scispace - formally typeset
Search or ask a question

Showing papers on "Optimized Link State Routing Protocol published in 2022"


Journal ArticleDOI
TL;DR: A proposed Cross-Layer and Energy-Aware Ad-hoc On-demand Distance Vector routing protocol for improving FANET performance and shows that the CLEA-AODV surpasses these protocols in terms of PSR, TP, E2E delay, and PDR.
Abstract: In recent years, unmanned aerial vehicles (UAVs) have become the trend for different types of research and applications. UAVs can accomplish some technical and risky tasks while still being safe, mobile, and inexpensive to operate. However, UAVs need flying ad-hoc networks (FANET) to operate in inaccessible or infrastructure-less areas. Subsequently, in many military and civil applications, the UAVs are connected ad hoc. FANET-based UAV systems have been developed for search and rescue, wildlife surveys, real-time monitoring, and delivery services. Maintaining the reliability and connectivity among UAV nodes in FANET becomes challenging because of the UAV movement, environmental conditions, energy efficiency, etc. Energy-aware routing protocols have become essential for developing advanced and effective FANETs. This paper presents a proposed Cross-Layer and Energy-Aware Ad-hoc On-demand Distance Vector (CLEA-AODV) routing protocol for improving FANET performance. The CLEA-AODV protocol is mainly divided into three sections: routing with AODV protocol, Glow Swarm Optimization (GSO)-based Cluster Head Selection, and Cooperative Medium Access Control (MAC). The cross-layer approach is implemented on the network layer and the data layer. The major parameters considered to evaluate the performance of the FANET are Packet Success Rate (PSR), Throughput (TP), End-to-End (E2E) delay, and packet drop ratio (PDR). The Network Simulator version 2 (NS2) is used to implement the CLEA-AODV protocol and evaluate the network performance. The results are compared with the standard AODV, Self-Organization Clustering-GSO (SOC-GSO), and Energy Efficient Neuro-Fuzzy Cluster-based Topology Construction with Meta-Heuristic Route Planning (EENFC-MRP) protocols. The results show that the CLEA-AODV surpasses these protocols in terms of PSR, TP, E2E delay, and PDR.

19 citations


Book ChapterDOI
TL;DR: In this paper , a stable fuzzy logic-based energy-efficient reactive routing protocol for MANETs is proposed, where crisp input is fed to the fuzzy inference engine for calculating the most trusted value which can be used as a metric for the route selection.
Abstract: A mobile ad hoc network is a collection of autonomous mobile nodes having communication capability with one another within a radio range. This is a network with intrinsic attributes like auto-configuration and organization by the network itself. In traditional, AODV single metric is used for the route selection scheme. Here we put forward a stable fuzzy logic-based energy-efficient AODV routing protocol for MANET. This protocol is used for selecting an optimal path to increase network lifetime. Fuzzy logic-based energy-efficient reactive protocol increases the performance metrics by selecting the most trusted node. In the fuzzy logic-based approach, crisp input is fed to the fuzzy inference engine for calculating the most trusted value which can be used as a metric for the route selection. The proposed work is simulated in MATLAB and NS2, and it compares the performance metrics in terms of throughput, end-to-end delay, and packet delivery ratio.

