Abstract
Mobile ad hoc network (MANET) is arranged with multiple nodes that communicate wirelessly. However, MANET communication suffers from various issues such as inadequate security, low stability, high power consumption, and a lack of specific infrastructure of the network. Moreover, the route failure happened in the network due to the unrestricted node movement, which has increased energy utilization, delay, and reduced lifetime of the nodes. To overcome these issues, the novel Eagle Based Density Clustering (EBDC) approach is developed in this research that predicts the link failure and increased the lifetime of the nodes. Here, the developed EBDC approach is utilized for clustering and route maintenance in MANET for that it creates the nodes using the star topology. Initially, the developed approach selects the Cluster Head and transmits the message through the created path. Subsequently, the link failure is detected by the EBDC model, and it creates a new reference layer to replace the exhausted layer. Hence, the developed EBDC model has enhanced the network lifetime and reduced energy utilization. Furthermore, this model is implemented using Network Simulator 2, and the parameters like accuracy, energy consumption, Packet Delivery Ratio, network lifetime, end-to-end delay, and throughput are calculated. Additionally, the attained outcomes are compared with prevailing methods for evaluating the efficiency of the developed approach.
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Avoid common mistakes on your manuscript.
1 Introduction
In general, the mobile ad hoc networks are arranged with several quantities of nodes that are communicating in a wireless manner (Tilwari et al. 2020). The MANET network is not having centralized supervision or particular infrastructure, and the nodes have the ability to move continuously in nature (Vatambeti 2020). Here, the information is passed from one place to the target location using wireless nodes that act as routers (da Costa Bento and Wille 2020). Normally, the mobile nodes in the MANET are communicated with each other without the need of base stations. Moreover, the routing protocols in the MANET are employed to regulate the routes that can be provided better communication through the nodes (Bhardwaj and El-Ocla 2020). The MANET is utilized for many applications because of its proliferation of smart devices, improvements in transmission, and flexibility (Sudhakar et al. 2020). Subsequently, the MANET is arranged by clusters that act as the cluster-head, and the rest of the communicating nodes are mentioned as cluster-members (Nivedita and Nandhagopal 2020). Moreover, the clustering method is employed for separating the entire network into the interrelated substructures that are named clusters (Mirsadeghi et al. 2020). Also, each cluster in the network has a node that is denoted as cluster-head, which performs the function of coordinator (Rajkumar and Jeyakumar 2021).
The routing protocol based on clustering methods is responsible for better communication in the network that involves inter-cluster and intra-cluster (Krishnan et al. 2020a, b). Additionally, when the cluster node is performing the member of neighboring clusters and having greater than one cluster-head, then that acts as the gateway node (Sufian et al. 2020). However, developing reliable clusters in MANET is utilized more time because of the nature of the wireless nodes (Nagendranath and Babu 2020). Additionally, the cluster-heads required a large amount of energy than the cluster-members (Regin and Menakadevi 2020). The clustering-based routing approach should be selecting the stable and exact cluster-head for enhancing the lifetime of the network (Dhindsa and Bhushan 2020). Also, the power consumption should be reduced for attaining effective communication.
In general, the MANET network is arranged with several numbers of nodes that are associated wirelessly. Moreover, the MANET nodes act as the router while transmitting the packets in the network. However, these networks have attained several concerns such as low stability, low security, and high energy utilization. Also, the network is affected by path failures because of the frequent movement of nodes that reduced the PDR and network lifetime (Srinivasa and Kamalesh 2020). Several routing protocols like ad hoc on-demand distance vector (AODV), Zone routing protocol (ZRP) (Shanthy and Padma 2020), Optimized Link State Routing (OLSR) (Ibrahim and Shanmugaraja 2020), Location Aided Routing (LAR) (Kumar et al. 2020), etc., are used to enhance the MANET communication, which are not attaining the accurate level for predicting link failure (Majd et al. 2019). Hence, the novel protocol is developed in this research to predict the link failure effectively and to enhance the lifetime of the nodes.
