A QoS Perception Routing Protocol for MANETs Based on Machine Learning

Authors

  • N. Sivapriya Assistant Professor, Department of Computer Application, Cauvery College for Women, Trichy, TamilNadu, India
  • R. Mohandas Associate Professor, Department of ECE, Balaji Institute of Technology & Science, Warangal, Telangana, India
  • Karthik Kumar Vaigandla Assistant Professor, Department of ECE, Balaji Institute of Technology & Science, Warangal, Telangana, India

Keywords:

AODV, Attack, Machine learning (ML), ML-AODV, MANETs, mobile node, SVM, Routing protocol, DSDV

Abstract

Machine learning (ML) approaches facilitate the acquisition of knowledge by a system and promote its capacity to adapt to the environment, relying on a multitude of logical and statistical processes. The primary objective of ML is to identify intricate patterns and derive decisions from the obtained outcomes. A range of ML methods have been used for the purpose of enhancing the security of mobile ad-hoc networks (MANETs). The recent progress in wireless communication has prompted researchers to focus their efforts on the development of MANETs. These networks include nodes communicating with one other in order to provide real-time entertainment services as required. Nevertheless, the establishment of safe routing in MANETs remains a formidable challenge, mostly attributed to the wireless connection and decentralized design of these networks. The Ad-hoc On-demand Distance Vector (AODV) routing protocol is extensively used in MANETs due to its broad range of applications, commendable performance, and scalability. However, the AODV routing protocol is considered to be a non-optimal solution since it offers simply an alternative route rather than an optimized one. This research presents a suggested ML based AODV Routing Protocol (ML-AODV) for the purpose of mitigating flooding and blackhole attacks in MANETs. The assessment of the suggested methodology is conducted using the NS-2 simulator and compared to established routing frameworks. This work aims to conduct a comparative analysis and investigation of the AODV, DSDV, and ML-AODV protocols. The analysis will primarily focus on evaluating the performance of these protocols using different metrics, including throughput (TP), packet delivery ratio (PDR), average end-to-end latency (E2EL), packet loss rate (PLR), and energy consumption (EC). The results indicate that the performance of ML-AODV outperforms that of DSDV and AODV. The ML-AODV algorithm demonstrates enhanced performance and reliability compared to previous techniques, while significantly reducing latency, routing overhead (RO), and PLR.

Downloads

Download data is not yet available.

References

Goyal N and Gaba A 2013 A new approach of location aided routing protocol using minimum bandwidth in mobile ad- hoc network International Journal of Computer Technology and Applications 4 pp 653.

Sivapriya, N. ., Mohandas, R. ., Kumar, P. K. ., & Vaigandla, K. K. . (2023). Dissection of Mobility Model Routing Protocols in MANET on QoS Criterion. International Journal on Recent and Innovation Trends in Computing and Communication, 11(8), 357–365. https://doi.org/10.17762/ijritcc.v11i8.8030

K. K. Vaigandla, "Communication Technologies and Challenges on 6G Networks for the Internet: Internet of Things (IoT) Based Analysis," 2022 2nd International Conference on Innovative Practices in Technology and Management (ICIPTM), 2022, pp. 27-31, doi: 10.1109/ICIPTM54933.2022.9753990.

Karthik Kumar Vaigandla, J.Benita, "PRNGN - PAPR Reduction using Noise Validation and Genetic System on 5G Wireless Network," International Journal of Engineering Trends and Technology, vol. 70, no. 8, pp. 224-232, 2022. https://doi.org/10.14445/22315381/IJETT-V70I8P223

A. Arya and J. Singh, “Comparative Study of AODV , DSDV and DSR Routing Protocols in Wireless Sensor Network Using NS-2 Simulator,” vol. 5, no. 4, pp. 5053–5056, 2014.

M. Manjunath and D. H. Manjaiah, “Performance Comparative of AODV, AOMDV and DSDV Routing Protocols in MANET Using NS2 Alamsyah1,2,” Int. J. Commun. Netw. Syst., vol. 004, no. 001, pp. 18–22, 2018, doi: 10.20894/ijcnes.103.004.001.005.

M. G. K. Alabdullah, B. M. Atiyah, K. S. Khalaf, and S. H. Yadgar, “Analysis and simulation of three MANET routing protocols: A research on AODV, DSR & DSDV characteristics and their performance evaluation,” Period. Eng. Nat. Sci., vol. 7, no. 3, pp. 1228–1238, 2019, doi: 10.21533/pen.v7i3.717.

