Sunteți pe pagina 1din 17

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/273279019

Weighted dominating set based routing for ad hoc communications in


emergency and rescue scenarios

Article  in  Wireless Networks · February 2014


DOI: 10.1007/s11276-014-0800-4

CITATIONS READS

7 113

2 authors:

Ramalakshmi Ramar Radhakrishnan Shanmugasundaram


Kalasalingam Academy of Research and Education (Deemed to be University) Kalasalingam University
17 PUBLICATIONS   49 CITATIONS    33 PUBLICATIONS   241 CITATIONS   

SEE PROFILE SEE PROFILE

Some of the authors of this publication are also working on these related projects:

WSN energy & Lifetime View project

Leach protocols and Secured authentication View project

All content following this page was uploaded by Ramalakshmi Ramar on 28 March 2016.

The user has requested enhancement of the downloaded file.


Weighted dominating set based routing for
ad hoc communications in emergency and
rescue scenarios

R. Ramalakshmi & S. Radhakrishnan

Wireless Networks
The Journal of Mobile Communication,
Computation and Information

ISSN 1022-0038
Volume 21
Number 2

Wireless Netw (2015) 21:499-512


DOI 10.1007/s11276-014-0800-4

1 23
Your article is protected by copyright and all
rights are held exclusively by Springer Science
+Business Media New York. This e-offprint is
for personal use only and shall not be self-
archived in electronic repositories. If you wish
to self-archive your article, please use the
accepted manuscript version for posting on
your own website. You may further deposit
the accepted manuscript version in any
repository, provided it is only made publicly
available 12 months after official publication
or later and provided acknowledgement is
given to the original source of publication
and a link is inserted to the published article
on Springer's website. The link must be
accompanied by the following text: "The final
publication is available at link.springer.com”.

1 23
Author's personal copy
Wireless Netw (2015) 21:499–512
DOI 10.1007/s11276-014-0800-4

Weighted dominating set based routing for ad hoc


communications in emergency and rescue scenarios
R. Ramalakshmi • S. Radhakrishnan

Published online: 4 September 2014


 Springer Science+Business Media New York 2014

Abstract Disasters create emergency situations and the protocols in terms of packet delivery ratio, control message
services provided must be coordinated quickly via a com- overhead, transmission delay and energy consumption.
munication network. Mobile adhoc networks (MANETs)
are suited for ubiquitous communication during emergency Keywords Connected dominating set  Routing  Energy
rescue operations, since they do not rely on infrastructure. efficient  Mobile ad hoc networks  Emergency rescue
The route discovery process of on-demand routing proto- scenarios
cols consumes too much bandwidth due to high routing
overhead. Frequent route changes also results in frequent
route computation process. Energy efficiency, quick 1 Introduction
response time, and scalability are equally important for
routing in emergency MANETs. In this paper, we propose As a consequence of disasters, emergency rescue team can
an energy efficient reactive protocol named Weighted- deploy and wireless mobile ad hoc network (MANET) can
CDSR for routing in such situations. This protocol selects a be used for emergency communications. Ad hoc networks
subset of network nodes named Maximum Weighted are the collection of wireless mobile nodes such as PDA,
Minimum Connected Dominating Set (MWMCDS) based Notebook, mobile phone or hand-held devices etc, com-
on weight, which consists of link stability, mobility and municating among them through wireless channels. The
energy. The MWMCDS provides the overall network con- important characteristics of these networks are battery
trol and data forwarding support. In this protocol, for every power, low bandwidth and dynamic topology. MANETs
two nodes u and v in the network there exists a path can provide an instant and distributed peer-to-peer ad hoc
between u and v such that all intermediate nodes belong to communication solution for the rescue workers [1]. In
MWMCDS. Incorporating route stability into routing emergency scenarios, it is assumed that it is not possible to
reduces the frequency of route failures and sustains net- recharge the battery powered devices. We can name a
work operations over an extended period of time. With MANET deployed in such emergency rescue operations as
fewer nodes providing overall network control and data emergency MANET. Two nodes can communicate directly
forwarding support, the proposed protocol creates less with each other if they are within each other’s transmission
interference and consumes less energy. The simulation range, otherwise intermediate nodes have to route the
results show that the proposed protocol is superior to other messages for them. Energy efficiency, quick response time
and stability are equally important for routing in emer-
gency MANETs, since mobile nodes have homogeneous
lifetimes. The presence of dynamic and adaptive routing
R. Ramalakshmi (&)  S. Radhakrishnan
protocols will enable ad hoc networks to be formed
Department of Computer Science and Engineering,
Kalasalingam University, Srivilliputhur, India quickly, and then it ensures efficient communications
e-mail: ramalakshmir@yahoo.com; rama@klu.ac.in during the rescue operations.
S. Radhakrishnan A routing protocol for MANET uses a broadcasting
e-mail: srk@klu.ac.in scheme to discover a route. It commonly uses route

