Skip to main content

Advertisement

Log in

Energy and delay efficient dynamic cluster formation using hybrid AGA with FACO in EAACK MANETs

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

MANET is a set of mobile nodes which works in a dynamic changing network and it is capable of communicating with each other efficiently where all the nodes perform a dual role as that of a transmitter and a receiver. MANETs do not use any centralized administration for communication. The performance of a MANET can be further enhanced by adapting a cluster mechanism with the help of CEAACK to provide security from penetrators. In this paper we propose a new improved ant colony optimization algorithm with two strategies to reduce the overhead in communication by predicting mobility of node and cluster formation. Firstly, a dynamic mechanism is designed for determining one or more heuristic parameters for improving the performance of the MANET. Secondly a dynamic list of nodes are maintained which helps in forming clusters and electing the cluster head faster. In addition a dynamic broadcast approach algorithm is incorporated to provide the information about the status of the nodes to the hybrid fuzzy-ant colony algorithm. This approach ensures low maintenance cost and is expected to be robust against node failures and network topology changes. The positive outcome of these two techniques consumes low energy and in the process provides better efficiency in data transmission in MANETs. It also achieves correct delivery of packets without unnecessary delay.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12

Similar content being viewed by others

References

  1. Zeng, Y., et al. (2013). Directional routing and scheduling for green vehicular delay tolerant networks. Wireless Networks, 19(2), 161–173.

    Article  Google Scholar 

  2. Zhou, J., et al. (2015). Secure and privacy preserving protocol for cloud-based vehicular DTNs. IEEE Transactions on Information Forensics and Security, 10(6), 1299–1314.

    Article  Google Scholar 

  3. Yao, Y., Cao, Q., & Vasilakos A. V. (2013). EDAL: An energy-efficient, delay-aware, and lifetime-balancing data collection protocol for wireless sensor networks. In MASS (pp. 182–190).

  4. Liu, J., et al. (2016). Leveraging software-defined networking for security policy enforcement. Information Sciences, 327, 288–299.

    Article  Google Scholar 

  5. Yang, M., et al. (2015). Software-defined and virtualized future mobile and wireless networks: A survey. MONET, 20(1), 4–18.

    Google Scholar 

  6. Yang, M., Li, Y., et al. (2015). Software-defined and virtualized future mobile and wireless networks: A survey. Mobile Networks and Applications, 20(1), 4–18.

    Article  Google Scholar 

  7. L. Zhou, et al. (2010). Context-aware middleware for multimedia services in heterogeneous networks. IEEE Intelligent Systems, 25(2), 40–47.

    Article  Google Scholar 

  8. Jiang, T., et al. (2012). QoE-driven channel allocation schemes for multimedia transmission of priority-based secondary users over cognitive radio networks. IEEE Journal on Selected Areas in Communications, 30(7), 1215–1224.

    Article  Google Scholar 

  9. Zhou, L., Xiong, N., Shu, L., Vasilakos, A. V., & Yeo, S. S. (2010). Context-aware middleware for multimedia services in heterogeneous networks. IEEE Intelligent Systems, 25(2), 40–47.

    Article  Google Scholar 

  10. Wu, J., & Dai, F. (2004). A generic distributed broadcast scheme in ad hoc wireless networks. IEEE Transactions on Computers, 53(10), 1343–1354.

    Article  Google Scholar 

  11. Câmara, D., & Loureiro, A. A. F. (2000). A novel routing algorithm for ad hoc networks. In 33rd Hawaii international conference on system sciences, January 2000.

  12. Ramakrishnan, B. (2010, Sept). Analytical study of cluster and sans cluster vehicular AdHoc network IJCEIT. ISSN 0974-2034.

  13. Yen, Y.-S., et al. (2011). Flooding-limited and multi-constrained QoS multicast routing based on the genetic algorithm for MANETs. Mathematical and Computer Modeling, 53(11–12), 2238–2250.

    Article  Google Scholar 

  14. Li, P. et al. (2012). Code Pipe: An opportunistic feeding and routing protocol for reliable multicast with pipelined Network coding. In INFOCOM (pp. 100–108).

  15. Li, P., Guo, S., Shui, Yu., & Vasilakos, A. V. (2014). Reliable multicast with pipelined network coding using opportunistic feeding and routing. IEEE Transactions on Parallel and Distributed Systems, 25(12), 3264–3273.

