Information

  • Author Services

Initiatives

You are accessing a machine-readable page. In order to be human-readable, please install an RSS reader.

All articles published by MDPI are made immediately available worldwide under an open access license. No special permission is required to reuse all or part of the article published by MDPI, including figures and tables. For articles published under an open access Creative Common CC BY license, any part of the article may be reused without permission provided that the original article is clearly cited. For more information, please refer to https://www.mdpi.com/openaccess .

Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications.

Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive positive feedback from the reviewers.

Editor’s Choice articles are based on recommendations by the scientific editors of MDPI journals from around the world. Editors select a small number of articles recently published in the journal that they believe will be particularly interesting to readers, or important in the respective research area. The aim is to provide a snapshot of some of the most exciting work published in the various research areas of the journal.

Original Submission Date Received: .

  • Active Journals
  • Find a Journal
  • Proceedings Series
  • For Authors
  • For Reviewers
  • For Editors
  • For Librarians
  • For Publishers
  • For Societies
  • For Conference Organizers
  • Open Access Policy
  • Institutional Open Access Program
  • Special Issues Guidelines
  • Editorial Process
  • Research and Publication Ethics
  • Article Processing Charges
  • Testimonials
  • Preprints.org
  • SciProfiles
  • Encyclopedia

electronics-logo

Article Menu

ieee research paper on manet

  • Subscribe SciFeed
  • Recommended Articles
  • Google Scholar
  • on Google Scholar
  • Table of Contents

Find support for a specific problem in the support section of our website.

Please let us know what you think of our products and services.

Visit our dedicated information section to learn more about MDPI.

JSmol Viewer

A survey on parameters affecting manet performance.

ieee research paper on manet

1. Introduction

  • The commonly used simulation tools in a MANET are described, covering the advantages and disadvantages of each. Additionally, statistics on the percentage of usage of these simulation tools are collected against 50 recent papers.
  • The list of routing protocol parameters that control the routing behavior is provided for three routing protocols. Comprehensive flowcharts for the covered routing protocols are provided. Additionally, the routing parameters’ usage statistics against 50 recent papers are presented.
  • The simulation parameters used to define a MANET environment are collected, illustrating the usage of each, and statistics on the literature usage percentage of the simulation parameters are covered. The literature range of values used for each simulation parameter is also provided.
  • The main parameters that influence the MANET performance under attack are covered, a list of common attack types on a MANET is collected, and the percentage of usage is shown.
  • The evaluation metric terms used for a performance analysis of MANETs are described. Additionally, statistical tables are collected to show the used environment parameters in our survey papers.

2. Routing in MANETs

  • Proactive routing protocols: For example, OLSR, each node maintains its routing table by periodically updating its information [ 6 ]; this increases network overhead. On the other hand, routes will always be available with a minimum delay. Proactive protocols provide better performance than reactive protocols as each node continuously updates its awareness of network changes. When a request is received, the packet forwarding procedure is directly handled.
  • Reactive routing protocols: For example, AODV and DSR, when a source node tries to perform a packet transmission, it initiates a route discovery mechanism to know how to reach the destination. After the route is determined and updated in the routing table, the packet is forwarded [ 7 ]. Reactive protocols have minimal network overhead, but there is a delay time consumed in the route discovery.
  • Hybrid routing protocols: For example, ZRP, the close local neighbors to a node are periodically updated, and the global nodes that are not direct neighbors will be updated on demand such as in reactive routing protocols [ 8 ].

2.1. AODV Routing Protocol

  • Destination node address;
  • Number of hop counts to reach the destination;
  • Intermediate nodes address;
  • Route entry expiry time;
  • Destination node sequence number.
  • Network diameter: The network diameter value sets the maximum number of hop counts between two nodes in MANETs. The network diameter default value is up to thirty-five hops at most as per RFC 3561 standard.
  • Node transversal time: The node transversal time is the estimation of packet transversal time between two neighbor nodes; this estimation should consider the network, processing, and transfer delay time. The default configuration time is 40 ms.
  • Network transversal time: The network transversal time is the expected time between sending the RREQ packet and the reception of the RREP packet as per the equation [ 14 ]:
  • Route request retry: If a route reply is not received by the source node within the maximum network transversal time, the source node can retry to request the route discovery again for a maximum route request retry times. If the route discovery exceeds the route request retry times, the destination node should be considered unreachable. The default value for the route request retry parameter is equal to 2 retries.
  • Blacklist timeout: When the RREP transmission from node A to node B fails, node A records node B in its blacklist buffer. During this blocking time, node A discards any RREQ from neighbor node B until the blacklist timeout is reached. After the blacklist timeout expires, node B is removed from the blacklist [ 14 ].
  • Route request rate limits: The route request rate limit is the maximum number of RREQ packets for the source node to originate per second. The route request rate limit’s default value is ten packets per second.
  • Active route timeout: The neighbor node is recorded in the routing table and considered an active node when the active route timeout is not exceeded. When a neighbor node is active, the recorded route to this neighbor should be used [ 15 ]. The active route timeout default value is 3000 ms.
  • Hello interval: All MANET nodes should reveal their existence in the network within a hello interval time [ 16 ]. If a node does not contribute to the routing activities for a hello interval time, it should broadcast a hello message with TTL = 1. Hello interval default value is set to be 1000 ms.
  • Allowed hello loss: If a node does not receive any contribution to routing activities from its direct neighbor node for more than (HelloInterval × AllowedHelloLoss), the node should assume a link failure to this neighbor [ 17 ]. The allowed hello loss default value is two link failures.
  • DPC: After the delete period constant time is expired, the expired route will be deleted from the routing table [ 18 ]. The default value for DPC is 5 s.

2.2. DSR Routing Protocol

  • source node identifier;
  • destination node identifier;
  • route request identifier;
  • record listing the address of all intermediate nodes.
  • Discovery hop limit: The discovery hop limit value is defined as the limit to the route request re-broadcast. If the first attempt of RREQ does not reach the destination node, the default value of the discovery hop limit is 255 hops, and the minimum value is one hop.
  • Broadcast jitter: The destination node should delay the RREP message by a random value that does not exceed the broadcast jitter’s maximum delay time. The broadcast jitter default value is ten milliseconds.
  • Route cache timeout: The route cache timeout is associated with each route entry in the cache [ 23 ]. When the timeout is reached, this means that the related route is not used and needs to be deleted from the node’s cache. Route cache timeout default value is three hundred milliseconds.
  • Send buffer timeout: When a packet cannot be transmitted to the next-hop node, this packet is queued inside a buffer to try sending it when possible. Send buffer timeout is the maximum time associated with a packet to be sent before being removed from the send buffer. The default value for send buffer timeout is 30 s.
  • Max request period: After a route discovery attempt fails to find a route to the destination node, the time between successive route discovery attempts doubles until the maximum request period is reached. The default value for the maximum request period time is 10 s.
  • Re-transmit buffer size: Re-transmit buffer holds the maximum number of packets waiting for the next-hop reachability confirmation. If the buffer is not sufficient to keep the new packet, this packet is discarded without notification. The re-transmit buffer size defines the buffer size with a default value of 50 packets.
  • Max maintenance re-transmission: The maximum number of re-transmissions for a packet waiting for a confirmation from the next hop should be limited by the configuration value of the max maintenance re-transmission parameter. The default value is only two transmissions.

2.3. OLSR Routing Protocol

  • Willingness: Willingness is a configuration parameter that specifies the node’s willingness to forward traffic packets to other network nodes [ 28 ]. A node may change the willingness during run-time based on conditions such as resource constraints and power limitations. Willingness is an integer value with a range between 0 and 7. ‘WILL_NEVER = 0’ is the lowest willingness value where this node must not be selected as a MPR for any node. ‘WILL_ALWAYS = 7’ is the highest willingness for a node to advertise its willingness to forward traffic on behalf of other network nodes. The default willingness value for a node is ‘WILL_DEFAULT = 3’.
  • Hello interval: Hello interval is the set periodic time between two consecutive hello messages in seconds. The default value is 2 s.
  • TC interval: This is the interval time in seconds between two consecutive topology control messages that carry the connectivity information. The TC interval default value is 5 s.
  • Refresh interval: Each node must cooperate in the network by sending a periodic hello message before the refresh interval period reaches a timeout. A hello interval must be smaller than or equal to the refresh interval. The default value for the refresh interval parameter is 2 s.
  • Neighbor hold time: Defines the link expiry time before declaring it as a broken link [ 29 ]. The neighbor hold time default value is 6 s.
  • Topology hold time: This is the timeout for the entries in the topology table before being deleted [ 29 ]. The topology hold time default value is 15 s.

