scispace - formally typeset
Search or ask a question

Showing papers on "Dynamic Source Routing published in 2021"


ReportDOI
01 Jan 2021
TL;DR: Babel is a loop-avoiding distance-vector routing protocol that is robust and efficient both in ordinary wired networks and in wireless mesh networks.
Abstract: Babel is a loop-avoiding distance-vector routing protocol that is robust and efficient both in ordinary wired networks and in wireless mesh networks. This document describes the Babel routing protocol, and obsoletes RFCs 6126 and 7557.

132 citations


Journal ArticleDOI
TL;DR: A new mechanism for route selection combining Ad-hoc On-Demand Distance Vector (AODV) protocol with Ant Colony Optimization (ACO) protocol to improve Quality of Service (QoS) in MANET is proposed.

65 citations


Journal ArticleDOI
TL;DR: This paper focuses on the feasibility tests for insertions and the impact of a limited cross-dock capacity on the routing cost, and adapts a recently proposed matheuristic based on large neighborhood search for this problem.
Abstract: In this paper, we propose an extension of the vehicle routing problem with cross-docking that takes into account resource constraints at the cross-dock. These constraints limit the number of docks that can be used simultaneously. To solve this new problem, we adapt a recently proposed matheuristic based on large neighborhood search. In particular, we focus on the feasibility tests for insertions and compare heuristics and constraint programming strategies. Finally, computational experiments on instances adapted from the vehicle routing problem with cross-docking are reported. They give insights on the impact of a limited cross-dock capacity on the routing cost.

21 citations


Journal ArticleDOI
TL;DR: Experimental analysis slows that FSR is good in term of PDR, channel utilization, link utilization vs throughput and link vs throughput from the rest of routing protocols after addressing of these problems UAVs resources are efficiently utilized.
Abstract: Flying Ad-hoc networks are emergent area in Ad-hoc networks evolved from MANETs and VANETs. Small unmanned aerial vehicles (UAVs) are used in FANETs applications and these small UAVs have limited resources while efficiently utilization of these resources is most critical task in real time monitoring of FANETs application. Network consumes its resources in path selection process and data routing from source to destination. Selecting of efficient routing protocol to utilize all available resources played vital role in extending network life time. In this article fisheye state routing (FSR) protocol is implemented in FANET and compare networks performance in term of channel utilization, link utilization vs throughput and packet delivery ratio (PDR) with distance sequence distance vector (DSDV), optimized link state routing (OLSR), adhoc on demand distance vector (AODV), dynamic source routing (DSR) and temperary ordered routing protocol (TORA). Experimental analysis slows that FSR is good in term of PDR (16438 packets delivered), channel utilization (89%) and link vs throughput from the rest of routing protocols after addressing of these problems UAVs resources are efficiently utilized (energy).

17 citations


ReportDOI
01 Aug 2021
TL;DR: This document illustrates the application of Segment Routing to solve the BGP-EPE requirement and allows a centralized controller to program any egress peer policy at ingress border routers or at hosts within the domain.
Abstract: Segment Routing (SR) leverages source routing. A node steers a packet through a controlled set of instructions, called segments, by prepending the packet with an SR header. A segment can represent any instruction topological or service-based. SR allows to enforce a flow through any topological path while maintaining per-flow state only at the ingress node of the SR domain. The Segment Routing architecture can be directly applied to the MPLS dataplane with no change on the forwarding plane. It requires a minor extension to the existing link- state routing protocols. This document illustrates the application of Segment Routing to solve the BGP Egress Peer Engineering (BGP-EPE) requirement. The SR-based BGP-EPE solution allows a centralized (Software Defined Network, SDN) controller to program any egress peer policy at ingress border routers or at hosts within the domain.

16 citations


Journal ArticleDOI
TL;DR: To establish path from source to destination using multicasting approach and also reduce the chances of congestion in the network, AODV and Ant Colony Optimization (ACO) technique is applied and data is transmitted.

16 citations


Proceedings ArticleDOI
Senthilkumar C1, G. Ramkumar1, G. Anitha1, Sureshkumar. M1, M. Ayyadurai1 
03 Jun 2021
TL;DR: In this article, a novel route maintenance and data security aspects are analyzed by using a new hybrid methodology called Hybrid Route Management Strategy (HRMS), in which the proposed routing scheme integrates some powerful metrics such as Dynamic Source Routing (DSR) and Fuzzy Interference Logic (FIL) to deal with complex routing scenario and provides a proper communication medium between source and destination entities.
Abstract: Now-a-days Communication and other related modes are getting a drastic development “With some dynamic features. The logic of Wireless Sensor Network (WSN) is helpful to achieve these kinds of communication needs around the globe. The route selection and transmission over the selected path is a general way of data transmission from source or transmitter end to the receiver or destination end. The route selection varies depends on the protocol followed over the communication medium, in which it differs based on the cost, distance and other related metrics. However, the major concern needs to concentrate over Wireless Sensor Network is a Security. In this paper, a novel route maintenance and data security aspects are analyzed “With experimental associations by using a new hybrid methodology called Hybrid Route Management Strategy (HRMS), in which the proposed routing scheme integrates some powerful metrics such as Dynamic Source Routing (DSR) and Fuzzy Interference Logic (FIL) to deal “With complex routing scenario and provides a proper communication medium between source and destination entities. The proposed routing metric called HRMS associates a crypto security feature called Improved Advanced Encryption Standard Methodology (IAFSM) to provide a data security over transmissions. For all, the proposed hybrid logic integrates several advanced communication logics to improve the transmission and reception schema better as compared With the classical WSNs routing protocols. The major intention of this HRMS approach is to build the robust routing protocol With proper security measures as well as the protocol is modified With respect to DSR norms to improve the path metric in good manner.

14 citations


Journal ArticleDOI
TL;DR: The proposed model improves the traditional Dynamic Source Routing (DSR) protocol by isolating the malicious nodes from participation in data packets transmission by improving the beta reputation system combined with the Ant Colony Optimization (ACO) metaheuristic.
Abstract: Moving randomly without any centralized authority, dynamic nodes constitute the Mobile Adhoc Networks on the basis of fully-fledged cooperation and native trustworthiness. Unfortunately, in real scenarios, the malicious nodes take advantage of this inherent trustworthiness to settle in and perform their suspicious activities. In the light of the growing concerns about security attacks in hostile environments, new challenges have emerged to thwart routing attacks including the smart grayhole attack, which adversely affects the availability and accuracy of the network by dropping data packets. This paper addresses this disturbing attack by monitoring the behavior of the participating nodes through a bio-inspired trust management model. The distributed trustworthiness assessment model is based on the beta reputation system combined with the Ant Colony Optimization (ACO) metaheuristic. The main focus of the beta reputation system is rating the nodes according to their successful tasks and their consumed energy, while the ACO metaheuristic maintains this reputation metric during the discovery process and calculates the preference value of each traversed path to select the most secure one. The proposed model improves the traditional Dynamic Source Routing (DSR) protocol by isolating the malicious nodes from participation in data packets transmission. The simulations conducted with the network simulator 2, show that despite the presence of numerous gray holes, the reputation-based ACO DSR (RACODSR) outperforms the standard DSR in terms of packet loss ratio by a decrease of 9.8%, packet delivery ratio by an increase of 0.22%, throughput by an increase of 0.4%, jitter by a decrease of 22.76%, the end to end delay by a decrease of 2.51% and the consumed energy by a decrease of 0.17%.

