Skip to main content

Cluster and Time Slot Based Cross-Layer Protocol for Ad Hoc Network

  • Conference paper
  • First Online:
  • 1041 Accesses

Abstract

Due to its good extendibility and robustness, Ad hoc network has been widely used in various aspects. However, its performance is restricted by the mobility, limited bandwidth and centerless architecture. In order to improve the performance of Ad hoc network, this paper proposes a cross-layer Hexagonal Clustering, Position and Time slot based (HCPT) protocol, in which clusters and time slots are divided according to the geographical location. And furthermore, an effective algorithm to find routes through the geographical locations of cluster heads is proposed, which can greatly reduce message collisions and reduce network overhead. By doing simulations in the Network Simulator 2 (NS2) software, we found that the HCPT protocol shows better performance in network topology discovery compared with the Optimized Link State Routing (OLSR) protocol. Simulation results also show that the proposed scheme outperforms the standard OLSR and the improved OLSR algorithm, which is proposed by N. Harrag, in terms of routing overhead and packet delivery ratio.

Supported by the Key Research and Development Program of Shaanxi Province (Grant No. 2019ZDLGY09-02).

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Vinay, S., Honnalli, S.B., Varaprasad, G.: Multipath source routing protocol for mobile adhoc networks with performance effective analysis. In: 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT), Coimbatore, pp. 41–44 (2018). https://doi.org/10.1109/ICICCT.2018.8473258

  2. Sultana, J., Ahmed, T.: Securing AOMDV protocol in mobile adhoc network with elliptic curve cryptography. In: 2017 International Conference on Electrical, Computer and Communication Engineering (ECCE), Cox’s Bazar, pp. 539–543 (2017). https://doi.org/10.1109/ECACE.2017.7912964

  3. Gadekar, S., Kadam, S.: Secure optimized link state routing (OLSR) protocol against node isolation attack. In: 2017 IEEE International Conference on Power, Control, Signals and Instrumentation Engineering (ICPCSI), Chennai, pp. 684–687 (2017). https://doi.org/10.1109/ICPCSI.2017.8391800

  4. Karaca, M., Bastani, S., Landfeldt, B.: Modifying backoff freezing mechanism to optimize dense IEEE 802.11 networks. IEEE Trans. Veh. Technol. 66, 9470–9482 (2017). https://doi.org/10.1109/TVT.2017.2705343

  5. Lin, C., Cai, X., Su, Y., Ni, P., Shi, H.: A dynamic slot assignment algorithm of TDMA for the distribution class protocol using node neighborhood information. In: 2017 11th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID), Xiamen, pp. 138–141 (2017). https://doi.org/10.1109/ICASID.2017.8285760

  6. Naguib, A., Saad, W., Shokair, M.: Remaining energy aware ML-CSMA/TDMA hybrid MAC protocol for LTE-M2M wireless network. In: 2019 International Conference on Innovative Trends in Computer Engineering (ITCE), Aswan, Egypt, pp. 322–327 (2019). https://doi.org/10.1109/ITCE.2019.8646538

  7. Chbib, F., Khalil, A., Fahs, W., Chbib, R., Raad, A.: Improvement of OLSR protocol by using bacis up MPR and routing table mechanisms. In: 2018 International Arab Conference on Information Technology (ACIT), Werdanye, Lebanon, pp. 1–6 (2018). https://doi.org/10.1109/ACIT.2018.8672716

  8. Harrag, N., Refoufi, A., Harrag, A.: Neighbor discovery using novel DE-based adaptive hello messaging scheme improving OLSR routing protocol performances. In: 2017 6th International Conference on Systems and Control (ICSC), Batna, pp. 308-312 (2017). https://doi.org/10.1109/ICoSC.2017.7958731

  9. Jiang, Y., Mi, Z., Wang, H., Wang, X., Zhao, N.: The experiment and performance analysis of multi-node UAV ad hoc network based on swarm tactics. In: 2018 10th International Conference on Wireless Communications and Signal Processing (WCSP), Hangzhou, pp. 1–6 (2018). https://doi.org/10.1109/WCSP.2018.8555914

