Selfish Scheduler for Packet Scheduling Based on Packet Weighted Energy Drain Rate in Manets

Similar documents
Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks

Impulse Radio Ultra Wide Band Based Mobile Adhoc Network Routing Performance Analysis

Measure of Impact of Node Misbehavior in Ad Hoc Routing: A Comparative Approach

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH

Mobility and Density Aware AODV Protocol Extension for Mobile Adhoc Networks-MADA-AODV

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes

Performance Analysis of Three Routing Protocols for Varying MANET Size

Security Scheme for Distributed DoS in Mobile Ad Hoc Networks

Gateway Discovery Approaches Implementation and Performance Analysis in the Integrated Mobile Ad Hoc Network (MANET)-Internet Scenario

IMPACT OF MOBILITY SPEED ON PROACTIVE AND REACTIVE ROUTING PROTOCOLS IN MOBILE ADHOC NETWORKS

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Dynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet

A Comparative Analysis of Energy Preservation Performance Metric for ERAODV, RAODV, AODV and DSDV Routing Protocols in MANET

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Secure Routing and Transmission Protocols for Ad Hoc Networks

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

Performance Evaluation of MANET through NS2 Simulation

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

Performance Analysis and Enhancement of Routing Protocol in Manet

Performance Analysis of Aodv Protocol under Black Hole Attack

Considerable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network)

The Impact of Transmission Power on the Performance of MANET Routing Protocols

Comparing the Impact of Black Hole and Gray Hole Attacks in Mobile Adhoc Networks

AODV-PA: AODV with Path Accumulation

SEAR: SECURED ENERGY-AWARE ROUTING WITH TRUSTED PAYMENT MODEL FOR WIRELESS NETWORKS

Performance Analysis of AODV Routing Protocol with and without Malicious Attack in Mobile Adhoc Networks

Chapter 7 CONCLUSION

A New Energy-Aware Routing Protocol for. Improving Path Stability in Ad-hoc Networks

Regression-based Link Failure Prediction with Fuzzy-based Hybrid Blackhole/Grayhole Attack Detection Technique

A Highly Effective and Efficient Route Discovery & Maintenance in DSR

Probabilistic Mechanism to Avoid Broadcast Storm Problem in MANETS

Security Enhancement of AODV Protocol for Mobile Ad hoc Network

Simulation Based Performance Analysis of Routing Protocols Using Random Waypoint Mobility Model in Mobile Ad Hoc Network

IJESRT. [Dahiya, 2(5): May, 2013] ISSN: Keywords: AODV, DSDV, Wireless network, NS-2.

Security Scheme for Malicious Node Detection in Mobile Ad Hoc Networks

A Study on the Behaviour of SAODV with TCP and SCTP Protocols in Mobile Adhoc Networks

Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks

Efficient On-Demand Routing for Mobile Ad-Hoc Wireless Access Networks

Performance Comparison of Ad Hoc Routing Protocols over IEEE DCF and TDMA MAC Layer Protocols

A Graph-based Approach to Compute Multiple Paths in Mobile Ad Hoc Networks

A Literature survey on Improving AODV protocol through cross layer design in MANET

Performance Comparison of MANETs Routing Protocols for Dense and Sparse Topology

An Extensive Simulation Analysis of AODV Protocol with IEEE MAC for Chain Topology in MANET

Prevention of Black Hole Attack in AODV Routing Algorithm of MANET Using Trust Based Computing

COMPARATIVE ANALYSIS AND STUDY OF DIFFERENT QOS PARAMETERS OF WIRELESS AD-HOC NETWORK

High Efficient Broadcasting Protocols for Mobile ADHOC Network

Mitigating Superfluous Flooding of Control Packets MANET

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

Power aware Multi-path Routing Protocol for MANETS

Performance Evaluation of Routing Protocols for MAC Layer Models

ENERGY EFFICIENT MULTIPATH ROUTING FOR MOBILE AD HOC NETWORKS

Shortcut Tree Routing using Neighbor Table in ZigBee Wireless Networks

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.

A Survey - Energy Efficient Routing Protocols in MANET

[Nitnaware *, 5(11): November 2018] ISSN DOI /zenodo Impact Factor

Performance Analysis of MANET Using Efficient Power Aware Routing Protocol (EPAR)

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)

Performance of Routing Protocols in Very Large-Scale Mobile Wireless Ad Hoc Networks

A Test-Bed for Power Consumption Performance Evaluation of AODV and DSDV Routing Protocols in Mobile Ad-hoc Networks

Varying Overhead Ad Hoc on Demand Vector Routing in Highly Mobile Ad Hoc Network

Design and Implementation of a Simulator for Ad Hoc Network Routing Protocols

Effect of Variable Bit Rate Traffic Models on the Energy Consumption in MANET Routing Protocols

Effects of Sensor Nodes Mobility on Routing Energy Consumption Level and Performance of Wireless Sensor Networks

A Distributed Security Scheme for Ad Hoc Networks

Improved Local Route Repair And Congestion Control In Self Organizing Networks

Control Traffic Analysis of On-Demand Routing Protocol. in Mobile Ad-hoc Networks

ComparisonofPacketDeliveryforblackholeattackinadhocnetwork. Comparison of Packet Delivery for Black Hole Attack in ad hoc Network

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

Performance Evaluation of Various Routing Protocols in MANET

A Performance Comparison of MDSDV with AODV and DSDV Routing Protocols

Performance evaluation of AODV, DSR and DSDV in mobile ad-hoc network using NS-2

Performance Analysis of DSR Routing Protocol With and Without the Presence of Various Attacks in MANET

Implementation of AODV Protocol and Detection of Malicious Nodes in MANETs

Evaluation of Routing Protocols for Mobile Ad hoc Networks

Performance Comparison of DSDV, AODV, DSR, Routing protocols for MANETs

Blackhole Attack Detection in Wireless Sensor Networks Using Support Vector Machine

[Kamboj* et al., 5(9): September, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116

Performance Comparison of Two On-demand Routing Protocols for Ad-hoc Networks based on Random Way Point Mobility Model

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Implementation: Detection of Blackhole Mechanism on MANET

Analytical Impact of Reputation based scheme on DSR protocol for Evaluation of MANETs

Study of Route Reconstruction Mechanism in DSDV Based Routing Protocols

PERFORMANCE BASED EVALUATION OF DSDV, AODV AND DSR ROUTING PROTOCOLS IN MANET

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

A Simulation study : Performance comparison of AODV and DSR

ROUTE STABILITY MODEL FOR DSR IN WIRELESS ADHOC NETWORKS

Performance Comparison of AODV, DSDV and I-DSDV Routing Protocols in Mobile Ad Hoc Networks

A Comparative Analysis of Traffic Flows for AODV and DSDV Protocols in Manet

Delayed ACK Approach for TCP Performance Improvement for Ad Hoc Networks Using Chain Topology

PERFORMANCE BASED EVALUATION OF DSDV, AODV AND DSR ROUTING PROTOCOLS IN MANET

Qos Parameters Estimation in MANET Using Position Based Opportunistic Routing Protocol

Routing Protocols in MANETs

Impact of Hello Interval on Performance of AODV Protocol

Exploring the Behavior of Mobile Ad Hoc Network Routing Protocols with Reference to Speed and Terrain Range

A Performance Comparison of Routing Protocols for Ad Hoc Networks

Distributed Clusterhead Architecture for Mobile Ad Hoc Networks

Qos-Aware Routing Based on Bandwidth Estimation for Mobile Ad Hoc Networks

Figure 1. Clustering in MANET.

Routing Protocols in MANET: Comparative Study

Transcription:

Journal of Computer Science, 9 (1): 37-42, 2013 ISSN 1549-3636 2013 Lakshmi and Radha, This open access article is distributed under a Creative Commons Attribution (CC-BY) 3.0 license doi:10.3844/jcssp.2013.37.42 Published Online 9 (1) 2013 (http://www.thescipub.com/jcs.toc) Selfish Scheduler for Packet Scheduling Based on Packet Weighted Energy Drain Rate in Manets 1 S. Lakshmi and 2 S. Radha 1 Department of ECE, Sathyabama University, Chennai, India 2 Department of ECE, SSN College of Engineering, Chennai, India Received 2012-10-10, Revised 2012-12-07; Accepted 2013-02-06 ABSTRACT The aim of our selfish scheduler based on packet weighted energy drain rate in Mobile ad-hoc networks mainly depends on the available least highest-limit of the residual value of a mobile node. The projected work comprises of mechanisms for detecting the selfish node as well as an attitude called rehabilitatebefore-malicious behavior for justifying against the malicious behavior of nodes having selfishness. It provides an immediate solution for separating the selfish nodes based on the parameter namely the packet weighted energy drain rate. If PWEDRSS is deployed in an ad hoc environment it not only provides an energetic and immediate solution to become aware of malicious nodes but also can detect selfish nodes which may be fruitless due the deficient energy available, since the restricted battery power is one of the main constraint for all the mobile nodes. The effective and well-organized performances of the projected work are done through ns-2 simulations. The parameters used are the Packet delivery ratio, Throughput, Control overhead, Total overhead and End to end delay. These parameters are computed based upon varying the number of nodes. The outcome forecast that the planned mechanism performs well. Keywords: Ad Hoc Networks, Selfishness, Reliability, Energy Drain Rate 1. INTRODUCTION (Anuradha et al., 2009). The word Packet Weighted in our scheduler scheme infer the suggestion about the Mobile ad hoc networks avails a collective and consumption of energy, which is directly proportional to limited wireless medium which is employed by all the the number of packets that are onward by an individual wireless nodes in the network providing efficient and node. The scheduler considered is mostly used in the effective control over this wireless medium is always context of the selfish nodes, which refers to a mobile significant. Several resource allocation attitudes have node that drops the packet that approach from other been contributed for achieving this task (Perkins et al., mobile nodes that drops the packets of its own node 2002). Although there are several such a resource (Papadimitratos and Haas, 2002; Ghorpade et al., scheduling algorithm, one of the packet scheduling 2008). When we consider the routing of packet strategy which considers the bandwidth for packet relay through Ad hoc On-Demand Distance Vector through multiple lines are projected (Broch et al., 1998). (AODV) routing protocol, the selfish node could The above stated solutions primarily targets on get rid show any one of the subsequent possible actions in of the problems that could occur with multiple sessions Ad hoc network (Chen and Nahrstedt, 2004). while sharing a common wireless links (Das et al., The consistency of the MANETs communication 2000). Our Planned mechanism takes into account generally depends upon the implied trust between the about the subjects that are distinct to MANET s nodes clearly trust in the sense refers to the full support namely dynamic topology and multihop environment which is create between nodes of the network so as to Corresponding Author: S. Lakshmi, Department of ECE, Sathyabama University, Chennai, India 37

ensure correct routing establishment techniques, through which the construction of routing information could be provided (Papadimitratos and Haas, 2002). But this kind of trust may be demoralized by adversary nodes that carry out security violated through attack nodes thus securing MANETs against MAC layer misbehavior has to be dealt and restrained. 2. MATERIALS AND METHODS 2.1. Packet Weighted Energy Drain Rate Based Selfish Scheduler In our projected work, the main focus is on the reactive routing based protocols in which the route discovery is executed only when a node wants to establish a connection to transmit a data to another node. The routing protocol used for our study is the AODV, an on demand routing protocol. If the source needs to communicate to a destination node, it generates data packets and transmits them through the Network layer, if there is no possible route from the source to the destination and then it initiates a route discovery process. We take into consideration that communication time is known. A node accepts to communicate the packet as shown in Fig. 1 only if it has at least Maximum-limit of Residual value. Algorithm 1: Choosing an Intermediate Node as Selfish Node: 1. A Neighbor Node M receives a RREQ from source; 2. If session_life_time is implied in RREQ then 3. Check 4. If NE i > (PSWEDR *session_life_time) then 5. Update life-duration field of RREQ. 6. Enable the communication and RREQ route to the Neighbor 7. Else 8. Disable the communication and drop the RREQs. 9. End if 10. Else 11. If NE i > MAX-LIMIT-RESIDUAL_VALUE then 12. Trigger the M/m/n queue to schedule the packets. 13. Else 14. Presence of selfish node. 15. Trigger the M/m/1 queue to schedule the packets. 16. End if 17. End if 2.2. Packet Weighted Energy Drain Rate Computation Packet Weighted Energy Drain Rate (PWEDR) is calculated as the difference between the product of number of packets and the energy E a of the node and the product of number of packets and the energy E b of the node between a session divided by time interval Equation 1: PWEDR E P * Engy t a a b b ( a b) = b P * Engy t a (1) When Engy a and Engy b are namely the nodes energy at t a and t b respectively. The PWEDR is averaged based on exponential averaging with α = 0.75. To manipulate the Average Packet Weighted Energy Drain Rate (APWEDR) we use the formula Equation 2: } =α ( ) + ( α) APWEDR * PWEDR t 1 ( )( a b) *PWEDR t 1 E (2) At the end, when the RREQ packet reaches the destination, it chooses a route that would maximize the life-time of the route by opting the one with maximum life-time of the node. Algorithm 2: Topology Maintenance by Rehabilitate-Before-Malicious Behaviour at Node N: 1. Compute PWEDR periodically and check NE i 2. If NE i <MIN-LIMIT-RESIDUAL_VALUE then 3. Check 4. If N==Non-Selfish node 5. Then 6. Relay the data packets to all the sources through node N 7. End if 8. If N==Destination 9. Terminate the data replay by sending OCR to all sources that they are be in contact with the destination 10. End if 11. End if The second Algorithm helps the protocol to route the packet and to rehabilitate quickly to link breakage due to presence of non-co-operating nodes when the energy of a node is fully drained i.e., when the current energy of the node goes below a minimum limit of residual value. The routing protocol reacts to this event and its feature depends in whether the node is a selfish node or a Destination Node. If the node is a selfish node, it sends Optimal Change Request (OCR) packets to all the source nodes through the neighbor s hops towards their respective destinations. 38