13 citations


Journal ArticleDOI
TL;DR: In this article, a cross-layer optimization method is presented with a novel mean field game (MFG) in ultra-dense scenarios with swarm UAVs, which jointly considers the power resources in the physical layer, frequency resources in medium access control (MAC) layer, and routing resources in network layer.
Abstract: Unmanned aerial vehicle (UAV) multi-hop communication networks are foreseen to be widely employed in both military and civilian scenarios. However, in ultra-dense scenarios with swarm UAVs, nodes are highly dynamic mobile, ultra-dense deployment and non-centralized distribution. These characteristics make the centralized resource management policy not apply. Meanwhile, existing routing protocols can't meet the performance challenges of high dynamic, topology and link frequency changes of ultra-dense scenarios with swarm UAVs. To solve the above challenges of resource management and routing protocol, a cross-layer optimization method is presented with a novel mean field game (MFG) in this paper. It is based on the cross-layer design method of the MFG theory and jointly considers the power resources in the physical layer, frequency resources in the medium access control (MAC) layer, and routing resources in the network layer. By dividing into subproblems, the original problem is solved. Meanwhile, the optimal data transmission path can be selected through the management and allocation of frequency resources and power resources. A crosslayer resource management dynamic source routing (CLRMDSR) protocol is designed based on that which adds link quality measurement. The simulation results show that the presented CLRM-DSR with the proposed resource management scheme can improve the data packet transmission rate, reduce end-toend delay, and lower routing overhead for the multi-hop swarm UAV communication network.

10 citations


Journal ArticleDOI
TL;DR: DyTE has performed more efficiently in terms of PDR, throughput, and throughput and drastically minimized the NRL by a factor of almost 3.5, and the results show a remarkable improvement in reducing the Network Routing Load (NRL) and in increasing the PDR and throughput of the network.
Abstract: A Vehicular Ad-hoc Network (VANET) is a subclass of wireless ad-hoc networks, widely used in on-road vehicles and roadside equipment, having applications in various areas including passenger safety, smart traffic solutions, and connectivity on vehicles The VANET is the backbone of the Intelligent Transport System (ITS) that establishes connectivity between vehicles through a wireless medium. When it comes to the communication between high-speed vehicles there is the challenge of dynamic mobility. In order to provide a higher Packet Delivery Ratio (PDR) and increase the throughput, a new routing protocol called Dynamic Trilateral Enrolment (DyTE) is introduced which chooses a dynamic trilateral zone to find the destination vehicle by allowing only relevant nodes to participate in the communication process using the location coordinates of source and destination nodes. The proposed routing protocol is compared with Ad-hoc On-demand Distance Vector (AODV), Ad-hoc On-demand Multipath Distance Vector (AOMDV), and Dynamic Source Routing (DSR), and the results show remarkable improvement in reducing the Network Routing Load (NRL) and increasing the PDR and throughput of the network. DyTE has performed more efficiently in terms of PDR (23% approximately), throughput (26% approximately) and drastically minimized the NRL by a factor of almost 3.

9 citations


Journal ArticleDOI
TL;DR: It is proved that the proposed system is achieving less energy consumption and improved network lifetime compared with existing Dynamic Source Routing (DSR), Hopfield Neural Network-based Disjoint Path set Selection (HNNDPS) and Multipath DSR (MDSR).
Abstract: The main goal is to find multiple node-disjoint paths that meet the multi-objective optimization problem in terms of energy consumption minimization and network lifetime improvement. Due to the battery-dependent nodes in mobile ad hoc networks, the performance of the network will degrade. Hence, it is necessary to choose multiple optimal node-disjoint paths between source and destination for data transfer. Additionally, it improves the Quality of Service (QoS) of wireless networks. Multi-objective function is used to select a path such that it gives an optimum result based on the energy consumption, hop, and traffic load. From the simulation results, it is proved that the proposed system is achieving less energy consumption and improved network lifetime compared with existing Dynamic Source Routing (DSR), Hopfield Neural Network-based Disjoint Path set Selection (HNNDPS) and Multipath DSR (MDSR).

Proceedings ArticleDOI
27 Jan 2021
TL;DR: In this paper, a new multi-hop routing protocol for D2D communications in 5G network is proposed, which modifies the conventional DSR protocol and takes advantage of 5G cellular infrastructure to make fast routing decisions.
Abstract: Device-to-Device (D2D) communication in 5G networks is designed to offload the traffic on the core networks and backhaul links, and to provide faster and energy-efficient access to the devices within a cell. However, efficient provision of D2D communication presents several challenges, including multi-hop routing to the devices that are not immediate neighbours. Dynamic Source Routing (DSR) is a popular protocol commonly applied to Mobile Ad hoc Networks (MANET); however, its direct application in 5G environment is not straightforward. In this paper, a new multi-hop routing protocol for D2D communications in 5G network is proposed. The protocol modifies the conventional DSR protocol and takes advantages of 5G cellular infrastructure to make fast routing decisions. The proposed protocol offers low overhead over the conventional DSR, in terms of the number of control messages in the D2D communication, thus saving for the devices during route finding process. Simulation results show that the proposed protocol also achieves better results in terms of D2D routing success probability.