    Article  Google Scholar 

  16. Vasilakos, A. V., et al. (2015). Information centric network: Research challenges and opportunities. Journal of Network and Computer Applications, 52, 1–10.

    Article  Google Scholar 

  17. Lee, J. S., & Cheng, W. L. (2012). Fuzzy-logic-based clustering approach for wireless sensor networks using energy predication. IEEE Sensors Journal, 12(9), 2891–2897.

    Article  Google Scholar 

  18. Taheri, H., Neamatollahi, P., Younis, O. M., Naghibzadeh, S., & Yaghmaee, M. H. (2012). An energy-aware distributed clustering protocol in wireless sensor networks using fuzzy logic. Journal of Ad Hoc Networks, 10(7), 1469–1481.

    Article  Google Scholar 

  19. Bagci, H., & Yazici, A. (2010). An energy aware fuzzy unequal clustering algorithm for wireless sensor networks. In Proceeding of IEEE conference on fuzzy systems (pp. 1–8).

  20. Torghabeh, N. A., Totonchi, M. R. A., & Moghaddam, M. H. Y. (2010). Cluster head selection using a two-level fuzzy logic in wireless sensor networks. In Proceedings of the 2nd International Conference on Computer Engineering and Technology (ICCET) (Vol. 2, pp. V2-357–V2-361).

  21. Acampora, G., et al. (2010). Interoperable and adaptive fuzzy services for ambient intelligence applications. ACM Transactions on Autonomous and Adaptive Systems (TAAS), 5(2), 8.

    Google Scholar 

  22. Attar, A., et al. (2012). A survey of security challenges in cognitive radio networks: solutions and future research directions. Proceedings of the IEEE, 100(12), 3172–3186.

    Article  Google Scholar 

  23. Yan, Z., et al. (2014). A survey on trust management for Internet of Things. Journal of Network and Computer Application, 42, 120–134.

    Article  Google Scholar 

  24. Yang, H., et al. (2014). Provably secure three-party authenticated key agreement protocol using smart cards. Computer Networks, 58, 29–38.

    Article  Google Scholar 

  25. Zhou, J., et al. (2015). 4S: A secure and privacy-preserving key management scheme for cloud-assisted wireless body area network in m-healthcare social networks. Information Sciences, 314, 255–276.

    Article  Google Scholar 

  26. Fadlullah, Z. Md., et al. (2010). DTRAB: Combating against attacks on encrypted protocols through traffic-feature analysis. IEEE/ACM Transactions on Network, 18(4), 1234–1247.

    Article  Google Scholar 

  27. Yao, G., et al. (2015). Passive IP trace back: Disclosing the locations of IP spoofers from path backscatter. IEEE Transactions on Information Forensics and Security, 10(3), 471–484.

    Article  MathSciNet  Google Scholar 

  28. Liu, B., et al. (2014). Toward incentivizing anti-spoofing deployment. IEEE Transactions on Information Forensics and Security, 9(3), 436–450.

    Article  Google Scholar 

  29. Jing, Q., Vasilakos, A. V., Wan, J., Jingwei, L., & Qiu, D. (2014). Security of the internet of things: Perspectives and challenges. Wireless Networks, 20(8), 2481–2501.

    Article  Google Scholar 

  30. Youssef, M., et al. (2014). Routing metrics of cognitive radio networks: A survey. IEEE Communications Surveys and Tutorials, 16(1), 92–109.

    Article  Google Scholar 

  31. Dvir, A., & Vasilakos, A. V. (2011). Backpressure-based routing protocol for DTNs ACM SIGCOM. Computer Communication Review, 41(4), 405–406.

    Google Scholar 

  32. Zhang, X. M., Zhang, Y., Yan, F., & Vasilakos, A. V. (2015). Interference-based topology control Algorithm for delay-constrained mobile Ad hoc networks. IEEE Transactions on Mobile Computing, 14(4), 742–754.

    Article  Google Scholar 

  33. Ramakrishnan, B., Rajesh, R. S., & Shaji, R. S. (2011). Analysis of routing protocols for highway model without using roadside unit and cluster. International Journal of Scientific & Engineering Research, 2(1), 1–9.

    Article  Google Scholar 

  34. Malik, M., & Singh, Y. (2013). Analysis of LEACH protocol in wireless sensor networks. International Journal of Advanced Research in Computer Science and Software Engineering, 3(2), 178–184.