123
Author's personal copy
500 Wireless Netw (2015) 21:499–512

discovery approach. The flooding of route request (RREQ) constructs a CDS from one node with maximum degree.
leads to congestion and also consumes more battery power. Each node has to know the degree of all the nodes in the
Frequent route changes also result in frequent route com- graph. The second algorithm is decentralized, which first
putation process. Therefore, it is crucial that MANET computes a dominating set and then selects additional
routing protocols must include information on mobility and nodes to connect the set to form CDS. This greedy algo-
residual energy into the algorithm design to adapt the rithm iteratively adds the nodes with maximum degree to
network and node changes. The stability of path is an the dominating set. Wu et al. [3] have proposed a method
important design criterion to be considered while devel- with two phases: marking and reduction. In the marking
oping multi-hop ad hoc communication protocols. phase, every node with two unconnected neighbors is
marked as a dominating node to form an initial CDS. In the
1.1 Network modeling and related definitions reduction phase, a node unmarked itself if it has either a
neighbor with larger ID which dominates all its neighbors
An ad hoc network is modeled as a graph G ¼ ðV; EÞ, or two adjacent neighbors with larger IDs which together
where V represents the set of nodes in the network and the dominates all its neighbors. Stojmenovic et al. [4, 5] have
edge set E represents all the links in the network. A improved the proposed algorithm [3] by using the key
homogeneous network deployed in 2D plane, where nodes consisting of node degree and ID to produce a backbone
have same transmission range is assumed. An edge exists quickly with short routes, low overhead, and less energy
between the two nodes if they are within the transmission consumption [6].
range of each other. Literatures [7–14] take energy issue into consideration.
Dominating Set (DS): Given a graph G ¼ ðV; EÞ, a Wu et al. have also proposed two rules based on node
Dominating Set (DS) is a subset D  V, such that for every degree and node’s energy level to construct power aware
vertex v 2 V, either v 2 D, or v has a neighbor in D. CDS in [7, 8]. An energy efficient dominating tree con-
Connected Dominating Set (CDS): Given a graph struction algorithm is proposed by Yu et al. [9] to construct
G ¼ ðV; EÞ, a Connected Dominating Set (CDS) is a subset a dominating tree that serves as a communication backbone
D  V which satisfies the following two conditions. in wireless infrastructures. Their algorithm uses k-hop
neighbor’s information, k 2 ½1; DG , where DG is the
– D is a DS
diameter of the graph G. It consists of two phases, marking
– For every two nodes u and v in D there exists a path
phase and connecting phase. The marking phase constructs
between u and v such that all intermediate nodes belong
a Maximal Independent Set (MIS) whereas the connecting
to D.
phase connects the forest to a single spanning tree. Rai
Maximum Weighted Minimum CDS (MWMCDS): Given a et al. [10] have proposed an algorithm for power aware
graph G ¼ ðV; EÞ with node weight function W : V ! Rþ , CDS construction in sensor networks. A timer based
MWMCDS problem is to find a minimum size CDS of G energy aware connected dominating set construction pro-
such that its total weight is maximum. tocol is proposed by Kim et al. [11]. Their work extends the
MAC-layer timer based CDS so that the energy level at
1.2 Connected dominating set in wireless networks each node is taken into account while constructing the
CDS. A Multi Point Relay(MPR) based CDS construction
A possible method to reduce the energy consumption in ad algorithm is proposed by Ramalakshmi et al. [12] for stable
hoc network, is to find a set of nodes (dominating set) that energy aware backbone construction. Shukla et al. [13]
take on additional responsibility to help with routing. Any have proposed a weighted CDS construction based on
dominating node can send a message to another node by energy, degree and ID. A CDS based topology control
forwarding the message to a neighboring dominating node. algorithm is proposed by Yu et al. [14] for wireless sensor
The dominating set based approach brings several benefits to network. El-Hajj et al. [15] have proposed a distributed
network routing and management. The search space of the CDS construction algorithm for routing in MANET. Their
routing path can be restricted to the set of dominating nodes. algorithm assigns weight to the nodes based on received
It can also alleviate broadcast storm problem. The network signal strength and selects nodes with maximum weight.
can react quickly to topology changes. A dominating set is A two-phase algorithm called maximal independent set
suitable for the routing task, as long as it is connected. with multiple initiators is proposed by Wang et al. [16]. In
their work, a forest consisting of multiple dominating trees
1.2.1 CDS construction in ad hoc networks rooted at multiple initiators is constructed parallely. In the
second phase, overlapping branches in the dominating trees
Guha et al. [2] have proposed two greedy algorithms for are interconnected to form a complete virtual backbone.
CDS construction. The first algorithm is centralized and it Nodes are ranked with \stability; degree; ID [ . An

123
Author's personal copy
Wireless Netw (2015) 21:499–512 501

algorithm to calculate a stable dominating set based on link data transmission. The rest of the paper is organized as
stability is proposed by Sheu et al. [17]. In their work, a follows: the background about state-of-art and energy
link is said to be weak if the strength of the beacon signals efficient routing protocols are presented in Sect. 2. Section
received on the link is below a threshold. The nodes are 3 explains the weighted connected dominating set
considered in the decreasing order of the non-weak links (Weighted-CDSR) based routing protocol. The simulation
associated with that node. A CDS construction algorithm results of the proposed work are presented in Sect. 4. The
based on the received signal strength is proposed by Leu conclusion of the work is arrived at Sect. 5.
et al. [18] for both static and dynamic environments. The
Mobility Adaptive Clustering Algorithm (MACA) by Ba-
sagni [19], has formed Weakly-CDS with slow moving 2 Background
nodes using clustering process. A Weakly-CDS induces a
weakly connected subgraph, which is the graph induced by In this section, we provide the background on the overview
the dominating nodes and its neighbors. A cluster-head is a of ad hoc and the stable, energy efficient routing protocols.
node that acts as a coordinator for the associated neighbors.
When nodes move randomly, a fast moving cluster-head is 2.1 Overview of on-demand routing protocols
likely to encounter another cluster-head sooner than a slow in ad hoc networks
moving one. The open neighbor sets of fast moving nodes
will exhibit more change than those of slow moving nodes. Routing in MANET is classified into proactive, reactive
Therefore, their algorithm has selected slow moving nodes, and hybrid. In proactive routing, each node maintains
which are more likely to have stable links. A mobility routing table with complete paths to every destination from
based clustering by An et al. [20] considers nodal move- that node. The route setup time is less in this routing as
ment in the creation of a CDS. In this protocol, nodes routes are already available. In reactive routing protocol
periodically exchange their position and velocity infor- [28–30], a route is created when it is needed. The source
mation with their neighbors. A node calculates the relative node initiates the route discovery when it has no route to
velocity and the relative mobility among its neighbors. the destination and it needs to send the data packet [31].
Wang et al. [21] have proposed a weight based route The key feature of Dynamic Source Routing (DSR) [28]
strategy to select a stable route. They have considered the is the use of source routing. The sender knows the complete
weight of the route with three factors—the route expiration hop-by-hop route to the destination. These routes are stored
time, the error count and the hop count. in a route cache. The data packets carry the source route in
A novel mobility handling algorithm is proposed by the packet header. When a node in the network attempts to
Sakai et al. [22], to shorten the recovery time of CDS in the send a data packet to a destination, when it does not know
mobile environment. A distributed topology management the route, it uses route discovery process to dynamically
algorithm is proposed by Bao et al. [23] to construct and determine a route. The route discovery process works by
maintain the minimal dominating set of the network. The flooding the network with RREQ packets. Each node
algorithm works with the 2-hop neighboring information. receiving a RREQ rebroadcasts it, unless it is the destina-
A simple, fixed and scalable virtual wireless backbone tion or it has route to the destination in its route cache.
construction is proposed by Al-Karaki et al. [24], to Such a node replies to the RREQ with a Route Reply
address the issue of topology control in homogeneous and (RREP) packet that is routed back to the original source.
heterogeneous networks. The fixed backbone called Virtual RREQ and RREP packets are also source routed. The route
Grid Architecture (VGA) is created through a novel and carried back by the RREP packet is cached at the source for
simple zoning scheme and is used as the underlying future use. If any link on a source route is broken, the
backbone for efficient routing. A MPR based broadcasting source node is notified using a Route Error (RERR) packet.
is proposed by Yen et al. [25] to limit the flooding of The source removes any route using this link from its cache
RREQ packet. The MPR nodes will rebroadcast the RREQ and a new route discovery process is initiated if this route is
packet. All nodes which are not in the set will receive and still needed.
process the packet but it will not rebroadcast. The authors Ad hoc On-Demand Vector (AODV) [29] also discovers
have optimized the route to adapt to the network changes. routes on demand, using a similar route discovery process
A broadcasting protocol based on MPR is proposed by like DSR. However, AODV adopts a very different
Moulahi et al. [26]. A survey on connected dominating set mechanism to maintain routing information. It uses routing
in ad hoc and sensor network is given by Yu et al. [27]. tables with one entry per destination. It relies on routing
The main objective of this work is to propose an energy table entries to propagate a RREP back to the source and to
efficient routing protocol, to use a stable path for routing. route data packets to the destination. It uses sequence
This protocol forms MWMCDS to do the broadcast and numbers at each destination to determine freshness of

123
Author's personal copy
502 Wireless Netw (2015) 21:499–512

routing information and to prevent routing loops. These The three-hop horizon pruning algorithm is proposed by
sequence numbers are carried by all routing packets. Upon Spohn et al. [35] to compute two-hop connected domi-
receiving the RREQ packet, each intermediate node checks nating set (TCDS), which is a set of nodes. Every node in
whether it has a valid route to the requested destination. If the network is within two hops from some node in the
the sequence number of the stored route is greater than the TCDS. They have applied a virtual radio range which is
sequence number in the RREQ packet, it notifies the source shorter than the physical radio range and consider the
about the valid route by sending RREP. If the intermediate nodes within virtual range as one-hop neighbors. They
node does not have a valid route to the destination, it have conducted simulation to see the route discovery pro-
checks whether it has already forwarded a RREQ packet cess of AODV over TCDS. Sivakumar et al. [37], have
with the same sequence number. If not, an intermediate proposed an approach based on (1) overlaying a virtual
node records its receipt of the RREQ packet and broadcasts infrastructure on an ad hoc network and (2) operating
the packet to its neighbors. The destination node, upon routing protocols over the infrastructure. The route dis-
receiving the RREQ packets, chooses the desired route and covery process uses sequence of unicast transmission of
notifies the selected route through a RREP packet to the RREQ. Their work achieves the efficiency through a tree
source. An important feature of AODV is the maintenance based forwarding mechanism. A QoS routing protocol
of timer-based states in each node regarding utilization of CEDAR is proposed by Sinha et al. [38, 39]. A minimum
individual routing table entries. A routing table entry dominating set of the ad hoc network is named as core.
expires if it is not used recently. A set of predecessor nodes Nodes in the core establishes a unicast virtual link with
is maintained for each routing table entry, indicating the set peer core nodes that are at most three hops away. Link state
of neighboring nodes that uses the entry to route data information, corresponding to stable high bandwidth links,
packets. These nodes are notified with RERR packets when are propagated across the core.
the next hop link breaks.
Dynamic MANET On-demand (DYMO) [30] uses the
same route discovery mechanism used in AODV to con- 3 Weighted connected dominating set based routing
struct the routing tables. However, it provides new features protocol
such as path accumulation. Path accumulation is done
during the process of transmitting the RREQ packets From the discussions above, it is observed that the major
through the network. In DYMO, when an intermediate design objective of the CDS approach is the construction of
node receives a RREQ, it stores the routes to all nodes virtual backbone with minimum number of nodes. The
through which the RREQ previously passed rather than just quality of the node to act as a dominating member is not at all
the originator of the RREQ. considered. There is a need for a generic protocol which is
stable, scalable and power efficient. So, in this paper, we
2.2 Stable, energy efficient protocols for emergency introduce a novel approach that integrates multiple factors
communication like link stability, mobility and energy into a single metric for
Maximum Weight Minimum CDS (MWMCDS) formation.
An energy efficient and scalable routing protocol is pro-
posed by Ramrekha et al. [32] for emergency ad hoc Table 1 Notations
communications. They select the route based on the route
Notation Description
length and the residual energy of nodes and this mechanism
is applied to AODV and OLSR protocols. A proactive N1 ðuÞ fv j ðu; vÞ 2 Eg
routing protocol called MQ-Routing, suitable for disaster N2 ðuÞ fw j v 2 N1 ðuÞ ^ w 62 N1 ðuÞ ^ ðv; wÞ 2 Eg
scenarios, is proposed by Macone et al. [33] to select N1t ðuÞ N1 ðuÞ at time t
routing path based on time-varying discount factor. Three cEN
in ðuÞ Initial energy of a node u
different metrics are reported, taking into account the link cEN
rm ðuÞ Remaining energy of a node u
availability prediction, the residual energy of the nodes and cMOB Minimum mobility factor with value 0.01
min
the node mobility. These metrics are combined together to Ruv Received Signal Strength (RSS) between node u and v
yield the time-varying discount factor. The route stability DRuv Variation of RSS between node u and v
based QoS routing is proposed by Sarma et al. [34]. They
cLS
u
Link stability metric of a node u with its neighbors
calculate the link stability based on the received signal
cMOB
u
Mobility metric of a node u
strength between the nodes. The route discovery procedure
cEN Energy metric of a Node u
selects the path with high energy and stability, to support u

throughput and delay requirements of QoS routing. WT u Weight of a node u

123
Author's personal copy
Wireless Netw (2015) 21:499–512 503

We also developed an energy efficient reactive routing The main importance of this metric is to let the algorithm
protocol named Weighted-CDSR that takes advantage of prefer more stable nodes which are not likely to change
the MWMCDS. This protocol works in two stages, their neighbor sets rapidly.
MWMCDS formation and Routing. The notations used in
the algorithm are listed in Table 1. In this protocol, a node Definition 3 (Energy) The energy metric of a node is
can play one of two roles as a non-dominating or a dom- calculated as
inating node. A non-dominating node just receives the cEN
rm ðuÞ
packet, while a dominating node rebroadcasts or relays the cEN
u ¼ ð4Þ
cEN
in ðuÞ
messages that it receives.
where cENu gives the ratio of energy currently available at u
3.1 Weight calculation to its initial energy. It is necessary to balance the traffic
through the network nodes in order to increase the mini-
The proposed weight WTu for a node u consists of three mum lifetime of the nodes. By using this metric, the most
metrics, taking into account the link stability (cLS energy-rich nodes are selected.
u ), energy
of the node (cEN u ) and the node mobility (c MOB
u ). A link
stability metric is used to compute the stability of the 3.2 MWMCDS formation
communication with its neighbors. The energy metric is to
choose the one with more energy among the stable nodes. Each node has a two-hop neighbor table for keeping the
The mobility metric (which follows the idea proposed in topology information about the nodes that are at one-hop
[36]) predicts the speed of a node. A minimum mobility and two hops away. This local topology information is used
factor cMOB in selecting the dominating nodes. Every mobile node
min is assumed and is assigned with value 0.01.
transmits a hello message to its neighbors. The hello
The WTu calculation includes cMOBmin if the mobility metric
MOB message of node u includes \WTu ; N1 ðuÞ [ . When a node
cu is 0. The weight of a node u is defined as,
8 LS EN receives a hello message from one of its neighbor, it
>
> cu :cu MOB updates the two-hop neighbor table.
>
< cMOB ; ifcu [ 0
u Initially all nodes are marked in WHITE color. After
WTu ¼ ð1Þ
> cLS EN hello message transmission, a node marks itself as a domi-
>
> u :cu
: MOB ; Otherwise nating node in BLACK color, according to the marking
cmin
procedure as described in Algorithm 1. A node is an inter-
To compute the weight in Eq. (1), Eqs. (2–3) of the fol- mediate node if it has two unconnected neighbors. A node u
lowing definitions are used: is covered by another node v, when each neighbor of u is also
Definition 1 (Link Stability) The link stability is calcu- neighbor of v, and WTu  WTv . An intermediate node
lated based on the Received Signal Strength (RSS). becomes an intergateway node if it is not covered by any
Assume DRuv is the variation of the RSS between nodes u neighbor. An intergateway node not covered by any pair of
ðRtþ1 Rt Þ connected neighboring nodes becomes a gateway node. A
and v with DRuv ¼ uv t uv . The distance between the two gateway or intergateway node is marked in BLACK color.
nodes is unchanged, when DRuv ¼ 0. When DRuv [ 0, it All nodes marked in BLACK forms the MWMCDS of the
means that the distance between the two nodes is closing. network. This process needs only two messages. The first
When DRuv \0, it means that distance between the two message allows the node to collect information about their
nodes is increasing. The link stability between nodes u and two-hop neighbors and the second is used by the node to
1
v is defined as luv ¼ ð1DR uv Þ
and the stability of a node u is, inform its neighbors about its final decision.
X X 1 The main idea of Algorithm 1 is as follows: At first,
cLS
u ¼ luv ¼ ð2Þ node ( u in the algorithm) enters an intermediate state when
8v2N1 ðuÞ 8v2N1 ðuÞ
ð1  DRuv Þ
it has two unconnected neighbors (described in lines 2
Definition 2 (Mobility) The mobility of nodes can be through 6). If u is intermediate node, then it becomes an
considered in terms of neighbor sets. Let AnB denote the intergateway node when u has the highest weight among its
symmetric difference between two sets A and B. Let A [ B one-hop neighbors and its neighbors are not covered by any
denote the union of these sets. The mobility factor is then of its neighbor (v in the algorithm) of u (described in lines
calculated as the percentage of neighbors which remains the 7 through 13). Then, u becomes gateway when its weight is
same between the sending of two consecutive Hello packets: the largest among one-hop neighbors and not covered by
any two of its neighbors (described in lines 14 through 23).
jN1tþ1 ðuÞnN1t ðuÞj
cMOB
u ¼ ð3Þ Finally, u is marked in BLACK if u is gateway or inter-
jN1tþ1 ðuÞ [ N1t ðuÞj gateway, (described in lines 24 through 26).

123
Author's personal copy
504 Wireless Netw (2015) 21:499–512

Data: Marking of node u

Result: u is marked with BLACK or WHITE

1. intermediate(u) = intergateway(u) = gateway(u) = f alse

2. foreach v, w ∈ N1 (u) do

3. if v = w && w ∈
/ N1 (v) then

4. intermediate(u) = true

5. end

6. end

7. if intermediate(u) then

8. intergateway(u) = true

9. foreach v ∈ N1 (u) do

10. if N1 (u) ⊆ N1 (v) && W Tu ≤ W Tv then

11. intergateway(u) = f alse

12. end

13. end

14. if intergateway(u) then

15. gateway(u) = true

16. foreach v, w ∈ N1 (u) do

17. if v = w && v ∈ N1 (w) && N1 (u) ⊆ N1 (v) ∪ N1 (w) then

18. if W Tu ≤ W Tv && W Tu ≤ W Tw then

19. gateway(u) = f alse

20. end

21. end

22. end

23. end

24. if gateway(u) intergateway(u) then

25. Color(u) ← BLACK

26. end

27. end

Algorithm 1: Marking Phase

123
Author's personal copy
Wireless Netw (2015) 21:499–512 505

Theorem 1 Let S be the set of BLACK nodes and S is a count. When a node wants to transmit a packet to a
Connected Dominating Set. destination, it first checks its two-hop table. If the
destination node is in the two-hop table, then it is
Proof The algorithm marks gateway and intergateway
forwarded directly.
nodes in BLACK color. It suffices to prove the property
The destination node replies with Weighted-RREP
for gateway node since gateway node is also an inter-
which follows the return path to the source host. A
gateway node. Suppose that, on the contrary, the cre-
mobile host broadcasts the Weighted-RREQ when it has
ated set S is not a CDS. Then, there exist some nodes
to find a route to a destination. This happens when the
which are not in S, and which have no neighbors with
destination node is not in the two-hop table. When a
nodes in S. Among such nodes, let x be the node with
dominating node receives this request packet, it also
the largest weight value. If all neighbors of x are non-
checks its two-hop table. It directly sends the packet to
intermediate, the graph is a complete graph. Otherwise,
the destination if the destination is in the two-hop table.
let y be an intermediate neighbor of x with the largest
If the destination is not in the two-hop table, it first
weight value. Since, y is not a gateway node, it is
creates or updates a route to the previous hop without a
covered by one (u) or two (u and w) of its neighbors
valid sequence number. It checks to determine whether
and has the lowest weight among them. Note that, if the
it has received this packet with the same source address
cover set contains two nodes and one of them w is non-
and request id. If so, it discards the packet. It creates a
intermediate, then u alone covers y and is an interme-
Weighted-RREP packet, when the destination sequence
diate node. Node x must be neighbor of u by the
number in its routing table entry is greater than or
coverage condition. However, WTy \WTu contradicts
equal to the destination sequence number in Weighted-
the choice of y. Therefore, the set of nodes not in S and RREQ. Otherwise, it increases the hop_cnt value in the
not neighbors of any nodes from S is empty. Hence S is Weighted-RREQ by one and rebroadcasts RREQ to the
CDS. h network. It also updates the routing table for forward
route entry with last hop address from which it has
3.3 Route discovery and maintenance in received the request packet. This packet is dropped by a
Weighted-CDSR non-dominating node. This process is repeated until it
finds the destination node.
The proposed protocol uses three control messages Every node, after receiving a Weighted-RREQ, pro-
namely Weighted-RREQ, Weighted-RREP and Weigh- cesses the packet as explained in Algorithm 2. The idea
ted-RERR for the route discovery. The Weighted-RREQ behind the algorithm is as follows: If a node (n in the
is a broadcast message originated by the source node to algorithm) is the destination it prepares the reply
find a path to the destination. The Weighted-RREP is a (described in lines 1 and 2). Otherwise, n (dominating
unicast message, originated by the destination to notify node) searches its two-hop table for the destination
the route to the source node. The nodes are notified (described in lines 4 through 6). Then, n searches the
through the Weighted-RERR message when the next routing table to compare the freshness of the route and
hop link breaks. The formats of these packets are in prepares the reply (described in lines 8 through 12).
Table 2. The packet is forwarded to the next hop ( described in
The Weighted-RREQ packet includes address, lines 14 through 17). The packet is dropped when n is
sequence number of the source and the destination not a dominating node (described in line 20).
nodes. It also includes the broadcast id and the hop