The developed method is utilized for diminishing the number of message transmissions while detecting the link failures in earlier. Moreover, the cluster head selection is efficiently reduced the unnecessary transmission, which is utilized lower energy for transmitting packets between the nodes. Subsequently, the main objective of this research is to enhance the lifetime of the network while predicting the path failures based on the selection of cluster heads. Here, the MANET network is developed based on the star topology, and the developed model is utilized for route maintenance while predicting link failure in the network. Finally, the proposed approach creates the reference layer when the route is failed that increased the lifetime of the nodes.
This research is ordered in the following sections. The related work of the developed proposed model is detailed in Sect. 2, the problem definition and system model is elaborated in Sect. 3. Moreover, the developed methodology is described in Sect. 4, and the obtained outcomes are discussed in Sect. 5. At last, the conclusion part of the developed model is mentioned in Sect. 6.
2 Related work
Some existing clustering methods in MANET is detailed as below.
Generally, the MANET is utilized for several applications that increased the great attention of researchers. However, routing of the packets in MANET is one of the difficult tasks because of the mobility of the MANET nodes. Prashant Dixit et al. (2020) developed the routing approach for MANET based on Lightweight Effective Cluster (LWEC) for enhancing the lifetime of the cluster-head. In this, the process of refugee node is developed for decreasing the complexity to preserve the procedure of the number of clusters in the developed network.
The mobility of the mobile nodes in the MANET can increase the difficulties in channel sensing, stability, and scalability that are reduced with the use of clustering algorithms. Moreover, the casting clustering issues are reduced using the Game theory that is based on the Minimum Weighted Inner Edge Straddling Tree (MWIEST), which is developed by Thong Nhat Tran et al. (2020). Furthermore, the developed clustering-based game theory is employed to create clusters with high stability.
Harold Robinson et al. (2019) developed the Reliable Routing Protocol (RRP) for attaining high Quality of Service (QoS) that is reduced the routing overhead in MANET. Here, the recognized node strength is utilized for calculating the bandwidth based on signals, and the message transmission is done through the created path. Consequently, Loose Virtual Clustering (LVC) and Neighbor Knowledge-based Rebroadcast (NKR) are developed for diminishing the routing overhead. Thus, it provides better results in routing overhead, data broadcasting, and network traffic.
The energy consumption and optimizing the routing are the challenging parts in MANET that are overcome with the use of optimal routing approaches, which are enhancing the efficiency of the network with an increased lifetime of nodes. Here, Sharifi and Babamir (2020) developed the novel clustering approach named Evolutionary Algorithms based on Imperialist Competitive Algorithm (EA-ICA) that are utilized for diminishing the overhead. Thus, this model attained better outcomes in stability, efficiency, convergence, and reproducibility.
To improve the system's consistency, Saravanan Kalaivanan (2020) developed the Energy Effectual Ad Hoc on-Demand Routing algorithm (EEAODR). This model is processed based on the AODV that can arrange the nodes in the system. Moreover, the energy of the hubs is identified in the base level point. Thus, the developed EEAODR model accomplished using the optimal path for the active nodes that are improved the packet delivery ratio. Also, the link and path failures are detected using the novel Hello-based Path Recovery (HBPR) method that is introduced by Sunil Kumar (2020). In this, the new path is created by the HBPR model when the transmission path is failed.
Moreover, the novel honey pot mechanism is developed for detecting the malicious nodes in the network. Additionally, Khudayer et al. (2020) described the route and link failure prediction approach based on the network zone, which is employed to regulate the route requests. Also, this model is developed to predict link failures for diminishing the packet drop while transmitting messages.
Subsequently, the link failures happened because of various attacks like black hole and grey hole attack that are reduced the lifetime of the nodes. Here, Ramesh Vatambeti (2020) described the Grey Wolf-based Trust Accumulation model (GWTA) to predict the malicious attacks in the network, which has improved the throughput and reduced packet loss. Theerthagiri (2020) developed the new approach as Futuristic Cooperation Validation (FCV) model to calculate the stability of links and node reliability. It is utilized the Markov model for calculating the influencing factor that attained a high PDR value while transmitting messages.
