proposed model provide the better outcomes.
End to End delay: It is the overall execution period for
the data transmission begins from source to destination
across MANET. The end to end delay has been
performed which is depend on routing finding latency,
queuing at the border queue along with retransmission
hindrance, broadcast and transmission period.
Table 4: End to End delay with number of nodes.
Technique N=50 N=100 N=150 N=200
HAODV 0.11 0.16 0.19 0.26
AODV 0.59 0.64 0.71 0.76
Table 4 explained the end to end delay with varying
number of nodes has been calculated. The average
esteem of the end to end delay of HAODV is 0.18. The
average esteem of traditional AODV is 0.67.
Fig. 4. End to End delay.
From the Fig. 4, the HAODV illustrate the lower end to
end delay when compared with traditional AODV
technique. Hence, the lesser end to end delay has been
attained for the proposed HAODV technique when
compared with other comparative analysis. Table 4
reflects that average End to end delay of HAODV has
decreased with respect to AODV. Average End to end
delay has reduced 73.13% with respect to AODV.
VI. CONCLUSION
In the proposed technique, the optimal HAODV
technique is used to found the shortest path from origin
to target place. As a result of the study, the proposed
technique illustrated the best performance measure
when compared to the other technique. The main
objective of the proposed system requires reliable,
scalable, and self-organizing, rapidly deployed and they
use a dynamic routing algorithm which leads to a better
increase in routing overhead, Average-End-to-end
Delay and throughput. This proposed technique was
implemented by MATLAB. It has been analyzed that the
proposed hybrid technique performs good quality as
compared to AODV routing protocol in terms of the
performance analysis. By comparing those protocols
performance measurements, it has been shown that
reactive topology-based algorithms are better than
proactive topology-based routing procedures.
0
5
10
15
20
25
N=50 N=100N=150N=200
Routing Overhead
No. of Nodes
No. of nodes Vs Routing Overhead
Hybrid
AODV
AODV
0
50
100
150
200
250
300
350
400
N=50 N=100 N=150 N=200
Throughput
No. of Nodes
No. of nodes Vs Throughput
Hybrid
AODV
AODV
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
N=50 N=100 N=150 N=200
End to end delay
No. of nodes
No. of nodes Vs End to end delay
Hybrid
AODV
AODV
Goyal et al., International Journal on Emerging Technologies 11(2): 135-139(2020) 139
VII. FUTURE SCOPE
The security in MANETs has also become more
important accordingly in future. Inherent characteristics
of MANET i.e. wireless medium, broadcast transmission
and lack of centralized administration render mobile ad
hoc networks vulnerable to security hazards. Security
aspects in the work have not been considered which
can be taken care of as future extension of the work.
Secondly, for the selection of the neighbor nodes; it may
be consider selecting energy efficient nodes in the
future work.
ACKNOWLEDGEMENTS
The authors would like to thank reviewers and editorial
boards for their valuable comments that improve the
quality of this manuscript.
Conflict of Interest. There is no conflict of interest for
any of the authors in this paper.
REFERENCES
[1]. Devika, B., & Sudha, P. N. (2019). Power
optimization in MANET using topology
management. Engineering Science and Technology, an
International Journal, 1-11
[2]. Patel, N. J. K., & Tripathi, K. (2018). Trust value
based algorithm to identify and defense gray-hole and
black-hole attack present in MANET using clustering
method. Int. J. Sci. Res. Sci. Eng. Technology, 4, 281-
287.
[3]. Anand, M., & Sasikala, T. (2019). Efficient energy
optimization in mobile ad hoc network (MANET) using
better-quality AODV protocol. Cluster Computing, 22(5),
12681-12687.
[4]. Robinson, Y. H., Julie, E. G., Saravanan, K., &
Kumar, R. (2019). FD-AOMDV: fault-tolerant disjoint ad-
hoc on-demand multipath distance vector routing
algorithm in mobile ad-hoc networks. Journal of Ambient
Intelligence and Humanized Computing, 10(11), 4455-
4472.
[5]. El-Semary, A. M., & Diab, H. (2019). BP-AODV:
Blackhole Protected AODV Routing Protocol for
MANETs Based on Chaotic Map. IEEE Access, 7,
95185-95199.
[6]. Rath, M., Pati, B., Pattanayak, B. K., Panigrahi, C.