Journal ArticleDOI
TL;DR: Simulation results demonstrate that, relative to state-of-the-art solutions, EEHRP is efficient in terms of energy, throughput, delay, control- and routing-overheads, and statistical significance of the findings obtained across confidence intervals is investigated.
Abstract: With Multi-Objective Optimization (MOO) mechanisms, many practical scenarios are imitated in Wireless Sensor Networks (WSNs). In MOO numerous desirable conflicting or non-conflicting objectives contend with one another and the decision has to be done among multiple available solutions. Based on the type of situation, Programme, and issue to be solved, the MOO problem has varied solutions. The solution chosen is a tradeoff solution on several occasions. In WSN, it is possible to identify MOO issues and associated solutions based on network architecture, node deployment, MAC strategies, routing, data aggregation, node mobility, etc. In this context, the paper proposes mobility aware, competent; delay tolerant Energy Efficient Hybrid Routing Protocol (EEHRP). Optimizing several metrics to pick the best route from the source to the target node is the cornerstone of the EEHRP. Multi-Objective optimization from optimization theory is a NP-hard problem. EEHRP seeks to obtain a Pareto optimal solution for the section of best MOO-based route under sensor node. The simulation results demonstrate that, relative to state-of-the-art solutions, EEHRP is efficient in terms of energy, throughput, delay, control- and routing-overheads. Furthermore, the paper investigates statistical significance of the findings obtained across confidence intervals. To prove EEHRP’s competence, a confidential interval of 95% is inserted into the simulation results obtained to represent margin of error around the estimated points. The on-hand state-of-art solutions and the propensity of the research fraternity in relation to MOO are also analyzed in this paper.


Journal ArticleDOI
Qing Liang, Tian Lin, Feng Wu, Fan Zhang, Wei Xiong 
27 May 2021-PLOS ONE
TL;DR: In this paper, a dynamic source routing protocol based on path reliability and monitoring repair mechanism (DSR-PM) is proposed to improve the communication quality of UAVs under high-speed movement.
Abstract: The two most essential factors for mobile self-organizing networks applicable to drones are reliability and stability. In harsh communication environments, such as mountainous regions and natural disasters, the use of satellites and terrestrial communication stations has severe time delays due to the high speed of UAVs, resulting in frequent communication interruptions with UAVs. Therefore, UAVs need to establish self-organizing networks for communication and information sharing. High-speed movement will lead to rapid changes in the network topology, resulting in established links being in an unstable connection state and even frequent routing errors, thus preventing the establishment of stable communication links. In order to improve the communication quality of UAVs under high-speed movement, we propose a dynamic source routing protocol based on path reliability and monitoring repair mechanism (DSR-PM). The model performs data transmission by filtering the best reliability path. The link state information is monitored during transmission and broken links are repaired in time to ensure the communication stability and reliability of the links and improve the data transmission efficiency. We simulated the approach in NS2 software and the simulation results show that the DSR-PM protocol effectively reduces parameters such as overhead, packet loss and delay, improves network throughput, and provides better communication performance.

Journal ArticleDOI
TL;DR: In this paper, a reactive big data-based "cognitive dynamic source routing protocol" is proposed for cognitive-based IoT networks to concurrently select the channel route at the network layer from source to destination.
Abstract: Dynamic opportunistic channel access with software-defined radio at a network layer in distributed cognitive IoT introduces a concurrent channel selection along with end-to-end route selection for application data transmission. State-of-the-art cognitive IoT big data-based routing protocols are not explored in terms of how the spectrum management is being coordinated with the network layer for concurrent channel route selection during end-to-end channel route discovery for data transmission of IoT and big data applications. In this paper, a reactive big data-based “cognitive dynamic source routing protocol” is proposed for cognitive-based IoT networks to concurrently select the channel route at the network layer from source to destination. Experimental results show that the proposed protocol cognitive DSR with concurrent channel route selection criteria is outperformed. This will happen when it is compared with the existing distributed cognitive DSR with independent channel route application data transmission.

