Volume 1 , Issue 2 , PP: 19-33, 2020 | Cite this article as | XML | Html | PDF | Full Length Article
Lamia F. Tulaib 1 * , Akbal O. Salman 2 , Mazin A. Mohammed 3
The desire to remain connected no matter where you are, when you want to be connected, or how you want to be connected has been a driving force behind the development of wireless networks, in particular in the field of persistent and ubiquitous computing. This need can be satisfied in a number of different ways. The Mobile Ad-hoc networks made up of a collection of nodes, each of which is equipped with wireless networking and communication capabilities. There may be any number of these nodes. It is not necessary to involve a central administrator in order for these nodes to communicate with one another since they may do so independently. Ad hoc networks also often referred to as infrastructure-less networks since they do not have a present topology or infrastructure. This is because ad hoc networks do not have a predetermined topology or infrastructure. Because each node in the wireless ad-hoc network functions as either a host or a router or both, In order to prevent unauthorized parties from accessing the data, it is essential to have developed secure and reliable routing protocols. The work that is presented in this proposed work is an attempt to develop an ad-hoc routing protocol that is safe and robust. The protocol in question called Energy Efficient Wireless Path Optimization (EEWPO). The dynamic route selection mechanism, which is based upon genetic programming, and the connection integrity assurance algorithm have been combined within the framework of the proposed model routing scheme for wireless ad-hoc networks to produce a routing-based mechanism that is secure, flexible, and robust. This is accomplished by combining the two mechanisms within the framework of the proposed model routing scheme. These two aspects are going to work together to form the foundation of this plan. The new combination has the ability to give a higher degree of security to the current network, hence reducing the likelihood that vulnerabilities in connection and fake route injections would be exploited. When it comes to speech-based ad-hoc networks, which need dedicated connections for the exchange of voice data over an ad-hoc channel, intelligent route selection throughout the multipath network becomes very important. This is because the transmission of speech data is essential to the functioning of these networks. In order to materialize the robust ad-hoc routing algorithm, the generation of the adaptive ad-hoc network routing solution requires the ideally layered combination of the genetic programming-based routing solution along with the connection integrity assurance model. Only then can the adaptive ad-hoc network routing solution be created. The effectiveness of the recommended routing protocol has been shown via testing in a number of different simulated situations.
wireless sensor networks , K-Means Clustering , IPv6 , the IEEE 802.15.4 , routing technique , multipath routing
[1] C. K. Toh, “Ad Hoc Mobile Wireless Networks,” Prentice Hall Publishers, 2002.
[2] Z. Bojković, M. Stojanović, and B. Milovanović, “Current Developments towards the 4G Wireless System,” Proceedings of International Conference TELSIKS, Niš, Serbia, pp. 229- 232, September 2005.
[3] Chlamtac I.,Conti M.and Liu, J. J. N, “Mobile adhoc networking: imperatives and challenges” Ad Hoc Networks. Vol. No.1, pp. 13-64, 2003.
[4] Haoya Tan; Hoi-Lun Nagan; Yunhuai Liu; Nionel, L.M., “Measurement Study of MobilityInduced Losses in IEEE 802.15.4” IEEE International Conference on Communications (ICC 2010). pp.23-27, May 2010.
[5] H.Takagi and L. Kleinrock, “Optimal transmission ranges for randomly distributed packet radio terminals,”IEEE Trans on Communication,Vol. 32, No. 3, pp.246-257, March 1984.
[6] T.C Hou and V. O.K. Li, “Transmission range control in multihop radio networks,” Trans On Communication, Vol. 34, No.1, pp.38-44, January 1986.
[7] Al-Akaidi M.: Alchaita, M., “Link Stability and mobility in adhoc wireless networks,”, IET Communication, Vol.1, No.2, pp.173-178, April 2007.
[8] Ionis Nikolaidis, Michel Barbeau, Evangelos Krankis, “Ad-hoc and wireless Network,” Third International Conference, ADHOC_NOW,Vol. 3158, Springer, pp. 651-660, 2004.
[9] Jing Deng, Yunghsiang S. Han, Po-Ning Chen and Pramod K. Varsheny,”Optimal Transmission Range for Wireless Ad Hoc Network Based on Energy Efficiency,” .IEEE Transaction on Communications. Vol.55, No.9, 1439-1439, September 2007.
[10] Tien, T. C. and Upadhaya, S. J., “A Local/Global Strategy Based on Signal Strength for message Routing in Wireless Mobile Ad-Hoc Networks,” IEEE Wireless Communication and Networking Conference, Vol.3 pp. 227-232, 2000.
[11] M.Abolhasan, B.Hagelstein, J.C.P Wang, “Real world performance of current Proactive multi-hop mesh protocols,” IEEE APCC, October 2009.
[12] Neyre Tekbiyik,ElifUysal-Biyikoglu, Energy efficient wireless unicast routing alternatives for machine to machine networks, Journal of Network and Computer Application, Vol. 34, pp. 1587-1614,2011 101
[13] V.Kaudia and P.R. Kumar, “Power control and clustering in adhoc networks,” IEEE INFOCOM, Vol.1, pp.459-469, 2003.
[14] S.Singh and C.S. Raghavendra, “PAMAS: power aware multi-access protocol with singling for adhoc networks,” Computer communication review, Vol.28, No.3, pp. 5-26, 1998.
[15] A. EI Gamal, C.Nair, B. Prabhakar, E. Uysal-Biyikoglu, and S. Zahedi,”Energy –efficient Scheduling of Packet Transmissions over wireless networks,” IEEE/ACM Trans. Networking, Vol.10 pp. 487-499, Aug2002.
[16] Swain, A.R., Hansdah, R.C., Chouhan, V.K,”Energy Aware Routing Protocol with Sleep Scheduling for Wireless Sensor Networks,” 24th IEEE International conference on Advanced Information Networking and Applications (AINA), 20-23 pp. 933-940, April 2010.
[17] J. Gomez-Castellanos, A. Campbell, M. Naghshineh, and C. Bisdikian PARO: A Power – aware routing optimization scheme for mobile adhoc networks IETF Internet Draft, Section 10 of RFC2026, draft-gomez-paromanet-00.txt, March 2001
[18] Jones CE, Siva lingam KM, Agrawal P, and Chen JC, “A survey of energy efficient networks protocols for wireless network,” Wireless Networks, Vol.7.No.4, pp. 343- 358, 2001.
[19] Henry Kumagi “Wireless Networking Security Consideration,” published in Lasa Knowledgebase,” Available at: http:/www.ictknowledgebase.org.uk/wirelesssecurity
[20] Baker, D.J. & Ephremides, A. “The Architectural organization of a mobile radio network via distributed algorithm,” IEEE transactions on communications COM- pp.1694-1701, 1981.