DOI QR코드

DOI QR Code

Intelligent On-demand Routing Protocol for Ad Hoc Network

  • Ye, Yongfei (School of Information Science and Engineering, Hebei North University) ;
  • Sun, Xinghua (School of Information Science and Engineering, Hebei North University) ;
  • Liu, Minghe (College of Economics and Management, Hebei North University) ;
  • Mi, Jing (School of Information Science and Engineering, Hebei North University) ;
  • Yan, Ting (School of Information Science and Engineering, Hebei North University) ;
  • Ding, Lihua (School of Information Science and Engineering, Hebei North University)
  • Received : 2019.05.09
  • Accepted : 2020.02.22
  • Published : 2020.10.31

Abstract

Ad hoc networks play an important role in mobile communications, and the performance of nodes has a significant impact on the choice of communication links. To ensure efficient and secure data forwarding and delivery, an intelligent routing protocol (IAODV) based on learning method is constructed. Five attributes of node energy, rate, credit value, computing power and transmission distance are taken as the basis of segmentation. By learning the selected samples and calculating the information gain of each attribute, the decision tree of routing node is constructed, and the rules of routing node selection are determined. IAODV algorithm realizes the adaptive evaluation and classification of network nodes, so as to determine the optimal transmission path from the source node to the destination node. The simulation results verify the feasibility, effectiveness and security of IAODV.

Keywords

References

  1. B. Xu, S. Hischke, and B. Walke, "The role of ad hoc networking in future wireless communications," in Proceedings of International Conference on Communication Technology Proceedings (ICCT), Beijing, China, 2003, pp. 1353-1358.
  2. J. Wang, C. Wang, Q. Wu, and Y. Gong, Ad Hoc Mobile Wireless Network. Beijing, China: National Defense Industry Press, 2004.
  3. J. N. Turner and C. S. Boyer, Ad Hoc Networks: New Research. New York, NY: Nova Science Publishers, 2009.
  4. X. Zhu, "Mobile ad hoc network security research," M.S. Thesis, Xi'an University of Electronic Science and Technology, Xi'an, China, 2004.
  5. S. Wang and H. Yang, "Research and analysis of mobile ad hoc network routing protocol," Computer Age, vol. 3, pp. 14-16, 2006.
  6. Q. Zhang and M. Luo, "Mobile ad hoc network security strategy," Telecommunication Switching, vol. 1, pp. 29-33, 2006.
  7. C. E. Perkins and E. M. Royer, "Ad-hoc on-demand distance vector routing," in Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), New Orleans, LA, 1999, pp. 90-100.
  8. C. E. Perkins and P. Bhagwat, "Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers," in Proceedings of the Conference on Communications Architectures, Protocols and Applications, London, UK, 1994, pp. 234-244.
  9. D. B. Johnson and D. A. Maltz, "Dynamic source routing in ad hoc wireless networks," in Mobile Computing. Boston, MA: Springer, 1996, pp. 153-181.
  10. D. B. Johnson, D. A. Maltz, and Y. C. Hu, "The dynamic source routing protocol for mobile ad hoc networks (DSR)," 2004 [Online]. Available: https://tools.ietf.org/html/draft-ietf-manet-dsr-10.
  11. Y. Xiao and X. Shan, "Wireless Ad-hoc network and its research challenges," Telecommunications Science, vol 6, pp. 12-14, 2002.
  12. Y. C. Hu, A. Perrig, and D. B. Johnson, "Ariadne: a secure on-demand routing protocol for ad hoc networks," Wireless Networks, vol. 11, no. 1-2, pp. 21-38, 2005. https://doi.org/10.1007/s11276-004-4744-y
  13. K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, "A secure routing protocol for ad hoc networks," in Proceedings of the 10th IEEE International Conference on Network Protocols, Paris, France, 2002, pp. 78-87.
  14. B. Dahill, B. N. Levine, E. M. Royer, and C. Shields, "A secure routing protocol for ad hoc networks," University of Massachusetts, Amherst, MA, Technical Report UM-CS-2001-037, 2001.
  15. H. Jiang, Y. Meng, Y. He, and S. Cheng, "An energy-efficient multicast routing protocol for mobile ad hoc networks," Journal of Circuits and Systems, vol. 7, no. 2, pp. 115-118, 2002.
  16. C. Ying and M. L. Shi, "QoS Routing in ad-hoc network," Chinese Journal Computers, vol. 24, no. 10, pp. 1026-1033, 2001. https://doi.org/10.3321/j.issn:0254-4164.2001.10.003
  17. M. G. Zapata and N. Asokan, "Securing ad hoc routing protocols," in Proceedings of the 1st ACM Workshop on Wireless Security, Atlanta, GA, 2002, pp. 1-10.
  18. L. Venkatraman and D. P. Agrawal, "Strategies for enhancing routing security in protocols for mobile ad hoc networks," Journal of Parallel and Distributed Computing, vol. 63, no. 2, pp. 214-227, 2003. https://doi.org/10.1016/S0743-7315(02)00065-5
  19. M. Akhlaq, M. N. Jafri, M. A. Khan, and B. Aslam, "Integrated mechanism of routing and key exchange in AODV," WSEAS Transactions on Communications, vol. 6, no. 4, pp. 565-572, 2007.
  20. J. R. Douceur, "The Sybil attack," in Peer-to-Peer Systems. Heidelberg, Germany: Springer, 2002, pp. 251-260.
  21. A. Shamir, "How to share a secret," Communications of the ACM, vol. 24, no. 11, pp. 612-613, 1979. https://doi.org/10.1145/359168.359176
  22. L. Zhou and Z. J. Haas, "Securing ad hoc networks," IEEE Network, vol. 13, no. 6, pp. 24-30, 1999. https://doi.org/10.1109/65.806983
  23. J. R. Quinlan, "Induction of decision trees," Machine Learning, vol. 1, no. 1, pp. 81-106, 1986. https://doi.org/10.1007/BF00116251