Airo International Research Journal March, 2016 Volume VII ... Khan...Routing in an ad hoc network...
Transcript of Airo International Research Journal March, 2016 Volume VII ... Khan...Routing in an ad hoc network...
Airo International Research Journal March, 2016 Volume VII, ISSN: 2320-3714
Airo International Research Journal March, 2016 Volume VII, ISSN: 2320-3714
ANALYTICAL STUDY ON ALGORITHM USED IN ANT COLONY
OPTIMIZATION IN WIRELESS SENSOR NETWORK
Vasima Khan, Research Scholar,Department of CSE, Sunrise University, Rajasthan
Dr. Shalini Goel , Supervisor, Department of CSE, Sunrise University, Rajasthan
Declaration of Author: I hereby declare that the content of this research paper has been truly made by me including the title of the research
paper/research article, and no serial sequence of any sentence has been copied through internet or any other source except references or some
unavoidable essential or technical terms. In case of finding any patent or copy right content of any source or other author in my paper/article, I shall
always be responsible for further clarification or any legal issues. For sole right content of different author or different source, which was
unintentionally or intentionally used in this research paper shall immediately be removed from this journal and I shall be accountable for any further
legal issues, and there will be no responsibility of Journal in any matter. If anyone has some issue related to the content of this research paper’s copied
or plagiarism content he/she may contact on my above mentioned email ID.
ABSTRACT
Apart from all the researches being done all around the world, still ad hoc networks are
a big challenge for the researchers. Routing in an ad hoc network is extremely
challenging because of its dynamic nature, limited bandwidth and power energy.
Somehow, Swarm Intelligence based techniques such as ant colony optimization (ACO)
algorithms have shown to be a good technique for developing routing algorithms for ad
hoc networks.
It is accepted that it is unrealistic to have all MHs inside scope of each other . In the
event that all MHs are close-by inside radio range, no directing issues to be tended to. In
genuine circumstances, the power expected to get finish network might be, at any rate,
infeasible, also issues, for example, battery life and spatial reusability. raises another
issue of symmetric (bi-directional) and awry (unidirectional) joins. As it will be seen later
on, a portion of the conventions that consider symmetric connections with acquainted
radio range, i.e., if MH1 is inside radio scope of MH3, at that point MH3 is likewise
inside radio scope of MH1.
INTRODUCTION
This is to state that the correspondence
joins are symmetric. In spite of the fact
that this suspicion is not generally
legitimate, it is normally made so on the
grounds that directing in hilter kilter
systems is a moderately hard errand.
In specific cases, it is conceivable to
discover courses that could maintain a
strategic distance from lopsided
connections, since it is very likely that
these connections approaching fall flat.
Symmetric connections, with all MHs
having indistinguishable capacities and
obligations are talked about.
Airo International Research Journal March, 2016 Volume VII, ISSN: 2320-3714
The issue of symmetric and lopsided
connections is one among the few
difficulties experienced in a MANET.
Another essential issue is that distinctive
hubs regularly have diverse versatility
designs. Some MHs are exceptionally
versatile, while others are essentially
stationary. It is hard to anticipate a MH's
development and example of
development.
The dynamic idea of MANETs makes
arrange open to assaults and
Untrustworthiness. Directing is
dependably the most noteworthy part for
any systems. Every hub ought work for
itself, as well as be agreeable with
different hubs. MANETs are defenseless
against different security assaults.
Subsequently, finding a protected and
dependable end-to-end way in MANETs
is a honest to goodness challenge.
The arrangement of a MANETs is
simple because of the nonappearance of
setting up any framework for
correspondence. Generally such sort of
systems are required in military
application and crisis save operations.
Be that as it may, gradually MANETs
have entered with the ranges of gaming,
detecting, and conferencing, cooperative
and appropriated registering [3]. This
dynamic system is yet to catch a large
portion of the business applications.
Research is as yet going ahead toward
this path with the goal that the MANET
can be sent in any zone where a speedier
and less expensive system can be setup
in a split second for information
correspondence.