Salam, T. and Hossen, M., 2020. Performance analysis on homogeneous LEACH and EAMMH protocols in wireless sensor network. Wireless Personal Communications, 113(1), pp.189-222. https://link.springer.com/article/10.1007/s11277-020-07185-6

Hossen, M., 2019. DTN routing protocols on two distinct geographical regions in an opportunistic network: an analysis. Wireless Personal Communications, 108(2), pp.839-851. https://link.springer.com/article/10.1007/s11277-019-06431-w.

AL-Dhief, F.T., Sabri, N., Salim, M.S., Fouad, S. and Aljunid, S.A., 2018. MANET routing protocols evaluation: AODV, DSR and DSDV perspective. In MATEC web of conferences (Vol. 150, p. 06024). EDP Sciences.

Singh, R.K. and Nand, P., 2016, April. Literature review of routing attacks in MANET. In 2016 International Conference on Computing, Communication and Automation (ICCCA) (pp. 525-530). IEEE.

Singh, U., Samvatsar, M., Sharma, A. and Jain, A.K., 2016, March. Detection and avoidance of unified attacks on MANET using trusted secure AODV routing protocol. In 2016 Symposium on Colossal Data Analysis and Networking (CDAN) (pp. 1-6). IEEE.

Kamel, M.B.M., Alameri, I. and Onaizah, A.N., 2017, March. STAODV: a secure and trust based approach to mitigate blackhole attack on AODV based MANET. In 2017 IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC) (pp. 1278-1282). IEEE.

Deshmukh, S.R., Chatur, P.N. and Bhople, N.B., 2016, May. AODV-based secure routing against blackhole attack in MANET. In 2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT) (pp. 1960-1964). IEEE.

Talukdar, M.I., Hassan, R., Hossen, M.S., Ahmad, K., Qamar, F. and Ahmed, A.S., 2021. Performance improvements of AODV by black hole attack detection using IDS and digital signature. Wireless Communications and Mobile Computing, 2021. https://www.hindawi.com/journals/wcmc/2021/6693316/

T. H. Sureshbhai, M. Mahajan, and M. K. Rai, “An investigational analysis of DSDV, AODV and DSR routing protocols in mobile Ad Hoc networks,” Proc. - 2nd Int. Conf. Intell. Circuits Syst. ICICS 2018, pp. 286–289, 2018, doi: 10.1109/ICICS.2018.00064.

A. Hariharan, A. Gupta and T. Pal, "CAMLPAD: Cybersecurity Autonomous Machine Learning Platform for Anomaly Detection," Proc. Future of Information and Communication Conference (FICC), San Francisco, CA, USA, pp. 705-720, 2020.

S. El Khediri, N. Nasri, A. Benfradj, A. Kachouri, and A. Wei, “Routing protocols in MANET: Performance comparison of AODV, DSR and DSDV protocols using NS2,” 2014 Int. Symp. Networks, Comput. Commun. ISNCC 2014, 2014, doi: 10.1109/SNCC.2014.6866519.

B. Paul, K. A. Bhuiyan, K. Fatema, and P. P. Das, “Analysis of AOMDV, AODV, DSR, and DSDV routing protocols for wireless sensor network,” Proc. - 2014 6th Int. Conf. Comput. Intell. Commun. Networks, CICN 2014, pp. 364–369, 2014, doi: 10.1109/CICN.2014.88.

Routray, S.K., Sharmila, K.: Routing in dynamically changing node location scenarios: A reinforcement learning approach. In: 2017 Third International Conference on Advances in Electrical, Electronics, Information, Communication and Bio-Informatics (AEEICB), pp. 458–462. IEEE, (2017). https://doi.org/10.1109/AEEICB.2017.7972354

Khan, F., Memon, S., Jokhio, S.H.: Support vector machine based energy aware routing in wireless sensor networks. In: 2016 2nd International Conference on Robotics and Artificial Intelligence (ICRAI), pp. 1–4. https://doi.org/10.1109/ICRAI.2016.7791218

Troia, S., Rodriguez, A., Mart´ın, I., Hern´andez, J.A., De Dios, O.G., Alvizu, R., Musumeci, F., Maier, G.: Machine-learning-assisted routing in sdn-based optical networks. In: 2018 European Conference on Optical Communication (ECOC), pp. 1–3. https://doi.org/10.1109/ECOC.2018.8535437

Hu, T., Fei, Y.: An adaptive and energy-efficient routing protocol based on machine learning for underwater delay tolerant networks. In: 2010 IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, pp. 381–384. https://doi.org/10.1109/MASCOTS.2010.45

Vaigandla, Karthik Kumar and Benita, J. ‘Selective Mapping Scheme Based on Modified Forest Optimization Algorithm for PAPR Reduction in FBMC System’. Journal of Intelligent & Fuzzy Systems, vol. 45, no. 4, pp. 5367-5381, October 2023, DOI: 10.3233/JIFS-222090.

