A Novel Supervised Learning Based Neighbor Discovery in MANET
A Novel Supervised Learning Based Neighbor Discovery in MANET
A Novel Supervised Learning Based Neighbor Discovery in MANET
Abstract—Mobile ad hoc networks (MANETs) is a multi-hop established and the data packets reach the destination.
wireless network having the capability to self- configure and self- Hence, it is also called as On-demand routing.
organize when affected by node mobility. Routing becomes a
problem in MANET because nodes continuously change their iii. Hybrid Protocols: It is a mix of both proactive and
position due to movement. As a result, a packet path must be reactive routing protocols. The choice of one or the
dynamically adapted according to the node movement. Most other routing depends upon the particular type of
routing protocols in MANET are characterized by low packet application or typical cases.
success ratio and low throughput. This work proposes an
effective routing algorithm assisted by artificial neural networks
Routing becomes a problem in MANET because nodes
for mobility prediction in order to improve the routing continuously change their position due to movement. As a
performances, thereby increasing the packet success ratio and result, the packet path must be dynamically adapted according
throughput. to the node movement. Most routing protocols in MANET are
characterized by low packet success ratio and high
Keywords—Routing; Mobile Ad Hoc Network (MANET); communication overhead. Hence, a sophisticated routing
Mobile Host’s(MH’s); Mobility prediction; Supervised learning protocol is proposed to address this issue.
A most likely application of MANET’s is in the field of
I. INT RODUCT ION emergency communication required during disaster
A Mobile Ad-hoc network is an assembly of the number of management. In the case of earthquakes or flooding, the
nodes that are free to move in any direction. Every single node telecom based infrastructure networks would fail and in this
in the network is independent of the topology and hence can be case, MANET comes to their rescue. So it is really necessary
referred to as an autonomous node. As the nodes are mobile in and helpful to propose a mechanism to address the routing
nature, the network topology changes dynamically, thereby problems in MANET.
each node serves as a router to facilitate packet routing. The
node from which the data packets are generated is called the II. RELAT ED W ORK
source node. The node to which the packets have to be
delivered in the network is called the destination node. Multi- MANET is an infrastructure-less temporary system, shaped
hop routing is employed to facilitate packet delivery amongst by an arrangement of mobile hosts that has no focal
the nodes. Due to node mobility, the routing path for the organization and builds up their particular network
packets changes frequently. This results in a reduction of progressively. In addition, the system's condition has a few
packet delivery ratio. highlights that include additional complexities, for example,
the regular changes in the topology caused by mobile hubs, and
Many routing algorithms have been suggested for MANET also the inconsistency, asset requirement and the data
which is classified into the following transmission constraint of remote channels. Various routing
i. Proactive routing: A route table about the position of protocols and mobility prediction techniques were proposed to
each and every node is built frequently and routing is optimize the network performance for effective steering in
based on it. Due to this, it is also called as table-driven MANET which is as discussed below.
routing. The authors in [1] clarify about the fast propagation of
lightweight remote gadgets, for example, PCs, remote phones,
ii. Reactive Routing: Route establishment is done on
demand by flooding the network with route request and remote sensors, the potential and significance of nomadic
packets. Based on the response, the next node is computing especially mobile Adhoc networking. Owing to the
identified and this process goes on until a fixed path is vigorous topology of Adhoc Network, this paper fundamentally
emphases on numerous directing strategies which are the most
Authorized licensed use limited to: Newcastle University. Downloaded on October 18,2020 at 15:38:30 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the International Conference on Smart Electronics and Communication (ICOSEC 2020)
IEEE Xplore Part Number: CFP20V90-ART; ISBN: 978-1-7281-5461-9
difficult issue in the present situation. There are many training procedure used is the back-propagation algorithm. As
protocols proposed for MANETs which makes it very hard to the nodes are dynamic in the network, there is no particular
figure out which convention is appropriate for various system path amongst source and the destination node. Hence, mobility
conditions. This paper effectively gives a review of various prediction provides more stable links for communication in
routing protocols. MANETs.
In [2], the authors explain that wireless Sensor Network In [8], the authors explain the importance of protocol
helps in checking different sorts of conditions by detecting the selection and routing to obtain an efficient network.
physical phenomenon. The paper’s real focus lies in expanding Comparisons are made between different Adhoc routing
the network lifetime so that the battery shall not be drained protocols, specifically between AODV and DSDV to have
soon. Clustering the sensor hubs is a powerful procedure for complete statistics about the performance analysis and results.
accomplishing this objective. This paper presents an energy- The different performance parameters used for comparison
productive clustering calculation for a sensor network in light were an end-to-end delay, jitter and throughput. Results show
of the LEACH convention. LEACH is one of the well-known that the effort required for routing with mobile nodes is
cluster-based structures, which has been generally proposed in comparatively less using AODV. Thus, AODV helps in
remote sensor networks. The proposed protocol is recreated reducing network overhead.
and the outcome demonstrates a critical decrease in In [9], the authors explain about multipath routing protocol
organization energy utilization when contrasted with LEACH. based on the stable backbone, focussing on finding the steady
In [3], the author sets out a proposition for DREAM_OLSR way to exchange the data packets. This ,, was carried out in 2
protocol. The convention had been proposed to impact the stages, the first stage involved the determination of correct hub
existing OLSR convention. The convention builds up an having higher enduring bandwidth, remaining energy, link
augmented solution, wherein Distance routing effective quality and dynamicity. Different routing routes were set up
algorithm is employed for optimization thus resulting in utilizing these hubs. Secondly, the backbone development to
increased efficacy and reduced overheads for MANETs. facilitate routing from source to destination was done. If any
In [4], the author presents an enhanced AODV convention. hub in a course tends to fail, at that point, the transmission
In this convention, a stability factor is utilized to monitor the would occur through the substitute way.
rest of the energy of each hub in the setup. When an RREQ In [10], the authors explain about AODV with reliable
message is sent by the source hub it checks its stability factor delivery (AODV-RD). An intelligent routing algorithm is built
during the time it ranges to its neighbouring hub. The AODV called AODV-RD which has an improved packet delivery
directing convention for MANETs that viably diminishes the ratio. Simulation results were used to demonstrate that AODV-
energy utilization and the end defer amid the course revelation RD essentially increases the packet success ratio when
process is suggested. By utilizing these strategies in directing compared to AODV-BR.
convention it is conceivable to diminish the energy and end to While dealing with MANETs, routing becomes a very huge
end defer by around 7% to 24%. problem since the nodes are continuously in movement. Most
In [5], the author explains about one of the most promising of the previously discussed solutions have a lot of unresolved
routing protocols for MANETS named DSR (Distance State issues such as low packet success ratio and high n etwork
Routing). Continuous Hop field Neural Network is utilised for communication overhead. Also, the existing procedures are not
route optimization which can improve usability as well as scalable for large networks since one particular approach does
survivability of MANET. not apply to all kinds of mobility. Although the nodes are
In [6], the author explains about Mobility prediction which random, there is a specific movement pattern underlying the
in case of versatile specially appointed systems is a movement of every node. If a machine learning classifier can
straightforward and powerful plan to foresee when the client be trained to learn the movement pattern and predict the
will leave from the present area and how will it move to the position of the node in the next point of time, this information
next future position. The versatility expectation is can be used for routing. Thus an effective solution using
exceptionally critical for homogeneous and heterogeneous artificial neural networks would be proposed to solve the
systems, dictated by applications in portability administration, routing problems thereby enhancing the routing performances,
smooth handoffs, call confirmation control, and asset booking by increasing the bandwidth, packet success ratio and
for enhanced nature of administration. One approach to address throughput.
the reality of hub versatility is contriving proactive
arrangements that make utilization of portability forecast III. CLUST ERING
calculations to evaluate the development of the hubs. This The process of grouping a given number of nodes within
paper display the most noteworthy vers atility expectation the entire network is referred as clustering, wherein the entire
procedures for MANETs concentrating on their significant plan network gets clustered frequently or after a fixed period of
standards and portrayal. time-based on the proximity of mobile nodes which are
In [7], the author uses neural network technology to foretell dynamic. In a cluster, any node which remains relatively stable
the forthcoming position of the mobile nodes in Ad hoc to all the other nodes would be chosen as a Cluster head.
networks. The proposed method consists of a multi-layered
feed-forward architecture for neighbourhood prediction. Neural
Authorized licensed use limited to: Newcastle University. Downloaded on October 18,2020 at 15:38:30 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the International Conference on Smart Electronics and Communication (ICOSEC 2020)
IEEE Xplore Part Number: CFP20V90-ART; ISBN: 978-1-7281-5461-9
U
° if iH
° § q mod ·
T (i) ®1 U * ¨¨ ¸¸ (1)
° © U ¹
°¯ 0otherwise
A candidate node in the network which desires to be a
Where, cluster head broadcasts a random value ‘q’. This random value
U – Preferred percentage of cluster heads within the ‘q’ would be matched with the calculated threshold value
entire network. essential for a node to be a cluster head. If this random value of
q – Current iteration or the current round. a node is lesser than the threshold value, then the candidate
H – Assembly of nodes that have not been the cluster node itself becomes the cluster head else the candidate node
heads in the preceding iteration. needs to wait for its turn until all the remaining nodes in the
For a node to be the cluster head a value between 0 and 1 network have turned out to be the cluster head at least once.