18 citations


Journal ArticleDOI
TL;DR: A comparative analysis of existing routing protocols with propagation models to assist researchers in gaining insight into the existing propagation model and routing protocols and shows that the Two-Ray Ground and FRIIS propagation model outperforms the compared models, and the routing protocol OLSR outperforms AODV and DSDV.
Abstract: Vehicular Ad hoc Networks (VANETs) thrive on providing a communication channel between vehicles and infrastructures that facilitate efficient and safe Vehicle-to-Vehicle (V2V) as well as Vehicle-to-Infrastructure (V2I) communications. Reliable and efficient transmission amongst vehicles and Road Side Units (RSUs) is a prime concern of Intelligent Transportation System (ITS). One of the primary challenges involved in vehicular communication is designing an efficient routing mechanism for data dissemination from node to node via a reliable route. The harsh vehicular environment with varied road conditions and obstacles in the signal propagation path induces another challenge. Therefore, this paper presents a comparative analysis of existing routing protocols with propagation models to assist researchers in gaining insight into the existing propagation model and routing protocols. The study also optimizes routing and propagation models for reliable packet dissemination. This work uses a realistic scenario from Open Street Map (OSM), and simulations are performed using SUMO. The trace files generated from SUMO are used for further simulation in NS-3. The simulation results are presented and studied in detail. The results show that the Two-Ray Ground and FRIIS propagation model outperforms the compared models, and the routing protocol OLSR outperforms AODV and DSDV.

16 citations


Journal ArticleDOI
TL;DR: In this paper , a fuzzy logic-based routing approach called OLSR+ for flying ad-hoc networks (FANETs) is proposed, which includes four main phases: 1) Discovering neighboring nodes. 2) Selecting multipoint relays.

13 citations


Journal ArticleDOI
13 Jan 2022-Drones
TL;DR: Simulation results indicate the proposed E-OLSR outperforms the existing OLSR and achieves supremacy over other protocols mentioned in this paper.
Abstract: The growing need for wireless communication has resulted in the widespread usage of unmanned aerial vehicles (UAVs) in a variety of applications. Designing a routing protocol for UAVs is paramount as well as challenging due to its dynamic attributes. The difficulty stems from features other than mobile ad hoc networks (MANET), such as aerial mobility in 3D space and frequently changing topology. This paper analyzes the performance of four topology-based routing protocols, dynamic source routing (DSR), ad hoc on-demand distance vector (AODV), geographic routing protocol (GRP), and optimized link state routing (OLSR), by using practical simulation software OPNET 14.5. Performance evaluation carries out various metrics such as throughput, delay, and data drop rate. Moreover, the performance of the OLSR routing protocol is enhanced and named “E-OLSR” by tuning parameters and reducing holding time. The optimized E-OLSR settings provide better performance than the conventional request for comments (RFC 3626) in the experiment, making it suitable for use in UAV ad hoc network (UANET) environments. Simulation results indicate the proposed E-OLSR outperforms the existing OLSR and achieves supremacy over other protocols mentioned in this paper.

12 citations


Journal ArticleDOI
TL;DR: In this article , the authors provide a thorough analysis of state-of-the-art literature related to the adoption of SDN in wireless ad hoc scenarios, ranging from WSNs with mostly fixed sensors and WMNs with mobile clients but stable routers to MANETs with every node freely moving on the field, VANETs having vehicles speeding through the network road, and FANET with aerial vehicles flying in every direction.

11 citations


Journal ArticleDOI
TL;DR: In this paper , an intelligent Hello dissemination model based on reinforcement learning algorithms is proposed to produce a dense reward structure, and facilitate the network learning in flying ad-hoc networks (FANETs).
Abstract: The routing mechanisms in flying ad-hoc networks (FANETs) using unmanned aerial vehicles (UAVs) have been a challenging issue for many reasons, such as its high speed and different directions of use. In FANETs, the routing protocols send hello messages periodically for the maintenance of routes. However, the hello messages that are sent in the network increase the bandwidth wastage on some occasions and the excessive number of hello messages can also cause the problem of energy loss. Scarce works deal with the problem of excessive hello messages in dynamic UAVs scenarios, and treat several other problems, such as bandwidth and energy wastage simultaneously. Generally, the existing solutions configure the hello interval to an excessive long or short time period originating delay in neighbors discovery. Thus, a self-acting approach is necessary for calculating the exact number of hello messages with the aim to reduce the bandwidth wastage of the network and the energy loss; this approach needs to be low complex in terms of computational resource consumption. In order to solve this problem, an intelligent Hello dissemination model, AI-Hello, based on reinforcement learning algorithms, that adapts the hello message interval scheme is proposed to produce a dense reward structure, and facilitating the network learning. Experimental results, considering FANET dynamic scenarios of high speed range with 40 UAVs, show that the proposed method implemented in two widely adopted routing protocols (AODV and OLSR) saved 30.86% and 27.57% of the energy consumption in comparison to the original AODV and OLSR protocols, respectively. Furthermore, our proposal reached better network performance results in relation to the state-of-the-art methods that are implemented in the same protocols, considering parameters, such as routing overhead, packet delivery ratio, throughput and delay.

10 citations


Journal ArticleDOI
TL;DR: A comprehensive survey of the cluster-based routing protocols (CBRPs) in terms of their strengths, weaknesses, specific applications, method, number of nodes, and future improvements for serving FANETs is proposed.
Abstract: Flying Ad-Hoc Network (FANET) is a set of Unmanned Aerial Vehicles (UAVs) inter-connected wirelessly. FANETs self-organize and provide low-cost, adaptable, and simple-to-implement flying nodes, enabling them to complete complicated tasks more quickly and collectively. The high mobility of nodes and the highly dynamic topology pose challenges to communication design, particularly when creating a routing protocol for UAV networks; this has inspired researchers to contribute and develop this technology. Hierarchical routing technique known as clustering is necessary to offer scalability, survivability, and distribute payload among UAVs to maintain the performance. This study has proposed a comprehensive survey of the cluster-based routing protocols (CBRPs) in terms of their strengths, weaknesses, specific applications, method, number of nodes, and future improvements for serving FANETs. Moreover, 21 CBRPs based FANETs were reviewed in terms of their topology, challenges, scalability, characteristics, clustering strategy, outstanding features, cluster head (CH) selection, routing metrics, and performance measures. In addition, open issues that need to be addressed in future studies in the field of routing protocols for UAV networks were also debated.

9 citations



Journal ArticleDOI
TL;DR: In this article , the Optimized Link State Routing Protocol (OLSR) is used to investigate the performance of VoIP applications in the VANET network, the network was tested before and after running the OLSR algorithm, the testing focused on Quality of Service (QoS) parameters like end-to-end delay, delay variation (jitter), and probability of packet loss between two moving hops through multi-hop Ad-hoc networks in different scenarios, using the ITU G.711 VoIP codec.
Abstract: Voice over Internet Protocol (VoIP) provides good services through Vehicular Ad-hoc Networks (VANET) platform. These networks encounter various challenges to support voice calls with acceptable Quality of Service (QoS). The Optimized Link State Routing Protocol (OLSR) is used to investigate the performance of VoIP applications in the VANET network. The network was tested before and after running the OLSR algorithm, the testing focused on Quality of Service (QoS) parameters like end-to-end delay, delay variation (jitter), and probability of packet loss between two moving hops through multi-hop Ad-hoc networks in different scenarios, using the ITU G.711 VoIP codec. After measured the end-to-end delay, jitter, and probability of packet loss for two nodes the algorithm decreased delay by 18.72%, while decreased jitter by about 20.42% and decreased packet loss by about 128.6%. However, The OLSR has shown initial good performance for four hops, and then added more hops the delay exceeded 400 ms which is not acceptable according to ITU-T recommendations. This was achieved by implementing a testbed to extract the desired results as opposed to using a simulation.

7 citations


Journal ArticleDOI
TL;DR: Simulation result shows that for increasing number of mobile nodes OLSR offers better throughput and minimum delay than AODV and GRP routing protocols.
Abstract: Mobile Ad Hoc Networks have evolved rapidly and are finding numerous applications in the areas of self-creating, self-organizing and self-administering wireless networks. The present paper describes use of and comparison of three routing protocols. The parameters used for comparison are throughput and delay in response by varying the number of mobile nodes. A random waypoint mobility model was used for fixing the mobile nodes. The simulation study is carried out using OPNET modeler 14.5. Simulation result shows that for increasing number of mobile nodes OLSR offers better throughput and minimum delay than AODV and GRP routing protocols.

Journal ArticleDOI
TL;DR: In this paper , a detection method that classifies malicious and benign information is proposed, which is based on learning techniques that initially require a dataset to determine mobile nodes' behavior and perform this work in an order such as mobile ad-hoc network simulation with some malicious nodes, features selection, and data collection using packet captured files.
Abstract: Mobile ad-hoc network is a dynamic wireless network that transfers information through neighbor nodes with a temporary configuration. Due to its dynamic nature, it is exposed to attacks and intrusions. Routing disruption attack is the main problem of this network where intermediate nodes act maliciously. An encryption-based security mechanism is a first-line defense system that is efficient. It is still not compatible with the mobile ad-hoc network environment. Malicious nodes can drop encrypted data packets in this network. The lightweight technique analyzes a few parameters that consume few resources and provide comparatively low detection rates. However, an intrusion detection system is a reliable second-line security mechanism. In this paper, we have proposed a detection method that classifies malicious and benign information. The proposed intrusion detection method is based on learning techniques that initially require a dataset to determine mobile nodes’ behavior. Subsequently, we perform this work in an order such as mobile ad-hoc network simulation with some malicious nodes, features selection, and data collection using packet captured files. This work is executed through extensive simulations in the NS-3. The proposed method learns the system for information classification, and experimental results that show the proposed method performs better than existing schemes. Moreover, the obtained performance confirms that the suggested feature set is suitable for the intrusion detection system in mobile ad-hoc networks.

Journal ArticleDOI
TL;DR: In this paper , the authors used residual energy to analyze routing protocols' energy efficiency as a metric to analyze selected routing protocols; Destination Sequence Distance Vector (DSDV) and Ad-hoc On-demand Distance Vector(AODV) via simulation.
Abstract: Mobile Ad-hoc Network (MANET) is a wireless network that comes with a few routing protocols which have varied mechanisms. Studies show that routing operations consume energy while current research focuses more on MANET routing protocol operation and its performance evaluation, the required energy for successful routing operations equally demands quality attention of researchers. Hence, the need to expand the scope of study on MANET routing protocols to the neglected area of studies. To bridge the research gap between MANET routing protocols and energy consumption, this paper used residual energy to analyze routing protocols’ energy efficiency as a metric to analyze selected routing protocols; Destination Sequence Distance Vector (DSDV) and Ad-hoc On-demand Distance Vector (AODV) via simulation. It also compared the amount of energy required to transmit the data packets to their destinations in DSDV and AODV. Results, in terms of energy efficiency, indicated that AODV was better than DSDV because it consumed less energy for its successful routing operations

Journal ArticleDOI
01 Nov 2022-Heliyon
TL;DR: In this article , the authors present the analysis of Mobile Ad hoc Network (MANET) in a wireless real-time communication medium for a Networked Control System (NCS), and determine whether the simulated behavior is significant for a plant or not.

Journal ArticleDOI
TL;DR: In this paper , the authors discuss the study of ad hoc networks and their different varieties, including wireless sensor networks, wireless mesh networks, and mobile ad hoc network, and discuss the most important results from 2000 to 2022 from various authors.


Journal ArticleDOI
TL;DR: According to the results, the OLSR protocol provides the best performance over the RWP model in a low mobility environment, whereas the Nomadic mobility model is suitable for O LSR protocol in a high mobility environment.
Abstract: Optimized Link State Routing Protocol (OLSR) is an efficient routing protocol used for various Ad hoc networks. OLSR employs the Multipoint Relay (MPR) technique to reduce network overhead traffic. A mobility model's main goal is to realistically simulate the movement behaviors of actual users. However, the high mobility and mobility model is the major design issues for an efficient and effective routing protocol for real Mobile Ad hoc Networks (MANETs). Therefore, this paper aims to analyze the performance of the OLSR protocol concerning various random and group mobility models. Two simulation scenarios were conducted over four mobility models, specifically the Random Waypoint model (RWP), Random Direction model (RD), Nomadic Community model (NC), and the Reference Point Group Model (RPGM) with a low as well as high random range mobility of the nodes. Moreover, BonnMotion Software and Network simulator NS-3 used to implement the simulation scenarios. Further, the performance of the OLSR protocol analyzed and evaluated based on latency, routing overhead, and packet loss ratio metrics. According to the results, the OLSR protocol provides the best performance over the RWP model in a low mobility environment, whereas the Nomadic mobility model is suitable for OLSR protocol in a high mobility environment.


Book ChapterDOI
01 Jan 2022
TL;DR: In this article , a methodology that computes the two-terminal reliability of mobile ad hoc networks by considering the effect of the link reliability and interference has been proposed, and the simulation results evidently designate that the network reliability falls down by 32% with an increase in interfering nodes from a single interference node to five interfering nodes.
Abstract: Reliability is quite possibly the main measure for arising advancements in communication network performance nowadays. The network reliability of mobile ad hoc network (MANET) is a function of link existence (single-hop/multi-hop) among the source and destination and the link reliability. The creation and deletion of communication links among the nodes are influenced by the dynamic topology nature of mobile ad hoc networks. In addition, these communication links may fail due to node failures, link failures, and interference. The presence of interference in an ad hoc network can vary the path from source to destination (direct path to intermediate path) which inherently exhibits diminish in the reliability of individual topology, which limits the network performance as well. It is decisive to address the effect of interference and link reliability on the link status and path status among network nodes. Therefore; a methodology that computes the two-terminal reliability of mobile ad hoc networks by considering the effect of the link reliability and interference has been proposed. The simulation results evidently designate that the network reliability falls down by 32% with an increase in interfering nodes from a single interference node to five interfering nodes. This work also identifies the finest value for the link reliability is 0.7.

Journal ArticleDOI
TL;DR: The current research aims to study the behavior of the state-of-the-art MANET protocols with the ACO technique, a hybrid technique, integrating a reactive route maintaining technique with a proactive method regarding the quality of service (QoS) and statistical analysis.
Abstract: Research on mobile ad-hoc networks (MANETs) is increasing in popularity due to its rapid, budget-friendly, and easily altered implementation, and relevance to emergencies such as forest firefighting and health care provisioning. The main concerns that ad-hoc networks face is dynamic topology, energy usage, packet drop rate, and throughput. Routing protocol selection is a critical point to surmount alterations in topology and maintain quality in MANET networks. The effectiveness of any network can be vastly enhanced with a well-designed routing protocol. In recent decades, standard MANET protocols have not been able to keep pace with growing demands for MANET applications. The current study investigates and contrasts ant colony optimization (ACO) with various routing protocols. This paper compares ad-hoc on-demand multi-path distance vector (AOMDV), dynamic source routing protocol (DSR), ad-hoc on-demand distance vector routing (AODV), and AntHocNet protocols regarding the quality of service (QoS) and statistical analysis. The current research aims to study the behavior of the state-of-the-art MANET protocols with the ACO technique. The ACO technique is a hybrid technique, integrating a reactive route maintaining technique with a proactive method. The reason and motivation for including the ACO algorithm in the current study is to improve by using optimization algorithms proved in other domains. The ACO algorithm appears to have substantial use in large-scale MANET simulation.

Journal ArticleDOI
TL;DR: An energy aware metaheuristic optimization with location aided routing (EAMO-LAR) protocol for MANETs is introduced in this article , which makes use of manta ray foraging optimization algorithm (MRFO) to help the searching process for the individual solution to be passed to the LAR protocol.
Abstract: A mobile ad hoc network (MANET) involves a group of wireless mobile nodes which create an impermanent network with no central authority and infrastructure. The nodes in the MANET are highly mobile and it results in adequate network topology, link loss, and increase the re-initialization of the route discovery process. Route planning in MANET is a multi-hop communication process due to the restricted transmission range of the nodes. Location aided routing (LAR) is one of the effective routing protocols in MANET which suffers from the issue of high energy consumption. Though few research works have focused on resolving energy consumption problem in LAR, energy efficiency still remains a major design issue. In this aspect, this study introduces an energy aware metaheuristic optimization with LAR (EAMO-LAR) protocol for MANETs. The EAMO-LAR protocol makes use of manta ray foraging optimization algorithm (MRFO) to help the searching process for the individual solution to be passed to the LAR protocol. The fitness value of the created solutions is determined next to pass the solutions to the objective function. The MRFO algorithm is incorporated into the LAR protocol in the EAMO-LAR protocol to reduce the desired energy utilization. To ensure the improved routing efficiency of the proposed EAMO-LAR protocol, a series of simulations take place. The resultant experimental values pointed out the supreme outcome of the EAMO-LAR protocol over the recently compared methods. The resultant values demonstrated that the EAMO-LAR protocol has accomplished effectual results over the other existing techniques.

Journal ArticleDOI
TL;DR: A comprehensive study is formally introduced covering routing protocols used in flying ad hoc networks, mobility models, heuristic computations, architecture and optimization techniques for improving parameters in flyingAd hoc networks.
Abstract: Flying-Thing is a new promising area, while in last few years Unmanned Aerial Vehicles are emerged. UAVs are very efficient in completing tasks also organizing ad hoc behaviour of networks, thus making flying ad hoc networks. The formation of aerial nodes is not feasible until we use Mobility models for communication between UAV’s. Mobile ad hoc networks & wireless sensor networks are mostly static in behaviour but UAVs are dynamic and deployed in sky using mobility models. In flying ad hoc networks effective communication can be made possible using 5G networks while designing routing protocols. In this paper a comprehensive study is formally introduced covering routing protocols used in flying ad hoc networks, mobility models, heuristic computations, architecture and optimization techniques for improving parameters in flying ad hoc networks. This paper reflects and explains future challenges and help scientists, Researchers to discover more research gaps that have been discussed in the literature and need more investigation. Also, different applications of flying things can be used in IoT based forestry which includes forest mapping, management where optimal results can be obtained. The uniqueness of this research study is to provide heuristic computational algorithm called AntHocNet, Mobility models, drawbacks of traditional technologies, flying-things architecture will be the core interest of this research study.

Proceedings ArticleDOI
07 Mar 2022
TL;DR: In this paper , the authors investigated the recovery time of two routing protocols (i.e., Optimized Link State Routing (OLSR) and a Better Approach To Mobile Ad-hoc Network (BATMAN)) in an IoT-Blockchain system after a network failure happened without and with a blockchain connection.
Abstract: When deploying the IoT-Blockchain system on an infrastructure-based network (e.g., Wi-Fi), we will face the single point of failure problem (e.g., failure of an access point harm the whole system). Using ad-hoc routing protocols can avoid such a problem, and the system can recover the communication automatically if an IoT device fails. This paper investigates the recovery time of two routing protocols (i.e., Optimized Link State Routing (OLSR) and a Better Approach To Mobile Ad-hoc Network (BATMAN)) in an IoT-Blockchain system after a network failure happened without and with a blockchain connection. We have used mininet-wifi and private Ethereum blockchain to build the IoT-Blockchain, where we deployed the two routing protocols. The evaluation results show that the performance of BATMAN is better than OLSR’s. Specifically, the recovery time of BATMAN is 8.485, 7.355 seconds faster than OLSR when not having and having a blockchain connection, respectively.

