Open Access   Article Go Back

Improving the Stability and Quality of Service in Cluster Head Rule Base System Using MANETs

Smita 1 , R. Bhakar2

Section:Research Paper, Product Type: Journal Paper
Volume-2 , Issue-5 , Page no. 4-7, May-2014

Online published on May 31, 2014

Copyright © Smita, R. Bhakar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Smita, R. Bhakar, “Improving the Stability and Quality of Service in Cluster Head Rule Base System Using MANETs,” International Journal of Computer Sciences and Engineering, Vol.2, Issue.5, pp.4-7, 2014.

MLA Style Citation: Smita, R. Bhakar "Improving the Stability and Quality of Service in Cluster Head Rule Base System Using MANETs." International Journal of Computer Sciences and Engineering 2.5 (2014): 4-7.

APA Style Citation: Smita, R. Bhakar, (2014). Improving the Stability and Quality of Service in Cluster Head Rule Base System Using MANETs. International Journal of Computer Sciences and Engineering, 2(5), 4-7.

BibTex Style Citation:
@article{Bhakar_2014,
author = {Smita, R. Bhakar},
title = {Improving the Stability and Quality of Service in Cluster Head Rule Base System Using MANETs},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2014},
volume = {2},
Issue = {5},
month = {5},
year = {2014},
issn = {2347-2693},
pages = {4-7},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=149},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=149
TI - Improving the Stability and Quality of Service in Cluster Head Rule Base System Using MANETs
T2 - International Journal of Computer Sciences and Engineering
AU - Smita, R. Bhakar
PY - 2014
DA - 2014/05/31
PB - IJCSE, Indore, INDIA
SP - 4-7
IS - 5
VL - 2
SN - 2347-2693
ER -

VIEWS PDF XML
4008 3761 downloads 3778 downloads
  
  
           

Abstract

Abstract-This paper considers the problem of finding high and low frequency node disjoint and multi constrained QoS multipath from source to destination by using agent based fuzzy inference system. CGSR protocol divide the network into several small areas called clusters and the members of each cluster entrusted to a special node called cluster-head. A fuzzy logic system was proposed by which we select a suitable cluster-head to improve the quality of CGSR protocol. Selecting an appropriate cluster-head can save the power of overall network because the Cluster-Head node consumes more power than other ordinary nodes and the node with the highest chance is elected as the cluster-head. (1) Determination of multiple paths and picking up of resource information (available energy, mobility,distance,and chance) of the intermediate nodes from source to destination. (2) Recognition of node disjoint, and multi-constrained QoS fit paths by using Takagi-Sugeno Fuzzy Inference System (TSFIS). TSFIS extracts a fuzzy QoS weight from available resource information of the intermediate nodes. (3) Selection of the best path depending on the fuzzy QoS weight. (4) Maintenance of QoS path when path breaks due to mobility of node or link failure. To test the performance effectiveness of the approach. Simulation results show that our proposed protocol is better than I-MAN on the basis of data drop, load, delay and throughput parameters. Hence, the proposed system gives an efficient result in the presence and absence of threats because it launches an appropriate protocol on the basis of network contexts.

Key-Words / Index Term

Fuzzy Logic System, Hops, QoS, MANET, FIS

References

[1]. G. Pei, M. Gerla, X. Hong, and C. Chiang. A wireless hierarchical routing protocol with group mobility. In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), September 1999.
[2]. A. Iwata, C.-C. Chiang, G. Pei, M. Gerla and T.-W. Chen, "Scalable routing strategies for ad hoc wireless networks," IEEE J. Select. Areas Commun., Vol. 17, No. 8, August 1999, pp. 1369-1379.
[3]. Hui-Yao An; Ling Zhong; Xi-Cheng Lu; Wei Peng, A cluster-based multipath dynamic source routing in MANET Wireless And Mobile Computing, Networking And Communications, 2005.
[4]. Rendong Bai and Mukesh Singhal, "DOA: DSR over AODV Routing for Mobile Ad Hoc Networks," IEEE Transactions on Mobile Computer, vol. 5, NO. 10, October 2006
[5]. Akhtar M A K, and Sahoo G (2013). A novel methodology for securing ad hoc network by friendly group model, Computer Networks & Communications (NetCom), vol 131, 23�35.
[6]. Saeed N H, Abbod M F et al. (2010). IMAN: An Intelligent MANET routing system, 2010 IEEE 17th International Conference on Telecommunications (ICT), 401�404.
[7]. Saeed N (2011). Intelligent MANET optimisation system.
[8]. Biswas K, and Ali M I (2007). Security threats in mobile Ad Hoc network, Master Thesis, Thesis no: CS-2007:07, Department of Interaction and System Design, School of Engineering Blekinge Institute of Technology, Sweden.
[9]. Ilyas M (2010). The handbook of Ad Hoc wireless networks, vol 29, CRC press.
[10]. Boukerche A (2008). Algorithms and protocols for wireless, mobile Ad Hoc networks, vol 77, John Wiley & Sons.
[11]. Anjum F and Mouchtaris P (2007). Security for wireless ad hoc networks, Wiley.com.
[12]. Michiardi P, and Molva R (2002). Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks, Advanced Communications and Multimedia Security, 107�121.
[13]. Buchegger S, and Le Boudec J Y (2002). Performance analysis of the CONFIDANT protocol, Proceedings of the 3rd ACM international symposium on Mobile Ad Hoc networking and computing, 226�236.
[14]. Buchegger S, and Le Boudec J Y (2002b). Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile Ad Hoc networks, 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing, 2002. Proceedings, 403�410.
[15]. Balasubramanian A, and Ghosh J (2005). A reputation based scheme for stimulating cooperation in MANETs, Proceeding-s of The 19th International Teletraffic Congress, Beijing.
[16]. Bajaj L, Takai M et al. (1999). Glomosim: a scalable network simulation environment, UCLA Computer Science Department Technical Report, 990027, 213.
[17]. GloMoSim (1999). Global Mobile Information System Simulator, Available from: http://pcl.cs.ucla.edu/projects/glomosim/
[18]. Das S R, Belding-Royer E M et al. (2003). Ad hoc on-demand distance vector (AODV) routing.
[19]. Hu Y C, Perrig A et al. (2003). Packet leashes: a defense against wormhole attacks in wireless networks, INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies, vol 3, 1976�1986.