ROUTING IN MANETS USING ACO WITH MOBILITY ASSISTANCE

Similar documents
SWARM INTELLIGENCE BASED DYNAMIC SOURCE ROUTING FOR IMPROVED QUALITY OF SERVICE

PERFORMANCE EVALUATION OF DSR USING A NOVEL APPROACH

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

Performance Analysis of DSR Routing Protocol With and Without the Presence of Various Attacks in MANET

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

A SURVEY OF ROUTING PROTOCOLS IN MOBILE AD HOC NETWORKS

Dynamic Source Routing in ad hoc wireless networks

Ant-based Dynamic Hop Optimization Protocol: a Routing Algorithm for Mobile Wireless Sensor Networks

Power aware Multi-path Routing Protocol for MANETS

Simulation and Performance Analysis of Throughput and Delay on Varying Time and Number of Nodes in MANET

Performance of Ad-Hoc Network Routing Protocols in Different Network Sizes

Estimate the Routing Protocols for Internet of Things

ComparisonofPacketDeliveryforblackholeattackinadhocnetwork. Comparison of Packet Delivery for Black Hole Attack in ad hoc Network

A Review on Black Hole Attack in MANET

Performance Evaluation of MANET through NS2 Simulation

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Detection and Removal of Blackhole Attack Using Handshake Mechanism in MANET and VANET

Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model

Performance evaluation of AODV, DSDV and AntHocNet in video transmission

Regression-based Link Failure Prediction with Fuzzy-based Hybrid Blackhole/Grayhole Attack Detection Technique

Performance Evaluation of Various Routing Protocols in MANET

Considerable Detection of Black Hole Attack and Analyzing its Performance on AODV Routing Protocol in MANET (Mobile Ad Hoc Network)

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Broch et al Presented by Brian Card

6367(Print), ISSN (Online) Volume 4, Issue 2, March April (2013), IAEME & TECHNOLOGY (IJCET)

Speed Performance of Intelligent Ant Sense Routing Protocol for Mobile Ad-Hoc Personal Area Network

Performance Analysis and Enhancement of Routing Protocol in Manet

Cache Timeout Strategies for on-demand Routing in MANETs

Computation of Multiple Node Disjoint Paths

STUDY ON MOBILE ADHOC NETWORK ROUTING PROTOCOLS

Performance Analysis of AODV using HTTP traffic under Black Hole Attack in MANET

Bee Inspired and Fuzzy Optimized AODV Routing Protocol

Content. 1. Introduction. 2. The Ad-hoc On-Demand Distance Vector Algorithm. 3. Simulation and Results. 4. Future Work. 5.

Prevention of Black Hole Attack in AODV Routing Algorithm of MANET Using Trust Based Computing

A New Approach for Energy Efficient Routing in MANETs Using Multi Objective Genetic Algorithm

Keywords: AODV, MANET, WRP

Unicast Routing in Mobile Ad Hoc Networks. Dr. Ashikur Rahman CSE 6811: Wireless Ad hoc Networks

MANET is considered a collection of wireless mobile nodes that are capable of communicating with each other. Research Article 2014

AODV-PA: AODV with Path Accumulation

Impact of Hello Interval on Performance of AODV Protocol

A Review: Optimization of Energy in Wireless Sensor Networks

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

Performance Analysis of Aodv Protocol under Black Hole Attack

Design and Implementation of a Simulator for Ad Hoc Network Routing Protocol

Optimizing Performance of Routing against Black Hole Attack in MANET using AODV Protocol Prerana A. Chaudhari 1 Vanaraj B.

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

A Survey - Energy Efficient Routing Protocols in MANET

Anil Saini Ph.D. Research Scholar Department of Comp. Sci. & Applns, India. Keywords AODV, CBR, DSDV, DSR, MANETs, PDF, Pause Time, Speed, Throughput.