Table 1: Application of Mobile Ad hoc Networks
Application Description
Military Services: Military services are one of the most discussed and common
application area of mobile ad hoc networks where
installation of any fixed infrastructure is not possible in the
enemy territories or inhospitable terrains. In this
environment MANET provides the required communication
mechanism in no time. Here, the soldiers are considered to
be the mobile nodes. So the network is required to remain
connected even though the soldiers move freely. This
support is provided by the MANET. Another application in
this area can be the coordination of the military objects and
the personnel in the battlefield. For example, the leader of a
group of soldiers may want to pass a message to all the
Airo International Research Journal March, 2016 Volume VII, ISSN: 2320-3714
soldiers or a group of soldiers involved in the operation. In
this situation, a secure and reliable routing protocol should
be able to do the job.
Emergency Services: These arise as a result of natural disasters when the entire
communications infrastructure is in disarray (for example,
Tsunamis, hurricanes, earthquake etc.) where restoring
communications quickly is essential. By using ad hoc
networks, an infrastructure could be set up in hours instead
of days/weeks required for wire-line communications.
Education: Universities and campus settings, Virtual classrooms, Ad
hoc communications during meetings or lectures.
Sensing and Gaming: Sensor network is a special case of ad hoc networks where
mobility is generally not considered. However the battery
power is a key factor in sensors. Each sensor is equipped
with a transceiver, a small microcontroller and an energy
source. The sensors relay information from other devices to
transport data to a central monitor. The sensors are used to
sense the environmental condition such as temperature,
pressure, humidity etc. In this case they form an ad hoc
network to collect intended information. The mobility can
also be incorporated into the sensor network where they are
meant to study the behavior of tornados or to study the
behavior of patients in the hospital.
Multi-user games, robotics pets.
Personal Area
Networking:
Personal communicating devices like laptops, PDAs, mobile
phones create a network to share data among one another
called the Personal Area Network (PAN). The PAN covers a
very short range for communication and can be used for ad
hoc communication among the devices or for connecting to
a backbone network.
Figure 1 An Infrastructure Network
Along these lines, every hub goes about
as a switch for correspondence which
makes directing complex when
contrasted with Wireless LANs
.
Airo International Research Journal March, 2016 Volume VII, ISSN: 2320-3714
Figure 2: An Infrastructure less Network
Recent years, have seen a fast
acceleration in the field of versatile
registering because of multiplication of
economical, generally accessible remote
gadgets. In this way, it has opened
immense open door for analysts to take a
shot at Ad Hoc Networks.
The Institute of Electrical and
Electronics Engineers (IEEE) 802.11 is a
conspicuous standard for remote
neighborhood (WLANs), which is
received by numerous sellers of WLAN
items. The IEEE 802.11 is the primary
computerized remote information
transmitting standard, which manages
the physical and MAC layers in
WLANs. It was acquired out year 1997.
Under the IEEE 802.11 standard, Mobile
Terminals (MTs) can work in two modes
[3, 32, 60]: (i) Infrastructure mode, in
which MTs can speak with at least one
Access Points (APs) which are
associated with a WLAN and (ii) Ad
Hoc Mode, in which MTs can discuss
straightforwardly with each other
without utilizing an AP.
A remote get to point is required for
foundation mode remote systems
administration. Consequently it offers
the benefit of versatility, brought
together security administration and
better availability. In the impromptu
method of remote systems, the hubs can
specifically speak with each other
without utilizing any get to point. To set
up a specially appointed remote system,
every remote connector must be
designed for impromptu mode versus the
foundation mode. An impromptu system
tends to include a little gathering of
gadgets all in closeness to each other. In
this system the execution debases as the
quantity of hubs increments. Specially
appointed systems can't bridge to wired
LANs or the internet without the
presence of a special purpose gateway
Airo International Research Journal March, 2016 Volume VII, ISSN: 2320-3714
node.
Physical Layer: IEEE 802.11 bolsters
three alternatives for the medium to be
utilized at the physical level – one
depends on infrared and the other two
depend on radio transmission. The
physical layer is subdivided reasonably
into two sections – Physical Medium
Dependent Sub layer (PMD) and
Physical Layer Convergence Protocol
(PLCP).