123
Author's personal copy
506 Wireless Netw (2015) 21:499–512

Input: Node n receives a Weighted-RREQ packet p

Output: Forwarding of Weighted-RREQ or Sending of Weighted-RREP packet

1. if n == p.dest addr then

2. sendReply(W eighted − RREP )

3. else

4. if isDominatingN ode(n) then

5. if nextHop = twoHopT able.lookU p(p.dest addr) = 0 then

6. send(p, nextHop) ;

7. else

8. if rt.lookU p(p.dest addr) then

9. seqNum = rt.getSeqN um(p.dest addr)

10. if seqNum ≥ p.dest seq# then

11. sendReply(W eighted − RREP )

12. end

13. else

14. rt.addEntry(p.src addr)

15. p.hop cnt + +

16. f orward(p)

17. end

18. end

19. else

20. drop(p)

21. end

22. end

Algorithm 2: Weighted-RREQ Packet Processing

The destination prepares the Weighted-RREP packet. The the established path. The originator node knows the distance to
src_addr is the destination node address and dest_addr is the the destination from this hop_cnt field. The life_time denotes
source node address which initiates the route discovery. The how long the route is valid. The Weighted-RERR message is
destination node copies these details from the Weighted-RREQ sent whenever a link break causes one or more destinations to
packet. When a node receives a Weighted-RREP packet, it become unreachable from some of the node’s neighbors.
searches for a route to the previous hop. If needed, a route is Every node after receiving a Weighted-RREP, processes
created for the previous hop, without a valid sequence number. the packet as explained in Algorithm 3. The idea behind
The node increases the hop count value in the Weighted-RREP Algorithm 3 is as follows: Node (u in the algorithm) frees
packet by one, in order to account the new hop through the the packet if it is the target node (described in lines 2 and
intermediate node. The forward route for this destination is 3). Otherwise, it creates a forward route entry in the routing
created if it does not already exist. The hop_cnt field is incre- table (described in lines 6 and 8) and forwards the packet to
mented by one when it is forwarded by the dominating nodes in the previous hop (described in lines 9 through 11).

123
Author's personal copy
Wireless Netw (2015) 21:499–512 507

Table 3 Simulation parameters


Input: node n receives EAR-RREP packet q
Parameter Value
1. // If reply is for me, discard it
Area size 1,000  1,000 m2
2. if n == q.dest addr then Simulation time 900 s
Traffic type Constant Bit Rate (CBR)
3. f ree(q) Packet size 512 bytes
MAC protocol IEEE 802.11
4. else
Propagation model Two-way ground
5. // forward route entry Transmission range 250 m
Bandwidth 2 Mbps
6. if rt.lookU p(q.src addr) == 0 then Queue size 50 packets
Mobility model Random waypoint
7. rt.addEntry(q.src addr)
Transmitting power 0.667 W
8. end Receiving power 0.365 W
Idle power 0.1 W
9. nextHop = rt.lookU p(q.dest addr) No. of nodes 60,70,80,90,100,110,120
(default:75)
10. q.hop cnt + +
No. of connections 1, 3, 5, 7, 9, 12, 15, 18, 20 (4 pkts/s)
(default:10)
11. send(q, nextHop)
Maximum speed (m/s) 5, 10, 15, 20, 25, 30, 35 (default:20)
12. end

Algorithm 3: Weighted-RREP Packet Processing parameters are listed in Table 3. Experiments are repeated
for 30 trials with different network sizes, load conditions and
mobility. We compared the simulation results to the well-
Table 2 Route discovery packet formats known on-demand routing protocols : DSR [28], AODV
Packet name Fields [29] and DYMO [30]. The reason for choosing these pro-
tocols for comparison is that they have been adopted by
Weighted- Type Hop_Count
RREQ
IETF and a lot of existing ad hoc routing protocols use these
bcast_id: Broadcast ID
protocols as their measuring yardstick. To verify the per-
dest_addr: Destination node ID
formance of the proposed protocol, we have applied the
dest_seq#: Destination sequence
routing process over the degree-based CDS proposed by Wu
number
et al. [8], named Wu(Degree)-CDSR.
src_addr: Source node ID
To see the performance of MWMCDS construction
src_seq#: Source sequence number
algorithm, the following metrics have been used.
Weighted- Type Hop_Count
RREP dest_addr: Destination node ID • Average CDS Size: the fraction of the network nodes in
dest_seq#: Destination sequence the CDS.
number • Average Route Length: the average number of hops in
src_addr: Source node ID the established path between each source-destination
life_time: Life time pair.
Weighted- Type Dest_Count
In rescue scenarios, the communication protocol must be
RERR dest_addr: Unreachable destination
energy efficient with fast response time. It should also be
node ID
scalable and reachable as more nodes are added during
dest_seq#: Unreachable destination
seq# these scenarios. To measure these requirements, the fol-
lowing performance metrics have been used.
4 Simulation study • Routing Overhead: (measure energy efficiency) the
total number of routing packets transmitted during the
In this section, we evaluate the proposed routing protocol simulation time.
Weighted-CDSR through simulation, using the network • End-to-End Delay: (measure response time) the aver-
simulator NS-2.34 [40]. We use a MANET with N mobile age time for a data packet to reach the destination from
nodes moving in the simulation area. The simulation the source.

123
Author's personal copy
508 Wireless Netw (2015) 21:499–512

• Packet Delivery Ratio: (measure scalability and reach- 4


Wu(Degree)-CDS
Weighted-CDS
ability) the ratio of data packets received at the 3.75
destination to the total packets transmitted.
• Energy Consumption: (measure energy efficiency) the 3.5

Average Route Length


total energy consumed for sending and receiving the 3.25
packets.
3

2.75
4.1 Average CDS size
2.5
Figure 1 shows the average CDS size with varying network
2.25
sizes. A degree-based CDS is considered as an optimum
size since it gives preference to the nodes that have larger 2
25 50 75 100 125 150 175 200 225
number of uncovered neighbors. The CDS constructed No.of Nodes
based on degree is unstable, because it includes nodes with
lowest energy or highest speed. The weight calculation in Fig. 2 Average route length
the proposed work combines multiple metrics such as link
stability, node mobility and energy for forming a Stable 135
AODV
CDS, which can work for a longer time than degree-CDS. DSR
DYMO
120 Weighted-CDSR
So, the CDS size in Weighted-CDS is larger than Wu(de-

Routing Overhead x 10 (packets)


Wu(Degree)-CDSR

gree)-CDS. 105

90
3

4.2 Average route length


75

This metric gives a measure of how well a routing protocol 60

can perform over CDS. As expected, the higher the CDS 45


size, the shorter the routes. This is presented in Fig. 2. As
30
the Weighted-CDS results in larger size CDS than
Wu(Degree)-CDS, the routes are shorter than the routes 15

obtained in Wu(Degree)-CDS. The graph induced by 0 5 10 15 20 25 30 35 40


Wu(Degree)-CDS is sparse, this results in longer routes. maximum speed (meters/sec)

4.3 Effects of node mobility Fig. 3 Routing overhead versus mobility

The results in Fig. 3 show the generated routing overhead protocols increases with the increased maximum node
against node mobility. The overhead of the all routing speed. This is because when node mobility increases,
existing path may be broken and more RREQ packets fail
35
to reach their destinations. As a consequence, more RREQ
Wu(Degree)-CDS
Weighted-CDS packets are generated and transmitted. The reduction in the
30 routing overhead is achieved in Weighted-CDSR as it
constructs the most stable routes with the longest duration
25
in contrast with AODV, DSR and DYMO. Weighted-
Average CDS Size

20
CDSR reduces the rate of route reconstruction due to link
breakage. Clearly the reduction in route reconstruction rate
15 in Weighted-CDSR reduces the rate of extra control mes-
sages. Although Wu(Degree)-CDS results in minimum size
10 CDS, it does not guarantee an optimal network perfor-
mance because the routing path is broken frequently due to
5
mobility of the nodes. Thus the routing overhead of
0 Wu(Degree)-CDSR is higher than Weighted-CDSR.
25 50 75 100 125 150 175 200 225
Figure 4 plots the packet delivery ratio of the routing
No.of Nodes
protocols against the maximum node speed. The results
Fig. 1 CDS size show that the delivery ratio decreases with the increased

123
Author's personal copy
Wireless Netw (2015) 21:499–512 509

100 consumption of Wu(Degree)-CDSR is minimum among all


the protocols when the maximum speed is less than 5 m/s.
90 This is due to less number of nodes participate in routing
Packet Delivery Ratio (%)

and the mobility does not affect the routing path frequently.
When the speed is greater than 5 m/s, the frequent route
80
breakage in Wu(Degree)-CDSR leads to high energy con-
sumption than Weighted-CDSR.
70

4.4 Effects of network density


60
AODV
DSR Figure 6 shows the performance of the protocols in terms
DYMO
Weighted-CDSR
Wu(Degree)-CDSR of routing overhead versus network density. As shown in
50
0 5 10 15 20 25 30 35 40 the figure, the routing overhead generated by each of the
maximum speed (meters/sec) protocols increases as the network density increases. At
high density with more than 100 nodes, the overhead
Fig. 4 PDR versus mobility
generated by DSR and Weighted-CDSR is reduced. The
route cache mechanism of DSR reduces the number of
node mobility. This is due to the fact that the routes are RREQ transmissions. In the case of Weighted-CDSR, the
highly prone to breakage as the host speed increases. The transmission of RREQ is restricted only to the CDS nodes.
weight based CDS construction algorithms use a mobility As a consequence, the routing overhead is reduced. When
metric to let the algorithm prefer more stable nodes which the network is sparse with less than 40 nodes, Wu(Degree)-
are not likely to change their neighbor sets rapidly. Com- CDSR incurs more routing overhead as mobility of the
paring the obtained results, Weighted-CDSR has the nodes affect the routing path. Since the CDS size grows
highest delivery ratio as it establishes routes with stable with the increasing network size, the routing overhead of
nodes. The packet delivery ratio of Wu(Degree)-CDSR is Wu(Degree)-CDSR is the least compared to AODV,
close to Weighted-CDS when the maximum speed is less DYMO and DSR.
than 5 m/s. The performance of Wu(Degree)-CDSR Figure 7 demonstrates the performance of all the protocols
degrades when the speed is more than 5 m/s. This is due to in terms of end-to-end delay. When the network density
the loss of connection with the neighbors as only nodes increases, the transmitted RREQ packets fail to reach the
with more neighbors are added in Wu(Degree)-CDSR. destinations due to high collisions and channel contention that
Figure 5 depicts the average energy consumption of the have been caused by excessive redundant transmissions.
nodes against node mobility. The energy consumption of Therefore, the waiting time of data packets is increased. The
the protocols increases with the increased node speed. figure also reveals that, in sparse network with 30 or 40 nodes,
More energy is consumed due to the frequent route especially when the network is poorly connected, the end-to-
reconstruction process resulting from link breakage. The end delay is higher in AODV, DSR and Weighted-CDSR. The
Weighted-CDSR consumes less energy compared to others end-to-end delay gets reduced when the network connectivity
because of the reduction in routing overhead. The energy increases with the increasing network density. But, in dense
50 130
AODV AODV
DSR DSR
DYMO 120
Average Energy Consumed x 10 (J)

DYMO
Weighted-CDSR
Routing Overhead x 10 (packets)

Weighted-CDSR
45 Wu(Degree)-CDSR 110 Wu(Degree)-CDSR
2

100

40 90
3

80
70
35
60
50
30
40
30
25 20
10
20 0
0 5 10 15 20 25 30 35 40 20 30 40 50 60 70 80 90 100 110 120 130
maximum speed (meters/sec) Number of nodes

Fig. 5 Energy consumed versus mobility Fig. 6 Routing overhead versus no. of nodes

123
Author's personal copy
510 Wireless Netw (2015) 21:499–512

0.5 100
AODV
DSR
0.45 DYMO
Weighted-CDSR
Wu(Degree)-CDSR
0.4 90

Packet Delivery Ratio (%)


End-to-End Delay (sec)

0.35

0.3 80

0.25

0.2 70

0.15

0.1 60
AODV
DSR
0.05 DYMO
Weighted-CDSR
Wu(Degree)-CDSR
0 50
20 30 40 50 60 70 80 90 100 110 120 130 20 30 40 50 60 70 80 90 100 110 120 130
Number of nodes Number of nodes

Fig. 7 End-to-end delay versus no. of nodes Fig. 8 PDR versus no. of nodes

network with more than 80 nodes, the complexity of the net- Weighted-CDSR. As a consequence, the energy consump-
work increases and hence the end-to-end delay increases. DSR tion is minimum in Weighted-CDSR compared to others.
needs to put the route information in the data packets which The energy consumption of Wu(Degree)-CDSR is the least
creates longer delay as the network density increases. The path among DYMO, DSR and AODV when the network is dense
accumulation of DYMO stores the routes to all nodes while with more than 60 nodes. This is due to least number of
processing RREQ packets. Thus the delay is always less in nodes involved in routing. As explained earlier, the routing
DYMO. The number of nodes in CDS increases when the overhead of Wu(Degree)-CDSR is high when the network is
network density increases. The denser CDS provides shorter sparse leads to highest energy consumption.
routes. Thus delay in Weighted-CDSR is less than AODV and
DSR, when the network density is high with more than 50 4.5 Effects of offered traffic load
nodes. The end-to-end delay in Wu(Degree)-CDSR is
the highest among DYMO, AODV and Weighted-CDSR, as The results in Fig. 10 show the achieved packet delivery ratio
minimum number of nodes experience heavy load. for all the protocols. When the number of flows increases, the
Figure 8 depicts the packet delivery ratio of all the number of nodes initiating route discovery operation also
protocols against network density. When the network increases. As a consequence, more RREQ packets are gen-
density is low, the network connectivity is poor. The per- erated and transmitted which lead to a high consumption of the
formance of AODV, DSR, DYMO and Weighted-CDSR communication bandwidth. This leads to the delivery of fewer
drops when the network density is set to low with 30 or 40 data packets at the destinations, thereby degrading the deliv-
nodes. However, when the network density is increased, ery ratio. At offered load of 20 flows, the high delivery ratio is
the performances of AODV and Weighted-CDSR are good. achieved by Weighted-CDSR with more stable nodes, when
In DSR, both the route-reply cycle and data packet trans-
65
missions carry the source route information. As a conse- AODV
DSR
60 DYMO
Average Energy Consumed x 10 (J)