R., & Sarkar, J. L. (2017). Load balanced routing
scheme for MANETs with power and delay
optimisation. International Journal of Communication
Networks and Distributed Systems, 19(4), 394-405.
[7]. Sharma, S. K., & Sharma, S. (2017). Improvement
over AODV considering QoS support in mobile ad-hoc
networks. International Journal of Computer Networks
and Applications (IJCNA), 4(2), 47-61.
[8]. Muthukumaran, N. (2017). Analyzing throughput of
MANET with reduced packet loss. Wireless Personal
Communications, 97(1), 565-578.
[9]. Palaniammal, M., & Lalli, M. (2014). Comparative
study of routing Protocols for MANETs. International
Journal of Computer Science and Mobile
Applications, 2(2), 118-127.
[10]. Raw, R. S., Lobiyal, D. K., & Das, S. (2015). A
probabilistic analysis of border node-based MFR routing
protocol for vehicular ad hoc networks. International
Journal of Computer Applications in Technology, 51(2),
87-96.
[11]. Persis, D., Jinil, and Paul, R. T. (2016). Reliable
mobile ad-hoc network routing using firefly
algorithm. International Journal of Intelligent Systems
and Applications, 8(5), 10-15.
[12]. Xiao, L., Shao, W., Liang, T., & Wang, C. (2016). A
combined model based on multiple seasonal patterns
and modified firefly algorithm for electrical load
forecasting. Applied energy, 167, 135-153.
How to cite this article
:
Goyal, Ankur, Sharma, Vivek Kumar and Kumar, Sandeep (2020). Development of Hybrid
Ad Hoc on Demand Distance Vector Routing Protocol in Mobile Ad hoc Network. International Journal on Emerging
Technologies, 11(2): 135–139.
... "Service-Oriented VANET" is the name given to roadside service. Different VANET security related issues are reviewed [1,3,4,6,7,11,[13][14][15], and more secure systems are proposed then the previous [2, 5, 8-10, 12, 16-23] by different researchers. ...
... For the most part, this review is comprehensive and incorporates the most recent developments in VANETs and security challenges, as well as privacy-preserving solutions [26]. According to Goyal et al., the hybrid AODV technique is proposed in this paper, and this technique will incorporate the MFR (most forward within radius) and firefly algorithm to detect shortest path [15]. In Figure 2, ANN flowchart, we can see the step by step executing of our ANN code. ...
Article
Full-text available
IoT or the internet of things is the talk of the town topic being researched in the field of information technology for more than decade. It is being in deployment stage in various developing economics, to enable driverless automobiles in the field of VANET. It helps in preventing crashes and provides urgent medical assistance in emergency case. Data security and location privacy are becoming of most importance in present IT scenario. Unauthorized access to location information of vehicles may pose a significant security threat. So, it is necessary to secure the location information of the vehicle. The proposed work aims at enhancement of location privacy data security in service location protocol of VANET'S. The primary techniques to be employed include artificial intelligence-based RF range approximation for transmission range adjustment and receive RF strength based distance estimation for trusted node location perimeters approximation, dynamic adjustment of silence period of OBU (on based unit) in conjunction with radio/RF interrupt. The unauthorized access to location information of vehicles and need of its privacy is the motivation for this work.
... An AODV is a reactive routing protocol designed for wireless and mobile Ad hoc networks. It supports unicast and multicast routing [17]. Nodes generate route requests to the neighbors until reach the destination, and the last reply route unicast message announces route activation. ...
Conference Paper
Full-text available
A Mobile Ad hoc Network (MANET) is made up of multiple nodes connected by routing protocols that do not require any infrastructure or centralized access point. Mobility and transmission power are two important parameters that influence the activity of MANET routing protocols. This study investigates the network performance of the reactive protocol AODV under different transmission power conditions in three mobility models of Random waypoint, Mass mobility and Linear mobility. Also, this study evaluates the impact of network size, mobility speed and simulation area on the network performance in terms of different QoS parameters. The simulation results are obtained using OMNeT++ and INET framework for AODV routing protocol. The findings indicate a good and helpful baseline for the researchers in evaluating some of the QoS metrics such as the packet delivery ratio, end to end delay and throughput under various scenarios in MANET environment.
