Recent Patents on Engineering

Author(s): S. Mahima* and N. Rajendran

DOI: 10.2174/1872212114666200117105819

An Efficient Cluster-based Flooding Using Fuzzy Logic Scheme (CBF2S) In Mobile Adhoc Networks

Page: [376 - 387] Pages: 12

  • * (Excluding Mailing and Handling)

Abstract

Aims and Objectives: Mobile Ad hoc Networks (MANET) hold a set of numerous mobile computing devices useful for communication with one another with no centralized control. Due to the inherent features of MANET such as dynamic topology, constrained on bandwidth, energy and computing resources, there is a need to design the routing protocols efficiently. Flooding is a directive for managing traffic since it makes use of only chosen nodes for transmitting data from one node to another. This paper intends to develop a new Cluster-Based Flooding using the Fuzzy Logic Scheme (CBF2S).

Methods: To construct clusters and choose proper cluster heads (CHs), the fuzzy logic approach is applied with the use of three parameters namely link quality, node mobility, and node degree. The presented model considerably minimizes the number of retransmissions in the network.

Results: The presented model instructs the cluster members (CM) to flood the packets inside a cluster which is known as intra-cluster flooding and CHs to flood the packets among the clusters which is known as inter-cluster flooding. In addition, the gateway sends a packet to another gateway for minimizing unwanted data retransmissions when it comes under different CH. The presented CBF2S is simulated using the NS2 tool under the presence of varying hop count.

Conclusion: The CBF2S model exhibits maximum results over the other methods in terms of overhead, communication overhead, traffic load, packet delivery ratio, and the end to end delay.

Keywords: MANET, flooding, clustering, fuzzy logic, mobility, CBF2S.

