0% found this document useful (0 votes)
8 views8 pages

Study of Mobile Ad Hoc Network Routing Protocols in Smart Environment

The document discusses the study of Mobile Ad hoc Network (MANET) routing protocols, highlighting the importance of protocol selection and path routing for data integrity and delivery. It categorizes MANET protocols into location-based, energy-aware, and topology-based routing, while addressing various routing attacks and their impact on performance. The paper also reviews existing techniques and challenges in MANETs, emphasizing the need for effective security mechanisms and energy-efficient routing solutions.

Uploaded by

Narmadha R
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views8 pages

Study of Mobile Ad Hoc Network Routing Protocols in Smart Environment

The document discusses the study of Mobile Ad hoc Network (MANET) routing protocols, highlighting the importance of protocol selection and path routing for data integrity and delivery. It categorizes MANET protocols into location-based, energy-aware, and topology-based routing, while addressing various routing attacks and their impact on performance. The paper also reviews existing techniques and challenges in MANETs, emphasizing the need for effective security mechanisms and energy-efficient routing solutions.

Uploaded by

Narmadha R
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Study of Mobile Ad hoc Network Routing Protocols in Smart Environment

R.Narmadha, P.Sathya, M.Arulprabhu


G.Daniya II-AI&DS
Department of Computer Application & AI&DS,
K.S.R College of Arts and Science For Women,
Tiruchengode
Email Id : [email protected], [email protected], [email protected]
[email protected]

Abstract the course of exploration routing, but also distort the path of
The two primary strategies for designing any wireless network the data providing the routing protocol to chose an
are Protocol Selection and Path Routing. The protocol unconventional route (in case it is available) or to resume
selected in the network should be the best, in terms of data again the route exploration procedure.
integrity and data delivery. Therefore, before selecting any
protocol, we should analyze its performance. The main
problem with most of the routing protocols is that, they rely CATEGORISATION OF MANET PROTOCOLS
on mobile nodes and based on the assumption that nodes will MANET routing protocols can be categorized into various
corporate or behave appropriately but there might be types as shown below:
circumstances where some particular set of nodes may not
cooperate appropriately. Most of the MANET protocols Location Based Routing: LAR (location aided routing)
becomes ineffective and presents the declined performance protocol is an example of location based routing.
while mitigating with large number of malicious nodes. Such Location information of a particular object can be detected by
set of malicious nodes interrupt the data flow, but support the various systems like GPS (Global positioning system).
flow of route discovery traffic, causing the protocol to select Location based routing uses the real location of nodes, to
another route or to restart the route discovery process. There make routing decisions routing decisions in mobile networks.
are various types of attacks in network like Impersonation Energy Awareness Based Routing: Multiple entries of routing
Attack, Selfish Node Misbehaving, Denial of Service (Dos), in routing tables are supported by each node in the network.
Routing Table Overflow Attack, Flooding Attack, Sybil Routing assessing power levels of network nodes is available
Attack, Black Hole Attack, Wormhole Attack.etc. Hence to for choosing best path in the wireless medium. In this
deal with such types of attack mobile ad Hoc network must situation, routing table corresponding to the energy level of
have an effective and better security mechanism. In this paper nodes and retained by sending hello packets among nodes at
various research gaps have been summarized for different the energy level. Hence the number of network nodes is
MANET algorithms along with their performance in recent provided by the total number of entries in routing tables.
years.
Topology Based Routing: Here the routing types are: On
Keywords: MANET, AODV, TORA, DSR, LAR, DSDV, Demand (Reactive) Routing Protocol, Table Driven
IoT, GPS (Proactive) Routing Protocols, and Hybrid Routing Protocols
[2]. The routing protocols of MANETs are expressed in
the below figure.
INTRODUCTION
MANET contain autonomous mobile nodes that group
together to create a wireless mobile network without the help
of any fixed infrastructure or any centralized management. To
maintain secure, robust and efficient routing, protocols
becomes one of the huge concerns in MANET, and many
researchers attracted by it. Routing protocols are usually
needed for retaining effective and well organized transmission
between source to destination and also for maintaining the
routes among mobile nodes and designing path for forwarding
packets. The main problem of most of the routing protocol is
that, routing protocols depends upon the mobiles nodes, and
depending on the situation, that these mobile nodes will work
properly, but due to their mobile behavior there is higher
feasibility of circumstances where particular node group may
not work properly[1]. While communicating with large scale
of malicious nodes, most of the routing protocols are Figure 1: Routing Protocols in MANET
witnessed for reduced performance, which certainly maintains
ROUTING ATTACKS Attacks on Particular Routing Protocol
Routing attacks are network layer attacks such as wormhole Prior research work represented various attacks in Ad Hoc
attacks, Sybil attacks, black hole attack, spoofing information networks. The routing protocol specific to the attacks are as
etc. There is an urgent need to ensure routing security in Ad- follows:
Hoc mobile networks, so that the success of the routing
operation can be guaranteed. Due to the absence of AODV: AODV is on Demand Protocol. To disrupt the routing
infrastructure in target network protecting routing work process fake routing information is broadcasted by the
becomes more challenging. The routing attack can be attacker or we can say that instead of broadcasting original
expressed in the below figure. The network traffic can be information, attacker broadcast a route with less distance
completely absorbed by a malicious node (MN). The parameter [4].
malicious nodes introduce themselves within the link between DSR: Here attacker easily modifies the source route info,
sender and recipient along with the middle nodes (IN-1, IN-2) given in the control message (Route Request, Route Reply)
and perform unauthorized access in the network.
SEAD: It is based on DSDV. It cannot stand for wormhole
attack [5].
ARIADNE: It is based on DSR, it is reactive protocol it is
mainly targeted by rushing and wormhole attack, but robust
for denial of service attack [5].
Location Disclosure Attack, Resource Consumption Attack,
Rushing Attack, Byzantine Attack, Black hole Attack,
Wormhole Attack are some other types of attack other types
of attack commonly used in Literature.