quence, long delay is experienced by the packets when the Weighted-CDSR


Wu(Degree)-CDSR
2

55
network density increases. Due to the long delay, the per-
50
formance of DSR drops with high network density. The
45
path accumulation policy in DYMO shows increased per-
40
formance at low network density. The packet delivery ratio
of Wu(Degree)-CDSR is least among DSR, AODV and 35

Weighted-CDSR due to heavy load on less number of 30

nodes. Also, the nodes in Wu(Degree)-CDSR experience 25

frequent route breakage due to mobility and energy. This 20

leads to more packet dropping. 15

Figure 9 shows the average energy consumption of all the 10


20 30 40 50 60 70 80 90 100 110 120 130
protocols with increasing node density. The route discovery Number of nodes
operation works with less number of nodes in the forwarding
of the RREQ packets and the route re-computation is less in Fig. 9 Energy consumed versus no. of nodes

123
Author's personal copy
Wireless Netw (2015) 21:499–512 511

100 minimum in Weighted-CDSR. Based on the increased


packet delivery ratio, improved energy efficiency, lesser
90 routing overhead and lesser end-to-end delay, the proposed
Packet Delivery Ratio (%)

protocol Weighted-CDSR, is well suited for the require-


ments of emergency and rescue scenarios.
80

70
References

60 1. Jang, H., Lien, Y., & Tsai, T. (2009). Rescue information system
AODV
DSR for earthquake disasters based on MANET emergency commu-
DYMO
Weighted-CDSR nication platform. In IWCMC 09.
Wu(Degree)-CDSR
50 2. Guha, S., & Khuller, S. (1999). Approximation algorithms for
1 3 5 7 9 12 15 18 20
connected dominating sets. Algorithmica, 20(4), 374–387.
Number of connections (4 pkts/sec) 3. Wu, J., & Li, H. (1999). On calculating connected dominating set
for efficient routing in ad hoc wireless networks. In DIALM’99
Fig. 10 PDR versus no. of flows proceedings of 3rd internation workshop on discrete algorithms
and methods for mobile computing and communications, pp. 7–14.
compared with others. The is due to the reduction of the 4. Stojmenovic, I. (2004). Comments and corrections to ‘‘dominat-
ing sets and neighbor elimination-based broadcasting algorithms
number of nodes involved in the dissemination of RREQ
in wireless networks’’. IEEE Transactions on Parallel and Dis-
packets which leads to the reduction of routing overhead and tributed Systems, 15(11), 1054–1055.
packet collisions. As a consequence more communication 5. Stojmenovic, I., Seddigh, M., & Zunic, J. (2002). Dominating
bandwidth is freed for data transmission. When the offered sets and neighbor elimination-based broadcasting algorithms in
wireless networks. IEEE Transactions on Parallel and Distrib-
load is minimum with 1pkt/sec, Wu(Degree)-CDSR provides
uted Systems, 13, 14–25.
the highest packet delivery ratio. The heavy load on CDS 6. Basagni, S., Mastrogiovanni, M., Panconesi, A., & Petrioli, C.
nodes in Wu(Degree)-CDSR is leading to energy depletion. (2006). Localized protocols for ad hoc clustering and backbone
Thus the performance of Wu(Degree)-CDSR decreases when formation: A performance comparison. IEEE Transactions on
Parallel and Distributed Systems, 17(4), 292–306.
the offered load increases.
7. Wu, J., Gao, M., & Stojmenovic, I. (2001). On calculating power-
aware connected dominating sets for efficient routing in ad hoc
wireless networks. In International conference on parallel pro-
5 Conclusion cessing, IPPN’01, pp. 346–354.
8. Wu, J., Dai, F., Gao, M., & Stojmenovic, I. (2002). On calcu-
lating power-aware connected dominating sets for efficient
This paper proposes a stable, scalable and energy efficient, routing in ad hoc wireless networks. IEEE/KICS Journal of
reactive routing protocol named Weighted-CDSR, suitable Communications and Networks, 4, 59–70.
for MANETs. A novel approach is introduced that inte- 9. Yu, R., Wang, X., & Das, K. (2009). EEDTC: Energy efficient
dominating tree construction in multi-hop wireless networks.
grates multiple factors like link stability, mobility and
Pervasive and Mobile Computing, 5, 318–333.
energy into a single metric for MWMCDS formation. Our 10. Rai, M., Verna, S., & Tapaswi, S. (2009). A power aware mini-
protocol uses MWMCDS for the broadcast and data mum connected dominating set for wireless sensor networks.
transmission. The CDS selection based on combined met- Journal of Networks, 6(6), 511–519.
11. Kim, B., Yang, J., Zhou, D., & Sun, M. (2005). Energy aware
rics increases the path availability for a longer period. The
conneced dominating set construction in mobile ad hoc networks.
performance of the proposed work is compared to degree- In Auburn University Technical Report CSSE05-07.
based and well known reactive routing protocols with 12. Ramalakshmi, R., & Radhakrishnan, S. (2012). Energy efficient
increased mobility, network density and number of con- stable connected dominating set construction in mobile ad hoc net-
works. Lecture Notes of the Institute for Computer Sciences, Social
nections. Simulation results show that the number of con-
Informatics and Telecommunications Engineering, 84, 63–72.
trol packet transmission is reduced because only the 13. Shukla, K. K., & Sah, S. (2013). Construction and maintenance of
dominating nodes act as routers to route the messages of virtual backbone in wireless networks. Wireless Networks. doi:10.
other nodes. The energy consumption is also less due to the 1007/s11276-012-0512-6.
14. Qureshi, H. K., Rizvi, S., Saleem, M., Khayam, S. A., Rakocevic,
reduction in route re-computation. With stable backbones,
V., & Rajarajan, M. (2012). Evaluation and improvement of
Weighted-CDSR gives high packet delivery ratio in all the CDS-based topology control for wireless sensor networks.
cases. As the network congestion is reduced, more band- Wireless Networks,. doi:10.1007/s11276-012-0449-9.
width is available for data transmission in Weighted- 15. El-Hajj, W., Trabelsi, Z., & Kountanis, D. (2007). Fast distrib-
uted dominating set based routing in large scale MANETs.
CDSR, it performs well when the number of flows
Computer Communications, 30, 2880–2891.
increases. As more nodes are added to the backbone when 16. Wang, F., Min, M., Li, Y., & Du, D. (2005). On the construction
the network density is high, the end-to-end delay is of stable virtual backbones in Mobile ad hoc networks. In

123
Author's personal copy
512 Wireless Netw (2015) 21:499–512

Proceedings for the IEEE international performance computing 36. Wu, C, Kumekawa, K., & Kato, T. (2009). A MANET protocol
and communicaions conference. considering link stability and bandwidth efficiency. In Proceedings
17. Sheu, P. R., Tsai, H. Y., Lee, Y. P., & Cheng, J. Y. (2009). On of ICUMT2009, 12th-14th October 2009, St. Petersburg, Russia.
calculating stable connected dominating sets based on link sta- 37. Sivakumar, R., Das, B., & Bharghavan, V. (2001). An improved
bility for mobile ad hoc networks. Tamkang Journal of Science spine-based infrastructure for routing in ad hoc networks. IEEE
and Engieering, 12(4), 417–428. Transaction on Parallel and Distributed Systems, 13, 14–25.
18. Leu, S., & Chang, R. (2012). A weight-value algorithm for 38. Sinha, P., Sivakumar, R., & Bharghavan, V. (2001). Enhancing
finding connected dominating set in a MANET. Journal of Net- ad hoc routing with dynamic virtual infrastructures. In Proceed-
work and Computer Applications, 35, 1615–1619. ings of he 20th IEEE INFOCOM conference, vol. 3,
19. Basagni, S. (1999). Distributed and mobility-adaptive clustering pp. 1763–1772.
for multimedia support in multi-hop wireless networks. In Pro- 39. Sivakumar, R., Sinha, P., & Bharghavan, V. (1999). Cedar: A
ceedings IEEE 50th vehiclular technology conference. core extraction distributed ad hoc routing algorithm. IEEE
20. An, B., & Papavassiliou, S. (2001). A mobility based clustering Journal on Selected Areas in Communications, 17, 1454–1465.
approach to suuport mobility management and multicast routing 40. Fall, K., & Varadhan, K. (2011). The ns manual, www.isi.edu/
in mobile ad hoc wireless networks. International Journal of nsnam/ns/doc/ns_doc.pdf.
Network Management, 11, 387–395.
21. Wang, N., Huang, Y., & Chen, J. (2007). A stable weight-based Mrs. R. Ramalakshmi received
on-demand routing protocol for mobile ad hoc networks. Infor- her Master of Engineering
mation Sciences, 177, 5522–5537. degree in Computer Science and
22. Sakai, K., Sun, M. T., & Ku, W. S. (2008). Maintaining CDS in mobile Engineering from Anna Uni-
ad hoc networks. Lectuere Notes in Computer Scicence, 5258, 141–153. versity, Chennai. She has been
23. Bao, L., & Garcia-Luna-Aceves, J. J. (2010). Stable energy aware working as a Senior Assistant
topology management in ad hoc networks. Pervasive and Mobile Professor at Kalasalingam Uni-
Computing, 8(3), 313–327. versity (Previously known as
24. Al-Karaki, J. N., & Kamal, A. E. (2008). Efficient virtual back- Arulmigu Kalasalingam College
bone routing in mobile ad hoc networks. Computer Networks, of Engineering) since 2001. She
52(2), 327–350. is doing her doctoral program.
25. Yen, Y., Chang, H., Chang, R., & Chao, H. (2010). Routing with She is a member of CSI, ISTE
adaptive path and limited flooding for mobile ad hoc networks. and Network Technology group
Computers and Electrical Engineering, 36, 280–290. of TIFAC-CORE in Network
26. Moulahi, T., Nasri, S., & Guyennet, H. (2012). Broadcasting Engineering. She is a Sun Cer-
based on dominated connecting sets with MPR in a realistic tified Java Programmer. She has received Young Scientist Fellowship
environment for WSNs & ad hoc. Journal of Network and from Tamilnadu State Council for Science and Technology. Her areas
Computer Applications, 35, 1720–1727. of interest include Wireless Sensor Networks, Mobile Ad Hoc Net-
27. Yu, J., Wang, N., Wang, G., & Yu, D. (2013). Connected dom- works and Graph Theory applications in ad hoc networks.
inating sets in wireless ad hoc and sensor networks—a compre-
hensive survey. Computer Communications, 36, 121–134.
Dr. S. Radhakrishnan com-
28. Johnson, D., Hu, Y., & Maltz, D. (2007). The dynamic source
pleted his M.Tech. and Ph.D.
routing protocol for Mobile ad hoc networks for IPv4. In Internet
from Institute of Technology,
draft www.ietf.org/rfc/rfc4728.txt.
Banaras Hindu University
29. Perkins, C., Belding-Royer, E., & Das, S. (2003). Ad hoc on-
(Presently known as Indian
demand distance vector routing. In Internet draft www.ietf.org/
Institute of Technology-BHU).
rfc/rfc3561.txt.
He has more than 25 years of
30. Chakeres, I., & Perkins, C. (2010). Dynamic MANET on-demand
Teaching and Research Experi-
(DYMO) routing. http://tools.ietf.org/html/draft-ietf-manet-dymo-21.
ence. He worked as Senior
31. Das, S., Perkins, C., Royer, E., & Marina, M. (2003). Performance
Research Fellow at School of
comparison of two on-demand routing protocols for ad hoc networks.
Biomedical Engineering, IT-
32. Ramrekha, T. A., Talooki, V. N., Rodriguez, J., & Politis, C.
BHU during 1988–1992. He
(2012). Energy efficient and scalable routing protocol for extreme
served as Asst. Professor and
emergency ad hoc communications. Mobile Network and Appli-
Principal In-charge at Watumull
cations, 17, 312–324.
Institute Electronic Engineering
33. Macone, D., Oddi, G., & Pietrabissa, A. (2012). MQ-routing:
and Computer Technology (WIEECT), Mumbai during 1992–1996.
Mobility-, GPS- and energy-aware routing protocol in MANETs
From 1997, he is working in the Kalasalingam University (Previously
for disaster relief scenarios. Ad Hoc Networks. doi:10.1016/j.
known as Arulmigu Kalasalingam College of Engineering) as Senior
adhoc.2012.09.008.
Professor in the Department of Computer Science and Engineering.
34. Sarma, N., & Nandi, S. (2010). Route stability based QoS routing
His fields of interest are Computer Networks, Bio-inspired computing
in mobile ad hoc networks. Wireless Personal Communications,
and Computer Applications in Medicine. He has published more than
54, 203–224.
100 publications in various International journals and International
35. Spohn, M. A., & Garcia-Luna-Aceves, J. J. (2006). Improving route
Conferences.
discovery in on-demand routing protocols using tow-hop connected
dominating sets. Pervasive and Mobile Computing, 4, 509–531.

123

View publication stats

S-ar putea să vă placă și