PMD handles encoding, interpreting,
and regulation of signs. The PLCP
abstracts the usefulness that the physical
layer brings to the table to the MAC
layer. PLCP offers a Service Access
Point (SAP) that is free of the
transmission innovation, and a Clear
Channel Assessment (CCA) transporter
sense flag to the MAC layer. The SAP
abstracts the channel which can present
to 1 or 2 Mbps information transmission
data transfer capacity. The CCA is
utilized by the MAC layer to execute the
Carrier Sense Medium Access with
Collision Avoidance (CSMA/CA)
instrument.
The accompanying are the three
decisions for the physical layer in the
first 802.11 standard : (i) Frequency
Hopping Spread Spectrum (FHSS)
working in 2.4 GHz Industrial,
Scientific, and Medical (ISM) band, at
information rates of 1 Mbps [using 2 –
level Gaussian Frequency Shift Keying
(GFSK) balance scheme] and 2 Mbps
(utilizing 4-level GFSK); (ii) Direct
Sequence Spread Spectrum (DSSS)
working in the 2.4 GHz ISM band, at
information rates of 1 Mbps (utilizing
differential parallel stage move
keying(DBPSK)) (iii) infrared working
at wavelengths in 850-950 mm go, at
information rates of 1 Mbps and 2 Mbps
utilizing Pulse Position Modulation
(PPM) conspire.
Basic MAC Layer Mechanism: The
IEEE 802.11 MAC has turned out to be
universal and increased broad notoriety
as an accepted layer-2 standard for
remote systems. Remote transmissions
are inalienably communicated in nature
and conflicts to get to the common
channel should be settled painstakingly
with a specific end goal to stay away
from impacts. Presently, the IEEE
802.11 principles incorporate an
essential medium get to convention
Distributed Coordination Function
(DCF) and a discretionary Point
Coordination Function (PCF). The
multihop or single-jump impromptu
Airo International Research Journal March, 2016 Volume VII, ISSN: 2320-3714
operation is bolstered by the DCF,
which depends on the Carrier Sense
Medium Access with Collision
Avoidance (CSMA/CA) irregular get to
conspire, in which retransmission of
impacted bundles is overseen as per
twofold exponential back off rules.
To stay away from the shrouded
terminal issue a discretionary Request to
Send (RTS)- Clear to Send (CTS)
system is actualized. The PCF is a
concentrate booking and surveying
based convention, which is intended to
help crash free and transmission of
ongoing movement in remote systems.
At the point when the PCF is in
operation, the AP controls medium get
to and maintains a strategic distance
from synchronous transmissions by the
hubs.
Inter-Frame Spacing (IFS): Inter-
frame spacing refers to the time interval
between the transmissions of two
successive frames by any station. There
are for types of IFS: SIFS, PIFS, DIFS,
and EIFS, in order from shortest to
longest. They denote priority levels of
access to the medium. Shorter IFS
denotes a higher priority to access the
medium, because the waiting time to
access the medium is lower.
The exact values of the IFS are obtained
from the attributes specified in the
Physical Layer Management
Information Based (PHYMIB) and are
independent of the station bit rate
Short inter-frame spacing (SIFS):
SIFS is the shortest of all the IFSs and
denotes highest priority to access the
medium. It is defined for short control
messages such as acknowledgement for
data packets.
PCF inter-frame spacing (PIFS): PIFS
is the waiting time whose value lies
between SIFS and DIFS and it is used
for real-time services.
DCF inter-frame spacing (DIFS):
DIFS is used by stations that are
operating under the DCF mode to
transmit packets. This is for
asynchronous data transfer within the
contention period
Extended inter-frame spacing (EIFS):
EIFS is the longest of all the IFSs and
denotes the least priority to access the
medium. IEFS is used for
resynchronization whenever physical
layer detects incorrect MAC frame
reception.
Carrier Sense Medium Access with
Collision Avoidance (CSMA/CA):
CSMA/CA is the MAC layer mechanism
Airo International Research Journal March, 2016 Volume VII, ISSN: 2320-3714
used by IEEE 802.11 WLAN. This
technique cannot be used in the context
of WLAN effectively because the error
rate in WLANs is much higher and
allowing collisions will lead to a drastic
reduction in throughput. Morever,
detecting collisions in the wireless
medium is not always possible. The
technique adopted here is therefore one
of collision avoidance.
THE NETWORK SIMULATOR
(NS2)
Reenactment has turned out to be a
significant apparatus in many research
zones where diagnostic strategies are not
appropriate and experimentation is not
practical. Specialists for the most part
utilize reenactment to break down
framework execution before physical
outline or to look at numerous choices
over a scope of framework conditions.
There are different test systems like NS-
2, Glomosim, Qualnet and Opnet are
accessible to do investigate work in
Wireless and Wired Networking. System
Simulator (NS form 2) is a protest
arranged, discrete occasion driven
system test system created at University
of California, Berkely written in C++
and OTcl and unreservedly accessible
for scholastic research reason. To lead
execution examination of our proposed
arrangements exhibited in this
postulation, the well known NS2 test
system has been widely utilized.
NS 2 was picked fundamentally on the
grounds that it is a demonstrated
reproduction instrument used in
numerous past research contemplates on
MANETs and has been approved and
checked in.
OBJECTIVES OF THE THESIS
The objective of the thesis is as
follows:
The objective of this work is to
find the shortest and lowest cost
path from one mobile node to
another. The time taken for
finding the path should be lesser
as it can be possible. So, as a
result the time taken while
setting-up a call will be less than
as it is in present. Here in this
paper I will use the tools like
NS2 simulation tool.
CHARACTERISTICS AND
FEATURES OF MANETS
Ad hoc networks have many features,
which make them quite distinct from
Airo International Research Journal March, 2016 Volume VII, ISSN: 2320-3714
wired networks and thus require
innovative ways to implement the
network functionalities. Table 1.2
summarizes some of the characteristics
of MANETs.
Table 2: Characteristics of MANETs.
Characteristics Description
Wireless medium: The wireless medium used by the nodes to communicate
with each other has time-varying coverage and asymmetric
propagation properties. It is less reliable and more prone to
interference compared to a wired medium.
Dynamic Topologies: Nodes are free to move arbitrarily with different speeds;
thus, the network topology may change randomly and at
unpredictable times.
Infrastructureless
Network:
Network is not depending on any fix infrastructure for its
operation.
Power Management: As the nodes are not fixed, they rely on batteries as their
power source. Thus mechanisms and protocols devised for
such networks need to keep the energy constraint in mind.
Peer-to-Peer nature: Thus, all protocols need to be designed for distributed
environments composed of “peers" and need to be robust
enough to handle these distributed dynamic topologies.
These different characteristics of wireless ad hoc networks
require different techniques than the wired networks,
especially at the three lower-most layers, to effectively
perform the network functions. The widely adopted
standard for wireless networks, at the physical and data-
link layer is IEEE 802.11 (for wireless local area networks)
Limited computing
and energy resources:
There are limited computing power, memory, and disk size
due to the limited battery capacity, as well as limitation on
device size, weight, and cost.
Limited service
coverage:
Due to device, distance between devices, network condition
limitations, service implementation for wireless devices is
more challenging as compared to the wired networks and
their elements and at the same time MANETs faces many
constraints.
Higher interference
results in lower
Infrared signals suffer interference from sunlight and heat
sources, and can be shielded/absorbed by various objects
and materials. Radio signals usually are less prone to being
Airo International Research Journal March, 2016 Volume VII, ISSN: 2320-3714
reliability: blocked; however, they can be interfered by other electrical
devices. The broadcast nature of transmission means all
devices are potentially interfering with one another. Self-
interference also happens due to multipath.
Highly variable
network conditions:
Higher data loss rates due to interference. User movement
causes frequent disconnection. Channel changes occur as
users move around. Received power diminishes with
distance.