SURVEY OF EXISTING TECHNIQUES


Dr. Ajay Jangra et. al. [6] referred to the problem of routing
protocols in detail. They have taken various performance
metrics like energy consumption; route Optimization and
Figure 2: Routing attack in network latency for comparison analysis of various routing protocols.
They discussed that in dense or sparse area there is
interconnectivity among various gadgets and movement
There are various types of attacks in the network layer for models can be used for controlling device movement purpose
example packet forwarding and routing attack [3]. An attack and hence stated that routing process is clearly affected by
can be initiated by the malicious or infected routing nodes in movement of nodes in the network.
MANET by deploying different ways some of the main types
of routing attack are as follows: In [7] two very important protocols of MANETs (Destination-
sequenced distance-vector and Ad Hoc On-Demand Distance
Route Catch Poisoning Attack: It uses the advantages of Vector Routing) have been reviewed by authors. And a
promiscuous mode to update the routing table, which typically comparison between DSDV and AODV has been done by
occurs when confidential information in the routing table is them. By studying their review work, we can choose protocols
erased, modified, or randomly written with forgery content. according to performance and scenarios, and we can tell
Rushing Attack: Reactive routing protocols are highly targeted which routing protocol could better perform in particular
by these attacks. circumstance.

Replication of Packet: Here (old or out of date) packets are Khattab M. Aliet. al. [8] presented a novel strategy in which
duplicated by the malicious node for unwanted resource new approach has been brought to the smart environment to
consumption and bandwidth consumption. save the consumer power of devices. In wireless sensor
networks a novel scheme is proposed for managing the sleep
Poisoning of Routing Table: In this type of attack, fake of nodes in networks. So that network connectivity can be
routing updates are sent by the malicious nodes kept and energy can be stored for future. The key feature of
Routing Table Overflow Attack: It usually take place in table the scheme is its simplicity. The effectiveness and convenient
driven routing protocols, the prominent job of this types of feature makes this approach more beneficial and this has been
attack is to make large set of routes so that creation of new successfully applied to many places of the networking.
path can be resisted. Authors in [9] presented a new AODV-EHA algorithm that
enhanced the quality of service as well as enhanced the life
time of sensor node under different energy condition and
variable traffic load for mass deployment of mobile network Security becomes an important topic in routing protocols in
they considered energy harvesting (EH) as the key enable adhoc networks. Brijendra Kumar Joshiet. al in [17]
technology, in the network. presented performance analysis of routing protocols and also
Authors in [10] presented a paper in which they enhanced presented security analysis under various types of attacks.
the performance of AODV protocol. Comparison has been To control the congestion problem of mobile network two
done between enhanced AODV protocol and existing solutions has been given by Syeda nyma ferdous et. Al. [18].
MANET protocols. Improvement is done under the area of Drop factor has been used for simulation of energy based
various attacks on AODV. And they have also discussed scheme. We can easily conclude from the result that proposed
the black hole attack in detail. solution is far better than the existing AODV protocol with
Authors in [11] presented a paper, which was completely respect to delay, throughput, delivery ratio etc.
based on security of smart environment and its requirements Dr. P.M. Jawandhiya et. al. [19] focused on the importance of
in the upcoming networks. They discussed how the network deficiency related consideration. Comparative performance
can be successfully implemented in Smart City, smart analysis of routing protocols has been done.
building, Smart home, smart car and they mentioned the risk
and challenges attached with IoT system. Prakhyalakhy Das et. al. [20] reviewed three widely used
routing protocols (Dynamic MANET on Demand (DYMO),
It is always very expensive to find a new route for transferring Dynamic Source Routing (DSR), Ad- hoc On Demand
packets in network. Hence a new approach for cache updating Distance Vector (AODV)). Evaluation has been done using
using distributed route cache update algorithm is proposed by various factors ex. mobility and traffic density.
V. V. Mandhare, R. C. Thool [12]. In UDSR distributed cache
replacement algorithm, route error information of size sixty Ashish Kumar Awadhiya1 et. Al.[21] provided a survey on
bytes was broadcasted by a source node to all its neighbors. the effects of mobility on the links lifetime. Hou Songfan et.
Hence stale route was replaced by all the neighbor nodes in Al. [22] used a real multichip smart (Internet of Thing)
their cache. Using different quality of service parameters the environment to compare the performance of two routing
performance has been improved up to thirty forty percent by protocols.
the new proposed approach. Vanita Bokhare et. Al. in [23] came up with new concept of
Dr. P. Venkata Krishna et. al. [13] proposed a new method for innovative broadcast method, and solved tumble down routing
Delay tolerant in Mobile ad hoc networks. They proposed a blockage problem.
new opportunistic adaptive routing protocol. They used a Mechanisms of some widely used existing MANET routing
proactive method for routing mechanism and by including a protocols (such as OLSR, DSR, AODV) have been studied
new concept called HUB they had chosen a new route here [24]. And there execution is exploited in internet of
between source and destination. The fitness value of all the things circumstances to find an accurate mechanism of routing
nodes in the network has been found by the routing protocols for IoT future.
and the nodes having highest fitness value are chosen for the
further process. Sudhir Goswami et. al. [25] proposed a new location based
energy efficient technique with an AODV protocol. Here the
Samiksha Nikam, B. T. Jadhav [14] used DSDV (destination- routing ability of AODV protocol was improved by energy
sequenced distance-vector) protocol to analyze the delay dependent nodes with the help of LAR protocol.
factor in mobile network. The delay was observed in both,
low and high conditions by taking various factors like speed They Pravanjan Das et. al. [26]modifies the existing SEAR-
pause time, total number of nodes, connection between the AODV routing protocol, and proposed a new multipath
nodes, etc. protocol with less consumption of energy.