Vaigandla, K. K. ., & Benita, J. (2023). A Novel PAPR Reduction in Filter Bank Multi-Carrier (FBMC) with Offset Quadrature Amplitude Modulation (OQAM) Based VLC Systems. International Journal on Recent and Innovation Trends in Computing and Communication, 11(5), 288–299. https://doi.org/10.17762/ijritcc.v11i5.6616

Karthik Kumar Vaigandla and J.Benita (2022), Novel Algorithm for Nonlinear Distortion Reduction Based on Clipping and Compressive Sensing in OFDM/OQAM System. IJEER 10(3), 620-626. https://doi.org/10.37391/IJEER.100334.

Shrestha, S., Baidya, R., Giri, B. and Thapa, A., 2020, March. Securing blackhole attacks in MANETs using modified sequence number in AODV routing protocol. In 2020 8th International Electrical Engineering Congress (iEECON) (pp. 1-4). IEEE.

Su, M.Y., 2011. Prevention of selective black hole attacks on mobile ad hoc networks through intrusion detection systems. Computer Communications, 34(1), pp.107-117.

Sargunavathi, S. and Martin Leo Manickam, J., 2019. Enhanced trust based encroachment discovery system for Mobile Ad-hoc networks. Cluster Computing, 22(2), pp.4837-4847.

Li, J.S. and Lee, C.T., 2006. Improve routing trust with promiscuous listening routing security algorithm in mobile ad hoc networks. Computer communications, 29(8), pp.1121-1132.

Kumar, P., Tripathi, S. and Pal, P., 2018, March. Neural network based reliable transport layer protocol for MANET. In 2018 4th International Conference on Recent Advances in Information Technology (RAIT) (pp. 1-6). IEEE.

Arthur, M.P., 2018, September. An SVM-based multiclass IDS for multicast routing attacks in mobile ad hoc networks. In 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI) (pp. 363-368). IEEE.

Garc´ıa, S., Ram´ırez-Gallego, S., Luengo, J., Ben´ıtez, J.M., Herrera, F.: Big data preprocessing: methods and prospects. Big Data Analytics 1(1), 1–22 (2016). https://doi.org/10.1186/s41044-016-0014-0

Buiati F, Puttini R, de Sousa R, Abbas C J B, Villalba L J G 2004 Authentication and Auto configuration for MANET Nodes 2004 Embedded and Ubiquitous Computing EUC 2004 Lecture Notes in Computer Science 3207 Springer.

Capkun S, Buttya L and Hubaux J P 2003 Self-Organized Public-Key Management for Mobile Ad Hoc Networks IEEE Transactions on Mobile Computing 2.

N. F. Rozy, R. Ramadhiansya, P. A. Sunarya, and U. Rahardja, “Performance Comparison Routing Protocol AODV, DSDV, and AOMDV with Video Streaming in Manet,” 2019 7th Int. Conf. Cyber IT Serv. Manag. CITSM 2019, 2019, doi: 10.1109/CITSM47753.2019.8965386.

M. Y. and E. A., “Comparative Analysis of Routing Protocols AODV DSDV and DSR in MANET,” Ijarcce, vol. 5, no. 12, pp. 470–475, 2016, doi: 10.17148/ijarcce.2016.512107.

N.Sivapriya et al. (2019). A framework for Fuzzy-based Fault Tolerant Routing mechanism with Capacity Delay Tradeoff in MANET. International Journal of Advanced Science and Technology, 28(17), 420 - 429. http://sersc.org/journals/index.php/IJAST/article/view/2281

N.Sivapriya, and T.N.Ravi “Efficient Fuzzy based Multi-constraint Multicast Routing with Multi-criteria Enhanced Optimal Capacity–Delay Tradeoff”, International Journal of Scientific & Technology Research, vol.8, issue no. 8, pp. 1468-1473, ISSN 2277-8616, August 2019.

Dr.R.Mohandas, Dr.N.Sivapriya, “TSP implementation for MANET using NS2”, NeuroQuantology, Volume 20, Issue 10, Page 847-854, ISSN 1303-5150, August 2022.

Mohandas, R., Krishnamoorthi, K. & Sudha, V. Energy Sensitive Cluster Level Security Selection Scheme for MANET. Wireless Pers Commun 105, 973–991 (2019). https://doi.org/10.1007/s11277-019-06131-5

Downloads

Published

25.12.2023

How to Cite

Sivapriya, N. ., Mohandas, R. ., & Vaigandla, K. K. . (2023). A QoS Perception Routing Protocol for MANETs Based on Machine Learning. International Journal of Intelligent Systems and Applications in Engineering, 12(1), 733–745. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/4171

Issue

Section

Research Article