Graphical Abstract

[1]
Y-B. Ko, and N. Vaidya, "Flooding-based geocasting protocols for mobile ad hoc networks", Mob. Netw. Appl., vol. 7, no. 6, pp. 471-480, 2002.
[http://dx.doi.org/10.1023/A:1020712802004]
[2]
C. Ho, K. Obraczka, G. Tsudik, and K. Viswanath, "Flooding for reliable multicast in multi-hop ad hoc networks", In 3rd Intl. workshop on Discrete Algorithms and Methods for Mobile Computing and Communications (DIAL-M’99), , 1999pp. 64-71
[http://dx.doi.org/10.1145/313239.313291]
[3]
C. Perkins, and E. Royer, "Ad-Hoc On Demand Distance Vector Routing", Proceedings of the IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), Feb, , 1999
[http://dx.doi.org/10.1109/MCSA.1999.749281]
[4]
S-Y. Ni, Y-C. Tseng, Y-S. Chen, and J-P. Sheu, The broadcast storm problem in a mobile ad hoc networkProc. of the 5th ACM/IEEE Int. Conference on Mobile Computing and Networking (MobiCom ’99), New York, NY, USA, 1999, pp. 151-162.
[http://dx.doi.org/10.1145/313451.313525]
[5]
M. Elhoseny, and K. Shankar, "Reliable data transmission model for mobile ad hoc network using signcryption tech-nique", IEEE Trans. Reliab., 2019.
[http://dx.doi.org/10.1109/TR.2019.2915800]
[6]
W. Peng, and X-C. Lu, "On the reduction of broadcast redun-dancy in mobile ad hoc networks", Proc. of the 1st ACM Int. Symposium on Mobile Ad Hoc Networking & Computing (Mo-biHoc’00), Piscataway, NJ, USA, , 2000pp. 129-130
[7]
Q. Zhang, and D.P. Agrawal, "Dynamic probabilistic broadcasting in manets", J. Parallel Distrib. Comput., vol. 65, no. 2, pp. 220-233, 2005.
[http://dx.doi.org/10.1016/j.jpdc.2004.09.006]
[8]
C.C. Chou, D.S. Wei, C.C.J. Kuo, and K. Naik, "An efficient anonymous communication protocol for peer-to-peer applications over mobile ad-hoc networks", IEEE J. Sel. Areas Comm., vol. 25, no. 1, pp. 192-203, 2007.
[http://dx.doi.org/10.1109/JSAC.2007.070119]
[9]
S. Y. Han and D. Lee, "An adaptive hello messaging scheme for neighbour discovery in on-demand MANET routing protocols", IEEE Commun. Lett., vol. 17, no. 5, pp. 1040-1043, 2013.
[http://dx.doi.org/10.1109/LCOMM.2013.040213.130076]
[10]
A.M.E. Ejmaa, S. Subramaniam, and Z.A. Zukarnain, "Neighbor-based Dynamic Connectivity Factor Routing Protocol for Mobile Ad Hoc Network", IEEE Access, vol. 4, no. 1, pp. 8053-8064, 2016.
[http://dx.doi.org/10.1109/ACCESS.2016.2623238]
[11]
A. Taha, R. Alsaqour, M. Uddin, M. Abdelhaq, and T. Saba, "Energy Efficient Multipath Routing Protocol for Mobile Ad-Hoc Network Using the Fitness Function", IEEE Access, vol. 5, no. 1, pp. 10369-10381, 2017.
[http://dx.doi.org/10.1109/ACCESS.2017.2707537]
[12]
F. Bai, N. Sadagopan, B. Krishnamachari, and A. Helmy, "Modeling path duration distributions in MANETs and their impact on reactive routing protocols", IEEE J. Sel. Areas Comm., vol. 22, no. 7, pp. 1357-1373, 2004.
[http://dx.doi.org/10.1109/JSAC.2004.829353]
[13]
S.R. Valayapalayam Kittusamy, M. Elhoseny, and S. Kathiresan, "An enhanced whale optimization algorithm for vehicular communication networks", Int. J. Commun. Syst., vol. 2019, .. e3953
[http://dx.doi.org/10.1002/dac.3953]
[14]
S. Famila, A. Jawahar, A. Sariga, and K. Shankar, "Improved artificial bee colony optimization based clustering algorithm for SMART sensor environments", Peer-to-Peer Netw. Appl., vol. 2019, pp. 1-9, 2019.
[http://dx.doi.org/10.1007/s12083-019-00805-4]
[15]
Y.H. Chen, E.H.K. Wu, and G.H. Chen, "Bandwidth-Satisfied Multicast by Multiple Trees and Network Coding in Lossy MANETs", IEEE Syst. J., vol. 11, no. 2, pp. 1116-1127, 2017.
[http://dx.doi.org/10.1109/JSYST.2015.2406756]
[16]
K. Shankar, and M. Elhoseny, Optimal Lightweight Encryp-tion Based Secret Share Creation Scheme for Digital Images in Wireless Sensor Networks.Secure Image Transmission in Wireless Sensor Network (WSN) Applications., Springer: Cham, 2019, pp. 115-129.
[http://dx.doi.org/10.1007/978-3-030-20816-5_8]
[17]
D. JinilPersis and T. Paul Robert, "Review of ad-hoc on-demand distance vector protocol and its swarm intelligent variants for Mobile Ad-hoc NETwork", IET Networks, vol. 6, no. 5, pp. 87-93, 2017.
[http://dx.doi.org/10.1049/iet-net.2017.001]]
[18]
N. Meghanathan, "A location prediction-based reactive rout-ing protocol to minimize the number of route discoveries and hop count per path in mobile ad hoc networks", Comput. J., vol. 52, no. 4, pp. 461-482, 2009.
[http://dx.doi.org/10.1093/comjnl/bxn051]
[19]
Shankar, K., and Mohamed Elhoseny. “An optimal light weight cryptography—simon block cipher for secure im-age transmission in wireless sensor networks. Secure Image Transmission in Wireless Sensor Network (WSN) Applications., Springer: Cham, 2019, pp. 17-32.
[20]
L. Chen, A. Ben Mnaouer, and C.H. Foh, "OPHMR: An opti-mized polymorphic hybrid multicast routing protocol (OPHMR) for Ad Hoc networks", IEEE Int. Conf. Commun,, vol. vol. 8, , 2006pp. 3572-3577
[http://dx.doi.org/10.1109/ICC.2006.255626]
[21]
H. Oh, "A Tree-Based Approach for the Internet Connectivity of Mobile Ad Hoc Networks", J. Commun. Netw. (Seoul), vol. 11, no. 3, pp. 261-270, 2009.
[http://dx.doi.org/10.1109/JCN.2009.6391330]
[22]
G. Varaprasad, "S. HosahalliNarayanagowda, and Shivashan-kar, “Implementing a new power aware routing algorithm based on existing dynamic source routing protocol for mobile ad hoc networks", IET Networks, vol. 3, no. 2, pp. 137-142, 2014.
[http://dx.doi.org/10.1049/iet-net.2013.0050]
[23]
S. Surendran, and S. Prakash, "An ACO Look- A head Ap-proach to Q O S Enabled Fault- Tolerant Routing in MA-NETs", China Commun., vol. 18, no. August, pp. 93-110, 2015.
[http://dx.doi.org/10.1109/CC.2015.7224693]
[24]
H. Zhang, X. Wang, P. Memarmoshrefi, and D. Hogrefe, "A survey of ant colony optimization based routing protocols for mobile ad hoc networks", 2013 Int. Conf. Comput. Inf. Sci. ICCIS 2013, vol. vol. 5, 2013pp. 1595-1598
[25]
M.U. Rahman, "Simulation-based analysis of MANET routing Protocols using Group Mobility Model", 2016 Int. Conf. In-ven Comput. Technol., vol. vol. 1, 2016pp. 20-32
[http://dx.doi.org/10.1109/INVENTIVE.2016.7823290]
[26]
N.S. Samaras, "Using Basic MANET Routing Algorithms for Data Dissemination in Vehicular Ad Hoc Networks (VANETs)", 26th Telecommun. Forum TELFOR 2016, vol. 1, , 2016no. 1, pp. 0-3
[http://dx.doi.org/10.1109/TELFOR.2016.7818741]
[27]
S. Arjunan, S. Pothula, and D. Ponnurangam, "F5N-based unequal clustering protocol (F5NUCP) for wireless sensor networks", Int. J. Commun. Syst., vol. 31, no. 17, 2018.e3811
[http://dx.doi.org/10.1002/dac.3811]