Enhancing Cluster Node Forming Routing Protocol in Mobile Adhoc Network
Enhancing Cluster Node Forming Routing Protocol in Mobile Adhoc Network
Original Article
Received: 03 November 2023 Revised: 09 February 2024 Accepted: 11 April 2024 Published: 26 May 2024
Abstract - Developing an Efficient power organization in wireless devices can be a challenging task, particularly in Mobile
Networks. Many researchers are focusing on providing efficient power management with the support of modern algorithms and
techniques. This article focuses on inventing a routing protocol with the support of clustering named Cluster Node Routing
Protocol (CNRP), which executes on three stages of cluster node forming, cluster-based route prediction and packet forwarding.
The proposed CNRP was implemented in the Network simulator and compared the results with existing cluster-based protocols
of FLCH-AODV and SCCM-AODV with respect to the parameters of Cluster forming time, Cluster head accuracy, Connectivity
analysis, Power analysis and Energy consumed. The proposed CNRP protocol performance is excellent in all the parameters
computation, and the overall performance of the MANET becomes 85% to 89% even the many cluster head changes. This
proposed protocol also supports Hidden and Exposed node issues and buffer overflow along with the energy optimization.
Keywords - MANET, Cluster node, Routing protocol, Network layer, Cluster Node Routing Protocol.
support an efficient power-optimized routing strategy. One good. This work could be the fundamental research data to the
way to achieve energy optimization is eliminating the more feature MANET-IoT based researchers. Maruthupandi et al
number of packets forwarding by the intermediate nodes [24] authors invented the DISNEY routing protocol using the
rather than using a cluster head based routing protocol for the SDN for MANET to provide the routing between the sources
packet route between the source to the destination node. This to destination nodes to overcome the congestion. The efficient
research article focuses on proposing a new Cluster Node route-manipulated table used for the routing support, and the
forming Routing Protocol (CNRP) for optimizing the battery. simulation results perform well in all the performance factors.
The routing protocol first forms the cluster node, and the However, the usage of the table needs dynamic changes,
cluster node are taking responsible for the routing path which causes the routing protocol to delay on routing decision.
decision and the packets forward to the destination. A separate Rajendra Prasad and Shivashankar [25] proposed the EEE
cluster forwarding algorithm was established to forward the Secure Routing protocol for adapting security policy in
packet to the next cluster, and this research work eliminates communication. The route-selected nodes have to provide the
all the internal node forwarding, which supports power authentication and selection node energy level up to the
optimization in MANET. This CNRP protocol indirectly threshold. Also, this routing protocol uses the shortest path for
supports the MANET challenges of Hidden and Exposed reliable communication route selection and the performance
nodes, buffer overflow, and internal threats. The article is of the simulation was better. However, this threshold and
structured as follows: Section II summarizes the various authentication-based nodes are difficult to determine. If any
existing routing-based power optimization methods used in condition is not met, the nodes could not be part of the
MANET thus far; Section III proposes MANET's working communication network.
principles; Section IV discusses the simulation setup used to
implement the research work; and Section V concludes and Mohammad et al. [26] anticipated the TBSMR for
includes feature work. MANET enhancement. This routing protocol uses different
factors like congestion, loss, QoS and malicious node
2. Research Work related to Routing protocols prediction for making the route between the nodes. The
This section explores further into the energy optimization simulation shows superior performance compared with other
routing technique, which has been a cornerstone of MANET methods, but the multiple factor usage for route prediction is
technology since its creation. It goes into the classification not possible practically when the nodes are huge. Anubhuti
parameter connected with this method, providing thorough Roda MOHINDRA and Charu GANDHI [27] proposed the
information about its significance and ramifications in the SCCM routing protocol, which has secured the transmission
context of MANETs. Abhilash and Shivaprakasha [1] have of packets using encryption and signature generation and
done a survey related to the MANET challenges with respect decryption process. The packet is converted to an unknown
to the routing protocol, scheduling strategy, energy packet using the ECC encryption method, which supports to
optimization, and Security factors. Finally authors explained provide the secure transmission of data packets between the
the importance of secure routing protocol and various attacks nodes. However, the work of encryption, decryption, and ECC
in routing strategies in MANET. Tripathy et al. [20] authors are overhead to the routing protocol, which makes some delay
proposed an adaptive routing protocol for Manet's in packet computation.
communications; this protocol used the parameters and
features to configure the route function dynamically. Hwanseok Yang [28] author proposed a technique
Simulation results show the best performance, but the usage evaluation method of nodes using cluster and key exchange
of parameters like security, functional parameters, trust without the usage of Certificate Authority. This method
values, and geographical values are not easy to collect in the assured the quality of packets as well as packet maintenance.
mobility nature of the nodes. The simulation and performance of this method are superior
to other methods with respect to the parameters of PDR, delay,
Arappali and Rajendran [21] authors proposed the OLSR control packets, throughput, and path length. However, the
protocol with Raspberry Pie inbuilt in the test bed; the forming of the clustering structure is not feasible in MANET.
simulation of OLSR performs better throughput, but the usage Uppalapati Srilakshmi et al. [13] authors propose that the
of BABEL for Vector directing is an additional task to the fuzzy clustering algorithm is activated in the Cluster Heads
routing protocol. Panda & Pattanayak [22] authors enhanced (CHs) for trust-based protection with energy optimization. CH
the ant colony optimization algorithm (ACO) to provide a is engaged for the secure route selection based on the latency,
secured routing protocol in MANET to prove the QoS. An node connection, and throughput, and the results are compared
evolutionary technique-based algorithm was added to ACO. with the EA-DRP & EE-OHRA methods proposed methods
But, this work has been fundamental for the research related produced energy was 0.10 m joules, latency was 0.0035 m
to ACO-based security routing. Quy et al. [23] authors made sec, throughput was 0.70 bps, and an 83 percent detection
the analysis of the routing protocol for MANET-IoT with four rate. The limitation of this method is that route selection was
major categories like: performance, energy, QoS and Security delayed due to the cluster head forming with fuzzy logic.
awareness. Finally conclude that proactive protocol work is Routing protocols in MANET have proven successful in a
186
S. Hemalatha et al. / IJETT, 72(5), 185-193, 2024
variety of applications, including routing, mobility, clustering, H represents the cluster head, which is selected based on
and hybrid techniques, as well as transmission range the residual energy node, node lifetime, and connectivity with
optimization. However, some procedures have produced other nodes. The system model is initially established to define
dismal outcomes. Further study is required to enhance routing internal node parameters. Figure 2 illustrates the entire
for power efficiency in MANETs. This paper presents a architecture, depicting the process of cluster formation and
cluster-based routing protocol that aims to improve route communication among nodes.
discovery and packet forwarding to target nodes while
reducing the requirement for intermediary nodes to pass Overall, the MANET graph encapsulates the nodes,
packets. edges, and key components such as source, target, and cluster
head, providing a visual representation of the network
3. Research Methodology structure and communication flow within the MANET
The research goal of this article is to form the cluster node environment.
that supports for MANET routing strategy to optimize the
battery life of the individual nodes. The research methodology Several criteria influence the cluster heads chosen for
compromises the following subsection: first, forming the each location, including battery power, mobility, link lifetime,
cluster node or Cluster head; second, the routing path selection and node mobility. The cluster node will be the one with the
from the sender to the receiver node; and finally, the packet maximum node life length, connectivity, and battery power
forwarding. values, as well as the lowest node mobility and distance
values.
3.1. Cluster Node or Cluster Head
In the MANET nodes cluster, node selection is based on
the location of the other nodes. Nodes that are in the same Mobile
region, and in the system represented in Figure 1, a single node
Mobile
is designated as the cluster node due to its greater energy
reserves, which allow it to transfer packets across the network
efficiently.
The MANET graph, denoted as MG = (M, N), is
constructed as follows: Mobile
M represents the set of MANET nodes, where M = {m1, Mobile
Cluster Node
m2, ..., mm, mn}. Here, 'm' denotes the total number of nodes,
ranging from 1 to n.
N represents the set of edges connecting the nodes, where
N = {l1, l2, ..., lv}.
In this graph: Mobile
S represents the source node. Mobile
T represents the target node.
Fig. 1 Cluster node forming
187
S. Hemalatha et al. / IJETT, 72(5), 185-193, 2024
Mobile Mobile
Mobile Mobile
Mobile
Mobile Mobile Mobile Cluster Node
Cluster Node
Mobile Mobile
Mobile
Mobile Cluster Node
Mobile Mobile
Fig. 3 Clustering groups
3.2 Cluster Node based Routing Protocol connectivity. The criteria used to designate a cluster node are:
Cluster Node-based routing protocol works as following • The cluster node must have the highest possible node
stages depicted in Algorithm I, First the formation of the longevity, connection, and battery power.
cluster Nodes in the MANET. In the second stage, the source • Conversely, the cluster node should have the lowest
initiates the route path to the respective cluster with the details values for node mobility and distance.
of the destination. Next step, the Cluster Node sends the • This selection procedure guarantees that the chosen
RREQ to the other clusters and makes a path. Finally, the cluster node maximizes its potential for durability,
packets are transmitted from the source to the destination by connection, and power efficiency within the MANET
deciding the route path Cluster nodes. region.
}
Algorithm I Working of Cluster Node-based Routing 3. Sender Cluster node sends the REEQ to all the clusters in
Protocol the MANET
Steps for Cluster Head forming and route process 4. Destination cluster node sends the RREP to the sender
1. Begin by totaling the number of nodes in each MANET cluster
region. Define M as the set of regions within the MANET, 5. Packet Transmission from the sender to the destination node
denoted by {R1, R2, R3,..., Rn}. Each region Ri comprises N via selected cluster nodes.
nodes, one of which is designated as the cluster head. 6. If the cluster node residual power is less, go to step 1;
2. For each Region Ri, Do follow otherwise process continues.
for (i=1; i≤ n; i++)
{ The selection of cluster heads is based on information
//All nodes in the MANET region are evaluated on a variety gathered from MANET nodes, which takes into account
of criteria, including lifetime, mobility, distance, power, and criteria such as device mobility, lifetime, distance, power, and
188
S. Hemalatha et al. / IJETT, 72(5), 185-193, 2024
The MAC layer employed was 802.11b, and a random Connectivity Analysis
simulation model was chosen. Propagation was modeled using A second connectivity comparison was made with respect
a two-way ground approach, with nodes capable of achieving to the connectivity analysis, which makes use of routing path
top speeds of 25 m/s and halting for 15 seconds. During selection between the Source nodes to the Destination node.
simulation intervals, two packets were delivered, and the From the simulation connectivity analysis compared with the
simulation time was set to 50 and 100 seconds. The initial other existing cluster head-related routing protocol research
node energy was set to 240 joules, with each node transmitting Fuzzy logic cluster head AODV (FLCH-AODV) [13] and
0.9 joules and receiving 0.4 joules. Sleep power was set to Secure Cryptography based Clustering Mechanism (SCCM-
0.002 joules, with a change over duration of 0.009 seconds. AODV) [27] with nodes count starting from 50,100,150 and
200 nodes. In all the cases, the proposed CNRP-AODV node
4.2. Comparative Evaluation route connectivity times are 8, 16, 24, and 32 ms and FLCH-
The proposed cluster node-based routing protocol was AODV connectivity time takes 12, 26, 40, 50 and SCCM-
implemented in AODV protocol [9] and named CNRP- AODV protocol connectivity time 14, 28, 42, and 52 ms,
AODV, with the simulated values analyzed with the alive which take more time for analysis the route paths connectivity
SCCM -AODV [27] FLCH-AODV [13] algorithm for comparing with proposed CNRP-AODV protocol as shown
predicting the comparative analysis. from the Figure 6.
189
S. Hemalatha et al. / IJETT, 72(5), 185-193, 2024
Connectivity Analysis
Time
190
S. Hemalatha et al. / IJETT, 72(5), 185-193, 2024
Power Analysis
Power
Energy Consumed
Energy
191
S. Hemalatha et al. / IJETT, 72(5), 185-193, 2024
References
[1] K.J. Abhilash, and K.S. Shivaprakasha, “Secure Routing Protocol for MANET: A Survey,” Advances in Communication, Signal
Processing, VLSI, and Embedded Systems, vol. 614, pp. 263-277, 2020. [CrossRef] [Google Scholar] [Publisher Link]
[2] Rajvi Trivedi, and Pimal Khanpara, “Robust and Secure Routing Protocols for MANET-Based Internet of Things Systems—A Survey,”
Emergence of Cyber Physical System and IoT in Smart Automation and Robotics, Advances in Science, Technology & Innovation.
Springer, Cham, pp. 175-188, 2021. [CrossRef] [Google Scholar] [Publisher Link]
[3] Abdul Majid Soomro et al., “Comparative Review of Routing Protocols in MANET for Future Research in Disaster Management,” Journal
of Communications, vol. 17, no. 9, pp. 734-744, 2022. [CrossRef] [Google Scholar] [Publisher Link]
[4] D. Hemanand et al., “Analysis of Power Optimization and Enhanced Routing Protocols for Wireless Sensor Networks,” Measurement:
Sensors, vol. 25, pp. 1-6, 2023. [CrossRef] [Google Scholar] [Publisher Link]
[5] Venkatesan Cherappa et al., “Energy-Efficient Clustering and Routing Using ASFO and a Cross-Layer-Based Expedient Routing Protocol
for Wireless Sensor Networks,” Sensors, vol. 23, no. 5, pp. 1-15, 2023. [CrossRef] [Google Scholar] [Publisher Link]
[6] M.K. Marina, and S.R. Das, “On-Demand Multipath Distance Vector Routing in Ad Hoc Networks,” Proceedings Ninth International
Conference on Network Protocols, Riverside, CA, USA, pp. 14-23, 2001. [CrossRef] [Google Scholar] [Publisher Link]
[7] Shahram Jamali, Bita Safarzadeh, and Hamed Alimohammadi, “SQR-AODV: A Stable QoS-Aware Reliable on-Demand Distance Vector
Routing Protocol for Mobile Ad Hoc Networks,” Scientific Research and Essays, vol. 6, no. 14, pp. 3015-3026, 2011. [CrossRef] [Google
Scholar] [Publisher Link]
[8] S.J. Lee, and M. Gerla, “AODV-BR: Backup Routing in ad Hoc Networks,” 2000 IEEE Wireless Communications and Networking
Conference, Chicago, IL, USA, vol. 3, pp. 1311-1316, 2000. [CrossRef] [Google Scholar] [Publisher Link]
[9] Jian Liu, and Fang-min Li, “An Improvement of AODV Protocol Based on Reliable Delivery in Mobile Ad Hoc Networks,” 2009 Fifth
International Conference on Information Assurance and Security, Xi'an, China, vol. 1, pp. 507-510, 2009. [CrossRef] [Google Scholar]
[Publisher Link]
[10] Hui Xia et al., “Impact of Trust Model on on-Demand Multi-Path Routing in Mobile Ad Hoc Networks,” Computer Communications,
vol. 36, no. 9, pp. 1078-1093, 2013.[CrossRef] [Google Scholar] [Publisher Link]
[11] Omar Smail et al., “A Multipath Energy-Conserving Routing Protocol for Wireless Ad Hoc Networks Lifetime Improvement,” EURASIP
Journal on Wireless Communications and Networking, vol. 2014, pp. 1-12, 2014. [CrossRef] [Google Scholar] [Publisher Link]
[12] S.M. Benakappa, and M. Kiran, “Energy Aware Stable Multipath Disjoint Routing Based on Accumulated Trust Value in MANETs,”
International Journal of Computer Network and Information Security, vol. 14, no. 4, pp. 14-26, 2022. [CrossRef] [Google Scholar]
[Publisher Link]
[13] Uppalapati Srilakshmi et al., “A Secure Optimization Routing Algorithm for Mobile Ad Hoc Networks,” IEEE Access, vol. 10, pp. 14260-
14269, 2022. [CrossRef] [Google Scholar] [Publisher Link]
[14] K. Rajendra et al., “Grey Wolf Optimizer and Cuckoo Search Algorithm for Electric Power System State Estimation with Load
Uncertainty and False Data,” International Journal on Recent and Innovation Trends in Computing and Communication, vol. 11, no. 2s,
pp. 59-67, 2023. [CrossRef] [Google Scholar] [Publisher Link]
[15] Aqeel Taha et al., “Energy-Efficient Multipath Routing Protocol for Mobile Ad-Hoc Network Using the Fitness Function,” IEEE Access,
vol. 5, pp. 10369-10381, 2017. [CrossRef] [Google Scholar] [Publisher Link]
192
S. Hemalatha et al. / IJETT, 72(5), 185-193, 2024
[16] Jayant Y. Hande, and Ritesh Sadiwala, “Optimization of Energy Consumption and Routing in MANET Using Artificial Neural Network,”
Journal of Integrated Science and Technology, vol. 12, no. 1, pp. 1-8, 2024. [Google Scholar] [Publisher Link]
[17] Guruprasath Rengarajan, Nagarajan Ramalingam, and Kannadhasan Suriyan, “Performance Enhancement of Mobile Ad Hoc Network
Life Time Using Energy Efficient Techniques,” Bulletin of Electrical Engineering and Informatics, vol. 12, no. 5, pp. 2870-2877, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[18] T. Saravanan, and S. Saravanakumar, “Energy Efficient Optimization Algorithms for MANET,” Proceedings of the 2023 Fifteenth
International Conference on Contemporary Computing, Noida, India, pp. 572-579, 2023. [CrossRef] [Google Scholar] [Publisher Link]
[19] Muhannad Tahboush, Mohammad Adawy, and Osama Aloqaily, “PEO-AODV: Preserving Energy Optimization Based on Modified
AODV Routing Protocol for MANET,” International Journal of Advances in Soft Computing and its Application, vol. 15, no. 2, pp. 263-
277, 2023. [Google Scholar] [Publisher Link]
[20] Bata Krishna Tripathy et al., “An Adaptive Secure and Efficient Routing Protocol for Mobile Ad Hoc Networks,” Wireless Personal
Communications, vol. 114, no. 2, pp. 1339-1370, 2020. [CrossRef] [Google Scholar] [Publisher Link]
[21] Nedumaran Arappali, and Ganesh Babu Rajendran, “MANET Security Routing Protocols Based on a Machine Learning Technique
(Raspberry PIs),” Journal of Ambient Intelligence and Humanized Computing, vol. 12, pp. 6317-6331, 2021. [CrossRef] [Google Scholar]
[Publisher Link]
[22] Niranjan Panda, and Binod Kumar Pattanayak, “ACO-Based Secure Routing Protocols in MANETs,” New Paradigm in Decision Science
and Management, Proceedings of ICDSM, pp. 195-206, 2020. [CrossRef] [Google Scholar] [Publisher Link]
[23] Vu Khanh Quy et al., “Routing Algorithms for MANET-IoT Networks: A Comprehensive Survey,” Wireless Personal
Communications, vol. 125, no. 4, pp. 3501-3525, 2022. [CrossRef] [Google Scholar] [Publisher Link]
[24] J. Maruthupandi et al., “Route Manipulation Aware Software-Defined Networks for Effective Routing in SDN Controlled MANET by
Disney Routing Protocol,” Microprocessors and Microsystems, vol. 80, 2021. [CrossRef] [Google Scholar] [Publisher Link]
[25] P. Rajendra Prasad, and Shivashankar, “Enhanced Energy Efficient Secure Routing Protocol for Mobile Ad-Hoc Network,” Global
Transitions Proceedings, vol. 3, no. 2, pp. 412-423, 2022. [CrossRef] [Google Scholar] [Publisher Link]
[26] Mohammad Sirajuddin et al., “TBSMR: A Trust-Based Secure Multipath Routing Protocol for Enhancing the QoS of the Mobile Ad Hoc
Network,” Security and Communication Networks, vol. 2021, pp. 1-9, 2021. [CrossRef] [Google Scholar] [Publisher Link]
[27] Anubhuti Roda Mohindra, and Charu Gandhi, “A Secure Cryptography Based Clustering Mechanism for Improving the Data Transmission
in MANET,” Walailak Journal of Science and Technology, vol. 18, no. 6, pp. 1-8, 2021. [CrossRef] [Google Scholar] [Publisher Link]
[28] Hwanseok Yang, “A Study on Improving Secure Routing Performance Using Trust Model in MANET,” Mobile Information Systems, vol.
2020, pp. 1-17, 2020. [CrossRef] [Google Scholar] [Publisher Link]
193