Mohd.Imran, Mohammed Abdul Qadeer [15] presented a Sang-Hyun Parket. et. al. [27] proposed a new algorithm,
comprehensive study for two routing protocols DSDV and energy efficient probabilistic routing probabilistic routing
AODV. Characteristics of both protocols have been (EEPR). Under the flooding algorithm to decrease the packet
compared. For analyzing trace file, trace graph tool of ns-2 loss problem and to increase the network lifetime and to
simulator have been used. The conclusion shows that under control the transmissions of routing request they used EERP
high mobility scenario AODV attains better performance and algorithm.
efficiency than DSDV. For the evaluation of two active Manet routing protocols
In this paper [16] two types of network has been used, one (AODV, DSR) and one proactive routing protocol (DSDV) a
was local Ad Hoc Network and other was Overlay networks. mathematical model is presented [28] here, which work for
Overlay networks performed better than local Ad Hoc performance evaluation and presimulation TCL files.
networks. And performance comparison analysis has also This paper [29] examine through transmission power,
been done. The prominent task was to improve the efficiency mobility models and simulation the fundamental factors,
of routing protocol in mobile network. which have a great effect on the performance of location
based routing protocol. Here performance analysis has been are known for Misbehave. A direct and recommendations trust
done under two different mobility models. model is used as trust mechanism and it is incorporated
After observing the old wireless sensor network inside Ad Hoc on demand distance vector routing protocol,
interoperability efforts for urban sensing, Paolo Bellavista et. which help to find a trustworthy routing path.
al. [30] came up with new solution for impromptu and Authors [41] presented comprehensive study of various
MANETs delays. MANET routing protocols and they represented some
Considering the power consumption factor, evaluation of important features, characteristics. Protocols performance is
MANET routing protocol have been done. The proposed analyzed and compared using mobile scenario. MANET
method [31] reduces the network delay and minimizes twenty features are also discussed by the authors.
percent of total energy consumption.
Authors in [32] presented a performance comparison of ad- MANET CHALLENGES
hoc networks protocols with respect to different parameters.
In addition to the attractive Application, there are many
After observing the result of [33] we can conclude that for drawbacks within the network, which should be studied
large client mesh network, where more throughputs is needed, carefully. Mobile ad Hoc Network faces many challenges
we should use the AODV routing protocol for the video some of these challenges are as follows:
streaming applications.
Fault Tolerance: protocol should be adaptable according to
Sheng Liu, Yang Yang, WeixingWang [34] presented B- the dynamic network station. In unfavorable environment,a
AODV (improved approach), a new optimized routing host may fail due to lack of energy or due to certain problems.
protocol. Which was based on the concept of finding the If the host fails it is duty of routing protocol to adjust these
shortest route in network .This paper presents key techniques changes in network.
of mobile adhoc network, its basic characteristics, and
compared it with the mobile communication system. Physical Resource Constraints: More energy consumption
and Limited battery power is the main issue in mobile Ad Hoc
Here [35] author’s Presented a paper in which energy Network.
consumption problem in adhoc network is solved by the
proposed algorithm and it also helpful for solving routing Ad Hoc Deployment: Hosts are randomly established in adhoc
problem in network. In static network they also presented networks without any prior infrastructure and topology
energy optimal path algorithm using greedy method. And the information. In a specific area establishment varies according
proposed algorithm presented better simulation result. to the application.
R. Madhan Mohan et. al.[36] presented a paper in which a Scalability: the routing protocol should be flexible enough to
modified and enhanced version of AODV protocol is invented add, operate and respond large number of hosts in the
and the protocol is modified in such a way that only target network. When the network expands it is important that the
node can respond to route request. And this was helpful in protocol handle it reliably and smoothly.
reducing control data messages into the networks. Using Quality of Service: The quality of service is very important
modified AODV protocol they have presented an adaptive factor for most of the applications like video and audio
routing concept in mobile network. streaming. Here it is very important that the data packets sent
For multicasting networks, reliable and more energy efficient by sender reach the destination reliable reach the destination
congestion control protocol is proposed by K. Srinivasa reliable and timely.
Raoet. al. [37].This paper concentrates on congestion control Routing: Due to the constantly changing topology, it is
in MANET. Authors have mentioned Energy Efficiency, difficult to route packets between pair of nodes. So most
challenges, properties of MANET .Various type of algorithm protocols should be based on On demand routing instead of
along with their properties has been also discussed here. table driving routing. Multicasting routing has also become a
Yicong tian’s [38] proposed work shows that, AOMDV-IoT big challenge. Many applications of the network uses, many to
protocol shows better simulation result as compared to many and one to many communication pattern. The routing of
AOMDV. A method was designed, which used to take packets in this situation becomes very difficult.
function of both network node as well as routing destination. Security: Security has become a very important issue of the
David Espes et. al. [39] presented a paper, here the numbers network, for various applications like military, battlefield
of control packets were reduced, and backbone network was operations, security is the main issue. The inherent features of
used by an AODV based protocol for minimization of control mobile networks such as limited physical security, resource
packets. GPS has given the destination location which was constraint capability, distributed corporation, highly mobile
transmitted to the initial node by backbone network. topology, wireless medium poses number of privacy
challenges to the network.
In this paper [40] security of protocols are enhanced and
ensures that the data is not taken through malicious nodes that
Following are the different MANET techniques with their benefits and limitations.
Table 1: Prior research work (various research gaps summarized for different MANET algorithms)
Author Year Technique Benefits Limitations
Nidhi Divecha 2017 Bluetooth Implementing prevention With large no. of nodes consumes
network technique of black hole attack almost the entire bandwidth. Packet
[10]
expansion using gives higher security and less drop ratio could be further reduced.
AODV packet drops and throughput. Not so much applicable for large
network.