Limited Bandwidth: Wireless links continue to have significantly lower capacity
than infrastructure networks. In addition, the realized
throughput of wireless communications - after accounting
for the effects of multiple access, fading, noise, and
interference conditions, etc., is often much less than a
radio's maximum transmission rate.
CONCLUSIONS
MANETs present distinctive challenges
to the convention architects. Versatility,
constrained bandwidth, and restricted
power cause visit topology changes. It
can also be liable to client misbehavior
and malicious attacks. The essential
nature of the communication mode is the
main concern because anything that
moves over the outdoors medium is
vulnerable to be grabbed by
unauthorized access. Apart from the
security issue, information access is also
an important issue since the primary goal
of the ad hoc networks is to give
information access to portable hubs.
Cooperative caching enhances the data
accessibility. This dissertation addressed
the issue of data accessibility,
malfunctioning of the hubs and hub
failure in MANETs. A Secure data cache
framework is presented.
To recognize the anomalies in the
network, a half breed interruption
identification framework is proposed.
This framework is outlined by utilizing
the idea of AIS and ACO. AIS makes
the network self safe and distinguishes
the anomalies, ACO takes care of course
distraction. The performance of half and
half IDS is evaluated with the aid of the
JiST simulator. The outcomes
demonstrate that half and half IDS is
capable of identifying the anomalies
with less time when compared to the
next steering conventions.
Airo International Research Journal March, 2016 Volume VII, ISSN: 2320-3714
A Data Caching Scheme (DCS) utilizing
ACO has been intended to enhance the
data accessibility ratio. DCS gives the
cache disclosure prepare. The hubs are
treated as ant agents and the local cache
is utilized to recover the data. The
experimental outcomes demonstrate that
DCS performs better by giving a less
end-to-end delay and a high packet
conveyance ratio.
To incorporate security amid data
access, a safe data cache framework
(ANTSEC) is planned. The group based
cooperative caching plan has been
enhanced by inserting control packets
with the data packets to give
invulnerability. The control capacities
AIS and CLC (Cross Layer Control) take
care of recognizing the misbehaving
hubs and course distraction individually.
The stack profile module is added with
directing table, CLC capacity and locator
set. The simulation comes about reveal
that the ANTSEC framework performs
better by giving higher PDR (Packet
Delivery Ratio) and lower end-to-end
delay as it installs the control packets
AISp and CLCp into the data packets.
The proposed framework is a novel mix
of cache management and security.
REFERENCES
1. Agrawal, D. P. and Qing-An Zeng,
„Introduction to Wireless and Mobile
Systems‟ , 2005, Brooks/Cole.
2. Amis, A., R. Prakash, T. Vuong, and
D. Huynh, „Max-min cluster
formation in wireless ad hoc
networks‟ , 2000. [Online].
Available: citeseer.ifi.unizh.ch/
amis00maxmin.html
3. An, B. and S. Papavassiliou, „A
mobility-based clustering approach
to support mobility management and
multicast routing in mobile ad-hoc
wireless networks,‟ International
Journal of Network Management,
Vol. 11, No. 6, pp. 387–395, 2001.
4. Anderson, R. G. T., B. Bershad, and
D. Wetherall, „A System
Architecture for Pervasive
Computing‟ , In Proc. 9th
ACM SIGOPS European
Workshop, pp. 177–182, Kolding,
Denmark, September 2000.
5. Andrew S. Tanenbaum, David J.
Wetherall, „Computer Networks,
Pearson‟ , 2011.
6. Artail, H., Haidar Safa, Khaleel
Mershad, Zahy Abou-Atme, Nabeel
Sulieman, „COACS: A Cooperative
and Adaptive Caching System for
Airo International Research Journal March, 2016 Volume VII, ISSN: 2320-3714
MANETs‟ , IEEE Transactions On
Mobile Computing, Vol. 7, No. 8,
August 2008.
7. Axelsson, S. „Intrusion detection
systems: A survey and taxonomy‟ ,
Technical Report No 99-15,
Chalmers University of Technology,
Sweden, 1999.
8. Basagni, S. „Distributed clustering
for ad hoc networks‟ , 1999.