... All the data packets approaching the destination node will be forwarded to the next hop node. The sequence number reflects how fresh the route is and contains a time stamp (Goyal, Sharma & Kumar, 2020;. ...
Article
Full-text available
Mobile ad-hoc networks (MANETs) and wireless mesh networks (WMNs) are used in a variety of research areas, including the military, industry, healthcare, agriculture, the Internet of Things (IoT), transportation, and smart cities. The swift advancement in MANET technology is the driving force behind this rising adoption rate. Routing over MANET is a critical problem due to the dynamic nature of the link qualities, even when nodes are static. A key challenge in MANETs is the need for an efficient routing protocol that establishes a route according to certain performance metrics related to the link quality. The routing protocols utilised by the nodes in WMNs and MANETs are distinct. Nodes in both types of networks exchange data packets through the routing protocols. For this highly mobile network, the ad-hoc On-Demand Distance Vector (AODV) routing protocol has been suggested as a possible solution. Recent years have attracted researchers’ attention to AODV since it is a routing technique for ad-hoc networks that prevents looping. The architecture of this routing protocol considers several factors, including the mobility of nodes, the failure of connection links, and the loss of packets. In this systematic review, one of the key focuses is bringing attention to the classic AODV, which was developed after discussing the recent development of several versions of AODV. The AODV routing protocol performs a path strength check to generate a more reliable and secure route between the source and destination nodes. In AODV, investigations demonstrate advances in both the format protocol approach and the network simulation-2 (NS-2), and these improvements were made in the same scenario used to revitalise AODV. It has been discovered that the AODV is more effective in several aspects, such as throughput, end-to-end delay, packet delivery ratio (PDR), energy consumption, jitter, packet loss ratio, and network overhead. Furthermore, this paper presents this systematic review based on AODV modifications in the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA). It also provides a methodological framework for the papers’ selection.
... These approaches will minimize resource usage in optimization, complex environments, and high-risk community intervention and take energy-conscious routing into account. This not only affects network output latency and packet failure but is one of the most critical factors for heavy energy usage [3][4][5]. ...
Chapter
An essential application, including remote environment monitoring or Target Tracking, is used in wireless sensor networking (WSN). The development of smaller, cheaper, or more intelligent sensors, particularly in recent years, has made it possible. These sensors have wireless interfaces that allow them to communicate in a network. Energy efficiency (EE) in WSN is an essential issue that will raise the network’s liability over the following months or even years. Routing inWSNs is quite challenging due to such networks’ intrinsic characteristics from other telecommunications networks, like national ad hoc networks or cellular networks. Clustering is the most common energy efficiency technique and provides many advantages such as energy efficiency, life cycle, scalability, and lower latency. A new form of swarm intelligence approach focused on humans’ collective actions, namely, the brainstorming process, is the brainstorming Optimization algorithm (BSO). It is not just an optimization process; it can also be used as an optimization development platform.
Article
The performance of any communication system heavily relies on the efficient routing of interventions. This article addresses the significant issue of routing protocol selection for optimal path determination in networks. Particularly, when wireless communication occurs among mobile nodes with limited resources, such as batteries, the routing problem becomes even more challenging. This article proposes the Fuzzy Control Energy Efficient (FCEE) routing protocol to overcome these challenges. The FCEE protocol combines the Ad-Hoc On-Demand Distance Vector (AODV) protocol with fuzzy logic techniques to enhance network lifetime and performance. The proposed approach introduces a memory-based channel integrated with fuzzy logic methodologies, which effectively restricts the forwarding of unnecessary broadcast packets based on the energy availability of the operating node. Through extensive simulations, demonstrate the promising capabilities of FCEE as a routing protocol for wireless mesh networks. To further assess the effectiveness of the FCEE protocol, the proposed article compares it with two existing routing protocols: AODV and Intelligent Routing AODV (IRAODV). The simulation results shows that the FCEE routing protocol significantly enhances the reliability of the conventional AODV, providing improved link connectivity and longer route lifetimes. Additionally, our proposed protocol enhances the quality of service (QoS) for mesh routing, with an average throughput of 351.374 (Kbps) compared to 90 (Kbps) for IRAODV and 39 (Kbps) for AODV. Moreover, FCEE exhibits superior energy efficiency with an average energy consumption of 14, while IRAODV and AODV consume 40 and 90 joules, respectively. In conclusion, the FCEE routing protocol demonstrates its potential to address the challenges of efficient routing in wireless mesh networks. By leveraging fuzzy logic and integrating it with AODV, FCEE enhances network lifetime, performance, and energy efficiency, making it a promising solution for future wireless communication systems.
Article
Full-text available
Measurements and fault data from an older software version were used to build the fault prediction model for the new release. When past fault data isn't available, it's a problem. The software industry's assessment of programme module failure rates without fault labels is a difficult task. Unsupervised learning can be used to build a software fault prediction model when module defect labels are not available. These techniques can help identify programme modules that are more prone to errors. One method is to make use of clustering algorithms. Software module failures can be predicted using unsupervised techniques such as clustering when fault labels are not available. Machine learning clustering-based software failure prediction is our approach to solving this complex problem.
Article
Full-text available
Mobile ad-hoc network (MANET) is a wireless ad hoc network, which is quickly deployable and functions without any infrastructure. This work proposes a hybrid optimization algorithm, named Chronological-Earth Worm optimization Algorithm (C-EWA), for performing effective clustering and adjusts power and energy parameters using topology management. In this paper, initially a graph that is equivalent to the network is constructed, and then, clustering of the graph is performed using the proposed C-EWA to generate an optimal cluster head. C-EWA is developed by the integration of chronological theory in EWA, with the use of the objective function. Here, the objective function considers several factors that involve power, connectivity, mobility, link lifetime, and distance. After choosing appropriate clusters, each of the nodes that belong to the cluster constructs a Gabriel graph within the corresponding cluster. Once the Gabriel graph is constructed, each node updates the list of neighbor and maintains the graph connectivity and adjusts the power of transmission based on the connectivity. The performance of the proposed method shows superior performance in terms of remaining battery power, mobility, throughput, delay and connectivity with values of 21.960 J, 0.729, 0.713, 0.295, and 5.256, respectively.
Article
Full-text available
Even though the ad-hoc on-demand distance vector (AODV) is a broadly used routing protocol for mobile ad-hoc networks (MANETs), it is vulnerable to a blackhole attack. Lu et al 1 developed a secure MANET routing protocol called SAODV to address the security weakness associated with the original AODV protocol and to remedy the blackhole attack. Specifically, the SAODV protocol can protect against blackhole attack performed by a malicious node during the routing process. However, it can not resist the cooperative blackhole attack in which two nodes are participating together to mount such attack. Therefore, this paper proposes a secure MANET routing protocol called BP-AODV to overcome the security breaches related to the SAODV protocol along with the original AODV protocol. In addition, the BPAODV is able to protect against a cooperative blackhole attack launched during the routing process and guards against the blackhole attack that might take place during the forwarding process. The BP-AODV is developed by extending the functionality of the AODV protocol along with utilizing the chaotic map features. The experimental results assure that the BP-AODV protocol is more secure than the SAODV protocol and can effectively fight the blackhole attack achieved by a malicious node or cooperative malicious nodes during the routing process. The results also reveal that the BP-AODV can strongly guard against the blackhole attack that occurs during the forwarding process.
Article
Full-text available
Mobile ad-hoc network (MANET) plays a significant role in the field of communication. Due to the dynamic movement of nodes, the network infrastructure is frequently changed. All nodes have the capacity to configure themselves and are communicated either directly through some intermediate nodes based on signal strength or through multi-hop routing. However, selection of the intermediate nodes will increase the routing overload in the route discovery procedure. Destination nodes are selected using intermediate nodes for broadcasting data packets with link scalability. The previous works for this problem have limitations such as they are not flexible to deliver the Quality of Service in the network model, and the possibility of packet delivery is less. In this paper, we propose Fault-Tolerant Disjoint Multipath Distance Vector Routing Algorithm (FD-AOMDV) that sprints path discovery phase with a reduced amount of delay. It finds disjoint paths in a way that routing overloads decrease considerably. FD-AOMDV can increase the scalability by reducing the routing overload when the latest route is established. Moreover, owing to the mobility of the node in MANETs, subsequent breakages of a link will cause the active path disconnection and also enlarge the routing overload. The simulation results prove that the proposed work reduces the routing overload, decreases the end-to-end delay, and reduces the packet delivery ratio compared with AOMDV and ZD-AOMDV on Network Simulator 2.