To detect and mitigate the interruption in MANET, the novel Smart Detection Model (SDM) is developed by Islabudeen and Devi (2020). In this, the user ID, biometric, and location of the mobile users are registered in the system for authentication. Here, the design of a unique hash chain is utilized for preventing interruptions. Saini and Sharma (2020) described the model based on Multipoint Relay Perception (MRP) for enhancing the quality, durability, and trust nodes while message transmission in MANET. Also, the selected relay has utilized the functions like reachability of messages, degree, and relative mobility of communication nodes. Sridevi et al. (2019) developed the meta-heuristic model that is named as Particle Swarm Optimization algorithm through Bat mechanism (PSO-BAT) for consuming lower energy. This model is developed for preventing malicious attacks and decreasing the energy drain rate. Thus, the PSO-BAT model reduced the execution time and enhanced the throughput.
Arindrajit Pal et al. (2019) developed the model for maintaining links as stable in a network using a temporal data investigation model. Here, an Autoregressive Moving Average (ARMA) statistical manner is utilized for forecasting the neighboring nodes, which are in a stable way. Thus, this approach developed the optimal link for attaining reliable and stable links for efficient data transmission. Also, Kumar (2019) developed the routing protocol based on the location of the nodes for maintaining routes in the network. Thus, this model reduced the link failures and increased the number of transmitted packets. Moreover, Darwish et al. (2019) described the Fruit Fly Optimization (FFO) mechanism for developing the shortest route to transfer messages in MANET, which provides better outcomes in execution time and scalability. The summary of literature based on related works is detailed in Table 1.
The important contribution of this research is detailed below.
-
Initially, develop the MANET network based on a star topology.
-
Moreover, the novel Eagle Based Density Clustering (EBDC) approach is developed in this research for attaining effective communication.
-
Here, the developed EBDC approach is employed for clustering and route maintenance process for that it creates the cluster head for message transmission.
-
It predicts the link failure based on the energy utilization of nodes, and it creates a new reference layer for efficient communication.
-
Thus, the introduced EBDC approach enhanced the lifetime of the nodes and reduced the energy consumption while transferring messages.
-
Moreover, the implementation of the developed approach is done with the use of NS-2 and the attained metrics like PDR, network lifetime, end-to-end delay, energy consumption, accuracy, and throughput are validated with prevailing methods.
3 System model and problem definition
In recent years, MANET communication is an efficient and exciting technology due to the rapid proliferation of devices in the wireless medium. Also, Ad hoc networks are utilized for many applications because it is more reliable for preserving the capability of the traffic load, robustness, and flexibility. Typically, the MANET system is arranged by many mobile nodes but that have restricted CPU power and battery. Also, the nodes in the network act as the router for transmitting packages, but the nodes have different mobility.
The problems have occurred in MANET communication while transferring messages through the routers, which are shown in Fig. 1. In that, the source node sends a request for all neighboring nodes. Also, the end node in the network transmits the reply message to the nearest nodes that are reached on the source site.
3.1 Problem formulation
In MANET, the routing protocols are utilized for enhancing the MANET communication but that are attained several security issues. Moreover, the link failures are happening because of the mobility of mobile nodes that are increased the energy utilization of nodes, routing overhead, and delay. Also, route maintenance is one of the critical issues in MANET that involves two parts that are route breakage and deterioration. In MANET, several network nodes are utilized high energy to transmit the reply message, which creates the link failure and reduces the node lifetime. Thus an efficient algorithm is required for predicting path failure earlier. Hence, the novel clustering algorithm is developed in this paper for diminishing the energy utilization and improving the network lifetime. Therefore, the use of clustering algorithms can be managed by CH nodes that are energy-consuming while data transmitting in a wide range.
4 Proposed EBDC methodology
This research develops an innovative Eagle Based Density Clustering (EBDC) model for predicting link failure and developing an alternate path for transmitting data in MANET. This approach is focused on the clustering and route maintenance process in MANET communication. Primarily, the star topology is utilized for developing the MANET network to transmit the packets. Moreover, the developed EBDC model continuously monitors the network links during data transmission. If there is any link failure happens, then it created a new link that is named as a reference layer. Thus, the developed model transmits the message through the reference layer.
Here, the developed EBDC model diminishes the energy utilization and enhances the lifetime of the node. The process of the proposed EBDC is shown in Fig. 2 which is explained in the following section. The innovation of this work is that the utilization of the eagle optimization model in the density clustering approach can enhance the efficiency to detect link failure for effective communication, which improved the network's lifetime.
4.1 Process of EBDC model
The proposed Eagle-based Density Clustering approach is employed to predict the link failure in the network based on the energy utilization of nodes and develops the new reference layer for effective communication. In this approach, the star topology is designed for MANET communication in that the required amount of nodes is created. The star topology is referred to as every node in the network connected with the center node called the router. In this topology, every node is associated with the middle node mentioned as the cluster head. If any node in the network wants to transmit the data, it passed the data to the CH node that forwards the data to neighboring nodes. After developing nodes, the proposed EBDC model is designed to prevent link failure in a route.
The message transmission using CH is detailed in Fig. 3. Here, the star topology is utilized for developing the MANET network by arranging the required quantity of nodes. In that, the CH is selected for preserves the data that is related to its cluster, which includes the details about the number of nodes in the cluster and route to the nodes. Moreover, the gateway node acts as the gate between the cluster networks employed to protect the nodes in the network. Additionally, the remaining nodes in the network are considered cluster members. In this, the CH nodes create the path for data transmission. Here, the proposed EBDC is continuously analyzing the path to predict the link failure. The selection of cluster head is based on the energy threshold of the nodes.
In this research, the density clustering model has been processed on the network to predict the link failure. Also, the optimization approach is utilized to identify or create the alternate path (reference layer) when it predicts the link failure in the network. Also, it enhanced the prediction accuracy and throughput ratio. Initially, the developed EBDC manner creates the mobile nodes for communication-based on the star topology that is mentioned in Eq. (1),
where node is represented as \(x\) and \(n\) numbers of nodes are developed in the network.
-
Selecting cluster head.
Additionally, the message is transmitted through the nodes in that the Cluster Head (CH) is identified based on the energy threshold range of every node in the network. Also, the energy threshold of each node is calculated using Eq. (2),
$$ Ex_{t} = \sum\limits_{x = 1}^{n} {g(x)\left[ {\varphi - \min \varphi } \right]} $$(2)where, \(\varphi\) denotes the kinetic energy for every node in the network. In this, the energy threshold of the nodes is considered as \(Ex_{t} = \pm 0.5\). If the energy threshold is higher than 0.5, then the particular nodes are taken as CH. Here, the cluster members in each cluster are employed to collect the information from the sensors.
-
Identify the path (k).
Subsequently, the developed model calculates the distance between each node in the network for transmitting the data. Moreover, the proposed method has calculated the distance between the node \(N_{1}\) and \(N_{2}\) is calculated based on the (x, y) coordinates using Eq. (3),
$$ k = \sum\limits_{x = 1}^{n} {d(x_{e} - x_{s} )} $$(3)where, \(d(x_{e} - x_{s} )\) denotes the distance between the end node and starting node. IN this approach, the distance between every two nodes is calculated and the shortest distance nodes are taken for message transmission. Here, the proposed density clustering function sets the distance value between the nodes as \(d(x_{e} - x_{s} ) = 0.2\) that is calculated by EBDC. Therefore, the distance between two nodes is 0.2, then it creates the path between the nodes. If the distance is greater than the particular condition, then the nodes are neglected.
-
Route maintenance.
Additionally, the developed model detects the route or link failure while transmitting data to the path (k). Here, the energy utilization of each node \((Ex)\) will be calculated for identifying the link failure that is mentioned in Eq. (4),
$$ Ex = Ex_{1} ,Ex_{2} \ldots Ex_{n} $$(4)
Primarily, the developed EBDC sets the condition \(E_{x} = 0.01J\) for each node in the path. If any node has utilized high energy, then it is considered a link failed node, i.e., \(E_{x} > 0.01J \to link\_fail\). So, the new reference layer is developed by the developed manner of the fitness function. The EBDC model updated the path k and developed the reference layer as k + 1 that is utilized to transfer the data.
Hence, the developed model transfers the message with lower energy utilization that is increased the lifetime of the nodes. The process of introducing the EBDC approach is detailed in Algorithm 1, and the flow chart is represented in Fig. 4. Initially, the MANET nodes are developed based on the star topology and the energy threshold of each node calculated. In this, if the node has the highest energy threshold, then it is identified as the cluster head. Moreover, the proposed model creates a route based on the shortest distance between the neighboring nodes.
Consequently, the energy utilization of each node is calculated to identify the link or node failure. If any node in the network is utilized more energy for transmission, it is considered the link or node failure. Thus, the path is updated by the EBDC fitness model that creates the alternate shortest path to secure data transfer, which improves the lifetime of the network and uses less energy than other conventional methods.
5 Results and discussion
The simulation of the developed EBDC process is done using NS-2 that is calculated the performance parameters like PDR, throughput, network lifetime, energy consumption, and delay. The simulation details using the proposed EBDC model are mentioned in Table 2. Initially, the developed approach creates the MANET network and selects the CH for message transmission.
Moreover, it performs the route maintenance process to create a new reference layer for transmitting the messages. Finally, the developed approach utilized lower energy and enhanced the lifetime of the nodes.
5.1 Case study
Let us consider the source node S, target node D, N1 to N16 are the neighboring nodes. In this proposed approach, the nodes are arranged based on the Star topology and here, the CH node is selected using the energy threshold of every node. Additionally, the energy threshold condition is taken as 0.5. If any node has an energy threshold is more than 0.5, then it is selected as CH and other nodes are considered as cluster members. In this, N is considered the base stations, N1, N7, N13 are taken as the CH node, and the remaining nodes are regarded as cluster members. Subsequently, the distance is computed between the CH and cluster members. The calculated distance is equal to 0.2, then the path is created between the nodes, and the message is transmitted through that path, which is represented in Fig. 5.
Subsequently, the energy utilization of each node is calculated that is utilized for determining the route faults. The proposed methodology set the energy utilization is 0.01 J for every node. If any node's energy utilization is higher than 0.01 J, then it is considered a link failure. Consequently, route maintenance is required for efficient communication that is attained by the proposed model fitness function. It generates one reference layer for transmitting the message in an efficient manner which is shown in Fig. 6.
Hence, the message has been transmitted through the alternate path, which means the reference layer. Moreover, the utilized nodes are consuming lower energy, so the lifetime of the node is high. Additionally, it provides better results in PDR, throughput, delay, and accuracy that are detailed in the following section.
5.2 Performance metrics
The proposed EBDC approach calculates performance metrics like accuracy, PDR, throughput, network lifetime, energy utilization, and delay. Here, the calculated metrics are evaluated using the existing approaches such as RRP (Robinson et al. 2019), EA-ICA (Sharifi and Babamir 2020), and Modified Zone-Based Intrusion Discovery Scheme (MZBIDS) (Krishnan et al. 2020a, b).
5.2.1 Accuracy
Accuracy is calculation is utilized for determining the efficacy of the developed EBDC approach. In this research, accuracy is calculated for identifying how effectively the proposed method detects the link failures and creates the route during message transmission, which is calculated using Eq. (5),
where \(Tn^{\prime}\) is True negative, \(Tp^{\prime}\) is denoted true positive, \(Fn^{\prime}\) is represents false-negative value and \(Fp^{\prime}\) is symbolizes false positive.
The effectiveness of the proposed EBDC approach is calculated and evaluated using existing approaches like RRP, EA-ICA, and MZBIDS that are detailed in Table 3. Here, the existing methods like RRP and MZBIDS have attained nearly 86% and 87% accuracy. Also, the existing EA-ICA approach achieved almost 95% accuracy. Moreover, the proposed EBDC obtained a high accuracy value of 99.9% that is very efficient than other approaches, which are represented in Fig. 7. The developed EBDC model effectively predicts the link failures based on the energy utilization of the nodes.
5.2.2 PDR calculation
This calculation is based on the rate of the entire quantity of attained data packets and the transmitted data packets, which is computed using Eq. (6),
The PDR value of the proposed EBDC approach is evaluated using existing techniques like RRP, EA-ICA, and MZBIDS that are detailed in Table 4. Here, the existing methods like RRP and MZBIDS are attained nearly 87% and 89% PDR.