Fig. 1. Selfish sheduler scheme based on packet weighted energy drain rate Table 1. Simulation parameters Parameter Value Description Number of mobile nodes in the terrain 50 Nodes 50 nodes are placed in the network Channel type required Wireless ad-hoc channel type Channel type Propagation type Two Ray ground model The radio propagation model Network interface type Phy/WirelessPhy type Network interface type Interface queue type M/M/1 and M/M/n Interface queue model Antenna type Omni-directional antenna Antenna model Protocol type AODV Ad-hoc on demand distance vector Simulation time 50secs Maximum simulation time Size of the packet 512bytes Variable data packet size Dimensions of the terrain 1000m 1000m X and Y dimensions of the motion The source node on receiving the OCR packet, Originates a new route discovery process for the communication session and hence with high chance obtains a fresh route before an actual link break occurs on the established original route. This could make the packet drops and increase the delay in time and hence enables the protocol to enhance rapidly to the network topology changes, if an alternate route to the desired destination exists. If the node being drained is a destination node, then it sends a request the source to stop all data routing to itself. When the request reaches the source, further replay of the data are prohibited. This may reduce the number of packet to be lost in the network and thus reduces packet delivery ratio and reduces resource usage by avoiding packet transmissions to unavailable destinations. 39 3. RESULTS The Network Simulator intialisation is specified in Table 1. used for our study is ns-2.in our simulation 50 mobile nodes were placed randomly in a terrain area 1000 1000 m.2 Mb/s is the wireless channel capacity used in our simulations. Each of the simulations is run for 50 sec. The Packet Weighted based Energy drain rate scheduling scheme are applied by varying the number of mobile nodes and the packet size. The proposed methodology is compared with the selfish aware queue scheduler. For each and every node a Constant Bit Rate (CBR) source has been utilized. A node transmits varying number of packet size. The random way model is used for simulation. The maximum allowed speed for

a node is 10 m sec 1. The following performance metrics are used to compare the two scheduling algorithm are the packet delivery ratio, control overhead, total overhead, End-End delay and through put. 3.1. Performance Metrics For performance estimation of this scheme the succeeding metrics are used. 3.2. Packet Delivery Ratio Packet delivery ratio is the relation of the total number of data packets sent to the receivers to the total number of data packets received by the receivers. 3.3. Control Overhead Control overhead is the relation of the total number of the control packets transmitted by the sender to the number of data packets delivered to the receivers. 3.4. Total Overhead Total overhead can be defined as the total number of data packets and control packets transmitted to the total number of the data packets delivered. 3.5. Throughput It may be defined as one of the dimensional parameter which represents the fraction of channel capacity utilized for reliable transfer of data from the source node to the destination nodes. 3.6. End to End delay It may be defined as the time gap between the times of packet origin to the time upto the last bit arrival of the packet to the target. 3.7. Performance Evaluation of SSQM 3.7.1. Packet Delivery Ratio Figure 2 shows the comparison chart between the Packet delivery ratio and the number of mobile nodes for two strategies, they are without PWEDRSS and with PWEDRSS. The graphical illustration apparently describes that the decrease in packet delivery ratio is due the increase in selfish behavior. When the reactive scheduling mechanism is deployed packet delivery ratio increases. The chart make known that the packet delivery ratio get decreased in the network when the selfish node behavior takes place but can be increased on an average by 38% when the PWEDRSS strategy is provided to isolating selfish node using weighted energy drain rate for the packet. The packet delivery ratio obtained through this solution is optimal and efficient. 40 Fig. 2. Packet delivery ratio for PWEDRSS Fig. 3. Control overhead for PWEDRSS Fig. 4. Total overhead for PWEDRSS 3.8. Control Overhead Figure 3 depicts the shows the comparison chart between the control overhead and the number of selfish nodes for two strategies, they are without PWEDRSS and with PWEDRSS. The graphical illustration apparently describes that the increase in control overhead, with the increase in selfish behavior. When the reactive scheduling mechanism is deployed control overhead decreases.

Fig. 5. Throughput for PWEDRSS Fig. 6. End to end delay for PWEDRSS The chart reveals that the control overhead ratio get decreased in the network when the selfish node behavior takes place but can be increased on an average by 17% when the PWEDRSS strategy is provided to isolating selfish node using weighted energy drain rate for the packet. 3.9. Total Overhead Figure 4 shows the comparison chart between the Total overhead and the number of selfish nodes for two strategies, they are without PWEDRSS and with PWEDRSS. The graphical illustration apparently describes that the increase in Total overhead due to the increase in selfish behavior. When the reactive scheduling mechanism is deployed total overhead decreases. The graph portrays that the Total overhead get increased in the network when the selfish node behavior takes place but can be decreased on an 41 average by 21% when the PWEDRSS strategy is provided to prevent the attack. 3.10. Throughput Figure 5 shows the comparison chart between the throughput and the number of selfish nodes for two strategies, they are without PWEDRSS and with PWEDRSS. The graphical illustration apparently describes that the decrease in throughput due to the increase in selfish behavior. When the reactive scheduling mechanism is deployed throughput increases. The graph portrays that the throughput get decreased in the network when the selfish node behavior takes place but can be increased on an average by 22% when the PWEDRSS strategy is provided to prevent the attack. 3.11. End to End delay Figure 6 shows the comparison chart between the End to End Delay and the number of selfish nodes for two strategies, they are without PWEDRSS and with PWEDRSS. The graphical illustration apparently describes that the increase in end to end delay due to the increase in selfish behavior. When the reactive scheduling mechanism is deployed end to end delay decreases. The graph portrays that the end to end delay get increased in the network when the selfish node behavior takes place but can be decreased on an average by 28% when the PWEDRSS strategy is provided. 4. DISCUSSION A new scheduling algorithm Packet weighted Energy Drain Rate based Selfish Scheduler (PWEDRSS) was discussed related to the parameters throughput,end to end delay,packetdelivery ratio,control overhead and total overhead by varying themobile nodes and it is proved that PWEDRSS performs better. 5. CONCLUSION In this study, Packet weighted energy based scheduling strategy is revealed. This mechanism work out the energy based on the number of packets transmitted by a node, through which scheduling decision could be made. By means of simulation, the algorithmic performance can be compared. Evolution analysis foretells that this solution performs better. In the near future, this mechanism can be used to prevent traffic congestion.

6. REFERENCES Anuradha, S., G. Raghuram, K.E.S. Murthy, B.G. Reddy, 2009. New routing technique to improve transmission speed of data packets in point to point networks. ICGST-CNIR J. Broch, J., D.A. Maltz, D.B. Johnson, Y.C. Hu and J. Jetcheva, 1998. A performance comparison of multi-hop wireless ad hoc network routing protocols. Proceedings of the 4th annual ACM/IEEE International Conference on Mobile Computing and Networking, Oct. 25-30, ACM Press, Dallas, TX, USA., pp: 85-97. DOI: 10.1145/288235.288256 Chen, K. and K. Nahrstedt, 2004. ipass: An incentive compatible auction scheme to enable packet forwarding service in MANET. Proceedings of 24th International Conference on Distributed Computing System, Mar. 26-26, IEEE Xplore Press, pp: 534-542. DOI: 10.1109/ICDCS.2004.1281620 Das, S.R., C.E. Perkins and E.M. Royer, 2000. Performance comparison of two on-demand routing protocols for ad hoc networks. Proceedings of the 19th Annual Joint Conference on IEEE Computer and Communications Societies, Mar. 26-30, IEEE Xplore Press, Tel Aviv, pp: 3-12. DOI: 10.1109/INFCOM.2000.832168 Ghorpade, V.R., Y.V. Joshiand and R.R. Manthalkar, 2008. Fuzzy logic based trust management framework for MANET. DSP J. Papadimitratos, P. and Z.J. Haas, 2002. Secure routing for mobile ad hoc networks. Proceedings of the SCS Commnication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), Jan. 27-31, San Antonio, TX., pp: 193-204. Perkins, C., E.B. Royer and S. Das, 2002. Ad hoc On- Demand Distance Vector (AODV) routing. University of Cincinnati. 42