Journal ArticleDOI
TL;DR: In this article , the enhanced energy efficient secure routing (EEE-SR) protocol has been proposed to access secure data in hostile environment, where the nodes associate with security policy and communicate with each other.
Abstract: Wireless networks are considered the best utilized network and in particular Mobile Ad-hoc NETworks (MANETs) have found many applications for its data transmission in real time applications. The accompanying challenges restrict the current protocols for the routing being specifically used in MANETs. The design issues in this network are to restrict the usage of energy while transmitting information and provide security to the nodes. In the existing routing protocols, route comes from a source where the source node seeks a way to the target node, by transmitting messages to its adjacent nodes, and the nodes use energy to do this. Mobile Ad-hoc network faces challenges in improving the energy efficiency and providing security for the routing protocol. This research work proposes the Enhanced Energy Efficient-Secure Routing (EEE-SR) protocol as a novel security algorithm to access secure data in hostile environment. In the proposed work, to secure data transmission in the network, the nodes associates with security policy. Under this policy, both the nodes have a common enforcing policy, and then they communicate with each other. The selection of the nodes for the transmission has to prove its authentication and then selection of the routing path built on the available energy threshold at the nodes in the set-up for forwarding packets in the network. The routing protocol implements the best shortest path in network and also checks for the nodes trustworthiness by evaluating the trust policies enforcement on it. The protocol enables a node to autonomously decide whether to select the neighboring node or based on the available energy threshold and security policy enforced. The algorithm evaluates increase network lifetime and low in the energy consumption, packet loss and end-to-end delay.

Journal ArticleDOI
TL;DR: Energy-Efficient Perspicacious Ant Colony Optimization Based Routing Protocol (EEPACORP) is proposed to determine the optimum route to transfer the data to reduce energy spent by each node for data transmission.
Abstract: – Mobile Ad-hoc Networks (MANETs) are a special kind of network that organize by itself, and they provide high-quality service despite the cost of routing. In MANET, there exist no option to reach other hosts in a single-hop where it needs multi-hop. Many intermediary hosts relay packets transmitted by the source host before reaching the destination host in a multi-hop situation. The level of energy at each node plays a significant role in MANET. Routes are frequently broken, and new routes are discovered in MANETs because of node mobility. In this paper, Energy-Efficient Perspicacious Ant Colony Optimization Based Routing Protocol (EEPACORP) is proposed to determine the optimum route to transfer the data to reduce energy spent by each node for data transmission. EEPACORP is based on the ant's inherent disposition to seek for food. EEPACORP is inspired from genetic character of ant towards finding its food. Pheromone concentration are modified in EEPACORP to find the most appropriate route. The performance of EEPACORP is analyzed in NS3 using standard network metrics. EEPACORP's studies demonstrate that it reduces delays and energy consumption better than the present routing methods.

Journal ArticleDOI
TL;DR: A new method, called TARA (Trust-Aware Reactive Ad Hoc routing), to incorporate node trusts into reactive ad hoc routing protocols, which influences the routing choice from outside by delaying the route request messages of untrusted nodes.
Abstract: In wireless ad hoc networks, security and communication challenges are frequently addressed by deploying a trust mechanism. A number of approaches for evaluating trust of ad hoc network nodes have been proposed, including the one that uses neural networks. We proposed to use packet delivery ratios as input to the neural network. In this article, we present a new method, called TARA (Trust-Aware Reactive Ad Hoc routing), to incorporate node trusts into reactive ad hoc routing protocols. The novelty of the TARA method is that it does not require changes to the routing protocol itself. Instead, it influences the routing choice from outside by delaying the route request messages of untrusted nodes. The performance of the method was evaluated on the use case of sensor nodes sending data to a sink node. The experiments showed that the method improves the packet delivery ratio in the network by about 70%. Performance analysis of the TARA method provided recommendations for its application in a particular ad hoc network.


Journal ArticleDOI
TL;DR: Evaluated topology-based routing protocols in the FANET indicate that hybrid routing protocols outperform other types of protocols in terms of average throughput and Proactive protocols have the least jitter.
Abstract: Flying Ad hoc Networks (FANETs) has developed as an innovative technology for access places without permanent infrastructure. This emerging form of networking is construct of flying nodes known as unmanned aerial vehicles (UAVs) that fly at a fast rate of speed, causing frequent changes in the network topology and connection failures. As a result, there is no dedicated FANET routing protocol that enables effective communication between these devices. The purpose of this paper is to evaluate the performance of the category of topology-based routing protocols in the FANET. In a surveillance system involving video traffic, four routing protocols with varying routing mechanisms were examined. Additionally, simulation experiments conducted to determine the influence of flying altitude. The results indicate that hybrid routing protocols outperform other types of protocols in terms of average throughput. Proactive protocols, on the other hand, have the least jitter.

Journal ArticleDOI
TL;DR: The performance of AODV in a linear wireless ad hoc network using different values of NTT using as well as without using Hello messages is investigated, it is observed that choice of value of N TT has a significant effect on establishment of route(s) between source node and destination node that eventually affects the performance of the linear Wireless Ad Hoc network under consideration.
Abstract: Wireless Ad Hoc Networks (WANETs) are predicted to be prevalent networks in coming future because of their infrastructure-less characteristics that result in self-organization, self-healing, and self-configuration of such networks. Routing means the process of selecting a path along which data can be transferred from source to destination that plays a significant role in the performance of ad hoc networks. There are many routing protocols developed for wireless ad hoc networks. One of such protocols, developed by C. E. Perkins, is Ad Hoc On-demand Distance Vector (AODV) routing protocol, which is a reactive routing protocol, AODV is used to establish route(s) between source node(s) and destination node(s) as and when routes are required. Performance of AODV routing protocol depends heavily on choice of values of a set of predefined attributes. One of such attributes of AODV is Node Traversal Time (NTT) which is supposed to play significant role in establishing route(s) between source node(s) and destination node(s). In this paper, we have investigated the performance of AODV in a linear wireless ad hoc network using different values of NTT using as well as without using Hello messages. The performance of the network has been measured using several metrics like Route Error Overhead, Routing Overhead, Normalized Routing Load, Average Hop Count, Total Number of Received Data Packets, Packet Delivery Ratio, Average End-to-End Delay and Throughput. It is observed that choice of value of NTT has a significant effect on establishment of route(s) between source node(s) and destination node(s) that eventually affects the performance of the linear wireless ad hoc network under consideration. The insights gained through this work could be useful in analysis of more realistic and complex networks.

Book ChapterDOI
01 Jan 2022
TL;DR: In this article, the authors analyzed and compared a simulation result of the impact of data flooding, link spoofing and Replay attacks with Optimized Link State Routing Protocol (OLSR) and DATA Flooding, RREQ Flooding and HELLO Flooding attacks with Ad hoc On-Demand Distance Vector (AODV) routing protocol (RFC 3561) on using ns-3 simulator.
Abstract: Amid the most recent decade, a few research endeavors have explored developing Internet of Things (IoT) and Mobile Ad hoc Networks (MANETs) application situations in a new concept called IoT-MANETs. One of the constraints of these applications is the security of the communication between the nodes. In this article, we analyze and compare a simulation result of the impact of DATA Flooding, Link-spoofing and Replay attacks with Optimized Link State Routing Protocol (OLSR) routing protocol (RFC 3626) and DATA Flooding, RREQ Flooding and HELLO Flooding attacks with Ad hoc On-Demand Distance Vector (AODV) routing protocol (RFC 3561) on using ns-3 simulator. In this comparison, we took into consideration the density of the network by the number of nodes included in the network, the speed of the nodes, the mobility model, and even, we chose the IEEE 802.11ac wireless local-area network (WLAN) standard for the MAC layer, in order to have a simulation, which deals with more general and more real scenarios.