Also, the existing EA-ICA approach achieved almost 94% PDR. Moreover, the proposed EBDC obtained a high PDR value of 99.85% that is very efficient than other techniques, which are represented in Fig. 8.
5.2.3 Throughput
The data packets are transferred through the communication links between the nodes, and the throughput ratio is computed for calculating the rate of data transfer in the network. Here, the throughput ratio is calculated using Eq. (7),
The throughput value of the proposed EBDC approach is evaluated using existing strategies like RRP, EA-ICA, and MZBIDS, detailed in Table 5. Here, the existing methods like RRP and MZBIDS are attained nearly 67 bps, 97 bps throughput value. Also, the prevailing EA-ICA approach accomplished almost 250 bps throughput value. Moreover, the proposed EBDC obtained a high throughput ratio of 700 bps while transmitting messages through 100 nodes, which are represented in Fig. 9.
5.2.4 Energy consumption
The proposed EBDC model attained lower energy consumption because of the route maintenance manner. Here, the energy utilization of the nodes has been calculated based on the simulation time.
Moreover, every node in the transmission path is utilized sufficient energy, and the calculated values are represented in Fig. 10. Furthermore, the comparisons of energy consumption with existing methods are mentioned in Table 6.
5.2.5 Network lifetime
In MANET, network lifetime is one of the necessary metrics for attaining efficient communication. When the energy utilization of nodes is high, nodes cannot communicate, which can affect the lifetime of the network. In this proposed approach, the energy utilization is low, so the network's lifetime is improved.
The network lifetime of the developed approach is calculated for several quantities of nodes that are validated with prevailing approaches, which is represented in Fig. 11. Here, the existing methods like RRP, EA-ICA, and MZBIDS have network lifetime 120 s, 265 s, and 198 s while transmitting messages through 500 nodes. Moreover, the proposed approach is attained a high lifetime of 580 s while sending messages through 500 nodes. Hence, the comparison is mentioned in Table 7.
5.2.6 End-to-end delay
Delay is calculated for identifying the time that is taken for reaching the transmitted data to the destination. It is the ratio of time that is occupied by received packets to the time taken by transmitted packets that are computed using Eq. (8),
The end-to-end delay value of the developed EBDC approach is estimated using prevailing strategies like RRP, EA-ICA, and MZBIDS that are detailed in Table 8. Here, the existing methods like RRP and MZBIDS are attained nearly 20 s and 18 s delay value.
Also, the existing EA-ICA approach accomplished 9 s delay value. Moreover, the proposed EBDC obtained a lower delay value of 1.5 s while transmitting messages through 100 nodes, which are represented in Fig. 12.
The proposed method has attained effective outcomes for predicting link failure and creating the new path for better transmission. Thus, it proved the comparison through prevailing methods, which is given in Table 9.
6 Conclusion
In MANET communication, link failure is happened because of various hackers, node mobility, and changing topology. So, this research developed the novel Eagle Based Density Clustering (EBDC) algorithm for route preservation and clustering in MANET. This model primarily develops nodes in the MANET that are arranged based on the Star topology, which reduced the packet loss because the message is stored in the cluster head. Initially, the developed manner finds the cluster head and path for message transmission. Subsequently, it detects the route (link) failure based on the calculation of the energy utilization of nodes. Hence, it creates a new reference layer for effectively transmitting messages. Accordingly, the developed reference layer is enhanced the lifetime of the nodes and network. The main advantages of the proposed EBDC approach are described as follows,
-
It created a large number of nodes in the MANET network
-
The proposed EBDC model effectively predicts the link failure while transmitting messages.
-
Consequently, EBDC developed the reference layer for effective transmission.
-
Thus, the developed EBDC approach enhanced the network lifetime and reduced the energy consumption due to the route maintenance and clustering process in EBDC.
-
Also, it enhanced the PDR, throughput ratio, and reduced the delay, energy utilization.
Therefore, it attained 99.9% high accuracy for predicting link failure, 99.85% PDR, energy utilization is 6 J, high network lifetime as 150 s, and lower delay as 1.5 s while transmitting a message through 100 numbers of nodes. Moreover, the comparison result proves the effectiveness of the proposed approach. In the future, the proposed strategy will apply in real-time applications to provide efficient outcomes.
Also in future, other influencing factors will be considered for attaining effective communication.
References
Bhardwaj A, El-Ocla H (2020) Multipath routing protocol using genetic algorithm in mobile ad hoc networks. IEEE Access 8:177534–177548. https://doi.org/10.1109/ACCESS.2020.3027043
da Costa Bento CR, Wille ECG (2020) Bio-inspired routing algorithm for MANETs based on fungi networks. Ad Hoc Netw. https://doi.org/10.1016/j.adhoc.2020.102248
Darwish SM, Elmasry A, Ibrahim SH (2019) Optimal shortest path in mobile ad-hoc network based on fruit fly optimization algorithm. Int Conf Adv Mach Learn Technol Appl Springer Cham. https://doi.org/10.1007/978-3-030-14118-9_10
Dhindsa KS, Bhushan B (2020) Clustering-based technique to defend DDoS attacks in mobile ad hoc networks. In: Proceedings of ICETIT 2019. Springer, Cham, pp 48–58
Dixit P, Pillai A, Rishi R (2020) A light weight efficient cluster based routing model for mobile ad hoc networks (LWECM). Int J Inf Technol 12(4):1085–1091. https://doi.org/10.1007/s41870-019-00291-0
Ibrahim MMS, Shanmugaraja P (2020) Optimized link state routing protocol performance in flying ad-hoc networks for various data rates of un manned aerial network. Mater Today Proc. https://doi.org/10.1016/j.matpr.2020.09.543
Islabudeen M, Devi MKK (2020) A smart approach for intrusion detection and prevention system in mobile ad hoc networks against security attacks. Wirel Pers Commun 112(1):193–224. https://doi.org/10.1007/s11277-019-07022-5
Kalaivanan S (2020) Quality of service (QoS) and priority aware models for energy efficient and demand routing procedure in mobile ad hoc networks. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-020-01769-7
Khudayer BH, Anbar M, Hanshi SM, Wan TC (2020) Efficient route discovery and link failure detection mechanisms for source routing protocol in mobile ad-hoc networks. IEEE Access 8:24019–24032. https://doi.org/10.1109/ACCESS.2020.2970279
Krishnan RS, Julie EG, Robinson YH et al (2020a) Enhanced certificate revocation scheme with justification facility in mobile ad-hoc networks. Comput Secur 97:101962. https://doi.org/10.1016/j.cose.2020.101962
Krishnan RS, Julie EG et al (2020b) Modified zone based intrusion detection system for security enhancement in mobile ad hoc networks. Wirel Netw 26(2):1275–1289. https://doi.org/10.1007/s11276-019-02151-y
Kumar SS (2019) Minimizing link failure in mobile ad hoc networks through QOS routing. In: the Proceedings of Innovations in Computer Science and Engineering. Springer, Singapore, pp 241–247. https://doi.org/10.1007/978-981-10-8201-6_27
Kumar S (2020) Prediction of node and link failures in mobile ad hoc network using hello based path recovery routing protocol. Wirel Pers Commun 115(1):725–744. https://doi.org/10.1007/s11277-020-07596-5
Kumar S, Raw RS, Bansal A (2020) Minimize the routing overhead through 3D cone shaped location-aided routing protocol for FANETs. Int J Inf Technol. https://doi.org/10.1007/s41870-020-00536-3
Majd NE, Ho N, Nguyen T, Stolmeier J (2019) Evaluation of parameters affecting the performance of routing protocols in mobile ad hoc networks (MANETs) with a focus on energy efficiency. In: Future of information and communication conference. Springer, Cham. https://doi.org/10.1007/978-3-030-12385-7_85
Mirsadeghi F, Rafsanjani MK, Gupta BB (2020) A trust infrastructure based authentication method for clustered vehicular ad hoc networks. Peer Peer Netw Appl. https://doi.org/10.1007/s12083-020-01010-4
Nagendranath M, Babu AR (2020) An efficient mobility aware stable and secure clustering protocol for mobile ADHOC networks. Peer Peer Netw Appl. https://doi.org/10.1007/s12083-019-00868-3
Nivedita V, Nandhagopal N (2020) Improving QoS and efficient multi-hop and relay based communication frame work against attacker in MANET. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-020-01787-5
Pal A, Dutta P, Chakrabarti A et al (2019) Biogeographic-based temporal prediction of link stability in mobile ad hoc networks. Wirel Pers Commun 104(1):217–233. https://doi.org/10.1007/s11277-018-6016-7
Rajkumar K, Jeyakumar MK (2021) Energy efficient clustering for certificate revocation scheme in mobile ad-hoc network. Wirel Pers Commun. https://doi.org/10.1007/s11277-020-08037-z
Regin R, Menakadevi T (2020) A novel clustering technique to stop congestion occur vehicular ad-hoc networks using node density based on received signal strength. Peer Peer Netw Appl. https://doi.org/10.1007/s12083-020-00958-7
Robinson YH, Krishnan RS, Julie EG et al (2019) Neighbor knowledge-based rebroadcast algorithm for minimizing the routing overhead in mobile ad-hoc networks. Ad Hoc Netw 93:101896. https://doi.org/10.1016/j.adhoc.2019.101896
Saini TK, Sharma SC (2020) Flexible multipoint relay selection for suitable route in mobile ad hoc networks. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-020-02552-4
Shanthy R, Padma T (2020) A zone routing protocol incorporated with sleep scheduling for MANETs. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-020-01798-2
Sharifi SA, Babamir SM (2020) The clustering algorithm for efficient energy management in mobile ad-hoc networks. Comput Netw 166:106983. https://doi.org/10.1016/j.comnet.2019.106983
Sridevi N, Nagarajan V, Sakthidasan K (2019) Efficient traffic control and lifetime maximization in mobile ad hoc network by using PSO–BAT optimization. Wirel Netw. https://doi.org/10.1007/s11276-019-02173-6
Srinivasa HP, Kamalesh VN (2020) A cluster-based connected dominating set routing protocol in mobile ad hoc networks. J Shanghai Jiaotong Univ 16(7):1002–1012
Sudhakar K, Sengottaiyan N, Anbukaruppusamy S (2020) A hybrid swarm intelligent framework to support efficient military communication in MANET. J Ambient Intell Humaniz Comput. https://doi.org/10.1007/s12652-020-01999-9
Sufian A, Banerjee A, Dutta P (2020) NC2H: cooperation among nodes through cluster head in ad hoc network. In: Proceedings of the 2nd international conference on communication, devices and computing. Springer, Singapore. https://doi.org/10.1007/978-981-15-0829-5_14
Theerthagiri P (2020) FUCEM: futuristic cooperation evaluation model using Markov process for evaluating node reliability and link stability in mobile ad hoc network. Wirel Netw 26(6):4173–4188. https://doi.org/10.1007/s11276-020-02326-y
Tilwari V, Maheswar R, Jayarajan P et al (2020) MCLMR: A multicriteria based multipath routing in the mobile ad hoc networks. Wirel Pers Commun. https://doi.org/10.1007/s11277-020-07159-8
Tran TN, Nguyen TV, Shim K, An B (2020) A game theory based clustering protocol to support multicast routing in cognitive radio mobile ad hoc networks. IEEE Access 8:141310–141330. https://doi.org/10.1109/ACCESS.2020.3013644
Vatambeti R (2020) A novel wolf based trust accumulation approach for preventing the malicious activities in mobile ad hoc network. Wirel Pers Commun 113(4):2141–2166. https://doi.org/10.1007/s11277-020-07316-z
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no potential conflict of interest.
Ethical approval
All applicable institutional and/or national guidelines for the care and use of animals were followed.
Informed consent
For this type of study formal consent is not required.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Vatambeti, R., Sanshi, S. & Krishna, D.P. An efficient clustering approach for optimized path selection and route maintenance in mobile ad hoc networks. J Ambient Intell Human Comput 14, 305–319 (2023). https://doi.org/10.1007/s12652-021-03298-3
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-021-03298-3