May 2012
Intelligent Automation & Soft Computing;2012, Vol. 18 Issue 3, p297
Academic Journal
In mobile ad hoc networks, mobile nodes have to communicate to each other without any infrastructure or base station. Thus, a lot of critical routing decision factors should be taken into considerations, such as reputation, reliability, availability, security, and mobility. Specially, the misconduct nodes due to unreliability, malfunction, migration, or malice may result in the loss and delay of packets. This paper proposes a fuzzy-based routing scheme based on reputation, bandwidth, and distance to overcome the misconduct mobile nodes and to enhance the performance of throughput. The scheme utilizes the ad hoc on-demand distance vector, the exponential smoothing model, and the fuzzy multiple-criteria group decision-making method to perform the routing path decision. Finally, the simulation is used to illustrate the performance of proposed scheme and existing methods. From the simulation results, the proposed scheme has better throughput than other schemes.


Related Articles

  • AODV Routing Protocol in MANET based on Cryptographic Authentication Method. Srinu Padma, Thandu Naga; Ramarao, Tandu; Simhadri, Nischala // International Journal of Computer Science Engineering & Technolo;Oct2012, Vol. 2 Issue 10, p1459 

    In mobile ad-hoc wireless network (MANET),secure communication is more challenging task due to its fundamental characteristics like infrastructure less, wireless link, distributed cooperation, dynamic topology, lack of association, resource constrained and physical vulnerability of node. In...

  • Optimization on Control Overhead in MANET.  // International Journal of Computer Applications;Dec2010, Vol. 12, p16 

    The article discusses an optimized ad-hoc on-demand distance vector (AODV) and optimized distance source routing (DSV) computer algorithms to minimize the control overhead. It offers a background of mobile ad-hoc network (MANET) and its routing protocols which are classified as either proactive,...

  • Analysis of Different Routing Techniques for Opportunistic Data Transfer. Rani Arasu, Sheela; Johnraja Jebadurai, Immanuel // International Journal of Computer Applications;2013, Vol. 62, p1 

    This paper deals with various routing techniques for efficient data transfer in MANET. MANET is a wireless infrastructure-less network where mobile devices communicate through wireless links. To make the communication of wireless network as good as that of the wired ones is the challenging...

  • A Border Node Based Routing Protocol for Partially Connected Vehicular Ad Hoc Networks. Mingliu Zhang; Wolff, Richard S. // Journal of Communications;Feb2010, Vol. 5 Issue 2, p130 

    Research on vehicular ad hoc networks (VANETs) has focused primarily on efficient routing protocol design under conditions where there are relatively large numbers of closely spaced vehicles, typical of major highways and urban areas. These routing protocols are designed principally for fully...

  • A Novel Scheme for Seamless Hand-off in WMNs. Hung Quoc Vo; Daesun Kim; Choong Seon Hong; Sungwon Lee; Eui-Nam Huh // KSII Transactions on Internet & Information Systems;2009, Vol. 3 Issue 4, p399 

    Although current wireless mesh network (WMN) applications experience a perceptually uninterrupted hand-off, their throughput after the hand-off event may be significantly degraded due to the low available bandwidth of the mobile client's new master. In this paper, we propose a novel mobility...

  • A mobility-based upper bound on route length in MANETs. Pascoe, M.; Gomez, J.; Rangel, V.; Lopez-Guerrero, M.; Mendoza, F. // Telecommunication Systems;Jan2013, Vol. 52 Issue 1, p105 

    In mobile ad-hoc networks (MANETs) routes are usually found by means of discovery packets that are injected to the network by sender nodes. Once the intended destination is reached by a discovery packet, it replies back to the sender using the same route. Upon reception of the reply message,...

  • Enhanced Triple Umpiring System for Security and Performance Improvement in Wireless MANETS. Kathirvel, Ayyaswamy; Srinivasan, Rengaramanujam // International Journal of Communication Networks & Information Se;Jun2010, Vol. 2 Issue 2, p77 

    A mobile ad hoc network is a self-created, self-organized and self-administering set of nodes connected via wireless links without the aid of any fixed infrastructure or administrator. Protecting the network layer from malicious attacks is an important and challenging issue in both wired and...

  • A MODEL FOR CONGESTION CONTROL OF TRANSMISSION CONTROL PROTOCOL IN MOBILE WIRELESS AD HOC NETWORKS. Monzer Habbal, Adib M.; Hassan, Suhaidi // Journal of Computer Science;Mar2013, Vol. 9 Issue 3, p335 

    Transmission Control Protocol (TCP) is a fundamental protocol in the TCP/IP Protocol Suite.TCP was well designed and optimized to work over wired networks where most packet loss occurs due to network congestion. In theory, TCP should not care whether it is running over wired networks, WLANs, or...

  • Reliable Buffering Management Algorithm Support for Multicast Protocol in Mobile Ad-hoc Networks. Alahdal, Tariq; Alsaqour, Raed; Abdelhaq, Maha; Saeed, Rashid; Alsaqour, Ola // Journal of Communications;Feb2013, Vol. 8 Issue 2, p136 

    Multicasting is one of the relevant issues of communication in infrastructure or centralized administration networks. The reliable delivery of multicast data packets needs feedback from all multicast receivers to indicate whether a retransmission is necessary. A reliable multicast delivery in...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics