Open Access Open Access  Restricted Access Subscription or Fee Access

OLSR Clustering Algorithm Based on Nodes Mobility


(*) Corresponding author


Authors' affiliations


DOI: https://doi.org/10.15866/irecos.v10i1.5053

Abstract


A Mobile Ad-hoc network (MANET) is formed when group of mobile wireless nodes collaborate between them to communicate through wireless links in the absence of the fixed infrastructure and any centralized control. Clustering is the most popular method developed to provide hierarchy and resource management over mobile ad hoc networks. In the literature, several clustering approaches were proposed. They generally differ on the cluster head selection criteria. In this work we present a novel mobility metric for mobile ad hoc networks which is subsequently used as a basis for cluster formation. Our algorithm gives major improvements regarding the number and the mobility value of elected cluster heads. Analysis and simulation results are used to show the performance of our algorithm compared with other clustering algorithms in literature.
Copyright © 2015 Praise Worthy Prize - All rights reserved.

Keywords


Ad Hoc; Mobility; Clustering; OLSR

Full Text:

PDF


References


Y. Zhang, J. Mee Ng and C. Ping Low, “A distributed group mobility adaptive clustering algorithm for mobile ad hoc networks”, Journal of Computer Communications, vol. 32, (2009), pp. 189-202.
http://dx.doi.org/10.1016/j.comcom.2008.10.002

S. Sarkar, T. G. Basavaraju, and C. Puttamadappa, Ad Hoc Mobile Wireless Networks: Principles, Protocols and Applications New York: Auerbach Publications, 2007
http://dx.doi.org/10.1201/9781420062229

J. Y. Yu and P. H. J. Chong, “A Survey of Clustering Schemes for Mobile Ad Hoc Networks”, IEEE Communications Surveys & Tutorials, (2005).
http://dx.doi.org/10.1109/comst.2005.1423333

D. Wei and H. A. Chan, “Clustering Ad Hoc Networks: Schemes and Classifications”, 3rd Annual IEEE Communications Society on Sensor and Ad Hoc Communications and Networks, (2006), pp. 920-926.
http://dx.doi.org/10.1109/sahcn.2006.288583

S. Chinara and S. K. Rath, “A Survey on One-Hop Clustering Algorithms in Mobile Ad Hoc Networks”, Journal of Network and Systems Management archive, vol. 17, no. 1-2, (2009) June, pp. 183-207.
http://dx.doi.org/10.1007/s10922-009-9123-7

K. Erciyes, O. Dagdeviren, D. Cokuslu and D. Ozsoyellery, “Graph theoretic clustering algorithms in mobile ad hoc networks and wireless sensor networks”, Applied and Computational Mathematics, vol. 6, no. 2, (2007), pp. 162-180.
http://dx.doi.org/10.1007/11604655_9

R. C. Hincapie, B. A. Correa and L. Ospina, “Survey on Clustering Techniques for Mobile Ad Hoc Networks”, (2006).

G. Kumar, K. K. Tripathi and N. Tyag, “Research Survey of Load Balancing Clusters in Wireless Ad hoc Network”, International Journal of Electronics Engineering, (2011), pp. 305-307.

P. Rai and S. Singh, “A Survey of Clustering Techniques”, International Journal of Computer Applications, vol. 7, no. 12, (2010) October.
http://dx.doi.org/10.5120/1326-1808

I. G. Shayeb, A. R. H. Hussein and A. B. Nasoura, “A Survey of Clustering Schemes for Mobile Ad-Hoc Network (MANET)”, American Journal of Scientific Research, (2011), pp. 135-151.

R. Agarwal and M. Motwani, “Survey of clustering algorithms for MANET”, International Journal on Computer Science and Engineering, vol. 1, no. 2, (2009), pp. 98-104.

M. E. Elhdhili, L. B. Azzouz and F. Kamoun, “CASAN: Clustering algorithm for security in ad hoc networks”, Computer Communications, vol. 31, (2008), pp. 2972-2980.
http://dx.doi.org/10.1016/j.comcom.2008.04.001

C. Park, Y. Lee, H. Yoon, S. Jin and D. Chio, “Cluster based Trust Evaluation in Ad Hoc Networks”, pp. 503-507.

L. Xu, X. Wang and J. Shen, “Strategy and Simulation of Trust Cluster Based Key Management Protocol for Ad hoc Networks”, Proceedings of 4th International Conference on Computer Science & Education, (2009), pp. 269-274.
http://dx.doi.org/10.1109/iccse.2009.5228445

C. Park, Y. Lee, H. Yoon, S. Jin and D. Chio, “Cluster based Trust Evaluation in Ad Hoc Networks”, pp. 503-507.

S. Peng, W. Jia and G. Wang, “Voting-Based Clustering Algorithm with Subjective Trust and Stability in Mobile Ad-Hoc Networks”, IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, (2008), pp. 3-9.
http://dx.doi.org/10.1109/euc.2008.93

L. Wang and F. Gao, “A Secure Clustering Scheme Protocol for MANET”, International Conference on Multimedia Information Networking and Security (MINES), (2010), pp. 785-789.
http://dx.doi.org/10.1109/mines.2010.166

P. Chatterjee, “Trust Based Clustering And secure routing Scheme for Mobile Ad Hoc Networks”, International Journal of Computer Networks & Communications, vol. 1, no. 2, (2009) July, pp. 84-97.

Barron, F.H. 1992. Selecting a best multiattribute alternative with partial information about attribute weights
http://dx.doi.org/10.1016/0001-6918(92)90042-c

Roy, B. (2005). An overview of MCDA techniques today: paradigms and challenges. In: Figueira, J., Greco, S. and Ehrgott, M. (eds) Multiple criteria decision analysis: state of the art surveys.

A Hajami, M. Elkoutbi. ” Density Based Clustering ”, ICOGCAC 09, 9-11 December 2009 Padur, Chennai, India

Network Simulator NS2 http://www.isi.edu/nsnam/ns/.

da Silva, E., e Silva, R.F., Albini, L.C.P., Security through virtualization on mobile ad hoc networks, (2012) International Journal on Communications Antenna and Propagation (IRECAP), 2 (4), pp. 270-275.

Al-Fedaghi, S., Al Zanaidi, D., Flow-based scenarios in mobile communication systems and networks, (2013) International Journal on Communications Antenna and Propagation (IRECAP), 3 (2), pp. 131-139.

Enshaei, M., Hanapi, Z.M., Othman, M., A review: Mobile Ad Hoc networks challenges, attacks, security, vulnerability and routing protocols, (2014) International Journal on Communications Antenna and Propagation (IRECAP), 4 (5), pp. 168-179.
http://dx.doi.org/10.15866/irecap.v4i5.3001

Pushparaj, R., Dinakaran, M., A location based-energy aware routing approach for mobile Ad Hoc networks, (2014) International Journal on Communications Antenna and Propagation (IRECAP), 4 (4), pp. 114-123.
http://dx.doi.org/10.15866/irecap.v4i4.3106

Kumar, J., Kulkarni, M., Gupta, D., Performance comparison of MANET routing protocols, (2010) International Review on Computers and Software (IRECOS), 5 (1), pp. 1-5.

Sengan, S., Chethur Pandian, S., An efficient agent-based intrusion detection system for detecting malicious nodes in MANET routing, (2012) International Review on Computers and Software (IRECOS), 7 (6), pp. 3037-3041.

Jiang, H., Zhang, S., Shao, G., Group mobility judge based on node's neighbors matrix in clustering MANET, (2012) International Review on Computers and Software (IRECOS), 7 (6), pp. 2886-2890.

Priyadarsini, S., Umashankar, S., TSRD-RL algorithm based secured route discovery for MANET with improved route lifetime, (2012) International Review on Computers and Software (IRECOS), 7 (2), pp. 499-504.

Ambika, I., Eswaran, P., Improved token based resource allocation technique for multi-service flows in MANET, (2013) International Review on Computers and Software (IRECOS), 8 (6), pp. 1489-1496.

Senthil Kumar, R., Sureshkumar, C., Cluster based AODV protocol to Minimizing the Route Rediscovery Process and to improve the lifetime of network in MANET, (2014) International Review on Computers and Software (IRECOS), 9 (1), pp. 38-47.

Devi, M., Chenthur Pandian, S., An efficient autonomous key management with verifiable secret sharing schemes for reduced communication/computation costs in MANET, (2014) International Review on Computers and Software (IRECOS), 9 (1), pp. 48-53.


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize