Generic placeholder image

Recent Advances in Computer Science and Communications

Editor-in-Chief

ISSN (Print): 2666-2558
ISSN (Online): 2666-2566

Review Article

Simulative Analysis of Column Mobility Model for Proactive and Reactive Routing Protocols in Highly Dense MANET

Author(s): Satveer Kour*, Himali Sarangal, Manjit Singh and Butta Singh

Volume 17, Issue 1, 2024

Published on: 05 October, 2023

Article ID: e051023221814 Pages: 9

DOI: 10.2174/0126662558264941231002055909

Price: $65

Abstract

One of the most promising fields of research in recent years is Mobile Ad Hoc Networks (MANET). The well-known advantages of the internet for specific types of applications lead to the fact that it is a wireless ad-hoc network. As a result, such networks can be utilized in circumstances where no other wireless communication infrastructure is present. A MANET is a network of wireless devices without any centralized control. A device can directly communicate with other devices using a wireless connection. For nodes that are located far from other nodes, multi-hop routing is employed. The functionality of route-finding is performed by routing protocols. The mobility model creates the movement pattern for nodes. This article discusses early research to address concerns about performance indicators for MANET routing protocols under the Column Mobility Model (CMM). Moreover, we discuss concerns regarding the designs of the related work, followed by the designed CMM model on the behavior of routing protocols.

Graphical Abstract

[1]
J. Kaur, and A. Singh, "A review study on the use of MANET for wireless devices", Proceedings of the International conferences on advances in electronics, electrical & computational intelligence (ICAEEC), India, 2019.
[2]
J.S. Kumar, and J. Sandeep, "Does MANET have senses? – An intellectual approach", Procedia Eng., vol. 38, pp. 1415-1431, 2012.
[http://dx.doi.org/10.1016/j.proeng.2012.06.176]
[3]
M. Conti, C. Boldrini, S.S. Kanhere, E. Mingozzi, E. Pagani, P.M. Ruiz, and M. Younis, "From MANET to people-centric networking: Milestones and open research challenges", Comput. Commun., vol. 71, pp. 1-21, 2015.
[http://dx.doi.org/10.1016/j.comcom.2015.09.007]
[4]
D. Kampitaki, and A.A. Economides, "Simulation study of MANET routing protocols under FTP traffic", Procedia Technol., vol. 17, pp. 231-238, 2014.
[http://dx.doi.org/10.1016/j.protcy.2014.10.233]
[5]
H. Zemrane, Y. Baddi, and A. Hasbi, "Mobile AdHoc networks for intelligent transportation system: Comparative analysis of the routing protocols", Procedia Comput. Sci., vol. 160, pp. 758-765, 2019.
[http://dx.doi.org/10.1016/j.procs.2019.11.014]
[6]
T. Mukherjee, S.K.S. Gupta, and G. Varsamopoulos, "Energy optimization for proactive unicast route maintenance in MANETs under end-to-end reliability requirements", Perform. Eval., vol. 66, no. 3-5, pp. 141-157, 2009.
[http://dx.doi.org/10.1016/j.peva.2008.10.006]
[7]
R. Kumar, M. Sharma, N. Kaur, and G. Singh, "A competent study of hybrid routing protocols of ANETs using NS-2 simulator", International Conference on Communication, Computing & Systems (ICCCS-2014), India, 2014, pp. 173-175.
[8]
F. Bai, and A. Helmy, "A survey of mobility models in wireless Adhoc networks",
[9]
M. Farkhana, and A. Abdul Hanan, "Mobility in mobile ad-hoc network testbed using robot: Technical and critical review", Robot. Auton. Syst., vol. 108, pp. 153-178, 2018.
[http://dx.doi.org/10.1016/j.robot.2018.07.007]
[10]
M. Schwamborn, N. Aschenbruck, and P. Matrini, "A realistic trace-based mobility model for first responder scenarios", Proceedings of the 13th ACM international conference on Modeling, analysis, and simulation of wireless and mobile systems, Turkey, 2010, pp. 266-274.
[http://dx.doi.org/10.1145/1868521.1868564]
[11]
N. Ibadah, K. Minaoui, M. Rziza, M. Oumsis, and C. Benavente-Peces, "Deep validation of spatial temporal features of synthetic mobility models", Computers, vol. 7, no. 4, p. 71, 2018.
[12]
A. Adnane, C. Bidan, and R.T. de Sousa Júnior, "Trust-based security for the OLSR routing protocol", Comput. Commun., vol. 36, no. 10-11, pp. 1159-1171, 2013.
[http://dx.doi.org/10.1016/j.comcom.2013.04.003]
[13]
Wei-Jen Hsu T., Spyropoulos K., Psounis, and A. Helmy, "Modeling spatial and temporal dependencies of user mobility in wireless mobile networks", IEEE/ACM Trans. Netw., vol. 17, no. 5, pp. 1564-1577, 2009.
[http://dx.doi.org/10.1109/TNET.2008.2011128]
[14]
E.R. Cavalcanti, and M.A. Spohn, "Improved spatial and temporal mobility metrics for mobile Ad Hoc networks", Inf. Sci., vol. 188, pp. 182-197, 2010.
[http://dx.doi.org/10.1016/j.ins.2011.11.015]
[15]
T. Manimegalai, and C. Jayakumar, "A conceptual study on mobility models in MANET", Int. J. Eng. Res. Technol., vol. 2, pp. 3593-3598, 2013.
[16]
A.A. Almazroi, E.A. Aldhahri, M.A. Al-Shareeda, and S. Manickam, "ECA-VFog: An efficient certificateless authentication scheme for 5G-assisted vehicular fog computing", PLoS One, vol. 18, no. 6, p. e0287291, 2023.
[http://dx.doi.org/10.1371/journal.pone.0287291] [PMID: 37352258]
[17]
B.A. Mohammed, M.A. Al-Shareeda, S. Manickam, Z.G. Al-Mekhlafi, A.M. Alayba, and A.A. Sallam, "ANAA-Fog: A novel anonymous authentication scheme for 5G-enabled vehicular fog computing", Mathematics, vol. 11, no. 6, p. 1446, 2023.
[http://dx.doi.org/10.3390/math11061446]
[18]
Z.G. Al-Mekhlafi, M.A. Al-Shareeda, S. Manickam, B.A. Mohammed, A. Alreshidi, M. Alazmi, J.S. Alshudukhi, M. Alsaffar, and A. Alsewari, "Chebyshev polynomial-based fog computing scheme supporting pseudonym revocation for 5g-enabled vehicular networks", Electronics, vol. 12, no. 4, p. 872, 2023.
[http://dx.doi.org/10.3390/electronics12040872]
[19]
M.A. Al-Shareeda, and S. Manickam, "A systematic literature review on security of vehicular Ad-Hoc network (VANET) based on VEINS framework", IEEE Access, vol. 11, pp. 46218-46228, 2023.
[http://dx.doi.org/10.1109/ACCESS.2023.3274774]
[20]
Z.G. Al-Mekhlafi, M.A. Al-Shareeda, S. Manickam, B.A. Mohammed, A. Alreshidi, M. Alazmi, J.S. Alshudukhi, M. Alsaffar, and T.H. Rassem, "Efficient authentication scheme for 5G-enabled vehicular networks using fog computing", Sensors, vol. 23, no. 7, p. 3543, 2023.
[http://dx.doi.org/10.3390/s23073543] [PMID: 37050601]
[21]
B.A. Mohammed, M.A. Al-Shareeda, S. Manickam, Z.G. Al-Mekhlafi, A. Alreshidi, M. Alazmi, J.S. Alshudukhi, and M. Alsaffar, "FC-PA: Fog computing-based pseudonym authentication scheme in 5G-enabled vehicular networks", IEEE Access, vol. 11, pp. 18571-18581, 2023.
[http://dx.doi.org/10.1109/ACCESS.2023.3247222]
[22]
M. Roy, C. Chowdhury, M.N. Anjum, and S. Neogy, "Designing secure and reliable mobile agent based system for reliable MANET", Int. J. Ad Hoc Ubiquitous Comput., vol. 32, no. 1, pp. 43-58, 2019.
[http://dx.doi.org/10.1504/IJAHUC.2019.101822]
[23]
N. Saravanan, R. Baskaran, M. Shanmugam, M.S. Saleem Basha, and P. Victer Paul, "An effective model for QoS assessment in data caching in MANET environments", Int. J. Ad Hoc Ubiquitous Comput., vol. 6, pp. 515-527, 2013.
[24]
M. Sichitiu, Mobility Models for Ad Hoc Networks. Computer Communications and Networks., Springer: London, 2009.
[25]
S. Kour, and J.S. Ubhi, "A Study of MANET Mobility Models", Int. J. Eng. Tech. Res., vol. 3, pp. 28-33, 2015.
[26]
N. Aschenbruck, E. Gerhards-Padilla, and P. Martini, "Modeling mobility in disaster area scenarios", Perform. Eval., vol. 66, no. 12, pp. 773-790, 2009.
[http://dx.doi.org/10.1016/j.peva.2009.07.009]
[27]
F. Maan, and N. Mazhar, "MANET routing protocols vs mobility models: A performance evaluation", Third International Conference on Ubiquitous and Future Networks (ICUFN), Dallia, China, 2011, pp. 179-183.
[http://dx.doi.org/10.1109/ICUFN.2011.5949158]
[28]
H.A. Amri, M. Abolhasan, and T. Wysocki, "Scalability of MANET routing protocols for heterogeneous and homogenous networks", Comput. Electr. Eng., vol. 36, no. 4, pp. 752-765, 2010.
[http://dx.doi.org/10.1016/j.compeleceng.2008.11.008]
[29]
S. Kour, and J. Singh, "Performance evaluation of enhanced manhattan mobility model over GM, RWP, Manhattan grid, SLAW, and TLW mobility models in MANETs", Recent Adv. Comput. Sci. Commun., vol. 15, no. 7, p. e190522194094, 2022.
[http://dx.doi.org/10.2174/2666255814666210615143318]
[30]
H.N. Lashari, H.M. Ali, and S. Massan, "A study of mobility models for UAV communication networks", 3C Tecnologia, vol. 7, pp. 276-297, 2019.
[31]
P. Sarao, "Performance analysis of MANET under security attacks", J. Commun., vol. 17, pp. 194-202, 2022.
[http://dx.doi.org/10.12720/jcm.17.3.194-202]
[32]
S.W. Nourildean, Y.A. Mohammed, and A.M. Salih, "Mobile Ad Hoc network improvement against jammers for video applications using riverbed modeler (v17.5)", Webology, vol. 19, no. 1, pp. 1446-1459, 2022.
[http://dx.doi.org/10.14704/WEB/V19I1/WEB19096]
[33]
A. Abdelhamid, M.S. Elsayed, A.D. Jurcut, and M.A. Azer, "A lightweight anomaly detection system for black hole attack", Electronics, vol. 12, no. 6, p. 1294, 2023.
[http://dx.doi.org/10.3390/electronics12061294]

Rights & Permissions Print Cite
© 2024 Bentham Science Publishers | Privacy Policy