Journal ArticleDOI
29 Jan 2021-Sensors
TL;DR: In this paper, the authors modify the multipath multimedia dynamic source routing (MMDSR) protocol to include a social metric called tie strength in the decisions taken by the forwarding algorithm.
Abstract: A mobile ad hoc network (MANET) is a set of autonomous mobile devices connected by wireless links in a distributed manner and without a fixed infrastructure. Real-time multimedia services, such as video-streaming over MANETs, offers very promising applications, e.g., two members of a group of tourists who want to share a video transmitted through the MANET they form, a video-streaming service deployed over a MANET where users watch a film, among other examples. On the other hand, social web technologies, where people actively interact online with others through social networks, are leading to a socialization of networks. Information of interaction among users is being used to provide socially-enhanced software. To achieve this, we need to know the strength of the relationship between a given user and each user they interact with. This strength of the relationship can be measured through a concept called tie strength (TS), first introduced by Mark Granovetter in 1973. In this article, we modify our previous proposal named multipath multimedia dynamic source routing (MMDSR) protocol to include a social metric TS in the decisions taken by the forwarding algorithm. We find a trade-off between the quality of service (QoS) and the trust level between users who form the forwarding path in the MANET. Our goal is to increase the trust metric while the QoS is not affected significantly.

Journal ArticleDOI
TL;DR: In this article, an efficient secret key establishment technique using traffic matrix is simulated in two reactive routing protocol scenarios: DSR (Dynamic Source Routing) and AODV (Ad hoc On-demand Distance Vector routing).
Abstract: Automatic key establishment schemes are the root of secure communication in Mobile adhoc networks(MANETs). These schemes are not universal, their performance depends on many factors like routing protocols, type of attackers aimed at, the parameter used for key generation, etc. Among the routing protocols used in MANETs the most popular ones are reactive routing protocols DSR and AODV. In this paper, an efficient secret key establishment technique using traffic matrix is simulated in the two reactive routing protocol scenarios: DSR (Dynamic Source Routing) and AODV (Ad hoc On-demand Distance Vector routing). The simulation results are compared and analyzed in terms of the key generation complexity, packet loss ratio and active attacker detection. Finally the paper concludes the fact that traffic load based key generation scheme is preferable for reactive routing protocol based systems.

Journal ArticleDOI
TL;DR: In this article, a digital signature based secure acknowledgment method (DSSAM) with the use of the RSA digital signature has been proposed and simulated in MANETs, where three different parameters are considered, namely secure acknowledgment, node authentication, and packet authentication for study.
Abstract: Mobile ad hoc network (MANET) is an infrastructure-less, self-motivated, arbitrary, self-configuring, rapidly changing, multi-hop network that is self-possessing wireless bandwidth-conscious links without centrally managed router support. In such a network, wireless media is easy to snoop. It is firm to the surety to access any node, easier to insertion of bad elements or attackers for malicious activities in the network. Therefore, security issues become one of the significant considerations for such kind of networks. The deployment of an effective intrusion detection system is important in order to provide protection against various attacks. In this paper, a Digitally Signed Secure Acknowledgement Method (DSSAM) with the use of the RSA digital signature has been proposed and simulated. Three different parameters are considered, namely secure acknowledgment, node authentication, and packet authentication for study. This article observes the DSSAM performance and compares it with two existing standard methods, namely Watchdog and 2-ACK under standard Dynamic Source Routing (DSR) routing environment. In the end, it is noticed that the rate of detection of malicious behaviour is better in the case of the proposed method. However, associated overheads are high. A trade-off between performance and overhead has been considered.

ReportDOI
25 Jan 2021
TL;DR: In this paper, the authors define a YANG data model for configuration and operation of segment routing in IGP protocols, which is intended to be used on network elements to configure or operate segment routing.
Abstract: This document defines a YANG data model ([RFC6020], [RFC7950]) for segment routing ([RFC8402]) configuration and operation. This YANG model is intended to be used on network elements to configure or operate segment routing. This document defines also generic containers that SHOULD be reused by IGP protocol modules to support segment routing.

Journal ArticleDOI
TL;DR: A light weight solution called SEC-DSR is proposed to defend the network from black hole attack and enables communication among nodes even in the presence of attackers, and results validate and ensure the effectiveness of the proposed solution tested on an ad hoc network with compromised black hole nodes.
Abstract: Wireless Ad Hoc Network is a dynamically organized network on emergency situations, in which a group of wireless devices send data among themselves without requiring any base stations for forwarding data. Here the nodes itself perform the functions of routing. This important characteristic of mobile ad hoc networks allows the hassle free set up of the network for communications in different crisis such as battlefield and natural disaster zones. Multi hop communication in MANET is achieved by the cooperation of nodes in forwarding data packets. This feature of MANET is largely exploited to launch a security attack called black hole attack. A light weight solution called SEC-DSR is proposed to defend the network from black hole attack and enables communication among nodes even in the presence of attackers. In this scheme, by analyzing only the control packets used for routing in the network, the compromised nodes launching the attack are identified. From the collective judgment by the participating nodes in the routing path, a secure route free of black hole nodes is selected for communication by the host. Simulation results validate and ensure the effectiveness of the proposed solution tested on an ad hoc network with compromised black hole nodes.

Book ChapterDOI
01 Jan 2021
TL;DR: In this paper, the authors provide the information of various routing protocol and optimization algorithm developed by different researcher which are applied to improve performance of MANET, which is basically used for quick transmission of data without creating infrastructure-based network.
Abstract: MANET is basically used for quick transmission of data without creating infrastructure-based network. In order to do transmission in mobile ad hoc network, it is required to find out efficient path between source and destination. MANET is developed using different type of topologies which frequently get changed on the movement of node that affects network performance result in selection of inappropriate path. So to find out best path between nodes, routing protocol is required. There are number of routing protocols available based on the requirement of network it get selected and implemented. This paper provides the information of various routing protocol and optimization algorithm developed by different researcher which is applied to improve performance of MANET.

Journal ArticleDOI
TL;DR: This work proposes an Admission control in mobile ad-hoc network routing (ACMANR) using both bandwidth capacity and resource estimation to achieve a good QoS and analyzes the behaviour of two well-known routing protocols in wireless network, ad hoc on-demand distance vector (AODV) and dynamic source routing (DSR).
Abstract: The widespread deployment of mobile ad-hoc network (MANET) in the areas of agriculture, military defence, weather forecasting and disaster control has necessitated the implementation of admission control within a network for a guaranteed quality of service (QoS). Admission control organises traffic flows to ensure the network medium is fairly shared among various nodes in the network. Various admission control algorithms have been proposed in the literature, using different metrics and parameters to achieve different admission control quality. In this work, we propose an Admission control in mobile ad-hoc network routing (ACMANR) using both bandwidth capacity and resource estimation to achieve a good QoS. Furthermore, we analyse the behaviour of two well-known routing protocols in wireless network, ad hoc on-demand distance vector (AODV) and dynamic source routing ( DSR), in our proposed admission control algorithm. Simulation results obtained from our proposed admission control algorithm using OPNET show that AODV routing protocol had a better throughput while DSR produced a better delay with lower overhead in MANET. Our proposed approach also shows better performance in terms of throughput and delay when compared with the state-of-the-art admission control routing using AODV and DSR.

Proceedings ArticleDOI
27 Jan 2021
TL;DR: In this article, the authors proposed to enhance the energy efficiency of network by modifying the dynamic source routing (DSR) protocol, which reduces the inter-arrival time of packet routing using Pareto distributions in DSR.
Abstract: Routing, dynamic control, and information theoretic are the main factors considered in the designing of adhoc networks. Usually, the performance of adhoc networks is analysed on the basis of packet delivery and power management. The existing studies indicate that there is a trade-off between packet delivery rate and energy consumption. It is desired to realize an energy efficient network which delivers packetized data at higher packet delivery rate. In this research work, we propose to enhance the energy efficiency of network by modifying the dynamic source routing (DSR) protocol. The inter-arrival time of packet routing is reduced using Pareto distributions in DSR. Adhoc networks are tested for different scenarios i.e. grid, random and mobile on proposed DSR. From the various simulations carried out, it is concluded that the proposed approach has proven significant contribution in terms of improvising energy performance of network.

Journal ArticleDOI
10 Apr 2021
TL;DR: This paper is implementing random routing of secure data transmission protocol for generating routing and providing privacy of transferred message and can improve the efficiency in the routing and also provide security of transferring message.
Abstract: Now a day’s automatic key establishment of any two devices in the network is placed an important role and generation of key is used for public key based algorithm. By using public key based algorithm we can automatically generated secret key any two devices in the network. So that by performing this process we can randomly generate secret key. In the ad hoc networks another concepts is routing from source node to destination node. The generation of routing process can be done by randomly and performing this process we can improve the efficiency in the routing. In this paper we are implementing random routing of secure data transmission protocol for generating routing and provide privacy of transferred message. By implementing this protocol we can provide random routing process for transferring message. Before transferring message the server will randomly generate routing for source node to destination node. After that the source node will send data to destination node. Before transferring message or data the source node will encrypt and send the cipher format data to destination node. The destination node will retrieve cipher format data and perform the decryption process. After completion of decryption process the destination node will get original message. By implementing those concepts we can improve the efficiency for generating routing and also provide security of transferring message.

Proceedings ArticleDOI
17 Mar 2021
TL;DR: In this paper, the authors provide a comparative performance analysis on the routing protocols using a ViSim tool that integrates the Ns2 simulator, focusing on MANET (Mobile Ad-Hoc Network) protocols for proactive - DSDV (Destination-Sequenced Distance-Vector Routing) and reactive - DSR (Dynamic Source Routing).
Abstract: The Internet of Things (IoT) architecture is structured as a network of devices that connect with one another and provide creative solutions to real-time problems. There have been studies regarding various combinations of routing protocols that defines the efficient pathway to interconnect the smart devices. Proactive, reactive and hybrid routing protocols are the three types of routing protocols defined on the basis of route discovery. The core objective of this paper is to provide a comparative performance analysis on the routing protocols using a ViSim tool that integrates the Ns2 simulator. This tool focus on MANET (Mobile Ad-Hoc Network) protocols for proactive - DSDV (Destination-Sequenced Distance-Vector Routing) and reactive - DSR (Dynamic Source Routing) and ADOV(Ad-hoc On-demand Distance Vector). Throughput, Goodput (packets and packet size) and Routing load (packets and packet size) are the parameters to make comparison between the routing protocols for performance analysis. This tool can be modified in the future for better analysis of different routing protocols.

Journal ArticleDOI
TL;DR: In this study, various MANET protocols, namely geographical, topology-based, hybrid, hierarchical, power-aware and multicast routing protocols, were investigated based on performance parameters (routing overhead, caching overhead, and packet delivery ratio) along with the security challenges they face.
Abstract: Various targeted attacks are focused on MANET exploiting these vulnerabilities and disrupting their operations. Therefore, network optimisation can be accomplished through the maximal use of resources available and deploying proper security measures. In this study, various MANET protocols namely geographical, topology-based, hybrid, hierarchical, power-aware and multicast routing protocols, were investigated based on performance parameters (routing overhead, caching overhead, and packet delivery ratio) along with the security challenges they face. In addition to this, comparative analysis among various routing protocols and their performances were evaluated. Several topological issues namely high power consumption, low bandwidth, and high error rate, were taken into account.

Posted ContentDOI
TL;DR: It is shown in the simulation results that there are significant superiorities of QoTa-MRP than that of DSR in terms of network throughput, packet loss rate and routing packet header overhead in IoRT.
Abstract: Internet of Remote Things (IoRT) is widely used in both military and civilian applications. However, due to the unique characteristics, which is characterized as long-distance and high-latency, the design of the routing protocol is a great challenge of IoRT. In this paper, a QoS-oriented and traffic-aware multi-path routing protocol (QoTa-MRP) is proposed for IoRT. QoTa-MRP is composed of two parts. The first part is the link traffic-aware based muti-paths source route discovery mechanism, which is used to establish multi-paths with lower link disjoint degree. The second part is path similarity and traffic priority based multi-path selection mechanism, which is used to determine the transmission mode of the traffic flows to enhance the reliability or effectiveness of the transmission. Simultaneously, the protocol is theoretically analyzed in terms of the successful transmission rate of routing transmission data packet. Finally, the dynamic source routing, which is a very representative protocol and is usually used as the baseline comparison protocol, is revisited for the performance verification of the QoTa-MRP in IoRT. It is shown in the simulation results that there are significant superiorities of QoTa-MRP than that of DSR in terms of network throughput, packet loss rate and routing packet header overhead in IoRT .

Journal ArticleDOI
TL;DR: In this paper, routing protocols such as Ad-hoc On-Demand Vector (AODV), Dynamic Source Routing (DSR), Temporally Ordered Routing Algorithm (TORA), Geographic Routing Protocol (GRP) and Optimized Link State Routing(OLSR) are compared using performance parameters such as number-of-hops, packet loss ratio, throughput, end-to-end delay and throughput.
Abstract: The ability of dynamic reconfigurability, quick response and ease of deployment has made Unmanned Aerial Vehicles (UAVs), a paramount solution in several areas such as military applications. Flying ad-hoc network (FANET) is a net-work of UAVs connected wirelessly and configured continuously without infrastructures. Routing on its own is not significant, but the mobility sequence of a UAV in FANETs is a more significant factor and an interesting research topic. The routing protocols gives us a certain and better perception of routing structure for FANETs. In this paper, routing protocols such as Ad-hoc On-Demand Vector (AODV), Dynamic Source Routing (DSR), Temporally Ordered Routing Algorithm (TORA), Geographic Routing Protocol (GRP) and Optimized Link State Routing (OLSR) are compared using performance parameters such as number-of-hops, packet loss ratio, throughput, end-to-end delay and throughput. The mobility models like Pursue Mobility Model (PRS), Semi-Circular Random Movement (SCRM), Manhattan Grid Mobility Model (MGM) and Random Waypoint Mobility (RWPM). The evaluation is carried out with three scenarios including one sender node and one receiver node, all senders one receiver and all senders all receivers are considered for above protocols and mobility models. For all evaluation scenarios, the performance of OLSR is the most efficient among the five routing protocols under four different performance parameters due to its proactive nature which makes the routing information up to date with the help of MPR (Multi Point Relay) in the network, resulting in the reduction of routing overhead in the network.

Proceedings ArticleDOI
04 Feb 2021
TL;DR: In this paper, the authors developed a more realistic simulation environment based on EXata simulator for performance assessment of three prominent routing protocols: AODV, DSR, and DYMO.
Abstract: The Mobile Ad hoc NETwork (MANET) mostly relies on a reliable routing protocol for its proper functioning Due to infrastructure-less feature the routing protocols have to make use of routing tables on every node that contain a topology information But, mobility brings fundamental challenge to the efficient design Today, several state of the art routing schemes those are based on the standard routing protocols viz Dynamic Source Routing (DSR) and Ad Hoc on Demand Distance Vector (AODV) are available to deal with the situations of frequent topology changes Although all these standard protocols intend to bring an efficient routing functionality, their performance differ with the variation in network scenarios This paper develops a more realistic simulation environment based on EXata simulator for performance assessment of three prominent protocols: AODV, DSR, and DYnamic MANET On-demand routing (DYMO) This assessment relying the measurement of evaluation metrics such as Packet Delivery Ratio (PDR), end-to-end delay, throughput, and jitter tests the suitability of these routing protocols for adaption to different network scenarios viz variation in the number of nodes and variation in the node speed To analyze the performances of these protocols in adversarial environment, they are also tested under the varying number of attackers those are causing routing disruptions by acting as black holes and gray holes The presented work certainly provides a pertinent reference for the selection of routing protocols for different application scenarios