Anjana Tiwari, 2017 Performance The Result of proposed method is This proposed method can be
Inderjeet Kaur Evaluation of much better than the existing simulated in different routing
[42]
Energy AODV routing protocol. Compute protocols with multiple security
Efficiency For the best outcome characteristics. mechanism. For Ex. Secure
MANET communication. Also extend this
work by proposing more efficient
methods.
V.V Mandhar 2016 Cache Stale route Problem solved up to Performance decreases as the
and R.C. Thool Replacement certain level. Proposed approach network increases. Drop more
[12]
Algorithm improved performance up to 30%. packets even if the network had few
malicious users.

Mohd. Imran, 2016 Comparison of Simulation results show the Work has been done using two
Mohammed Topology based performance of two main protocols parameters. More numbers of
[15]
Abdul Qadeer Routing with respect to the average end to parameters could be taken.
Protocol end Delay, Throughput.

S. S. Asole 2016 Comparison of Provide an outcome as to which Has not mention packet drop rate and
routing routing protocol is better. applicable to limited system size.
[43]
protocol.

Samiksha 2016 A fuzzy Reduce the delay in mobility. More numbers of parameters could
Nikam approach used be taken.
[14]
Sudhir 2015 Energy efficient Work has been done for energy Still issue of power aware or energy
Goswami & scheme for conservation. Work has been done efficiency. Performance low due to
[25]
Chetan maximize to increase the network lifetime. congestion occurs in network.
Agarwal routing
capability.
Hrishabha Raj 2014 Energy efficient Energy consumption less. AODV rout discovery latency is
secure multiply high.
[44]
path EESM,
AODV
Eman S. 2013 Uses the Improvement in throughput. More difficult to configure,
Alwadiyeh technique of Improves packet delivery ratio, implementation require additional
[45]
ESDMR, reducing the impact of hidden planning a configuration.
EDMR. terminal problem.
Dr.Asha 2012 Randomized Improved AODV protocol for Work has been done with small
shripadambhai energy based solving link failure problem in number of nodes.
[46]
ka AODV protocol MANET.
for wireless
adhoc network.
Bikesh 2011 Analysis of Comparison done between DSDV, Impersonation attacks problem. No
Chandra Singh UDP DSR, AODV. any method provided for
[47]
performance in improving efficiency of protocols.
MANET.
Amrit Suman 2011 Analyzed Better result for Worm Hole N/A
FISHEYE, Attack.
[48]
AODV, DYMO
against
Wormhole
attack in Manet.

