Advertisement

Fuzzy-Based Trusted Ant Routing (FTAR) Protocol in Mobile Ad Hoc Networks

  • Srinivas Sethi
  • Siba K. Udgata
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7080)

Abstract

This paper proposes a novel approach called Fuzzy-based Trusted Ant Routing (FTAR) using fuzzy logic and swarm intelligence to select optimal path by considering optimization of multiple objectives. It retains the advantages of swarm intelligence algorithm and ensures trusted routing protocol by implementing fuzzy logic. It uses trust-evaluation scheme using dropped packet and Time-Ratio parameters which calculate trust values for nodes in MANETs to distinguish between healthy and malicious nodes. FTAR considers not only shortest path but also the trusted level of neighbors or intermediate nodes.

Keywords

MANET Routing Protocol Fuzzy Antnet 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Abolhasan, M., Wysocki, T., Dutkiewicz, E.: A Review of Routing Protocol for Mobile Ad hoc Networks. Elsevier Ad Hoc Nwtworks Journal 2(1), 1–22 (2004)CrossRefGoogle Scholar
  2. 2.
    Deng, H., Li, W., Agrawal, D.: Routing Security in Wireless Ad Hoc Networks. IEEE Communication Magazine, 70–75 (October 2002)Google Scholar
  3. 3.
    Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Mobile Computing and Networking (MobiCom 2000), pp. 255–265 (2000)Google Scholar
  4. 4.
    Vigna, G., Gwalani, S., Srinivasan, K.: An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks. In: Proc. of the 20th Annual Computer Security Applications Conference (ACSAC 2004) (2004)Google Scholar
  5. 5.
    Dorigo, M., Gambardella, L.M.: Ant colony system: a cooperative learning approach to the traveling salesman problem. IEEE Transactions on Evolutionary Computation 1(1), 53–66 (1997)CrossRefGoogle Scholar
  6. 6.
    Di Caro, G.A., Dorigo, M.: Ant Colonies for Adaptive Routing in Packet-Switched Communications Networks. In: Eiben, A.E., Bäck, T., Schoenauer, M., Schwefel, H.-P. (eds.) PPSN 1998. LNCS, vol. 1498, pp. 673–682. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  7. 7.
    Dhillon, S.S., Van Mieghem, P.: Performance Analysis of the AntNet Algorithm. International Journal of Computer Networks, 2104–2125 (2007)Google Scholar
  8. 8.
    Di Caro, G.A., Ducatelle, F., Gambardella, L.M.: AntHocNet: An Ant-Based Hybrid Routing Algorithm for Mobile Ad Hoc Networks. In: Yao, X., Burke, E.K., Lozano, J.A., Smith, J., Merelo-Guervós, J.J., Bullinaria, J.A., Rowe, J.E., Tiňo, P., Kabán, A., Schwefel, H.-P. (eds.) PPSN 2004. LNCS, vol. 3242, pp. 461–470. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  9. 9.
    Sethi, S., Udgata, S.K.: The Efficient Ant Routing Protocol for MANET. International Journal on Computer Science and Engineering (IJCSE) 02(07), 2414–2420 (2010)Google Scholar
  10. 10.
    Güneş, M., Sorges, U., Bouazizi, I.: ARA - The Ant-Colony Based Routing Protocol for MANETs. In: International Conference on Parallel Processing Workshops, pp. 1530–2016 (2002)Google Scholar
  11. 11.
    Goswami, M.M., Dharaskar, R.V., Thakare, V.M.: Fuzzy Ant Colony Based Routing Protocol For Mobile Ad Hoc Network. In: International Conference on Computer Engineering and Technology, ICCET 2009, pp. 438–448 (2009)Google Scholar
  12. 12.
    Venkatesh, C., Yadaiah, N., Natarajan, A.M.: Dynamic Source Routing Protocol using Fuzzy Logic Concepts for Ad hoc Network. Accademic Open Internet Journal 15, 1–15 (2005)Google Scholar
  13. 13.
    Wagyana, A., Hendrawan, Rachmana, N.: Performance Improvement of Dynamic Source Routing on Manet using Fuzzy Logic. In: Proceedings of MoMM 2006, pp. 251–258 (2006)Google Scholar
  14. 14.
    Avramopoulos, I., Kobayashi, H., Wang, R., Krishnamurthy, A.: Highly Secure and Efficient Routing. In: INFOCOM 2004 (2004)Google Scholar
  15. 15.
    Awerbuch, B.R., Holmer, D., Nita-Rotaru, C., Rubens, H.: An on-demand secure routing protocol resilient to byzantine failures. In: ACM Workshop on Wireless Security, WiSe (2002)Google Scholar
  16. 16.
    Hu, Y.-C., Perrig, A., Johnson, D.B.: Ariadne: A secure on-demand routing protocol for ad hoc networks. In: Hu, Y.-C., Perrig, A. (eds.) Proceedings of the Eighth ACM International Conference on Mobile Computing and Networking, MobiCom 2002 (2002)Google Scholar
  17. 17.
    Belding-Royer, E.M., Parkins, C.E.: Evolution and future directions of the ad hoc on-demand distance vector routing protocol. Ad Hoc Network (Elsevier) 1(1), 125–150 (2003)CrossRefGoogle Scholar
  18. 18.
    Wong, Y.F., Wong, W.C.: A fuzzy-decision-based routing protocol for mobile ad hoc networks. In: 10th IEEE International Conference on Network, pp. 317–322 (2002)Google Scholar
  19. 19.
    Raju, G.V.S., Hernandez, G., Zou, Q.: Quality of service routing in ad hoc networks. In: IEEE Wireless Communications and Networking Conference, vol. 1, pp. 263–265 (2000)Google Scholar
  20. 20.
    Pedrycz, W., Gomide, F.: An introduction to fuzzy sets: analysis and design (complex adaptive systems). MIT Press, Cambridge (1998)zbMATHGoogle Scholar
  21. 21.
    Buckley, J.J., Eslami, E., Esfandiar, E.: An introduction to fuzzy logic and fuzzy sets (advances in soft computing). Physica Verlag (2002)Google Scholar
  22. 22.
    Park, I., Kim, J., London, I.P.: Blocking Expanding Ring Search Algorithm for Efficient energy Consumption in Mobile Ad Hoc Networks. In: Proceedings of the WONS, Les Menuires, France, pp. 185–190 (2006)Google Scholar
  23. 23.

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Srinivas Sethi
    • 1
  • Siba K. Udgata
    • 2
  1. 1.Department of CSEIGITSaranagIndia
  2. 2.Department of Computer & Information SciencesUniversity of HyderabadHyderabadIndia

Personalised recommendations