Generic placeholder image

Recent Advances in Computer Science and Communications

Editor-in-Chief

ISSN (Print): 2666-2558
ISSN (Online): 2666-2566

Research Article

An Energy-efficient Routing Protocol Based on Elephant Herding Optimization in MANET

Author(s): A. Dinesh* and B.P. Sreejith Vignesh

Volume 17, Issue 8, 2024

Published on: 06 March, 2024

Article ID: e060324227747 Pages: 11

DOI: 10.2174/0126662558284944240223131955

Price: $65

conference banner
Abstract

Background: A mobile ad hoc network (MANET) is a collection of self-organizing mobile nodes creating an ad hoc network without fixed infrastructure. Routing is a major issue in mobile networks that may reduce network performance due to frequent network topology changes. Routing protocols are so important in dynamic multi-hop networks that many studies have focused on the routing problem in MANETs.

Methods: In this research work, a proposed ad hoc on-demand distance vector (AODV) with an elephant herding optimization (EHO) called AODVEHO is used as an optimal path selection method that creates a set of best paths between destination and source.

Results: To validate the performance of proposed AODVEHO, AntHocNet, AODV, and designation sequence distance vector (DSDV). Various performance measures are considered to validate our proposed research work, such as packet delivery ratio (PDR), end-to-end delay (E2ED), and average energy consumption (AEC).

Conclusion: Experimental results are indicated that the AODVEHO achieved a higher routing overhead (73 %), PDR (89.87 %), low E2ED rate (95.22 %), AEC (75.60 %), and dead nodes (75%) when compared to other routing schemes.

Keywords: MANET, Routing protocols, AODV, elephant herding optimization, energy efficient, mobile nodes.