    Google Scholar 

  35. Lee, K., Lee, J., Lee, H., & Shin, Y. (2010, Feb). A density and distance based cluster head selection algorithm in sensor networks. In Proceedings of the international conference on advanced communication technology (pp. 162–165).

  36. Meng, T., Fan, W., Yang, Z., & Vasilakos, G. C. A. (2015). Spatial reusability-aware routing in multi-hop wireless networks. IEEE TMC. doi:10.1109/TC.2015.2417543.

    Google Scholar 

  37. Banerjee, S., & Khuller, S. (2001, April). A clustering scheme for hierarchical Control in multi-hop wireless networks. In Proceedings of the annual joint conference of the IEEE computer and communications societies (INFOCOM) (pp. 1028–1037).

  38. Wei, D., Jin, Y., Vural, S., Moessner, K., & Tafazolli, R. (2011). An energy-efficient clustering solution for wireless sensor Networks. IEEE Transactions on Wireless Communication, 10, 3973–3983.

    Article  Google Scholar 

  39. Ishmanov, F., Malik, A. S., & Kim, S. W. (2011). Energy consumption balancing (ECB) issues and mechanisms in wireless sensor networks (WSNs): A comprehensive overview. European Transactions on Telecommunications, 22, 151–167.

    Article  Google Scholar 

  40. Wei, L. et al. (2010). SecCloud: Bridging secure storage and computation in cloud. In ICDCS Workshops (pp. 52–61).

  41. Fadlullah, Z. Md., et al. (2010). DTRAB: combating against attacks on encrypted protocols through traffic-feature analysis. IEEE/ACM Transactions on Networking, 18(4), 1234–1247.

    Article  Google Scholar 

  42. Sathiamoorthy, J., Ramakrishnan, B., & Usha, M. (2015, November). Design of a competent broadcast algorithm for reliable transmission in CEAACK MANETs. Journal of Network Communications and Emerging Technologies, 5(1), 144–151.

    Google Scholar 

  43. Liu, L., et al. (2015). Physarum optimization: A biology-inspired algorithm for the steiner tree problem in networks. IEEE Transactions on Computers, 64(3), 819–832.

    MathSciNet  Google Scholar 

  44. Mohamed Jafar, O. A., & Sivakumar, R. (2010). Ant-based clustering algorithms: A brief survey. International Journal of Computer Theory and Engineering, 2(5), 1793–8201.

    Google Scholar 

  45. Song, Y., Liu, L., Ma, H., Vasilakos, A. V. (2014). A biology-based algorithm to minimal exposure problem of wireless sensor networks. IEEE Transactions on Network and Service Management 11(3), 417–430.

    Article  Google Scholar 

  46. Xiong, N., et al. (2009). Comparative analysis of quality of service and memory usage for adaptive failure Detectors in healthcare systems. IEEE Journal on Selected Areas in Communications, 27(4), 495–509.

    Article  Google Scholar 

  47. Busch, C., Kannan, R., & Vasilakos, A. V. (2012). Approximating congestion + dilation networks via “Quality of Routing” games. IEEE Transactions on Computers, 61(9), 1270–1283. doi:10.1109/TC.2011.145.

    Article  MathSciNet  Google Scholar 

  48. Khabbazian, M., Blake, I. F., & Bhargava, V. K. (2012). Local broadcast algorithms in wireless ad hoc networks: Reducing the number of transmissions. IEEE Transactions on Mobile Computing, 11(3), 402–413.

    Article  Google Scholar 

  49. Khabbazian, M., & Bhargava, V. K. (2008). Localized broadcasting with guaranteed delivery and bounded transmission redundancy. IEEE Transactions on Computers, 57(8), 1072–1086.

    Article  MathSciNet  Google Scholar 

  50. Joe, M. M., & Ramakrishnan, B. (2015). Review of vehicular ad hoc network communication models including WVANET (Web VANET) model and WVANET future research directions. In Wireless networks (pp. 1–18).

  51. Joe, M. M., & Ramakrishnan, B. (2015). WVANET: Modelling a novel web based communication architecture for Vehicular network. In Wireless personal communications (pp. 1–15).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to B. Ramakrishnan.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sathiamoorthy, J., Ramakrishnan, B. Energy and delay efficient dynamic cluster formation using hybrid AGA with FACO in EAACK MANETs. Wireless Netw 23, 371–385 (2017). https://doi.org/10.1007/s11276-015-1154-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-015-1154-2

Keywords

Navigation