Moitreyee 2010 Designed Better result for Rushing attack. Designed mechanism provides better
Dasgupta Mechanism of result for Rushing attack Only.
[49]
route request
Choudhury
(RREQ)
Chaki forwarding.
M. 2006 FPGA React quickly to dynamic topology High network routing overhead. We
Ramakrishnan implementation changes. can further enhance the functioning.
[50]
& S. S. of DSDV.
Hanmugavel

CONCLUSION [6] N. Jeba and V. Kamala, “A Survey on Routing


MANET should have an effective and better security services, Protocols for Internet of Things,” in International
because various upcoming applications of MANET are on the Journal of Advanced Research in Science,
way in future. Reducing the routing problems will develop a Engineering and Technology, 2016, vol. 3, no. 5, pp.
secure, efficient and better application in MANET. We have 1993–1996.
summarised almost all the existing MANETs techniques. After [7] S. J. Patil, “Available Online at www.ijarcs.info A
Extensive literature survey, we realized that there are a lot of Review On Trust Based Secure Routing Protocols In
security problems in mobile ad Hoc network and various Ad-Hoc Networks,” 2017, vol. 8, no. 976, pp. 661–
challenges need more attention. We will have to take more 668.
action for better performance in upcoming smart environment.
[8] K. M. A. Alheeti, “Conservation Based on Routing
Protocol,” 2017, pp. 69–74.
REFERENCES [9] T. D. Nguyen, J. Y. Khan, and D. T. Ngo, “An
[1] G. N. Anil, “Semantic Probabilistic Modelling of effective energy-harvesting-aware routing algorithm
novel routing Protocol with Implication of for WSN-based IoT applications,” in IEEE
Cumulative Routing Attack in Mobile adhoc International Conference on Communications, 2017.
network,” 2012, vol. 9, no. 1, pp. 340–349. [10] Nidhi DIVECHA“Solution to Bluetooth Network
[2] R. Balakrishna, Z. Hussain. A survey on manets‐ Expansion using AODV- Ad HOC Routing Protocol,”
types, characteristics, applications and protocols used. 2017, vol. 7, no. 4, pp. 10683–10688.
National Conference on Frontiers and Advances in [11] S.-R. Oh and Y.-G. Kim, “Security Requirements
Information Science and Technology FAIST13; 23– Analysis for the IoT,” in 2017 International
24 May, 2013;. Bangalore, India: Conference on Platform Technology and Service
RRCE; 2013. (PlatCon), 2017, pp. 1–6.
[3] H. Yang, H. Luo, F. Ye, S. Lu, L. Zhang, “Security in [12] V. V. Mandhare and R. C. Thool, “Improving QoS of
mobile ad hoc networks: challenges and solutions,” In Mobile Ad-hoc Network Using Cache Update Scheme
proc. IEE Wireless Communication, UCLA, Los in Dynamic Source Routing Protocol,” in Procedia
Angeles, CA, USA; volume- 11, Page(s):38- 47, Computer Science, 2016, vol. 79, pp. 692–699.
ISSN: 1536-1284
[13] S. Informatic, J. Anantapur, and V. Ramana, “T O L E
[4] Nishu Garg and R.P.Mahapatra, “MANET Security RANTMOBILEAD-HOCNETWORKS
Issues,” IJCSNS International Journal of Computer M.VenkataRamana1,Dr.PVenkataK
Science and Network Security, VOL.9 No.8, August r i s h n a 2,” 2016, vol. X, pp. 25–29.
2009.
[14] Samika Nikam“Delay Analysis Of Adhoc Network,”
[5] Ping Yi, Yue Wu and Futai Zou and Ning Liu, “A 2016, vol. 8, no. 9, pp. 7–11.
Survey on Security in Wireless Mesh Networks”,
Proceedings of IETE Technical Review, Vol. 27, [15] M. Imran and M. A. Qadeer, “Evaluation Study of
