Abstract
MANET is a set of mobile nodes which works in a dynamic changing network and it is capable of communicating with each other efficiently where all the nodes perform a dual role as that of a transmitter and a receiver. MANETs do not use any centralized administration for communication. The performance of a MANET can be further enhanced by adapting a cluster mechanism with the help of CEAACK to provide security from penetrators. In this paper we propose a new improved ant colony optimization algorithm with two strategies to reduce the overhead in communication by predicting mobility of node and cluster formation. Firstly, a dynamic mechanism is designed for determining one or more heuristic parameters for improving the performance of the MANET. Secondly a dynamic list of nodes are maintained which helps in forming clusters and electing the cluster head faster. In addition a dynamic broadcast approach algorithm is incorporated to provide the information about the status of the nodes to the hybrid fuzzy-ant colony algorithm. This approach ensures low maintenance cost and is expected to be robust against node failures and network topology changes. The positive outcome of these two techniques consumes low energy and in the process provides better efficiency in data transmission in MANETs. It also achieves correct delivery of packets without unnecessary delay.












Similar content being viewed by others
References
Zeng, Y., et al. (2013). Directional routing and scheduling for green vehicular delay tolerant networks. Wireless Networks, 19(2), 161–173.
Zhou, J., et al. (2015). Secure and privacy preserving protocol for cloud-based vehicular DTNs. IEEE Transactions on Information Forensics and Security, 10(6), 1299–1314.
Yao, Y., Cao, Q., & Vasilakos A. V. (2013). EDAL: An energy-efficient, delay-aware, and lifetime-balancing data collection protocol for wireless sensor networks. In MASS (pp. 182–190).
Liu, J., et al. (2016). Leveraging software-defined networking for security policy enforcement. Information Sciences, 327, 288–299.
Yang, M., et al. (2015). Software-defined and virtualized future mobile and wireless networks: A survey. MONET, 20(1), 4–18.
Yang, M., Li, Y., et al. (2015). Software-defined and virtualized future mobile and wireless networks: A survey. Mobile Networks and Applications, 20(1), 4–18.
L. Zhou, et al. (2010). Context-aware middleware for multimedia services in heterogeneous networks. IEEE Intelligent Systems, 25(2), 40–47.
Jiang, T., et al. (2012). QoE-driven channel allocation schemes for multimedia transmission of priority-based secondary users over cognitive radio networks. IEEE Journal on Selected Areas in Communications, 30(7), 1215–1224.
Zhou, L., Xiong, N., Shu, L., Vasilakos, A. V., & Yeo, S. S. (2010). Context-aware middleware for multimedia services in heterogeneous networks. IEEE Intelligent Systems, 25(2), 40–47.
Wu, J., & Dai, F. (2004). A generic distributed broadcast scheme in ad hoc wireless networks. IEEE Transactions on Computers, 53(10), 1343–1354.
Câmara, D., & Loureiro, A. A. F. (2000). A novel routing algorithm for ad hoc networks. In 33rd Hawaii international conference on system sciences, January 2000.
Ramakrishnan, B. (2010, Sept). Analytical study of cluster and sans cluster vehicular AdHoc network IJCEIT. ISSN 0974-2034.
Yen, Y.-S., et al. (2011). Flooding-limited and multi-constrained QoS multicast routing based on the genetic algorithm for MANETs. Mathematical and Computer Modeling, 53(11–12), 2238–2250.
Li, P. et al. (2012). Code Pipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined Network coding. In INFOCOM (pp. 100–108).
Li, P., Guo, S., Shui, Yu., & Vasilakos, A. V. (2014). Reliable multicast with pipelined network coding using opportunistic feeding and routing. IEEE Transactions on Parallel and Distributed Systems, 25(12), 3264–3273.
Vasilakos, A. V., et al. (2015). Information centric network: Research challenges and opportunities. Journal of Network and Computer Applications, 52, 1–10.
Lee, J. S., & Cheng, W. L. (2012). Fuzzy-logic-based clustering approach for wireless sensor networks using energy predication. IEEE Sensors Journal, 12(9), 2891–2897.
Taheri, H., Neamatollahi, P., Younis, O. M., Naghibzadeh, S., & Yaghmaee, M. H. (2012). An energy-aware distributed clustering protocol in wireless sensor networks using fuzzy logic. Journal of Ad Hoc Networks, 10(7), 1469–1481.
Bagci, H., & Yazici, A. (2010). An energy aware fuzzy unequal clustering algorithm for wireless sensor networks. In Proceeding of IEEE conference on fuzzy systems (pp. 1–8).
Torghabeh, N. A., Totonchi, M. R. A., & Moghaddam, M. H. Y. (2010). Cluster head selection using a two-level fuzzy logic in wireless sensor networks. In Proceedings of the 2nd International Conference on Computer Engineering and Technology (ICCET) (Vol. 2, pp. V2-357–V2-361).
Acampora, G., et al. (2010). Interoperable and adaptive fuzzy services for ambient intelligence applications. ACM Transactions on Autonomous and Adaptive Systems (TAAS), 5(2), 8.
Attar, A., et al. (2012). A survey of security challenges in cognitive radio networks: solutions and future research directions. Proceedings of the IEEE, 100(12), 3172–3186.
Yan, Z., et al. (2014). A survey on trust management for Internet of Things. Journal of Network and Computer Application, 42, 120–134.
Yang, H., et al. (2014). Provably secure three-party authenticated key agreement protocol using smart cards. Computer Networks, 58, 29–38.
Zhou, J., et al. (2015). 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks. Information Sciences, 314, 255–276.
Fadlullah, Z. Md., et al. (2010). DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis. IEEE/ACM Transactions on Network, 18(4), 1234–1247.
Yao, G., et al. (2015). Passive IP trace back: Disclosing the locations of IP spoofers from path backscatter. IEEE Transactions on Information Forensics and Security, 10(3), 471–484.
Liu, B., et al. (2014). Toward incentivizing anti-spoofing deployment. IEEE Transactions on Information Forensics and Security, 9(3), 436–450.
Jing, Q., Vasilakos, A. V., Wan, J., Jingwei, L., & Qiu, D. (2014). Security of the internet of things: Perspectives and challenges. Wireless Networks, 20(8), 2481–2501.
Youssef, M., et al. (2014). Routing metrics of cognitive radio networks: A survey. IEEE Communications Surveys and Tutorials, 16(1), 92–109.
Dvir, A., & Vasilakos, A. V. (2011). Backpressure-based routing protocol for DTNs ACM SIGCOM. Computer Communication Review, 41(4), 405–406.
Zhang, X. M., Zhang, Y., Yan, F., & Vasilakos, A. V. (2015). Interference-based topology control Algorithm for delay-constrained mobile Ad hoc networks. IEEE Transactions on Mobile Computing, 14(4), 742–754.
Ramakrishnan, B., Rajesh, R. S., & Shaji, R. S. (2011). Analysis of routing protocols for highway model without using roadside unit and cluster. International Journal of Scientific & Engineering Research, 2(1), 1–9.
Malik, M., & Singh, Y. (2013). Analysis of LEACH protocol in wireless sensor networks. International Journal of Advanced Research in Computer Science and Software Engineering, 3(2), 178–184.
Lee, K., Lee, J., Lee, H., & Shin, Y. (2010, Feb). A density and distance based cluster head selection algorithm in sensor networks. In Proceedings of the international conference on advanced communication technology (pp. 162–165).
Meng, T., Fan, W., Yang, Z., & Vasilakos, G. C. A. (2015). Spatial reusability-aware routing in multi-hop wireless networks. IEEE TMC. doi:10.1109/TC.2015.2417543.
Banerjee, S., & Khuller, S. (2001, April). A clustering scheme for hierarchical Control in multi-hop wireless networks. In Proceedings of the annual joint conference of the IEEE computer and communications societies (INFOCOM) (pp. 1028–1037).
Wei, D., Jin, Y., Vural, S., Moessner, K., & Tafazolli, R. (2011). An energy-efficient clustering solution for wireless sensor Networks. IEEE Transactions on Wireless Communication, 10, 3973–3983.
Ishmanov, F., Malik, A. S., & Kim, S. W. (2011). Energy consumption balancing (ECB) issues and mechanisms in wireless sensor networks (WSNs): A comprehensive overview. European Transactions on Telecommunications, 22, 151–167.
Wei, L. et al. (2010). SecCloud: Bridging secure storage and computation in cloud. In ICDCS Workshops (pp. 52–61).
Fadlullah, Z. Md., et al. (2010). DTRAB: combating against attacks on encrypted protocols through traffic-feature analysis. IEEE/ACM Transactions on Networking, 18(4), 1234–1247.
Sathiamoorthy, J., Ramakrishnan, B., & Usha, M. (2015, November). Design of a competent broadcast algorithm for reliable transmission in CEAACK MANETs. Journal of Network Communications and Emerging Technologies, 5(1), 144–151.
Liu, L., et al. (2015). Physarum optimization: A biology-inspired algorithm for the steiner tree problem in networks. IEEE Transactions on Computers, 64(3), 819–832.
Mohamed Jafar, O. A., & Sivakumar, R. (2010). Ant-based clustering algorithms: A brief survey. International Journal of Computer Theory and Engineering, 2(5), 1793–8201.
Song, Y., Liu, L., Ma, H., Vasilakos, A. V. (2014). A biology-based algorithm to minimal exposure problem of wireless sensor networks. IEEE Transactions on Network and Service Management 11(3), 417–430.
Xiong, N., et al. (2009). Comparative analysis of quality of service and memory usage for adaptive failure Detectors in healthcare systems. IEEE Journal on Selected Areas in Communications, 27(4), 495–509.
Busch, C., Kannan, R., & Vasilakos, A. V. (2012). Approximating congestion + dilation networks via “Quality of Routing” games. IEEE Transactions on Computers, 61(9), 1270–1283. doi:10.1109/TC.2011.145.
Khabbazian, M., Blake, I. F., & Bhargava, V. K. (2012). Local broadcast algorithms in wireless ad hoc networks: Reducing the number of transmissions. IEEE Transactions on Mobile Computing, 11(3), 402–413.
Khabbazian, M., & Bhargava, V. K. (2008). Localized broadcasting with guaranteed delivery and bounded transmission redundancy. IEEE Transactions on Computers, 57(8), 1072–1086.
Joe, M. M., & Ramakrishnan, B. (2015). Review of vehicular ad hoc network communication models including WVANET (Web VANET) model and WVANET future research directions. In Wireless networks (pp. 1–18).
Joe, M. M., & Ramakrishnan, B. (2015). WVANET: Modelling a novel web based communication architecture for Vehicular network. In Wireless personal communications (pp. 1–15).
Author information
Authors and Affiliations
Corresponding author
About this article
Cite this article
Sathiamoorthy, J., Ramakrishnan, B. Energy and delay efficient dynamic cluster formation using hybrid AGA with FACO in EAACK MANETs. Wireless Netw 23, 371–385 (2017). https://doi.org/10.1007/s11276-015-1154-2
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-015-1154-2