Overhead Analysis of Reactive Shortest Single and Multi-path Routing Mechanism with Load Balance in MANET

II. ROUTING CATEGORIES

Dynamic Search Technique Used for Improving Passive Source Routing Protocol in Manet

2. LITERATURE REVIEW. Performance Evaluation of Ad Hoc Networking Protocol with QoS (Quality of Service)

Performance Comparison of DSDV, AODV, DSR, Routing protocols for MANETs

AN ANALYSIS FOR RECOGNITION AND CONFISCATION OF BLACK HOLE IN MANETS

Performance comparison of Dynamic Source Routing with Weight Based Reliable Routing method

Performance Comparison of AODV, DSR, DSDV and OLSR MANET Routing Protocols

G.Narasa Reddy, 2 A.Avanthi, 3 R.Prasanth Reddy 1

PERFORMANCE BASED EVALUATION OF DSDV, AODV AND DSR ROUTING PROTOCOLS IN MANET

DYNAMIC SEARCH TECHNIQUE USED FOR IMPROVING PASSIVE SOURCE ROUTING PROTOCOL IN MANET

A Comparative Analysis of Traffic Flows for AODV and DSDV Protocols in Manet

Routing in Ad Hoc Wireless Networks PROF. MICHAEL TSAI / DR. KATE LIN 2014/05/14

Software Simulation for bandwidth Estimate of Ad-hoc Networks

International Journal of Advanced Research in Computer Science and Software Engineering

A Survey on Wireless Routing Protocols (AODV, DSR, DSDV)

2013, IJARCSSE All Rights Reserved Page 85

A Study on Mobile Internet Protocol and Mobile Adhoc Network Routing Protocols

Review: Performance Evaluation of TCP Congestion Control Mechanisms Using Random-Way-Point Mobility Model

A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Beacon Update for Greedy Perimeter Stateless Routing Protocol in MANETs

Defending MANET against Blackhole Attackusing Modified AODV

Performance Analysis of AOMDV, OLSR and DSR Routing Protocols Using UDP agents in MANETS

ANewRoutingProtocolinAdHocNetworks with Unidirectional Links

Routing Protocols in Mobile Ad-Hoc Network

Backward Aodv: An Answer To Connection Loss In Mobile Adhoc Network (Manet)

Simulation and Analysis of Blackhole Attack in MANETs for Performance Evaluation

AWERProcedia Information Technology & Computer Science

Experiment and Evaluation of a Mobile Ad Hoc Network with AODV Routing Protocol

Figure 1: Ad-Hoc routing protocols.

Design and Development of Secure Data Cache Framework. Please purchase PDF Split-Merge on to remove this watermark.

GSM Based Comparative Investigation of Hybrid Routing Protocols in MANETS

Behaviour of Routing Protocols of Mobile Adhoc Netwok with Increasing Number of Groups using Group Mobility Model

A Hybrid Routing Protocol for Ad-hoc Wireless Network Based on Proactive and Reactive Routing Schemes

A Reliable Route Selection Algorithm Using Global Positioning Systems in Mobile Ad-hoc Networks

PERFORMANCE BASED EVALUATION OF DSDV, AODV AND DSR ROUTING PROTOCOLS IN MANET

Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network

Performance Evaluation and Comparison of On-Demand Routing Protocols for Ad Hoc Networks: DSR, AODV, AOMDV, TORA

Evaluation of Ad-hoc Routing Protocols with. Different Mobility Models for Warfield. Scenarios

Presenting a multicast routing protocol for enhanced efficiency in mobile ad-hoc networks

A Comparative Study between AODV and DSDV Routing Protocols in Mobile Ad Hoc Networks using Network Simulator NS2

MODIFICATION AND COMPARISON OF DSDV AND DSR PROTOCOLS

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

Evaluating the Performance of Modified DSR in Presence of Noisy Links using QUALNET Network Simulator in MANET

Varying Overhead Ad Hoc on Demand Vector Routing in Highly Mobile Ad Hoc Network

[Kamboj* et al., 5(9): September, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116

Impulse Radio Ultra Wide Band Based Mobile Adhoc Network Routing Performance Analysis

Performance Evaluation of AODV DSDV and OLSR Routing Protocols with Varying FTP Connections in MANET

Evaluating the Performance of Mobile Agent-Based Message Communication among Mobile Hosts in Large Ad Hoc Wireless Network

Poonam kori et al. / International Journal on Computer Science and Engineering (IJCSE)

Removal of Selective Black Hole Attack in MANET by AODV Protocol

Analysis QoS Parameters for Mobile Ad-Hoc Network Routing Protocols: Under Group Mobility Model

Transcription:

ISSN : 0973-7391 Vol. 3, No. 1, January-June 2012, pp. 97-101 ROUTING IN MANETS USING ACO WITH MOBILITY ASSISTANCE Praveen Biradar 1, and Sowmya K.S 2 1,2 Dept. Of Computer Science and Engineering, Dayananda sagar college of Engineering, Bangalore, Karnataka, India E-mail: sowmyaks.3@gmail.com ABSTRACT This paper presents an algorithm for mobility in routing protocol along with an Ant Colony Optimization (ACO) to solve path finding problem and reduce packet losses in mobile ad hoc networks (MANETs). The algorithm can be applied to any Reactive protocols Such as DSR and AODV. Here ant communication behaviour is the inspiration for solving computational problems which can be reduced to find a good path, and the mobility assisted routing applied over reactive protocol to estimate the number of packet which can traverse before the link failure, by calculating its link life time which in-turn gives route life time. This algorithm reduces the path finding problem, increases packet delivery ratio and throughput. Keywords: ACO, Link life time, packet loss, route life time, mobility, link failure, MANET. 1. INTRODUCTION A MANET is an autonomous collection of mobile users that communicate over relatively bandwidth constrained wireless links. MANETs sport highly dynamic topology, Fragile, low-capacity links, no dedicated infrastructure components and with presence of dynamic and adaptive routing protocols enables MANETs to be formed quickly. As result it is more focused on issues like Availability, wireless channel access and multihop routing, ignoring the most important issues includes packet loss, throughput, path discovery in protocols. Since the topology of MANET is dynamic, connectivity among nodes may vary with the movements of nodes and the with time node departures. MANETs have several advantages compared to any other network, but pose many challenges includes mobility of node, route discovery, link failure, packet loss and many other, as per our paper we concentrate only on the packet loss, throughput, route discovery using ACO, and measuring the link life time which determines the route life time. In this paper we consider the impact of mobility on the link and route lifetimes in ad hoc network, till now there no real-life measurements were used to study the effect of node mobility on the link and route lifetime. We develop a statistical framework about the routing protocol and route discovery in the mobility assisted routing as it clearly explained in Fig. 2 and Fig. 3, which is carried with ACO algorithm and Mobility algorithm includes few steps to calculate link lifetime and determination of route lifetime, algorithm for controlling packet loss, Finally[4] Evaluation of algorithm, which come with the increase in throughput and packet delivery ratio. 2 DESCRIPTION OF ACO Ant Colony Optimization algorithm inspired by one aspect of ant behavior, the ability to find the shortest path, the most successful algorithm technique based on ant behavior. ACO algorithms as the potentiality of using artificial pheromone and artificial ants to drive the search of always better solutions for complex optimization problems. In ACO once all ants have computed their tour, ACO updates the pheromone trail using all the solutions produced by the ant colony. The pheromone trails allow the ants to find their way to the food source. The same pheromone trails can be used by other ants to find the location of the food sources discovered by their mates. At the end of this phase the Pheromone of the entire system evaporates and the process of construction and update is iterated. ACO mechanism is more effective since it avoids long convergence time by directly concentrate the search in a neighbourhood of the best tour found up to the current iteration of the algorithm. Figure 1 shows the ants moving in pheromone trail between nest and food leaving pheromone of its own at each node in path, which is done vice verse on reverse process. In Fig. 2 an obstacle interrupts the trail which led ant in searching new path towards food. Fig. 3 ants find two paths to go around the obstacle leaving

98 pheromone in which one is shortest, Finally Fig. 4 shows a new pheromone trail is formed along the shorter path and all transmission is done through that path thereafter. Each node updates its routing tables and used to select next hops according to the weighted probability. Figure 1: Ants in Pheromone Trail Between Nest and Food Figure 2: An Obstacle Interrupts the Trail 3. INTEGRATION OF ACO WITH MOBILITY SCHEME IJCSC Mobility of nodes is the factor effecting the connectivity between the two node which is unlimited if it static ad hoc network and changes with increase in mobility. Hence link failure is inevitable if increase in mobility and its difficult to find the route to destination. In order to control this link failure and path finding issue we need to integrate ACO along with Mobility in routing protocol which should be independent of effective solution. We can apply this on any Reactive protocols (ex: DSR or AODV). Here the duration of link between two nodes is considered as the link life time(llt) and is used to find the route life time(rlt) of the link between source to destination. Upton determining the RLT we apply ACO technique to the route which are active and valid for transmission, which in turn gives the shortest and best path to reach the destination. A. Calculation of Link Life Time Link exists between two nodes if they are within communication range of each other. In this paper, we calculate LLT and presented briefly for clarity. Figure 5 shows the two mobile nodes A and B with radio range of r. The present location of nodes A and B are A(Xa1,Ya1) and B(Xb1, Yb1), respectively. And these nodes are moving with velocities Va and Vb, and angles θa and θb respectively. As nodes are mobile the future locations are A(Xa2, Ya2) and B(Xb2, Yb2) after some duration, t. Figure 3: Ants Finds Two Path to go Around the Obstacles Figure 5: A Scenario for Calculating LLT Figure 4: A new Pheromone Trail is Formed Along the Shorter Path The future location is calculated using all the information related to their current location, by following two functions. A(xa2, ya2) = f (t, va, θa, xa1, ya1) (1) B(xb2, yb2) = f (t, vb, θb, xb1, yb1) (2) If the distance between A and B after time t is s then s2 = (xa2 xb2)2 + (ya2 yb2)2. (3)

Routing in MANETS Using ACO with Mobility Assistance 99 A and B will be able to communicate with each other as long as they will remain within their transmission range, r. So, t = LLT if s r. After solving (3) with s r and considering t = LLT, we get ()()() ab + cd + a + c r ad bc LLT = 2 2 a + c where a = v a cos θ a v b cos θ b, b = x a1 x b1, B. Mobility Model 2 2 2 2 c = v a sin θ a v b sin θ b, and d = y a1 y b1. This model has been implemented to treat the mobility related issues in the ad hoc network. In MANETs the movement of node is unpredictable and the time they are in link holds key for packet transmission. Hence calculation of link life time is carried with respect to the mobility of nodes, as increase in mobility, LLT between the nodes decreases. This breaks the routes, and packet loss due to link failure. Which significantly affect the packet delivery ratio, throughput and delay caused by link failure. Hence this model has be proposed along with other routing protocol to increase its efficiency. After calculating the LLT and RLT, ACO algorithm comes in picture in finding the shortest among all the available routes calculated using RLT. These algorithms solve the path finding and mobility related problem and explained in four steps. Step 1: Estimation of minimum LLT initiated by source: Here the estimation of LLT is carried on any reactive protocol (ex: DSR or AODV) in which minimum threshold link life time (TLLT) used by the source to find more stable link and route to the destination. Upon estimating the TLLT based on the nature of mobility, which is random mobility in some area and stable in places where mobility is least. As per two aspects of mobility, the TLLT has to be set accordingly. In random mobility the TLLT can be set higher for low speeds compare to high speed and in stable aspect the TLLT can be set higher. Step 2: Route discovery using TLLT along ACO In a reactive protocol, whenever there is a packet to be transmitted, the source itself will search for the route in the route cache. If there is no route present in the cache then with the help of ACO algorithm the path finding process is initiated from source to desired destination, upon finding the route the threshold link life time is calculated over that path by source, each node along the path towards destination calculate own LLT with the previous nodes, and compares the calculation with TLLT in the packet. If the calculated LLT is greater than the TLLT of the packet, then this node become part of the route. Similarly same will be carried over all routes found by ACO and among all which has higher and same TLLT are included other nodes are discarded from route. (4) Step 3: Determination of route life time The liveliness of the route is called the route life time (RLT), that is all the nodes in the networks have their own link life time, and the node with lowest LLT has high probability of breaking the route. So, the link with lowest LLT in any route is considered as RLT. Here if any node is a part of the route, it compares its own LLT with the RLT in the route discovery packet sent by the source. If the LLT is less than the RLT, it replaces the RLT in the discovery packet with its own LLT. Or if LLT is more or equal, it forwards the route discovery packet without changing RLT field. The source receives the route reply packet, calculate the net RLT, RLTnet, which is difference between RLT of the packet and the time it took the route reply packet to arrive to the source, troute. Then, RLTnet is given by RLTnet = RLT troute. (5) RLTnet and troute are stored in route cache by source. troute is average latency between source and destination. Step 4: Algorithm for reducing packet loss Whenever there is a packet to send, the source search a route from route cache, and estimate the number of packet that route is able to deliver without loss. Latency between source and destination, troute, is important. Let as consider Nest be estimated number of packets to be sent through that route, and given by Nest = RLTnet/troute. (6) The selected route will be alive during RLTnet, and within RLTnet, the source will be able to send the Nest number of packets. If more than Nest number of packet sent they have high probability of getting lost due to broken route. If there are more packets to be sent then the source find alternative route from route cache, if there no route is present again the route discovery process is carried by source using ACO technique and mobility algorithm. C. System Model and Implementation We present the proposed algorithm using 5, 10 and 15 nodes, where nodes communication pattern is omnidirectional with a transmission radius r. Nodes moves at constant velocity in communication range or sometimes out of range. Each node is equipped with GPS and antenna with height above 1 meter to provide location, current velocity and direction of movement. Packet loss occurs due to link failure and collisions. As per implementation the nodes share same channel for packet transmission. UDP is used as transport layer protocol. Destination is used as Loss monitor which gives detail about packet loss n failure in transmission. Here DSR is the reactive protocol used as routing protocol combined with the algorithm. On this DSR routing

100 IJCSC protocol we apply four modifications made in above steps. First, whenever there is a route discovery request at node, it calculates the shortest path to the destination by ACO technique, upon which it calculates LLT with previous nodes. Second, each packet route discovery packet contains TLLT value assigned at source, nodes that receives this packet compares it LLT with TLLT in the packet, and passes to next node if its same or high or drops the packet if the LLT is less than TLLT. Third, RLT of the discovered route is estimated with minimum of LLT values of the nodes. Forth, the latency of the route is calculated by destination and sends to source through route reply packet. Thus, the source estimates the number of packets to be sent using the RLT and latency of the corresponding route. This implementation reduces the path finding complexity and packet loss due to failure. 4. EVALUATION We consider three metrics packet delivery ratio, packet loss and average packet delay in measuring performance of the proposed algorithm with existing solutions. Packet delivery ratio is the number of received packets by the destination and the total number of packets sent by the source. Packet loss is the total number of lost packet during transmission. Average packet delay is the time required by a packet to reach from source to destination. As our evaluation is in wireless network so we consider the speed of the mobile nodes for measuring the performance of the protocols. We compare our implementation DSR with LLT with original DSR and DSR with Direction Tracking. Simulation is carried with these protocols and the output is plotted on the graph as shown in Figures 6, 7 and 8 which provides the results of 5 nodes. The original DSR has a solution to broken routes called maintenance procedure, which deletes the route with broken links from cache. DSR with Direction Tracking search for the shortest path based on number of hop-count from cache and second, it searches for path with better LLT with Minimum hop-count from cache. Figure 6: Average End to End Packet Delay Figure 7: End to End Delivery Ratio Figure 8: Packet Loss Ratio The packet delivery ratio is obtained with DSR with LLT is compared with other two DSR protocols and the result in figure shows the significant improvement in the packet delivery ratio which is above 40 percent. 5. CONCLUSION In this paper, a new algorithm is applied to earlier routing protocol along with ACO technique to path finding complexes and reduce packet loss due to inevitable link failures in MANET is presented. The proposed changes to the routing algorithm are implemented in DSR and can be applied to any reactive or on-demand routing protocols. ACO used for path finding along with RLT is estimated using the route discovery mechanism. Using RLT and latency, the number of packets that can traverse a route is estimated by source by route reply packet, and only this number of packets is sent through that route. Thus the evaluation of this in above section shows that packet loss decreases and packet delivery ratio increases significantly.

Routing in MANETS Using ACO with Mobility Assistance 101 REFERENCES [1] D. B. Johnson, and D. A. Maltz, Dynamic Source Routing in Ad Hoc Wireless Networks, Mobile Computing, Eds. Kluwer Academic Publishers, pp. 153-181, 353, 1996. [2] Sowmya K.S, Rakesh T. and Deepthi P Hudedagaddi, Detection and Prevention of Blackhole Attack in MANET Using ACO, IJCSNS International Journal of Computer Science and Network Security, 12 No. 5, May 2012. [3] Edward Y. Hua and Zygmunt J. Haas, Fellow, IEEE, An Algorithm for Prediction of ink Lifetime in MANET Based on Unscented Kalman Filter, IEEE Communictions Letters, 13, No. 10, October 2009. [4] R.S. Chang, and W.W. Chen, Mobility Assessment On-Demand (MAOD) Routing Protocol for Mobile Ad hoc Networks, Journal of Wireless Communications & Mobile Computing, pp. 369-381, 4, Issue 4, Jun 2004, ISSN: 1530-8669. [5] M. Pascoe, J. Gomez, V. Rangel, and M. Lopez-Guerrero, An Upper Bound on Network Size in Mobile Ad Hoc Networks, Proc. of IEEE GLOBECOM, pp. 314-319, New Orleans, Nov 2008. [6] Satoshi Kurosawa, Hidehisa Nakayama, Nei Kat, Abbas Jamalipour, and Yoshiaki Nemoto, Detecting Blackhole Attack on ACO-based Mobile Ad Hoc Networks by Dynamic Learning Method, International Journal of Network Security, 5, No. 3, pp. 338-346, Nov. 2007.