Article
Full-text available
Mobile Ad hoc Network (MANET) is a collection of nodes formed together to make communication without need of infrastructure. Due to restricted characteristics of MANET has to relay on wireless communication. This causes the battery power is an important factor in MANET to provide reliable communication without any power failure. Many research works has been carried out to improve the battery power to avoid packet dropping or packet loss while transmitting of packets. The battery power optimization in MANET is still not come in to the wrapping up. This research article proposed a method to improve the battery power in MANET and provide the better quality in packet transmission. This is achieved by using AODV protocol with improving the routing strategy in packet transmission. The result was implemented in Network simulator and shows better improvement comparing with the existing power optimization strategy. © 2018 Springer Science+Business Media, LLC, part of Springer Nature
Article
Full-text available
This research paper analyses the throughput capacity of Mobile Ad hoc Network (MANET) with reduced packet loss. The nodes are then discovered using Medium Access Control (MAC) 802.11 protocol. It has the capability to discover the neighbor nodes automatically and the next node of the throughput for each node is determined using Flooding algorithm. In this algorithm, each node try to forward every information to every one of its nearest source node and then it receives the acknowledgement from the destination nodes. After initializing the source and destination node, the shortest path between the source and destination node is determined using K- Nearest Neighbor (KNN) algorithm. It calculates the distance between the nodes and sort the nearest neighbor based on the minimum distance. The routing is performed with the help of Dynamic Source Routing (DSR) algorithm which allows each dispatcher to decide on and control the routes used in routing packets. The packet loss gets reduced by considering the throughput of nodes. Here the Operating System is Linux Simulation software and then Network Simulator version 2 tool was used.
Article
Routing in Mobile Ad-hoc NETwork (MANET) is a contemporary graph problem that is solved using various shortest path search techniques. The routing algorithms employed in modern routers use deterministic algorithms that extract an exact non-dominated set of solutions from the search space. The search efficiency of these algorithms is found to have an exponential time complexity in the worst case. Moreover this problem is a multi-objective optimization problem in nature for MANET and it is required to consider changing topology layout. This study attempts to employ a formulation incorporating objectives viz., delay, hop-distance, load, cost and reliability that has significant impact on network performance. Simulation with different random topologies has been carried out to illustrate the implementation of an exhaustive search algorithm and it is observed that the algorithm could handle small-scale networks limited to 15 nodes. A random search meta-heuristic that adopts the nature of firefly swarm has been proposed for larger networks to yield an approximated non-dominated path set. Firefly Algorithm is found to perform better than the exact algorithm in terms of scalability and computational time.
Article
Short-term load forecasting (STLF) plays an irreplaceable role in the efficient management of electric systems. Particularly in the electricity market and industry, accurate forecasting could provide effective future plans and economic operations for operators of utilities and power systems. Hence, a more precise and stable load-forecasting model is essentially needed in the field of electricity load forecasting. To avoid the limitations of individual models, a new combined model is proposed. In this model, except for the multiple seasonal patterns used to reduce interferences from the original data, a new optimization algorithm is presented and applied to optimize the weight coefficients of the combined model based on non-positive constraint combination theory. To estimate the forecasting ability of the proposed combined model, half-hourly electricity power data from New South Wales, the State of Victoria and the State of Queensland in Australia were used in this paper as a case study. In the numerical experiments, compared with other six single models, the average mean absolute percent errors (MAPEs) of the combined model were reduced by 0.7138%, 1.0281%, 4.8394%, 0.9239%, 9.6316% and 7.3367%, respectively.
Article
In this paper, we examined the significance of position-based routing with bordernode- based forwarding for vehicular ad hoc network (VANET) to optimise path length between vehicles. We have mathematically evaluated the performance of border node-based forwarding method such as Border node-based MFR (B-MFR). B-MFR strongly avoids the interior nodes within the transmission range for further transmitting the packets. Furthermore, we have developed a mathematical model for B-MFR to determine average number of hop counts, expected distance between source and destination, and maximum progress of the next-hop node towards the destination node using Poisson distribution for node deployment. Analytical and simulation results indicate that B-MFR can provide efficient routing in VANETs. In our work, results clearly show that using the border-nodes is an advantage to maximise the performance of routing protocol in terms of average number of hops with minimum delay. We have mathematically simulated the proposed protocol in MATLAB and compared the result with existing routing protocol MFR.