3. Simulation in MANETs

3.1. manets simulators, 3.2. attacks on manets’ routing protocols.

  • Routing table overflow attack: In this attack, the attacking node tends to crowd the network by advertising several non-existing nodes to overflow the routing table [ 33 ]. This prevents legitimate nodes from being aware of network nodes and routing their packets normally.
  • Flooding attack: In a flooding attack, malicious nodes tend to waste network resources such as memory, bandwidth, and battery by flooding the network with bogus packets [ 34 ]. For example, flooding RREQ packets prevents the MANET from functioning normally.
  • DDoS attack: In a DDoS attack, attackers tend to keep the targeted legitimate node busy by continuously requesting RREQ messages from collaborative attackers at the same time without respecting the TTL time [ 35 ].
  • False removal of working route: In this attack, the malicious node advertises a false state of the link with the destination node as if the link is broken. This enforces the source node to re-initiate route discovery protocol to find another path to reach the destination. Additionally, it slows down packet transmission. False removal of working route attack could be used with another collaborative attack to isolate the targeted legitimate node from MANET.
  • Node isolation attack: Attackers isolate an innocent node by blocking routing information about this targeted node from the entire network [ 36 ]. This leads to an ignorance of the presence of this innocent node.
  • Routing table poisoning: In this attack, the attacker sends false RREQ packets with a higher sequence number to force all nodes to delete the old genuine route to a destination and update this route with a corrupted one.
  • Blackhole attack: The attacker tends to change the routing protocol packets to be the best route known for a targeted destination, and when it is requested to forward data packets to the destination node, it starts discarding the received packets to slow down the network performance [ 37 ].
  • Grayhole attack: Grayhole attack is an instance of a blackhole attack where an attacker selectively drops some data packets and normally forwards others [ 38 ], or drops all packets but only at a certain time. This makes the attack difficult to detect.
  • Wormhole attack: In a wormhole attack, two attacking nodes cooperate where one attacker at a specific location encapsulates some packets and tunnels them to the second attacker, bypassing all intermediate nodes to introduce itself as the fastest route to a destination and then drop the data packets later [ 39 ]. It can also be used to replay the received data packets in the other side of the network to disrupt the routing protocol.
  • Rushing attack: In a rushing attack, the malicious node sends RREQ messages with high-power transmission to introduce itself as the shortest path to any destination with only one hop count [ 40 ], this manipulates all network nodes to use this routing path. The rushing attack is most likely used alongside another attack such as dropping the network packets that need forwarding.