needs to be chosen by the node. If the chosen value is lesser Once the cluster head is chosen it is given an identification
than the threshold value T(i), then the node turns out to be the number. Using this identification number, the cluster head
cluster head for the present round. A node that has become a sends an advertisement to the remaining nodes so that all the
cluster head in the preceding rounds does not turn out to be a nodes contained by the cluster links to the cluster head. Thus,
cluster head in the subsequent round until all the existing nodes the nodes submit themselves to the cluster head by accepting
in the entire network have become cluster heads at least once. the request to join the cluster head.
The entire process for cluster head selection takes place in During the steady phase, the random value assigned to the
two steps namely setup phase and steady phase. The algorithm cluster head would be compared with the threshold value. As
for these two phases is as follows long as the random value is less er than the threshold value, the
given node is maintained as a cluster head in the network. As
the nodes are mobile leading to a dynamic topology thereby the
entire process of cluster head selection has to be carried out
again.
Authorized licensed use limited to: Newcastle University. Downloaded on October 18,2020 at 15:38:30 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the International Conference on Smart Electronics and Communication (ICOSEC 2020)
IEEE Xplore Part Number: CFP20V90-ART; ISBN: 978-1-7281-5461-9
A machine learning approach in conjugation with clustering Type, Layer M ulti-Layer Perceptron; 3
is employed on the MANET to facilitate efficient packet No of input neurons 4
delivery, which is carried out by predicting the node position to
avoid link breakage and to optimize the node energy. The No of output neurons 1
entire work is split into modules and each module is executed No of hidden Layer 1
step by step one after the other. The flow process for all the
modules is as shown in Fig. 2. No of hidden Layer neurons 13
Learning algorithm LM S
Error rate 0.001
Learning rate 0.9
Authorized licensed use limited to: Newcastle University. Downloaded on October 18,2020 at 15:38:30 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the International Conference on Smart Electronics and Communication (ICOSEC 2020)
IEEE Xplore Part Number: CFP20V90-ART; ISBN: 978-1-7281-5461-9
Authorized licensed use limited to: Newcastle University. Downloaded on October 18,2020 at 15:38:30 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the International Conference on Smart Electronics and Communication (ICOSEC 2020)
IEEE Xplore Part Number: CFP20V90-ART; ISBN: 978-1-7281-5461-9
VI. CONCLUSION
Due to the use of Artificial Neural Networks for position
prediction and use of predicted position to do routing, the
performance of the routing protocol had increased
significantly. The proposed solution for routing in MANETs is
scalable for relatively massive networks. By using more
complex neural network algorithms for neighbor prediction, the
network can be made fault-tolerant since the probability of a
data packet reaching the destination node is higher, even if one
of the links breaks due to congestion or any other abrupt
activity in the network. These type of highly efficient networks
with no fixed infrastructure have promising application in the
Fig. 9. T hroughput plot field of disaster management and emergency communication.
Fig.9 illustrates that the throughput in the proposed method Ad-hoc network uses wireless links for the data
transmission of packets which subsequently makes it highly
is better than AODV for a fixed number of nodes. Throughput
increased approximately by 25% after incorporating mobility susceptible to attack. Even though more or less some work has
prediction. been done on MANET's security issues, still many issues and
challenges needs are addressed. As it is quite challenging to
offer security due to the absence of centralized architecture or
authority, as key management turns into a problematic
situation. Therefore, special efforts must be made to ensure
both secure and reliable communication.
REFERENCES
Authorized licensed use limited to: Newcastle University. Downloaded on October 18,2020 at 15:38:30 UTC from IEEE Xplore. Restrictions apply.
Proceedings of the International Conference on Smart Electronics and Communication (ICOSEC 2020)
IEEE Xplore Part Number: CFP20V90-ART; ISBN: 978-1-7281-5461-9
Authorized licensed use limited to: Newcastle University. Downloaded on October 18,2020 at 15:38:30 UTC from IEEE Xplore. Restrictions apply.