Study of Mobile Ad Hoc Network Routing Protocols in Smart Environment
Study of Mobile Ad Hoc Network Routing Protocols in Smart Environment
Abstract the course of exploration routing, but also distort the path of
The two primary strategies for designing any wireless network the data providing the routing protocol to chose an
are Protocol Selection and Path Routing. The protocol unconventional route (in case it is available) or to resume
selected in the network should be the best, in terms of data again the route exploration procedure.
integrity and data delivery. Therefore, before selecting any
protocol, we should analyze its performance. The main
problem with most of the routing protocols is that, they rely CATEGORISATION OF MANET PROTOCOLS
on mobile nodes and based on the assumption that nodes will MANET routing protocols can be categorized into various
corporate or behave appropriately but there might be types as shown below:
circumstances where some particular set of nodes may not
cooperate appropriately. Most of the MANET protocols Location Based Routing: LAR (location aided routing)
becomes ineffective and presents the declined performance protocol is an example of location based routing.
while mitigating with large number of malicious nodes. Such Location information of a particular object can be detected by
set of malicious nodes interrupt the data flow, but support the various systems like GPS (Global positioning system).
flow of route discovery traffic, causing the protocol to select Location based routing uses the real location of nodes, to
another route or to restart the route discovery process. There make routing decisions routing decisions in mobile networks.
are various types of attacks in network like Impersonation Energy Awareness Based Routing: Multiple entries of routing
Attack, Selfish Node Misbehaving, Denial of Service (Dos), in routing tables are supported by each node in the network.
Routing Table Overflow Attack, Flooding Attack, Sybil Routing assessing power levels of network nodes is available
Attack, Black Hole Attack, Wormhole Attack.etc. Hence to for choosing best path in the wireless medium. In this
deal with such types of attack mobile ad Hoc network must situation, routing table corresponding to the energy level of
have an effective and better security mechanism. In this paper nodes and retained by sending hello packets among nodes at
various research gaps have been summarized for different the energy level. Hence the number of network nodes is
MANET algorithms along with their performance in recent provided by the total number of entries in routing tables.
years.
Topology Based Routing: Here the routing types are: On
Keywords: MANET, AODV, TORA, DSR, LAR, DSDV, Demand (Reactive) Routing Protocol, Table Driven
IoT, GPS (Proactive) Routing Protocols, and Hybrid Routing Protocols
[2]. The routing protocols of MANETs are expressed in
the below figure.
INTRODUCTION
MANET contain autonomous mobile nodes that group
together to create a wireless mobile network without the help
of any fixed infrastructure or any centralized management. To
maintain secure, robust and efficient routing, protocols
becomes one of the huge concerns in MANET, and many
researchers attracted by it. Routing protocols are usually
needed for retaining effective and well organized transmission
between source to destination and also for maintaining the
routes among mobile nodes and designing path for forwarding
packets. The main problem of most of the routing protocol is
that, routing protocols depends upon the mobiles nodes, and
depending on the situation, that these mobile nodes will work
properly, but due to their mobile behavior there is higher
feasibility of circumstances where particular node group may
not work properly[1]. While communicating with large scale
of malicious nodes, most of the routing protocols are Figure 1: Routing Protocols in MANET
witnessed for reduced performance, which certainly maintains
ROUTING ATTACKS Attacks on Particular Routing Protocol
Routing attacks are network layer attacks such as wormhole Prior research work represented various attacks in Ad Hoc
attacks, Sybil attacks, black hole attack, spoofing information networks. The routing protocol specific to the attacks are as
etc. There is an urgent need to ensure routing security in Ad- follows:
Hoc mobile networks, so that the success of the routing
operation can be guaranteed. Due to the absence of AODV: AODV is on Demand Protocol. To disrupt the routing
infrastructure in target network protecting routing work process fake routing information is broadcasted by the
becomes more challenging. The routing attack can be attacker or we can say that instead of broadcasting original
expressed in the below figure. The network traffic can be information, attacker broadcast a route with less distance
completely absorbed by a malicious node (MN). The parameter [4].
malicious nodes introduce themselves within the link between DSR: Here attacker easily modifies the source route info,
sender and recipient along with the middle nodes (IN-1, IN-2) given in the control message (Route Request, Route Reply)
and perform unauthorized access in the network.
SEAD: It is based on DSDV. It cannot stand for wormhole
attack [5].
ARIADNE: It is based on DSR, it is reactive protocol it is
mainly targeted by rushing and wormhole attack, but robust
for denial of service attack [5].
Location Disclosure Attack, Resource Consumption Attack,
Rushing Attack, Byzantine Attack, Black hole Attack,
Wormhole Attack are some other types of attack other types
of attack commonly used in Literature.
Replication of Packet: Here (old or out of date) packets are Khattab M. Aliet. al. [8] presented a novel strategy in which
duplicated by the malicious node for unwanted resource new approach has been brought to the smart environment to
consumption and bandwidth consumption. save the consumer power of devices. In wireless sensor
networks a novel scheme is proposed for managing the sleep
Poisoning of Routing Table: In this type of attack, fake of nodes in networks. So that network connectivity can be
routing updates are sent by the malicious nodes kept and energy can be stored for future. The key feature of
Routing Table Overflow Attack: It usually take place in table the scheme is its simplicity. The effectiveness and convenient
driven routing protocols, the prominent job of this types of feature makes this approach more beneficial and this has been
attack is to make large set of routes so that creation of new successfully applied to many places of the networking.
path can be resisted. Authors in [9] presented a new AODV-EHA algorithm that
enhanced the quality of service as well as enhanced the life
time of sensor node under different energy condition and
variable traffic load for mass deployment of mobile network Security becomes an important topic in routing protocols in
they considered energy harvesting (EH) as the key enable adhoc networks. Brijendra Kumar Joshiet. al in [17]
technology, in the network. presented performance analysis of routing protocols and also
Authors in [10] presented a paper in which they enhanced presented security analysis under various types of attacks.
the performance of AODV protocol. Comparison has been To control the congestion problem of mobile network two
done between enhanced AODV protocol and existing solutions has been given by Syeda nyma ferdous et. Al. [18].
MANET protocols. Improvement is done under the area of Drop factor has been used for simulation of energy based
various attacks on AODV. And they have also discussed scheme. We can easily conclude from the result that proposed
the black hole attack in detail. solution is far better than the existing AODV protocol with
Authors in [11] presented a paper, which was completely respect to delay, throughput, delivery ratio etc.
based on security of smart environment and its requirements Dr. P.M. Jawandhiya et. al. [19] focused on the importance of
in the upcoming networks. They discussed how the network deficiency related consideration. Comparative performance
can be successfully implemented in Smart City, smart analysis of routing protocols has been done.
building, Smart home, smart car and they mentioned the risk
and challenges attached with IoT system. Prakhyalakhy Das et. al. [20] reviewed three widely used
routing protocols (Dynamic MANET on Demand (DYMO),
It is always very expensive to find a new route for transferring Dynamic Source Routing (DSR), Ad- hoc On Demand
packets in network. Hence a new approach for cache updating Distance Vector (AODV)). Evaluation has been done using
using distributed route cache update algorithm is proposed by various factors ex. mobility and traffic density.
V. V. Mandhare, R. C. Thool [12]. In UDSR distributed cache
replacement algorithm, route error information of size sixty Ashish Kumar Awadhiya1 et. Al.[21] provided a survey on
bytes was broadcasted by a source node to all its neighbors. the effects of mobility on the links lifetime. Hou Songfan et.
Hence stale route was replaced by all the neighbor nodes in Al. [22] used a real multichip smart (Internet of Thing)
their cache. Using different quality of service parameters the environment to compare the performance of two routing
performance has been improved up to thirty forty percent by protocols.
the new proposed approach. Vanita Bokhare et. Al. in [23] came up with new concept of
Dr. P. Venkata Krishna et. al. [13] proposed a new method for innovative broadcast method, and solved tumble down routing
Delay tolerant in Mobile ad hoc networks. They proposed a blockage problem.
new opportunistic adaptive routing protocol. They used a Mechanisms of some widely used existing MANET routing
proactive method for routing mechanism and by including a protocols (such as OLSR, DSR, AODV) have been studied
new concept called HUB they had chosen a new route here [24]. And there execution is exploited in internet of
between source and destination. The fitness value of all the things circumstances to find an accurate mechanism of routing
nodes in the network has been found by the routing protocols for IoT future.
and the nodes having highest fitness value are chosen for the
further process. Sudhir Goswami et. al. [25] proposed a new location based
energy efficient technique with an AODV protocol. Here the
Samiksha Nikam, B. T. Jadhav [14] used DSDV (destination- routing ability of AODV protocol was improved by energy
sequenced distance-vector) protocol to analyze the delay dependent nodes with the help of LAR protocol.
factor in mobile network. The delay was observed in both,
low and high conditions by taking various factors like speed They Pravanjan Das et. al. [26]modifies the existing SEAR-
pause time, total number of nodes, connection between the AODV routing protocol, and proposed a new multipath
nodes, etc. protocol with less consumption of energy.
Mohd.Imran, Mohammed Abdul Qadeer [15] presented a Sang-Hyun Parket. et. al. [27] proposed a new algorithm,
comprehensive study for two routing protocols DSDV and energy efficient probabilistic routing probabilistic routing
AODV. Characteristics of both protocols have been (EEPR). Under the flooding algorithm to decrease the packet
compared. For analyzing trace file, trace graph tool of ns-2 loss problem and to increase the network lifetime and to
simulator have been used. The conclusion shows that under control the transmissions of routing request they used EERP
high mobility scenario AODV attains better performance and algorithm.
efficiency than DSDV. For the evaluation of two active Manet routing protocols
In this paper [16] two types of network has been used, one (AODV, DSR) and one proactive routing protocol (DSDV) a
was local Ad Hoc Network and other was Overlay networks. mathematical model is presented [28] here, which work for
Overlay networks performed better than local Ad Hoc performance evaluation and presimulation TCL files.
networks. And performance comparison analysis has also This paper [29] examine through transmission power,
been done. The prominent task was to improve the efficiency mobility models and simulation the fundamental factors,
of routing protocol in mobile network. which have a great effect on the performance of location
based routing protocol. Here performance analysis has been are known for Misbehave. A direct and recommendations trust
done under two different mobility models. model is used as trust mechanism and it is incorporated
After observing the old wireless sensor network inside Ad Hoc on demand distance vector routing protocol,
interoperability efforts for urban sensing, Paolo Bellavista et. which help to find a trustworthy routing path.
al. [30] came up with new solution for impromptu and Authors [41] presented comprehensive study of various
MANETs delays. MANET routing protocols and they represented some
Considering the power consumption factor, evaluation of important features, characteristics. Protocols performance is
MANET routing protocol have been done. The proposed analyzed and compared using mobile scenario. MANET
method [31] reduces the network delay and minimizes twenty features are also discussed by the authors.
percent of total energy consumption.
Authors in [32] presented a performance comparison of ad- MANET CHALLENGES
hoc networks protocols with respect to different parameters.
In addition to the attractive Application, there are many
After observing the result of [33] we can conclude that for drawbacks within the network, which should be studied
large client mesh network, where more throughputs is needed, carefully. Mobile ad Hoc Network faces many challenges
we should use the AODV routing protocol for the video some of these challenges are as follows:
streaming applications.
Fault Tolerance: protocol should be adaptable according to
Sheng Liu, Yang Yang, WeixingWang [34] presented B- the dynamic network station. In unfavorable environment,a
AODV (improved approach), a new optimized routing host may fail due to lack of energy or due to certain problems.
protocol. Which was based on the concept of finding the If the host fails it is duty of routing protocol to adjust these
shortest route in network .This paper presents key techniques changes in network.
of mobile adhoc network, its basic characteristics, and
compared it with the mobile communication system. Physical Resource Constraints: More energy consumption
and Limited battery power is the main issue in mobile Ad Hoc
Here [35] author’s Presented a paper in which energy Network.
consumption problem in adhoc network is solved by the
proposed algorithm and it also helpful for solving routing Ad Hoc Deployment: Hosts are randomly established in adhoc
problem in network. In static network they also presented networks without any prior infrastructure and topology
energy optimal path algorithm using greedy method. And the information. In a specific area establishment varies according
proposed algorithm presented better simulation result. to the application.
R. Madhan Mohan et. al.[36] presented a paper in which a Scalability: the routing protocol should be flexible enough to
modified and enhanced version of AODV protocol is invented add, operate and respond large number of hosts in the
and the protocol is modified in such a way that only target network. When the network expands it is important that the
node can respond to route request. And this was helpful in protocol handle it reliably and smoothly.
reducing control data messages into the networks. Using Quality of Service: The quality of service is very important
modified AODV protocol they have presented an adaptive factor for most of the applications like video and audio
routing concept in mobile network. streaming. Here it is very important that the data packets sent
For multicasting networks, reliable and more energy efficient by sender reach the destination reliable reach the destination
congestion control protocol is proposed by K. Srinivasa reliable and timely.
Raoet. al. [37].This paper concentrates on congestion control Routing: Due to the constantly changing topology, it is
in MANET. Authors have mentioned Energy Efficiency, difficult to route packets between pair of nodes. So most
challenges, properties of MANET .Various type of algorithm protocols should be based on On demand routing instead of
along with their properties has been also discussed here. table driving routing. Multicasting routing has also become a
Yicong tian’s [38] proposed work shows that, AOMDV-IoT big challenge. Many applications of the network uses, many to
protocol shows better simulation result as compared to many and one to many communication pattern. The routing of
AOMDV. A method was designed, which used to take packets in this situation becomes very difficult.
function of both network node as well as routing destination. Security: Security has become a very important issue of the
David Espes et. al. [39] presented a paper, here the numbers network, for various applications like military, battlefield
of control packets were reduced, and backbone network was operations, security is the main issue. The inherent features of
used by an AODV based protocol for minimization of control mobile networks such as limited physical security, resource
packets. GPS has given the destination location which was constraint capability, distributed corporation, highly mobile
transmitted to the initial node by backbone network. topology, wireless medium poses number of privacy
challenges to the network.
In this paper [40] security of protocols are enhanced and
ensures that the data is not taken through malicious nodes that
Following are the different MANET techniques with their benefits and limitations.
Table 1: Prior research work (various research gaps summarized for different MANET algorithms)
Author Year Technique Benefits Limitations
Nidhi Divecha 2017 Bluetooth Implementing prevention With large no. of nodes consumes
network technique of black hole attack almost the entire bandwidth. Packet
[10]
expansion using gives higher security and less drop ratio could be further reduced.
AODV packet drops and throughput. Not so much applicable for large
network.
Anjana Tiwari, 2017 Performance The Result of proposed method is This proposed method can be
Inderjeet Kaur Evaluation of much better than the existing simulated in different routing
[42]
Energy AODV routing protocol. Compute protocols with multiple security
Efficiency For the best outcome characteristics. mechanism. For Ex. Secure
MANET communication. Also extend this
work by proposing more efficient
methods.
V.V Mandhar 2016 Cache Stale route Problem solved up to Performance decreases as the
and R.C. Thool Replacement certain level. Proposed approach network increases. Drop more
[12]
Algorithm improved performance up to 30%. packets even if the network had few
malicious users.
Mohd. Imran, 2016 Comparison of Simulation results show the Work has been done using two
Mohammed Topology based performance of two main protocols parameters. More numbers of
[15]
Abdul Qadeer Routing with respect to the average end to parameters could be taken.
Protocol end Delay, Throughput.
S. S. Asole 2016 Comparison of Provide an outcome as to which Has not mention packet drop rate and
routing routing protocol is better. applicable to limited system size.
[43]
protocol.
Samiksha 2016 A fuzzy Reduce the delay in mobility. More numbers of parameters could
Nikam approach used be taken.
[14]
Sudhir 2015 Energy efficient Work has been done for energy Still issue of power aware or energy
Goswami & scheme for conservation. Work has been done efficiency. Performance low due to
[25]
Chetan maximize to increase the network lifetime. congestion occurs in network.
Agarwal routing
capability.
Hrishabha Raj 2014 Energy efficient Energy consumption less. AODV rout discovery latency is
secure multiply high.
[44]
path EESM,
AODV
Eman S. 2013 Uses the Improvement in throughput. More difficult to configure,
Alwadiyeh technique of Improves packet delivery ratio, implementation require additional
[45]
ESDMR, reducing the impact of hidden planning a configuration.
EDMR. terminal problem.
Dr.Asha 2012 Randomized Improved AODV protocol for Work has been done with small
shripadambhai energy based solving link failure problem in number of nodes.
[46]
ka AODV protocol MANET.
for wireless
adhoc network.
Bikesh 2011 Analysis of Comparison done between DSDV, Impersonation attacks problem. No
Chandra Singh UDP DSR, AODV. any method provided for
[47]
performance in improving efficiency of protocols.
MANET.
Amrit Suman 2011 Analyzed Better result for Worm Hole N/A
FISHEYE, Attack.
[48]
AODV, DYMO
against
Wormhole
attack in Manet.
Moitreyee 2010 Designed Better result for Rushing attack. Designed mechanism provides better
Dasgupta Mechanism of result for Rushing attack Only.
[49]
route request
Choudhury
(RREQ)
Chaki forwarding.
M. 2006 FPGA React quickly to dynamic topology High network routing overhead. We
Ramakrishnan implementation changes. can further enhance the functioning.
[50]
& S. S. of DSDV.
Hanmugavel