Issue 1, Jan-Feb 2010. Performance Comparison of Topology Based Routing
Protocol, AODV and DSDV in MANET,” in 2016
International Conference on Micro-Electronics and
Telecommunication Engineering (ICMETE), 2016, [28] G. R. Pathak, S. H. Patil, A. D. Rana, and Y. N.
pp. 207–211. Suralkar, “Mathematical model for routing protocol
[16] P. Dwivedi, “A Prototyped Ad Hoc Routing Protocol performance in NS2: Comparing DSR, AODV and
for Efficiency Enhancement for Routing in MANET,” DSDV as example,” Proc. - 2014 IEEE Glob. Conf.
2016, vol. 133, no. 13, pp. 15–17. Wirel. Comput. Networking, GCWCN 2014, pp. 184–
188, 2015.
[17] B. K. Joshi, “Security Assessment of AODV Protocol
under,” 2016, pp. 173–177. [29] A. Macintosh, M. FeiSiyau, and M. Ghavami,
“Simulation study on the impact of the transmission
[18] S. N. Ferdous and M. S. Hossain, “Randomized power on the performance of routing protocols under
energy-based AODV protocol for wireless ad-Hoc different Mobility Models,” Innov. Comput. Technol.
network,” in 2016 3rd International Conference on (INTECH), 2014 Fourth Int. Conf., pp. 185–190,
Electrical Engineering and Information and 2014.
Communication Technology, iCEEiCT 2016, 2017,
pp. 1–5. [30] P. Bellavista, G. Cardone, A. Corradi, and L.
Foschini, “Convergence of MANET and WSN in IoT
[19] P. M. Jawandhiya and S. S. Asole, “Performance urban scenarios,” IEEE Sens. J., vol. 13, no. 10, pp.
analysis of mobility models using routing protocols, 3558–3567, 2013.
traffic models and provides an outcome as to which
routing protocol is better,” in 2016 International [31] Shivashankar, H. N. Suresh, G. Varaprasad, and G.
Conference on Recent Advances and Innovations in Jayanthi, “Notice of Violation of IEEE Publication
Engineering, ICRAIE 2016, 2017, pp. 0–4. Principles Designing Energy Routing Protocol With
Power Consumption Optimization in MANET,” IEEE
[20] P. Das and D. D. Seth, “Performance analysis of Trans. Emerg. Top. Comput., vol. 2, no. 2, pp. 192–
routing protocols for adhoc network in a fading 197, 2014.
environment,” in 2016 IEEE International
Conference on Computational Intelligence and [32] O. Of and R. Protocols, “Comparative Performance
Computing Research, ICCIC 2016, 2017, pp. 6–10. Analysis of.”
[21] A. K. Awadhiya, S. Mishra, and V. Sharma, “Link [33] K. A. Ai-ghadanfary and D. M. B. Al-Somaidai,
Lifetime Prediction in Mobile Adhoc Network : A “Simulation of Some Routing Protocols in a Client
Survey,” 2016, vol. 5, no. 7, pp. 736–740. Wireless Mesh Networkfor Multimedia
Applications,” First Int. Conf. Electr. Commun.
[22] S. Hou, M. Wu, W. Liao, and D. Wang, “Performance Comput. Power Control Eng., 2013.
comparison of AODV and DSR in MANET test-bed
based on Internet of Things,” in 2015 IEEE 82nd [34] S. Liu, Y. Yang, and W. Wang, “Research of AODV
Vehicular Technology Conference, VTC Fall 2015 - Routing Protocol for Ad Hoc Networks1,” AASRI
Proceedings, 2016, pp. 3–7. Procedia, vol. 5, pp. 21–31, 2013.
[23] V. Bokhare and S. Suryavanshi, “A secure NCPR for [35] A. Chaturvedi, D. N. Goswami, and T. Sharma,
reducing routing overhead in MANET,” in 2015 4th “Energy Optimal Path Algorithm for routing in Static
International Conference on Reliability, Infocom Adhoc Network using Greedy Approach (EOGR),”
Technologies and Optimization: Trends and Future Int. J. Comput. Appl., vol. 48, no. 24, pp. 23–28,
Directions, ICRITO 2015, 2015. 2012.
[24] H.-M. Xin and K. Yang, “Routing {Protocols} [36] R. MadhanMohan and K. Selvakumar, “An Energy
{Analysis} for {Internet} of {Things},” in 2015 2nd Efficient Routing in Mobile Adhoc Networks using
{International} {Conference} on {Information} Aggregate Interface Queue Length and Node
{Science} and {Control} {Engineering} ({ICISCE}), 2015, Remaining Energy,” Int. J. Comput. Appl., vol. 42,
no. i, pp. 447–450. no. 19, pp. 8–12, 2012.
[25] S. Goswami, C. Agrawal, and A. Jain, “Location [37] K. S. Rao, R. S. Kumar, P. Venkatesh, R. V. S. Naidu,
based Energy Efficient Scheme for Maximizing and A. Ramesh, “Development of Energy Efficient
Routing Capability of AODV Protocol in MANET,” and Reliable Congestion Control Protocol for
in International Journal of Wireless and Microwave Multicasting in Mobile Adhoc Networks compare
Technologies, 2015, vol. 5, no. 3, pp. 33–44. with AODV Based on Receivers,” vol. 2, no. 2, pp.
631–634, 2012.
[26] L. Almazaydeh, E. Abdelfattah, M. A.- Bzoor, A. A.-
Rahayfeh, and C. Science, “P Erformance E Valuation [38] Y. Tian and R. Hou, “An improved AOMDV routing
of R Outing,” 2010, vol. 2, no. 2, pp. 64–73. protocol for internet of things,” 2010 Int. Conf.
Comput. Intell. Softw. Eng. CiSE 2010, pp. 0–3, 2010.
[27] S. H. Park, S. Cho, and J. R. Lee, “Energy-efficient
probabilistic routing algorithm for internet of things,” [39] D. Espes and C. Teyssié, “Approach for Reducing
J. Appl. Math., vol. 2014, 2014. Control Packets in AODV-based MANETs,” 2007.
[40] S.Hu, “Dynamic Monitoring Based On Wireless
Sensor Networks of IoT,” pp. 0–3, 2015.
[41] S. Naski, “Performance of Ad Hoc Routing
Protocols : Characteristics and Comparison,” Ad Hoc
Networks, 2005.
[42] A. Tiwari and I. Kaur, “Performance Evaluation of
Energy Efficient For MANET Using AODV Routing
Protocol,” 3rd IEEE Int. Conf. "Computational Intell.
Commun. Technol. (IEEE-CICT 2017), pp. 1–5, 2017.
[43] P. M. Jawandhiya and S. S. Asole, “Performance
analysis of mobility models using routing protocols,
traffic models and provides an outcome as to which
routing protocol is better,” in 2016 International
Conference on Recent Advances and Innovations in
Engineering, ICRAIE 2016, 2017, pp. 0–4.
[44] H. R. Jain, “International Conference on Advances in
Engineering and Technology Research (ICAETR),
2014,” Improv. Energy Effic. Secur. Multipath AODV
Routing Protoc. MANET, pp. 1–9, 2014.
[45] E. S. Alwadiyeh and A. F. a Aburumman,
“Interference-aware multipath routing protocols for
mobile ad hoc networks,” 38th Annu. IEEE Conf.
Local Comput. Networks - Work., no. December, pp.
980–986, 2013.
[46] A. Ambhaikar, H. R. Sharma, and V. K. Mohabey,
“Improved AODV Protocol For Solving Link Failure
In MANET,” Int. J. Sci. Eng. Res., vol. 3, no. 10, pp.
1–6, 2012.
[47] Bikash Chandra Singh, Tapan Kumar Godder, S.
Miah, and H. M. Abdul Awal, “Experimental
Analysis of UDP Performance in Mobile Ad Hoc
Networks with Different Routing Protocols and
varying payload,” Int. J. Distrib. Parallel Syst., vol. 2,
no. 6, pp. 107–113, 2011.
[48] A. Suman, “A Behavioral Study of Wormhole Attack
in Routing for MANET,” vol. 26, no. 10, pp. 42–46,
2011.
[49] M. Dasgupta, “Routing Misbehavior in Ad Hoc
Network,” Int. J., vol. 1, no. 18, pp. 94–97, 2010.
[50] M. Ramakrishnan and S. Shanmugavel,
“Implementation Network,” 2006.

You might also like