[1]
D. Sinwar, N. Sharma, S.K. Maakar, and S. Kumar, "Analysis and comparison of ant colony optimization algorithm with DSDV, AODV, and AOMDV based on shortest path in MANET", Journal of Information and Optimization Sciences, vol. 41, no. 2, pp. 621-632, 2020.
[http://dx.doi.org/10.1080/02522667.2020.1733193]
[2]
S. Venkatasubramanian, A. Suhasini, and C. Vennila, "Cluster head selection and optimal multipath detection using coral reef optimization in MANET environment", International Journal of Computer Network and Information Security, vol. 14, no. 3, pp. 88-99, 2022.
[http://dx.doi.org/10.5815/ijcnis.2022.03.07]
[3]
B.P.S. Vignesh, and M.R. Babu, "Classifying the malware application in the Android-based smart phones using ensemble-ANFIS algorithm", International Journal of Networking and Virtual Organisations, vol. 19, no. 2/3/4, pp. 257-269, 2018.
[http://dx.doi.org/10.1504/IJNVO.2018.095425]
[4]
T. Singh, J. Singh, and S. Sharma, "Energy efficient secured routing protocol for MANETs", Wirel. Netw., vol. 23, no. 4, pp. 1001-1009, 2017.
[http://dx.doi.org/10.1007/s11276-015-1176-9]
[5]
Q. Zheng, X. Tian, Z. Yu, N. Jiang, A. Elhanashi, S. Saponara, and R. Yu, "Application of wavelet-packet transform driven deep learning method in PM2.5 concentration prediction: A case study of Qingdao, China", Sustain Cities Soc., vol. 92, p. 104486, 2023.
[http://dx.doi.org/10.1016/j.scs.2023.104486]
[6]
T.A.N. Abdali, R. Hassan, R.C. Muniyandi, A.H. Mohd Aman, Q.N. Nguyen, and A.S. Al-Khaleefa, "Optimized particle swarm optimization algorithm for the realization of an enhanced energy-aware location-aided routing protocol in manet", Information, vol. 11, no. 11, p. 529, 2020.
[http://dx.doi.org/10.3390/info11110529]
[7]
S. V. BP, "Incremental research on cyber security metrics in android applications by implementing the ML algorithms in malware classification and detection", J. Cybersecu. Inf. Manage, vol. 3, no. 1, pp. 14-420, 2021.
[8]
B.P. Sreejith Vignesh, "Application of IPF to Achieve CSR routing in adhoc networks", Asian J. Comp. Sci. Technol., vol. 9, no. 2, pp. 18-23, 2020.
[http://dx.doi.org/10.51983/ajcst-2020.9.2.2172]
[9]
G-G. Wang, S. Deb, and L.S. Coelho, "Elephant herding optimization", in 2015 3rd international symposium on computational and business intelligence 2015: IEEE, pp. 1-5, .
[http://dx.doi.org/10.1109/ISCBI.2015.8]
[10]
A. Kout, S. Labed, S. Chikhi, and E.B. Bourennane, "AODVCS, a new bio-inspired routing protocol based on cuckoo search algorithm for mobile ad hoc networks", Wirel. Netw., vol. 24, no. 7, pp. 2509-2519, 2018.
[http://dx.doi.org/10.1007/s11276-017-1485-2]
[11]
S. Sarhan, and S. Sarhan, "Elephant herding optimization Ad Hoc on-demand multipath distance vector routing protocol for MANET", IEEE Access, vol. 9, pp. 39489-39499, 2021.
[http://dx.doi.org/10.1109/ACCESS.2021.3065288]
[12]
C. Rajan, and N. Shanthi, "Genetic based optimization for multicast routing algorithm for MANET", Sadhana, vol. 40, no. 8, pp. 2341-2352, 2015.
[http://dx.doi.org/10.1007/s12046-015-0437-8]
[13]
D. Gupta, A. Khanna, L. Sk, K. Shankar, V. Furtado, and J.J.P.C. Rodrigues, "Efficient artificial fish swarm based clustering approach on mobility aware energy‐efficient for MANET", Trans. Emerg. Telecommun. Technol., vol. 30, no. 9, p. e3524, 2019.
[http://dx.doi.org/10.1002/ett.3524]
[14]
P. Jayalakshmi, and R. Saravanan, "ACO-based enhanced energy-efficient intelligent routing protocol for MANET", International Journal of Grid and Utility Computing, vol. 11, no. 4, pp. 435-442, 2020.
[http://dx.doi.org/10.1504/IJGUC.2020.108445]
[15]
J.S. Priya, M.A. Femina, and R.A. Samuel, "APSO-MVS: An adaptive particle swarm optimization incorporating multiple velocity strategies for optimal leader selection in hybrid MANETs", Soft Comput., vol. 24, no. 24, pp. 18349-18365, 2020.
[http://dx.doi.org/10.1007/s00500-020-05034-z]
[16]
M. Ahmad, A. Hameed, F. Ullah, I. Wahid, S.U. Rehman, and H.A. Khattak, "A bio-inspired clustering in mobile adhoc networks for internet of things based on honey bee and genetic algorithm", J. Ambient Intell. Humaniz. Comput., vol. 11, no. 11, pp. 4347-4361, 2020.
[http://dx.doi.org/10.1007/s12652-018-1141-4]
[17]
R. Kushwah, S. Tapaswi, and A. Kumar, "A novel technique for gateway selection in hybrid manet using genetic algorithm", Wirel. Pers. Commun., vol. 126, no. 2, pp. 1273-1299, 2022.
[http://dx.doi.org/10.1007/s11277-022-09791-y]
[18]
M.A. Al-Shareeda, and S. Manickam, "COVID-19 vehicle based on an efficient mutual authentication scheme for 5G-enabled vehicular fog computing", Int. J. Environ. Res. Public Health, vol. 19, no. 23, p. 15618, 2022.
[http://dx.doi.org/10.3390/ijerph192315618] [PMID: 36497709]
[19]
M.A. Al-Shareeda, M. Anbar, S. Manickam, and I.H. Hasbullah, "Se-cppa: A secure and efficient conditional privacy-preserving authentication scheme in vehicular ad-hoc networks", Sensors (Basel), vol. 21, no. 24, p. 8206, 2021.
[http://dx.doi.org/10.3390/s21248206] [PMID: 34960311]
[20]
M.A. Al-Shareeda, M. Anbar, S. Manickam, and I.H. Hasbullah, "Towards identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks", IEEE Access, vol. 9, pp. 113226-113238, 2021.
[http://dx.doi.org/10.1109/ACCESS.2021.3104148]
[21]
B.A. Mohammed, M.A. Al-Shareeda, S. Manickam, Z.G. Al-Mekhlafi, A. Alreshidi, M. Alazmi, J.S. Alshudukhi, and M. Alsaffar, "FC-PA: fog computing-based pseudonym authentication scheme in 5G-enabled vehicular networks", IEEE Access, vol. 11, pp. 18571-18581, 2023.
[http://dx.doi.org/10.1109/ACCESS.2023.3247222]
[22]
M.A. Al-Shareeda, and S. Manickam, "Msr-dos: Modular square root-based scheme to resist denial of service (dos) attacks in 5g-enabled vehicular networks", IEEE Access, vol. 10, pp. 120606-120615, 2022.
[http://dx.doi.org/10.1109/ACCESS.2022.3222488]
[23]
H. Singh, B. Singh, and M. Kaur, "An improved elephant herding optimization for global optimization problems", Eng. Comput., pp. 1-33, 2021.
[24]
J. Li, H. Lei, A.H. Alavi, and G.G. Wang, "Elephant herding optimization: variants, hybrids, and applications", Mathematics, vol. 8, no. 9, p. 1415, 2020.
[http://dx.doi.org/10.3390/math8091415]
[25]
K. Chandravanshi, G. Soni, and D.K. Mishra, "Design and analysis of an energy-efficient load balancing and bandwidth aware adaptive multipath n-channel routing approach in MANET", IEEE Access, vol. 10, pp. 110003-110025, 2022.
[http://dx.doi.org/10.1109/ACCESS.2022.3213051]
[26]
Q. Zheng, P. Zhao, D. Zhang, and H. Wang, "MR‐DCAE: Manifold regularization‐based deep convolutional autoencoder for unauthorized broadcasting identification", Int. J. Intell. Syst., vol. 36, no. 12, pp. 7204-7238, 2021.
[http://dx.doi.org/10.1002/int.22586]
[27]
C. Perkins, E. Belding-Royer, and S. Das, Ad hoc on-demand distance vector (AODV) routing, pp. 2070-1721, 2003.
[http://dx.doi.org/10.17487/rfc3561]
[28]
C. Perkins, E. Belding-Royer, and S. Das, RFC3561: Ad hoc ondemand distance vector (AODV) routing., United States, 2003.

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy