Differential Evolution for Mobile Ad-hoc Networks: A Review
S. Prabha1 , R. Yadav2
Section:Review Paper, Product Type: Journal Paper
Volume-6 ,
Issue-6 , Page no. 1459-1467, Jun-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i6.14591467
Online published on Jun 30, 2018
Copyright © S. Prabha, R. Yadav . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: S. Prabha, R. Yadav, “Differential Evolution for Mobile Ad-hoc Networks: A Review,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.1459-1467, 2018.
MLA Style Citation: S. Prabha, R. Yadav "Differential Evolution for Mobile Ad-hoc Networks: A Review." International Journal of Computer Sciences and Engineering 6.6 (2018): 1459-1467.
APA Style Citation: S. Prabha, R. Yadav, (2018). Differential Evolution for Mobile Ad-hoc Networks: A Review. International Journal of Computer Sciences and Engineering, 6(6), 1459-1467.
BibTex Style Citation:
@article{Prabha_2018,
author = {S. Prabha, R. Yadav},
title = {Differential Evolution for Mobile Ad-hoc Networks: A Review},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2018},
volume = {6},
Issue = {6},
month = {6},
year = {2018},
issn = {2347-2693},
pages = {1459-1467},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2368},
doi = {https://doi.org/10.26438/ijcse/v6i6.14591467}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i6.14591467}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2368
TI - Differential Evolution for Mobile Ad-hoc Networks: A Review
T2 - International Journal of Computer Sciences and Engineering
AU - S. Prabha, R. Yadav
PY - 2018
DA - 2018/06/30
PB - IJCSE, Indore, INDIA
SP - 1459-1467
IS - 6
VL - 6
SN - 2347-2693
ER -
VIEWS | XML | |
506 | 305 downloads | 301 downloads |
Abstract
Differential evolution is potentially one of the most promising real parameter optimization algorithms. In last few years, time has witnessed the growth and applications of Differential Evolution in the field of science and engineering. This paper focuses on the application of Differential Evolution (DE) in mobile ad-hoc network to solve optimization problems. According to the conducted studies the applications are classified on the basis of four categories of optimization problems: clustering, routing, security and topology control mechanism. In this article, we review the main work and discuss the future scope of differential evolution with mobile ad-hoc networks. The results of conducted literature survey shows that maximum amount of articles were published in the years 2012 and 2015. About 62.5% of articles were related to topology control mechanism whereas rest of categories shared the similar contribution of about 12.5% each. From the review, it was found that research has been conducted on the application of DE in solving issues such as handling networks (up to 500 nodes) with minimum overhead and strengthening of cryptographic algorithms (up to 9 key size). In future these works can be extended to solve similar problems in large networks. Moreover, it was found that no work has been carried out to find secure route for dissemination using DE.
Key-Words / Index Term
Differential Evolution, Mutation, Crossover, Fitness Function, Topology control mechanism, Routing, Clustering
References
[1] International Fund for Agricultural Development (IFAD), The United Nations Environment Programme (UNEP), ”Smallholders, food security, and the environment”, Report, United Nation, 2013.
[2] Zhaohui Wang, Houbing Song, David W. Watkins, Keat Ghee Ong, Pengfei Xue, Qing Yang, Xianming Shi. 2015, “Cyber-physical systems for water sustainability: challenges and opportunities”, IEEE Communications Magazine, Vol. 53, Issue. 5, pp. 216 – 222, 2015.
[3] Bruno S. Faical, Gustavo Pessin, Geraldo P. R. Filho, Andre C. P. L F.Carvalho, Pedro H Gomes and Jo Ueyama, “Fine-tuning of UAV control rules for spraying pesticides on crop fields dynamic environments”, International Journal of Artificial Intelligence Tools, Vol. 25, Issue. 01, 2016.
[4] H.Pucha, M. Gunes and Y. C. Hu,”Performance impact of traffic patterns on routing protocols in mobile ad-hoc network”, Computer Networks, Vol.51, Issue. 12 pp. 3595-3616, 2007.
[5] J. M. Garcia-Campos, D.G. Reina, S.L. Toral, N. Bessis, F. Barrero, E. Asimakopoulou, R. Hill, “ Performance evaluation of reactive routing protocols for VANETs in urban scenario following good simulation practices” , In Proceeding of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS’ 15), Brazil, pp. 1-8, July 2015.
[6] R. Storn, K. Price, “Differential evolution – a simple and efficient adaptive scheme for global optimization over continuous spaces”, Technical Report TR-95-012, ICSI, 1995.
[7] D. G. Reina, P. Ruiz, R. Ciobanu, S.L. Toral, B. Dorronsoro and C. Dobre, “Review article: A Survey on the application of evolutionary algorithms for mobile multi-hop ad-hoc network optimization problems”, International Journal of Distributed sensor networks, Vol. 12, Issues. 02, Article ID 2082496, pp 13, 2016
[8] R. Storm, K. Price,” Differential evolution – a simple and efficient heuristic for global optimization over continuous spaces”, J Global Optim 1997, Vol. 11, Issue. 4, pp. 341–59, 1997.
[9] K. Price, R. Storn, J. Lampinen, “Differential evolution – a practical approach to global optimization”, Springer, Berlin, 2005.
[10] S. Das, P.N. Suganthan, “Differential Evolution: A Survey of the State-of-Art” , In Evolutionary Computation, IEEE Transaction on, Vol. 15, Issue. 1, pp. 4-31, 2011.
[11] Lubdha M. Bendale, Roshani. L. Jain, Gayatri D. Patil, “ Study of Various Routing Protocols in Mobile Ad-Hoc Networks”, International Journal of Scientific Research in Network Security and Communication, Vol.6, Issue.1, 2018.
[12] K. Kotecha, S. Popat,”Multi objective genetic algorithm base adaptive QoS routing in MANET”, In IEEE Congress on Evolutionary Computation (CEC’07), India, pp. 1423-1428, 2007.
[13] H. Yetgin, K.T. K. Cheung, L. Hanzo, “Multi-objective routing optimization using evolutionary algorithms”, in Proceeding of the IEEE Wireless Communication and Networking Conference (WCNC’ 12), China, pp. 3030-3034, 2012.
[14] K. Deb, A. Pratap, S. Agarwal, T. Meyarivan, “Fast and Elitist multi-objective genetic algorithm: NSGA-II”, IEEE Transactions on Evolutionary Computation, Vol. 6, pp. 182-197, 2002.
[15] M. Camelo, C. Omana, and H. Castro,”QoS routing algorithm based on multi-objective optimization for wireless mesh networks” , In IEEE Latin American Conference on Communications (LATINCOM’ 10), (Bogota)Colombia, pp. 1-6, 2010.
[16] F. Xue, A. Sanderson R. Graves, “Multi-objective routing in wireless sensor networks with differential evolution algorithm”, In IEEE International Conference on Networking, Sensing and Control (ICNSC’ 06), USA, pp. 880-885, 2006.
[17] F. Xue, “Multi-objective differential: Theory and Application”, PhD. thesis, Rensselaer Polytechnic Institute, New York, 2004.
[18] S. Gundry, J. Kusyk, J. Zou, C. S. Sahin, M. U. Uyar, “Performance Evaluation of differential evolution based topology control method for autonomous MANET nodes”, 2012 IEEE Symposium Computers and Communications (ISCC) , Turkey, 2012.
[19] S. Luke, C. Cioffi-Revilla, L. Panait, K. Sullivan, G. Balan, “MASON: A Multiagent Simulation Environment”, Vol. 81, Issue 7, pp. 517-527, 2005.
[20] A. Okabe, B. Boots, K. Sugihara, “Spatial tessellations: concepts and applications of Voronoi diagrams”, Wiley Series in Probability and Mathematical Statistics, 1992.
[21] S. Gundry, J. Zou, J. Kusyk, C. S. Sahin, M. U. Uyar, “Markov chain model for differential based topology control in MANETs”, 2012 35th IEEE Sarnoff Symposium (SARNOFF), USA, 2012.
[22] S. Gundry, J. Kusyk, J. Zou, C. S. Sahin, M. U. Uyar, “Differential Evolution based fault tolerant topology control in MANETs”, MILCOM 2013 - 2013 IEEE Military Communications Conference, USA, 2013.
[23] A. Yao, “On constructing minimum spanning tree in k-dimensional spaces and relates problems”, SIAM Journal on Computing, Vol. 11, Issue 4, pp. 721-736, 1982.
[24] S. Poduri, G. Sukhatme, “Constrained coverage for mobile sensor networks”, In Proceeding of the 2004 IEEE International Conference on Robotics and Automation, Vol.1, pp.165-171, 2004.
[25] S. Gundry, J. Zou, C.S. Sahin, J. Kusyk, M.U. Uyar, “Autonomous and fault tolerant vehicular self deployment mechanisms in MANETs”, IEEE International Conference on Technology for Homeland Security (HST), USA, 2013.
[26] S. Gundry, J. Zou, J. Kusyk, M. U. Uyar, C. S. Sahin, “Fault tolerance bio-inspired topology control mechanism for autonomous mobile node distribution in MANETS”, MILCOM 2012 - 2012 IEEE Military Communications Conference, USA, 2012.
[27] S. Gundry, J. Zou, M. U. Uyar, C. S. Sahin, J. Kusyk, “ Differential evolution-based autonomous and disruption tolerant vehicular self-organized in MANETs”, Ad Hoc Networks, Vol. 25, Part B, pp. 454-471, 2015.
[28] R. Bollobas, “Random graph”, Academic Press, 1985.
[29] H. Cheng, J. Cao, X. Wang, S. K. Das, S.Yang, “Stability-aware multi-metric clustering in mobile ad-hoc networks with groip mobility”, Wireless Communication and Mobile Computing,Vol. 9, Issues 6, pp.759-771, 2009.
[30] D. Turgut, S. K. Das, R. Elmasri, B. Turgut, “Optimizing clustering algorithm in mobile ad-hoc network using genetic algorithmic approach”, Global Telecommunications Conference, 2002. GLOBECOM `02. IEEE, Taiwan, 2002.
[31] U.K. Chakraborty, S. K. Das, T. E. Abbott, “Clustering in mobile ad hoc networks with differential evolution”, 2011 IEEE Congress on Evolutionary Computation (CEC), USA, 2011.
[32] Umesh Kumar Singh, Jalaj Patidar, Kailash Chandra Phuleriya,”On Mechanism to Prevent Cooperative Black Hole Attack in Mobile Ad Hoc Networks”, International Journal of Scientific Research in Computer Science and Engineering ,Vol.3, Issue.1, pp.11-15, 2015.
[33] A.Vani, “ Detection and Elimination of Wormhole Attacks in a MANET”, International Journal of Scientific Research in Computer Science and Engineering ,Vol.5, Issue.5, pp.35-40, October (2017).
[34] R. Dorai, M. Rajaram, “ Trust and Reputation Mechanism with Path Optimization in Multipath Routing”, World Academy of Science Engineering and Technology International Journal of Electronics and Communication Engineering, Vol. 9, Issue 3, 2015.
[35] GiaS. Wulandari, W. Rismawan, S. Saadah, “Differential evolution for the cryptanalysis of Transposition Cipher”, 3rd International conference on Information and Communication Technology (ICoICT), Bali, 2015.
[36] C. Erbao, L. Mingyong, “The open vehicle routing problem with fuzzy demands”, in Expert Systems with Applications Vol. 37, Issue 3, pp. 2405-2411, 2010.
[37] S. N. Sinha, S. Palit, M. A. Molla, A. Khanra, M. Kule, “A cryptanalytic attack on knapsack cipher using differential evolution algorithm”, Recent Advances in Intelligent Computational Systems, Trivandrum, pp. 317-320, 2011.