IJCNIS Vol. 14, No. 3, 8 Jun. 2022
Cover page and Table of Contents: PDF (size: 464KB)
Full Text (PDF, 464KB), PP.88-99
Views: 0 Downloads: 0
Coral Reef Optimization, Cluster Head Selection, Mobile Ad-hoc Network, Optimal Multipath Scheme, Secret Message
Mobile Ad-hoc Network (MANET) data transfer between nodes in a multi-hop way offers a wide variety of applications. The dynamic feature of ad hoc network mobile nodes is primarily influenced by safety issues, which limit data forwarding rate in multipath routing. As a supplementary method to improve safe data delivery in a MANET, this paper propose and analyse the cluster head (CH) selection and optimum multipath scheme. The CHs are chosen based on the possibility values of each node in MANET, which are considered from the residual energy of each node. During the present phase, the total remaining node energy is used to calculate the mean energy of the entire network. The most likely nodes are picked as the CH, which gathers packets from the cluster members through multi-hop communication. The fundamental idea is to partition a top-secret communication into several shares and then forward the shares via numerous routes to the destination. The Coral Reef Optimization method is used in this work to perform optimum multipath routing. The thorough simulation findings validate the feasibility and efficacy of the suggested strategy in comparison to Butterfly optimization algorithm (BA), Whale Optimization algorithm (WOA) and BAT algorithm techniques.
S.Venkatasubramanian, A. Suhasini, C.Vennila, "Cluster Head Selection and Optimal Multipath detection using Coral Reef Optimization in MANET Environment", International Journal of Computer Network and Information Security(IJCNIS), Vol.14, No.3, pp.88-99, 2022. DOI:10.5815/ijcnis.2022.03.07
[1]Kant, L., Young, K., Younis, O., Shallcross, D., Sinkar, K., Mcauley, A., et al. (2008). Network science based approaches to design and analyze MANETs for military applications. IEEE Communications Magazine, 46(11), 55–61.
[2]Boukerche, A., Zarrad, A., & Araujo, R. (2010). A cross-layer approach-based Gnutella for collaborative virtual environments over mobile ad hoc networks. IEEE Transactions on Parallel and Distributed Systems, 21(7), 911–924.
[3]Mahantesh G. Kambalimath, Mahabaleshwar S. Kakkasageri, "Dynamic Resource Discovery Scheme for Vehicular Cloud Networks", International Journal of Information Technology and Computer Science, Vol.11, No.12, pp.38-49, 2019.
[4]Tseng, Y.-C., Shen, C.-C., & Chen, W.-T. (2003). Integrating mobile IP with ad hoc networks. Computer, 36(5), 48–55.
[5]Khalid, A., Ahn, H., & Kim, C. (2016). Reliable and efficient multi-rate aware reactive (REMAR) routing for IEEE 802.11 based MANET. In 2016 international conference on information networking (ICOIN).
[6]Young, W., Remley, K., Holloway, C., Koepke, G., Camell, D., Ladbury, J., et al. (2014). Radiowave propagation in urban environments with application to public-safety communications. IEEE Antennas and Propagation Magazine, 56(4), 88–107.
[7]Maison, R., Steen, D., Zakrzewicz, M., & Biniek, Z. (2011). Monitoring high performance data streams in vertical markets: Theory and applications in public safety and healthcare. Bell Labs Technical Journal, 16(3), 163–179.
[8]Clausen, T., Dearlove, C., & Jacquet, P. (2014). The optimized link state routing protocol, version 2, IETF RFC7181 (pp. 1–115).
[9]Karthigha, M., Latha, L. and Sripriyan, K., 2020, February. A comprehensive survey of routing attacks in wireless mobile ad hoc networks. In 2020 International Conference on Inventive Computation Technologies (ICICT) (pp. 396-402). IEEE.
[10]Liu, G., Yan, Z. and Pedrycz, W., 2018. Data collection for attack detection and security measurement in mobile ad hoc networks: A survey. Journal of Network and Computer Applications, 105, pp.105-122.
[11]Abbas, A. (2010). Analysis of multiple attempt multipath routing for mobile ad hoc networks. International Journal of Ad Hoc and Ubiquitous Computing, 5(3), 163.
[12]Sarma, H.K.D., 2018, December. Secure Multimedia Communication over Mobile Ad-hoc Networks. In 2018 Fifth International Conference on Parallel, Distributed and Grid Computing (PDGC) (pp. 812-817). IEEE.
[13]Wang, H.M., Zhang, Y., Ng, D.W.K. and Lee, M.H., 2018. Secure routing with power optimization for ad-hoc networks. IEEE Transactions on Communications, 66(10), pp.4666-4679.
[14]Kushwah, V. and Bhatnagar, S., Modified Trust Mechanism for detection and prevention of DDoS Attack under MANET Scenario, 2018.
[15]Anzani, M., Javadi, H.H.S. and Modirir, V., 2018. Key-management scheme for wireless sensor networks based on merging blocks of symmetric design. Wireless Networks, 24(8), pp.2867-2879.
[16]Modiri, V., Javadi, H.H.S. and Anzani, M., 2017. A novel scalable key pre-distribution scheme for wireless sensor networks based on residual design. Wireless Personal Communications, 96(2), pp.2821-2841.
[17]Dongjin Park, Taeho Cho,"A Fuzzy Rule-based Key Re-Distribution Decision Scheme of Dynamic Filtering for Energy Saving in Wireless Sensor Networks", International Journal of Information Technology and Computer Science, Vol.9, No.4, pp.1-8, 2017.
[18]Zhang, H., Wang, X., Memarmoshrefi, P. and Hogrefe, D., 2017. A survey of ant colony optimization based routing protocols for mobile ad hoc networks. IEEE access, 5, pp.24139-24161.
[19]Saidu M, Onwuka EN, Okwori M, Umar A. An enhanced leach routing algorithm for energy conservation in a wireless sensor network. International Journal of Wireless and Microwave Technologies. 2016 Jul;6(4):59-71..
[20]Fu, C., Kezmane, T., Du, X., Fu, Y. and Morrisseau, C., 2018, March. An location-aware authentication scheme for cross-domain internet of thing systems. In 2018 International Conference on Computing, Networking and Communications (ICNC) (pp. 452-456). IEEE.
[21]Mahadev A. Gawas, Lucy J. Gudino, K. R Anupama, "Congestion-Adaptive and Delay-Sensitive Multirate Routing Protocol in MANETs: A CrossLayer Approach", Journal of Computer Networks and Communications, vol. 2019, Article ID 6826984, 13 pages, 2019.
[22]Sumet Prabhavat, Worrawat Narongkhachavana, Thananop Thongthavorn, Chanakan Phankaew, "Low Overhead Localized Routing in Mobile Ad Hoc Networks", Wireless Communications and Mobile Computing, vol. 2019, Article ID 9652481, 15 pages, 2019.
[23]S.Venkatasubramanian, et.all, "An Energy Efficient Clustering Algorithm in Mobile Adhoc Network Using Ticket Id Based Clustering Manager", International Journal of computer science and Network security(IJCSNS), pp. 341-349, Vol. 21, Issue. 7, 2021
[24]A. H. Mohsin, K. A. Bakar, and A. Zainal, “Optimal control overhead based multi-metric routing for MANET,” Wireless Networks, vol. 24, no. 6, pp. 2319–2335, 2018.
[25]Seyedakbar Mostafavi, Vesal Hakami, and Fahimeh Paydar. 2020. A QoS-Assured and Mobility-Aware Routing Protocol for MANETs. JOIV : International Journal on Informatics Visualization 4 (02 2020).
[26]S. Salma, I. Abdel-Fatah, and A. Mohamed. 2020. Performance evaluation of MANET routing protocols based on QoS and energy parameters. International Journal of Electrical and Computer Engineering (IJECE) 10 (08 2020), 3635 3642.
[27]Rao, D.S. and Rao, P.N. (2016) ‘A cluster based scalable and energy efficient multi path routing protocol for MANET’, International Journal of Engineering Science, Vol. 6, No. 3, pp.3093–3099.
[28]S.-J. Lee and M. Gerla, Split multipath routing with maximally disjoint paths in ad hoc networks, in: ICC’01.
[29]M.R. Pearlman, Z.J. Haas, P. Sholander and S.S. Tabrizi, On the impact of alternate path routing for load balancing in mobile ad hoc networks, in: MobiHOC (2000)
[30]K. Wu and J. Harms, Performance study of a multipath routing method for wireless mobile ad hoc networks, in: 9th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication System (2001).
[31]Venkatasubramanian, S., Suhasini, A. & Vennila, C. An Efficient Route Optimization Using Ticket-ID Based Routing Management System (T-ID BRM). Wireless Pers Commun (2021). https://doi.org/10.1007/s11277-021-08731-6