  10. Liu, K., Niu, K.: A hybrid relay node selection strategy for VANET routing. In: 2017 IEEE/CIC International Conference on Communications in China (ICCC), Qingdao, pp. 1–6 (2017). https://doi.org/10.1109/ICCChina.2017.8330400

  11. Zhang, L., Guo, J.: A vector-based improved geographic information routing protocol. In: 2017 7th IEEE International Conference on Electronics Information and Emergency Communication (ICEIEC), Macau, pp. 421–424 (2017). https://doi.org/10.1109/ICEIEC.2017.8076596

  12. Al-shugran, M.A., Shqier, M.M.A., Jaradat, G.M.: Adaptive dynamic update for greedy routing protocol using fuzzy logic controller and mobility prediction. In: 2018 IEEE International Conference on Electro/Information Technology (EIT), Rochester, MI, pp. 0852–0857 (2018). https://doi.org/10.1109/EIT.2018.8500126

  13. Qin, X., Wang, T., Zhang, B.: An efficient location based localized broadcasting algorithm for wireless ad hoc and sensor networks. In: 2018 10th International Conference on Wireless Communications and Signal Processing (WCSP), Hangzhou, pp. 1–6 (2018). https://doi.org/10.1109/WCSP.2018.8555530

  14. Savalkar, V.A.: Link prediction for identifying link failure using cross layer approach. In: 2018 2nd International Conference on Inventive Systems and Control (ICISC), Coimbatore, pp. 1120–1129 (2018). https://doi.org/10.1109/ICISC.2018.8398978

  15. Peng, J., Niu, H., Huang, W., Yin, X., Jiang, Y.: Cross layer design and optimization for multi-hop ad hoc networks. In: IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC). Chongqing, pp. 1678–1682 (2017). https://doi.org/10.1109/IAEAC.2017.8054300

  16. Kanthimathi, S., Jhansi Rani, P.: Defending against packet dropping attacks in wireless adhoc networks using cluster based trust entropy. In: 2018 International Conference on Advances in Computing, Communications and Informatics (ICACCI), Bangalore, pp. 2447–2452 (2018). https://doi.org/10.1109/ICACCI.2018.8554751

  17. Liu, D., Zhou, Q., Zhang, Z., Liu, B.: Cluster-based energy-efficient transmission using a new hybrid compressed sensing in WSN. In: 2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), San Francisco, CA, 2016, pp. 372–376 (2016). https://doi.org/10.1109/INFCOMW.2016.7562104

  18. Sharma, S., Choudhary, H.: Optimal deployment of mobile sensors nodes using signal strength equalization. In: 2018 IEEE International Students’ Conference on Electrical, Electronics and Computer Science (SCEECS), Bhopal, pp. 1–6 (2018). https://doi.org/10.1109/SCEECS.2018.8546990

  19. IEEE802.11n, Standard for information technology. Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) - Amendment: Enhancements for Higher Throughput (2009)

    Google Scholar 

  20. Lee, J.S., Miller, L.E.: CDMA Systems Engineering Handbook (1998)

    Google Scholar 

  21. Wang, Q., He, X., Chen, N.: A cross-layer neighbor discovery algorithm in ad hoc networks based on hexagonal clustering and GPS. In: 6th Annual 2018 International Conference on Geo-Spatial Knowledge and Intelligence (2019). https://doi.org/10.1088/1755-1315/234/1/012050

  22. Yang, X., Li, M., Qian, Z., Di, T.: Improvement of GPSR protocol in vehicular ad hoc network. IEEE Access 6, 39515–39524 (2018). https://doi.org/10.1109/ACCESS.2018.2853112

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiandeng He .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Qiu, Y., He, X., Wang, Q., Yao, H., Chen, N. (2020). Cluster and Time Slot Based Cross-Layer Protocol for Ad Hoc Network. In: Gao, H., Feng, Z., Yu, J., Wu, J. (eds) Communications and Networking. ChinaCom 2019. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 312. Springer, Cham. https://doi.org/10.1007/978-3-030-41114-5_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-41114-5_28

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-41113-8

  • Online ISBN: 978-3-030-41114-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics