Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 30073
Evaluation of Context Information for Intermittent Networks

Authors: S. Balaji, E. Golden Julie, Y. Harold Robinson

Abstract:

The context aware adaptive routing protocol is presented for unicast communication in intermittently connected mobile ad hoc networks (MANETs). The selection of the node is done by the Kalman filter prediction theory and it also makes use of utility functions. The context aware adaptive routing is defined by spray and wait technique, but the time consumption in delivering the message is too high and also the resource wastage is more. In this paper, we describe the spray and focus routing scheme for avoiding the existing problems.

Keywords: Context aware adaptive routing, Kalman filter prediction, spray and wait, spray and focus, intermittent networks.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1132739

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 354

References:


[1] A. Vahdat and D. Becker, “Epidemic Routing for partially connected Ad hoc networks”, Technical Report CS2000-06 Dept. Computer Science, Duke Univ., 2000.
[2] A. Lindgren, A. Doria, O. Schelen, “Probabilistic Routing in intermittently connected networks”, Mobile Computing and Commn. Rev.. Vol 7, no.3, July 2003.
[3] S. Balaji, M. Rajaram (2016), “SIPTAN: Securing Inimitable and Plundering Track for Ad Hoc Network”, Wireless Personal Communications, Springer, 1-21, DOI 10.1007/s11277-016-3187-y.
[4] V. Zhao, M.Ammar and E. Zegura, “A message ferrying approach for Data Delivery in Sparse mobile adhoc networks”, Proc. ACM MobiHoc’ 04, May 2004.
[5] M. Mirco Musolesi, Stephen Hailes, Cecilia Mascolo, “Adaptive Routing for Intermittently Connected Mobile Ad Hoc Networks,” Proc. Int’l Conf. World of Wireless, Mobile, and Multimedia networks (WoWMoM ’05), June 2005
[6] S. Balaji, M. Rajaram (2014), “EUDIS-An Encryption Scheme for User-Data Security in Public Networks”, World Academy of Science, Engineering and Technology, International Journal of Computer, Information, Systems and Control Engineering Vol: 8 No:11, pp. 1825 – 1830.
[7] T. Spyropoulos, K. Psounis and C.S. Raghavendra,”Spray and wait: An Efficient routing scheme for intermittently connected mobile networks”, Proc. Workshop Delay Tolerant Networking and Related networks (WDTN ’05), pp.252-259,2005
[8] Mirco Musolini, Cecilia Mascolo “CAR: Context aware adaptive routing for delay tolerant mobile networks”, Feb 2009.
[9] G. Arun Sam Paul Thomas, R. Karthik Ganesh, A. Kandasamy, S. Balaji, Y. Harold Robinson, (2011) “An Advanced Controlled-Flooding Routing with Group Organization for Delay Tolerant Networks using A-SMART”, Emerging Trends in Electrical and Computer Technology (ICETECT), 978-1-4244-7926-9/11, IEEE.
[10] R. Chen, F. Bao, M. Chang, J.-H. Cho, Dynamic trust management for delay tolerant networks and its application to secure routing, Parallel and Distributed Systems, IEEE Transactions on 25 (5) (2014) 1200– 1210.
[11] N. Li, S. K. Das, A trust-based framework for data forwarding in opportunistic networks, Ad Hoc Networks 11 (4) (2013) 1497–1509.
[12] Harold Robinson, Y., Rajaram, M., Golden Julie, E. and Balaji, S. (2016), “TBOR: Tree Based Opportunistic Routing for Mobile Ad Hoc Networks”, World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering Vol: 10, No:6, pp. 1115 – 1122.
[13] S. Biswas and R. Morris, “Exor: opportunistic multi-hop routing for wireless networks,” ACM SIGCOMM Computer Communication Review, vol. 35, no. 4, pp. 133–144, August 2005.
[14] Z. Zhong and S. Nelakuditi, “On the efficacy of opportunistic routing,” in 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, 2007, pp. 441–450.
[15] Balaji, S., Julie, E. G., Rajaram, M., & Robinson, Y. H. Fuzzy Based Particle Swarm Optimization Routing Technique for Load Balancing in Wireless Sensor Networks, World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering Vol:10, No:7, 2016, pp. 1384 – 1393.
[16] A. Darehshoorzadeh and L. Cerda-Alabern, “Candidate selection algorithms in opportunistic routing,” in Proceedings of the 5th ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks, ser. PM2HW2N ’10. New York, NY, USA: ACM, 2010, pp. 48–54.
[17] A. K. Dey, G. D. Abowd, and D. Salber, “A conceptual framework and a toolkit for supporting the rapid prototyping of context-aware applications,” Hum.-Comput. Interact., vol. 16, no. 2, pp. 97–166, 2001.
[18] Harold Robinson, Y., Rajaram, M., Golden Julie, E. and Balaji, S. (2016), “Tree Based Data Fusion Clustering Routing Algorithm for Illimitable Network Administration in Wireless Sensor Network”, World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering Vol:10, No:6, pp. 1123 – 1130.
[19] Tashtoush, Y.M., Okour, M.A.: Fuzzy Self-Clustering for Wireless Sensor Networks. In proceeding of the IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, pp. 223–229. 2008.
[20] Kim, B.H., Moon, S.Y., Lee, H.Y., Sun, C.I., and Cho, T.H.: Cluster Adaptation Method to Enhance Performance of Filtering scheme in Sensor Network in Proceeding of the 11th International Conference on Advanced Communication Technology, pp. 411–416. 2009.
[21] Harold Robinson, Y., Rajaram, M., Golden Julie, E. and Balaji, S. (2016), “Detection of Black Holes in MANET Using Collaborative Watchdog with Fuzzy Logic”, World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering Vol:10, No:3, pp. 575 – 581.
[22] Veena, K.N., Vijaya Kumar, B.P.: Dynamic Clustering for Wireless Sensor Networks: A Neuro-Fuzzy Technique Approach’ in Proceeding of the IEEE International Conference on Computational Intelligence and Computing Research (ICCIC), pp. 1–6. 2010.
[23] M. Musolesi and C. Mascolo, “Car: context-aware adaptive routing for delay-tolerant mobile networks,” Mobile Computing, IEEE Transactions on, vol. 8, no. 2, pp. 246–260, 2009.
[24] Harold Robinson, Y, Golden Julie E, Balaji S, Ayyasamy A, (2016), Energy Aware Clustering Scheme in Wireless Sensor Network Using Neuro-Fuzzy Approach , Wireless Personal Communications, Springer, 1-19, Doi: 10.1007/s11277-016-3793-8.
[25] Z. Wang, C. Li, and Y. Chen, “Local cooperative relay for opportunistic data forwarding in mobile ad-hoc networks,” in Proceedings of the IEEE International Conference on Communications, 2012, pp. 5381–5386.
[26] C. Boldrini, M. Conti, F. Delmastro, and A. Passarella, “Context- and social-aware middleware for opportunistic networks,” J. Netw. Comput. Appl., vol. 33, no. 5, pp. 525–541, Sep. 2010.
[27] Balaji, S., Rajaram, M., Robinson, Y. H., & Julie, E. G. (2016). A Hypercube Social Feature Extraction and Multipath Routing in Delay Tolerant Networks. World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering, 10(6), 1220-1229.
[28] M. Bheemalingaiah, C. Venkataiah, K. Vinay Kumar, M. M. Naidu, D. Sreenivasa Rao, “ Survey of Energy Aware On-demand Multipath Routing Protocols in Mobile Ad Hoc Networks”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 6, Issue 4, April 2016.
[29] Yibin Liang, Thesis on Multipath “Fresnel Zone” Routing for Wireless Ad Hoc Networks”, Virginia Polytechnic Institute and State University, March 2004.
[30] Robinson, Y. H., Julie, E. G., & Balaji, S. (2016), “Bandwidth and Delay Aware Routing Protocol with Scheduling Algorithm for Multi Hop Mobile Ad Hoc Networks”. World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering, 10(8), 1512-1521.
[31] Ya Xu, John Heidemann, Deborah Estrin, Geography informed Energy Conservation for Ad Hoc Routing. Proceedings of the Seventh Annual ACM/IEEE International Conference on Mobile Computing and Networking (ACM Mobicom), 2001.
[32] Heinzelman, W.R., Chankdrakasan A., Balakrishnan, H.: Energy Efficient Communication Protocol for Wireless Micro sensor Network. Int. Conf. Sys. Scien. 8, 2000, pp. 3005–3014.
[33] Harold Robinson, Y., Rajaram, M., Golden Julie, E. and Balaji, S. (2016) Dominating Set Algorithm and Trust Evaluation Scheme for Secured Cluster Formation and Data Transferring. World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering, vol. 10, No. 2, pp. 388-393.
[34] Wedde HF, Farooq M, Pannen baecker T, Vogel B. BeeAdHoc: an energy efficient routing algorithm for mobile ad hoc networks inspired by bee behavior. ProcACM Genet Evol Comput Conf 2005:153–60.
[35] Abed AK, Oz G, Aybay I. Influence of mobility models on the performance ofdata dissemination and routing in wireless mobile ad hoc networks. J ComputElectr Eng 2014; 40:319–29.
[36] Balaji, S., Harold Robinson, Y. and Rajaram, M. (2016) SCSBE: Secured Cluster and Sleep Based Energy-Efficient Sensory Data Collection with Mobile Sinks. Circuits and Systems, 7, 1992-2001.http://dx.doi.org/10.4236/cs.2016.78173.
[37] Su BL, Wang MS, Huang YM. Fuzzy logic weighted multi-criteria of dynamic route lifetime for reliable multicast routing an ad hoc networks. J Expert Syst Appl 2008; 35:476–84.
[38] Mazhar N, Farooq M. A hybrid artificial immune system (AIS) model for power aware secure mobile ad hoc networks (MANETs) routing protocols. J Appl SoftComput 2011; 11:5695–714.
[39] Robinson, Y.H., Balaji, S. and Rajaram, M. (2016) “ECBK: Enhanced Cluster Based Key Management Scheme for Achieving Quality of Service”, Circuits and Systems, 7, 2014-2024. http://dx.doi.org/10.4236/cs.2016.78175.
[40] S. Bohacek, J.P. Hespanha, K. Obraczka, J. Lee, C. Lim, Enhancing security via stochastic routing, in: Proceedings of the Eleventh International Conference on Computer Communication and Networks, 2002.
[41] W. Peng and X. Lu, “AHBP: An efficient broadcast protocol for mobile ad hoc networks,” Journal of computer science and technology, vol. 16, no. 2, pp. 114–125, 2001.
[42] M Geethalakshmi, Y Harold Robinson, “Fault tolerant routing and scheduling scheme for multi hop wireless networks”, International Journal of Advanced Research in Computer Science and Software Engineering, vol.3, no.3, 2013.