[Online]. Available:
citeseer.ifi.unizh.ch/basagni99distrib
uted.html.
9. Bonabeau, E., M. Dorigo, and G.
Theraulaz, „Swarm Intelligence:
From Natural to Artificial Systems‟ ,
Oxford University Press, 1999.
10. Camara, D. and A.AF. Loureiro, „A
novel routing algorithm for hoc
networks‟ , Baltzer Journal of
Telecommunications Systems 18,
Vol.1, No.3, 2001, pp.85-100.
11. Carlos Cordeiro and Dharma P
Agrawal, „ Adhoc and Sensor
Networks, Theory and
Applications‟ , World Scientific
Publishing, 2006.
12. Castro L. de and Timmis J., „
Artificial Immune Systems as a
Novel Soft Computing Paradigm‟ ,
Soft Computing Journal, Vol. 7,
Issue 7, 2003.
13. Castro L. de and Zuben F.,
„Artificial Immune Systems: Part I –
Basic Theory and Applications‟ , TR
– DCA 01/99, 1999.
14. Chatterjee, M., S. K. Das, and D.
Turgut, „Wca: A weighted clustering
algorithm for mobile ad hoc
networks‟ , Cluster Computing, Vol.
5, No. 2, pp. 193–204, 2002.
15. Chen, G., F. Nocetti, J. Gonzalez,
and I. Stojmenovic, „Connectivity
based k-hop clustering in wireless
Networks‟ , In proceedings of the
35th Annual Hawaii International
Conference on System Sciences,
Vol. 7, 2002.
16. Chlamtac I. and J. Redi, „Mobile
Computing: Challenges and
Opportunities‟ , In Encyclopedia of
Computer Science, 4th Edn,D.
Hemmendinger, A. Ralston, and E.
Reilly (Eds), International Thomson
Publishing, 1998.
17. Chlamtac, I. , M. Conti, and J. Liu,
„Mobile Ad Hoc Networking:
Imperatives and Challenges‟ ,
Journal of Ad Hoc Networks, Vol. 1,
No. 1, pp. 13–64, 2003.
18. Chu Yan, Zhang JianPei, „Cache
Management based on Ant Colony
Airo International Research Journal March, 2016 Volume VII, ISSN: 2320-3714
Model in Wireless Mobile
Environments‟ , IEEE International
Multisymposium on Computer and
Computational Sciences, pp.517-
520, 2007.
19. Chu Yan, Zhang JianPei, Zhao
Chunhui, „Data Cache Strategy
Based on Colony Algorithm in
Mobile Computing Environment‟ ,
IEEE International Conference on
Internet Computing in Science and
Engineering, pp.235-238, 2008.
20. Chuangang Wang, Yanping Yu,
Yuanxin Xu, Minjue Ma, Shibin
Diao, „A Multi-Hop Clustering
Protocol for MANETs‟ , 5th
International Conference on Wireless
Communications, Networking and
Mobile Computing, 2009. WiCom
'09, pp. 1-4, 2009.
21. Conti, M., G.Maselli, G.Turi and
S.Giordano, „Cross-layering in
mobile ad hoc network design‟ ,
IEEE Computer Society, Vol
37,No.2, pp.48-51, 2004.
22. Cordon, O., F. Herrera and T.
Stützle, special issue on „Ant Colony
Optimization‟ , Vol. IX, No.2-3,
Mathware and Soft Computing,
November, 2002.
23. Corson S. and J. Macker, „Mobile ad
hoc networking (MANET): Routing
protocol performance issues and
evaluation considerations‟ , RFC
2501, Jan. 1999.
24. Daniel Camara, and Antonia A.F.
Loureiro, „Ants A novel routing
algorithm for ad hoc networks‟ ,
Proceedings of the 3300 Hawaii
International Conference on System
Sciences, 2000.
25. Dasgupta D., Ji Z. and Gonzalez F.,
„Artificial Immune System (AIS)
Research in the Last Five Years‟ ,
The 2003 Congress on Evolutionary
Computation (CEC '03), 8-12 Dec.,
Vol. 1, pp. 123-130, 2003.