3.3. Simulation and Attack Parameters

  • Maximum simulation time (s): While running any simulator, a simulation time parameter is set to stop the simulation after this timeout is reached [ 41 ]; for more accurate results it is preferred to increase the simulation time.
  • Medium packet rate (packet/s): To avoid interference and packet loss between nodes due to the wireless medium limitation, a packet rate ratio should be pre-set between all MANET nodes. This parameter depends on the road capacity (number of nodes/mile), the available frequency used for packet transfer, and the used wireless protocol (ex. IEEE 802.11) [ 42 ].
  • Mobility speed of nodes (m/s): MANET nodes do not have a fixed location, which means that they are moving from one place to another at varying speeds. The speed of nodes affects the result of the simulation.
  • Nodes’ mobility movement pattern: The mobility pattern of mobile nodes in a MANET comprises one of the following patterns: (1) random way mobility, (2) linear mobility in a straight line, (3) circle mobility, and (4) stationary mobility for fixed nodes across the network.
  • Number of intermediate nodes: Increasing the number of intermediate nodes that forward packets between source nodes and destination decreases the routing protocol performance.
  • Number of source nodes: In MANETs, source nodes initiate packet transmission procedures; increasing the number of source nodes in MANET will overload the channel with more packets overhead.
  • Number of malicious nodes: Increasing the number of malicious nodes in MANETs decreases overall network performance.
  • Position of intermediate nodes: The position of intermediate nodes inside MANETs affects the performance. As the number of intermediate nodes between the source node and the destination node increases, network performance increases.
  • Position of malicious nodes: Attackers tend to take a good physical position between source and destination nodes to be able to perform the planned attack and drop the network packets.
  • Data packet payload (byte/packet): Data packet payload is the percentage of real data bytes (excluding the control and header data bytes) divided by the overall packet size in bytes. The data packet payload is an indication of the actual gain from packet transmission.
  • Simulation area: Simulates the MANETs’ network coverage area in m 2 . The simulation area reflects on the density of nodes inside the network, which impacts the routing protocol mechanisms.
  • Antenna type: The following are the antenna types and properties used for wireless communication: (1) the isotropic antenna transmits equal signal power in all directions; (2) the omnidirectional antenna transmits equal power in all horizontal directions, decreasing to zero along the vertical axis; and (3) the directional antenna transmits only in one direction at a specified angle.
  • Transportation protocol type: Transport protocol is based on two types: (1) the TCP protocol is a connection-oriented protocol that requires a connection establishment between the sender and the receiver first before sending data packets. This leads to a more secure and guaranteed delivery of data packets. On the other hand, the TCP protocol slows down packet delivery due to the needed overhead of handshaking. (2) UDP is a connectionless protocol that needs no connection establishment, which is faster but less reliable for packet delivery.
  • Transmission power: Each node needs to configure the transmission power that defines the range that this node could reach in one hop. Increasing transmission power leads to more coverage, but also means more energy consumption and quick battery drain.
  • Mobility speed of malicious nodes: MANETs have a dynamic network structure, which means that at certain times the network consists of some nodes that could leave the network after a while. Malicious node mobility speed is a key factor in affecting network performance. The attacker could use its speed to target an innocent node and isolate it from the network by simply taking a position between this innocent node and the destination node while traveling.
  • Transmission power of malicious nodes: The power of transmission for a malicious node could be valuable when the attacker aims to introduce itself as the shortest path between source and destination nodes. This malicious node can then drop the network packets later.

4. Evaluation Metrics and Performance Analysis in MANETs

  • THPT: Throughput is the rate of successfully delivered packets that reached the receiver node per time slot [ 43 ]. Throughput is affected by topology changes, noise on communication links, the power of transmission from the source node, and the existence of malicious nodes affecting the throughput ratio.
  • AETED: Average end-to-end delay is the average time taken to send a packet to the destination node [ 44 ]. This delay is due to many reasons such as route discovery queuing and process latency, delays caused by wireless links, and processing delays at both the sender and the receiver sides.
  • PDR: Packet delivery ratio is the ratio of packets that are received by the destination across the overall transmitted packets from the source node [ 45 ]. The packet delivery ratio represents the maximum throughput that can be achieved by the MANET network.
  • PLR: Packet loss ratio is the opposite of PDR; PLR measures the total lost packets that did not reach the destination node across the overall transmitted packets [ 46 ].
  • ROR: Routing overhead ratio is the size of control and header packets needed by the protocol for route discovery and maintenance over the total data packets received by the destination node [ 47 ].
  • NRL: Normalized routing load is the ratio between the total number of control packets sent by a source node over the total number of data packets received by a destination node [ 48 ]. An increase in normalized routing load metric indicates the efficiency of the used routing protocol.
  • NL: The network load is the average amount of data packets that are being carried by the entire network over time [ 49 ]. Increasing the network load ratio increases the possibility of data collision in the wireless medium.

5. Related Work

6. conclusions and future work, author contributions, data availability statement, conflicts of interest.

  • Reddy, B.; Dhananjaya, B. The AODV routing protocol with built-in security to counter blackhole attack in MANET. Mater. Today Proc. 2022 , 50 , 1152–1158. [ Google Scholar ] [ CrossRef ]
  • Ahmed, D.E.; Ibrahim, H.; Khalifa, O. Performance Evaluation of AODV, OLSR, and GRP for Transmitting Video Conferencing over MANETs. Int. J. Comput. Sci. Inf. Secur. 2020 , 18 , 45–51. [ Google Scholar ]
  • Kurniawan, A.; Kristalina, P.; Hadi, M.Z.S. Performance Analysis of Routing Protocols AODV, OLSR and DSDV on MANET using NS3. In Proceedings of the 2020 International Electronics Symposium (IES), Surabaya, Indonesia, 29–30 September 2020; pp. 199–206. [ Google Scholar ] [ CrossRef ]
  • Skaggs-Schellenberg, R.; Wang, N.; Wright, D. Performance Evaluation and Analysis of Proactive and Reactive MANET Protocols at Varied Speeds. In Proceedings of the 10th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 6–8 January 2020; pp. 0981–0985. [ Google Scholar ] [ CrossRef ]
  • Ferdous, R.; Muthukkumarasamy, V. A Comparative Performance Analysis of MANETs Routing Protocols in Trust-Based Models. In Proceedings of the International Conference on Computational Science and Computational Intelligence (CSCI), Las Vegas, NV, USA, 15–17 December 2016; pp. 880–885. [ Google Scholar ] [ CrossRef ]
  • Govindasamy, J.; Punniakody, S. A comparative study of reactive, proactive and hybrid routing protocol in wireless sensor network under wormhole attack. J. Electr. Syst. Inf. Technol. 2018 , 5 , 735–744. [ Google Scholar ] [ CrossRef ]
  • Bai, Y.; Mai, Y.; Wang, N. Performance comparison and evaluation of the proactive and reactive routing protocols for MANETs. In Proceedings of the Wireless Telecommunications Symposium (WTS), Chicago, IL, USA, 26–28 April 2017; pp. 1–5. [ Google Scholar ] [ CrossRef ]
  • Panda, N.; Patra, B.; Hota, S. Manet Routing Attacks and Their Countermeasures: A Survey. J. Crit. Rev. 2020 , 7 , 2777–2792. [ Google Scholar ] [ CrossRef ]
  • Saudi, N.A.M.; Arshad, M.A.; Buja, A.G.; Fadzil, A.F.A.; Saidi, R. Mobile Ad-Hoc Network (MANET) Routing Protocols: A Performance Assessment. In Proceedings of the Third International Conference on Computing, Mathematics and Statistics, Singapore, 27 March 2019; pp. 53–59. [ Google Scholar ] [ CrossRef ]
  • Shrestha, S.; Baidya, R.; Giri, B.; Thapa, A. Securing Blackhole Attacks in MANETs using Modified Sequence Number in AODV Routing Protocol. In Proceedings of the 8th International Electrical Engineering Congress (iEECON), Chiang Mai, Thailand, 4–6 March 2020; pp. 1–4. [ Google Scholar ] [ CrossRef ]
  • Kumari, A.; Krishnan, S. Simulation-Based Study of Blackhole Attack Under AODV Protocol. In Proceedings of the Fourth International Conference on Computing Communication Control and Automation (ICCUBEA), Pune, India, 16–18 August 2018; pp. 1–6. [ Google Scholar ] [ CrossRef ]
  • Jubair, M.A.; Muniyandi, R.C. NS2 Simulator to Evaluate the Effective of Nodes Number and Simulation Time on the Reactive Routing Protocols in MANET. Int. J. Appl. Eng. Res. 2016 , 11 , 11394–11399. [ Google Scholar ]
  • Agrawal, R.; Tripathi, R.; Tiwari, S. Performance Evaluation and Comparison of AODV and DSR Under Adversarial Envi-ronment. In Proceedings of the International Conference on Computational Intelligence and Communication Networks, Gwalior, India, 7–9 October 2011; pp. 596–600. [ Google Scholar ] [ CrossRef ]
  • Perkins, C.; Belding-Royer, E.; Das, S. RFC3561: Ad Hoc On-Demand Distance Vector (AODV) Routing ; IETF: Santa Barbara, CA, USA, 2003. [ Google Scholar ] [ CrossRef ]
  • Gupta, S.K.; Saket, R.K. Observation of AODV Routing Protocol’s Performance at Variation in ART Value for Various Node’s Mobility. In Proceedings of the First International Conference on Information and Communication Technology for Intelligent Systems: Volume 1. Smart Innovation, Systems and Technologies, Maghreb, Tunisia, 18–20 December 2018; Springer: Cham, Switzerland, 2016; Volume 50. [ Google Scholar ] [ CrossRef ]
  • Sharma, Y.; Sharma, A.; Sengupta, J. Performance evaluation of Mobile Ad hoc Network routing protocols under various se-curity attacks. In Proceedings of the International Conference on Methods and Models in Computer Science, New Delhi, India, 13–14 December 2010; pp. 117–124. [ Google Scholar ] [ CrossRef ]
  • Gupta, S.K.; Alsamhi, S.; Saket, R.K. Optimal Relation between ART and Mobility & Transmission Range at Default QualNet & Calculated Transmission Powers. In Proceedings of the 6th International Conference on Advances in Engineering Sciences and Applied Mathematics (ICAESAM-2016), Kuala Lumpur, Malaysia, 21–22 December 2016. [ Google Scholar ] [ CrossRef ]
  • Agrawal, N.; Fatima, M. Impact of Active Route Time Out and Delete Period Constant on AODV Performance. Int. J. Comput. Appl. 2016 , 147 , 19–25. [ Google Scholar ] [ CrossRef ]
  • Aggarwal, A.; Gandhi, S.; Chaubey, N. Performance analysis of aodv, dsdv and dsr in manets. Int. J. Distrib. Parallel Syst. 2014 , 2 , 167–177. [ Google Scholar ] [ CrossRef ]
  • Desai, R.; Patil, B.P. Analysis of routing protocols for Ad Hoc Networks. In Proceedings of the 2014 International Conference on Circuits, Systems, Communication and Information Technology Applications (CSCITA), Mumbai, India, 4–5 April 2014; pp. 111–115. [ Google Scholar ] [ CrossRef ]
  • Bobade, N.P.; Mhala, N.N. Performance Evaluation of AODV and DSR On-Demand Routing Protocols with Varying MANET Size. Int. J. Wirel. Mob. Netw. 2012 , 4 , 183–196. [ Google Scholar ] [ CrossRef ]
  • Johnson, D.; Hu, Y. The Dynamic Source Routing Protocol (DSR) for Mobile Ad Hoc Networks for IPv4 ; Rice University: Houston, TX, USA, 2007; Available online: https://tools.ietf.org/html/rfc4728 (accessed on 5 February 2023).
  • Gupta, S.K.; Alsamhi, S.H.; Saket, R.K. Comparative performance analysis of AODV for CBR & VBR traffic under influence of ART & DPC. In Proceedings of the 11th International Conference on Industrial and Information Systems, Roorkee, India, 3–4 December 2016; pp. 112–117. [ Google Scholar ] [ CrossRef ]
  • Hashim, A.-A.; Farhan, M.M.; Alshybani, S. Performance Evaluation of OLSR and AODV Routing Protocols over Mobile Ad-hoc Networks. In Proceedings of the First International Conference of Intelligent Computing and Engineering, Hadhramout, Yemen, 15–16 December 2019; pp. 1–8. [ Google Scholar ] [ CrossRef ]
  • Abdullah, A.M.; Ozen, E.; Bayramoglu, H. Investigating the Impact of Mobility Models on MANET Routing Protocols. Int. J. Adv. Comput. Sci. Appl. 2019 , 10 , 25–35. [ Google Scholar ] [ CrossRef ]
  • Jacquet, P.; Muhlethaler, P.; Clausen, T.; Laouiti, A.; Qayyum, A.; Viennot, L. Optimized link state routing protocol for ad hoc networks. In Proceedings of the IEEE International Multi Topic Conference: Technology for the 21st Century, IEEE INMIC 2001, Lahore, Pakistan, 30 December 2001; pp. 62–68. [ Google Scholar ] [ CrossRef ]
  • Clausen, T.; Jacquet, P.; Adjih, C.; Laouiti, A.; Minet, P.; Muhlethaler, P.; Qayyum, A.; Viennot, L. Optimized link state routing protocol (OLSR). RFC3626. Technol. Rep. 2003 , 1 , 1–75. [ Google Scholar ]
  • Boushaba, A.; Benabbou, A.; Benabbou, R.; Zahi, A.; Oumsis, M. Optimization on OLSR protocol for reducing topology control packets. In Proceedings of the International Conference on Multimedia Computing and Systems, Tangiers, Morocco, 10–12 May 2012; pp. 539–544. [ Google Scholar ] [ CrossRef ]
  • Kumar, M.; Sharma, C.; Dhiman, A.; Rangra, A.K. Performance Variation of Routing Protocols with Mobility and Scalability in MANET. In Advances in Intelligent Systems and Computing ; Springer: Singapore, 2018; Volume 638, pp. 9–21. [ Google Scholar ] [ CrossRef ]
  • Malhotra, J. A survey on MANET simulation tools. In Proceedings of the 2014 Innovative Applications of Computational In-telligence on Power, Energy and Controls with their impact on Humanity (CIPECH), Ghaziabad, India, 28–29 November 2014; pp. 495–498. [ Google Scholar ] [ CrossRef ]
  • Dorathy, I.; Chandrasekaran, M. Simulation tools for mobile ad hoc networks: A survey. J. Appl. Res. Technol. 2018 , 16 , 437–445. [ Google Scholar ] [ CrossRef ]
  • Kumar, A.; Varadarajan, V.; Kumar, A.; Dadheech, P.; Choudhary, S.S.; Kumar, V.A.; Panigrahi, B.; Veluvolu, K.C. Black hole attack detection in vehicular ad-hoc network using secure AODV routing algorithm. Microprocess. Microsyst. 2020 , 80 , 103352. [ Google Scholar ] [ CrossRef ]
  • Ahamed, U.; Fernando, S. Identifying the Impacts of Active and Passive Attacks on Network Layer in a Mobile Ad-hoc Network: A Simulation Perspective. Int. J. Adv. Comput. Sci. Appl. 2020 , 11 , 600–605. [ Google Scholar ] [ CrossRef ]
  • Fiade, A.; Triadi, A.Y.; Sulhi, A.; Masruroh, S.U.; Handayani, V.; Suseno, H.B. Performance Analysis of Black Hole Attack and Flooding Attack AODV Routing Protocol on VANET (Vehicular Ad-Hoc Network). In Proceedings of the 8th International Conference on Cyber and IT Service Management, Pangkal Pinang, Indonesia, 23–24 October 2020; pp. 1–5. [ Google Scholar ] [ CrossRef ]
  • Kaur, T.; Kumar, R. Mitigation of Blackhole Attacks and Wormhole Attacks in Wireless Sensor Networks Using AODV Protocol. In Proceedings of the IEEE International Conference on Smart Energy Grid Engineering, Oshawa, ON, Canada, 12–15 August 2018; pp. 288–292. [ Google Scholar ] [ CrossRef ]
  • Poongodi, T.; Khan, M.S.; Patan, R.; Gandomi, A.H.; Balusamy, B. Robust Defense Scheme Against Selective Drop Attack in Wireless Ad Hoc Networks. IEEE Access 2019 , 7 , 18409–18419. [ Google Scholar ] [ CrossRef ]
  • Hameed, A.; Al-Omary, A. Survey of Blackhole attack on MANET. In Proceedings of the 2nd Smart Cities Symposium, Bahrain, Bahrain, 24–26 March 2019; pp. 1–4. [ Google Scholar ] [ CrossRef ]
  • Yadav, S.; Kumar, R.; Tiwari, N.; Bajpai, A. An Effective Approach to Detect and Prevent Collaborative Grayhole Attack by Malicious Node in MANET. In Intelligent Systems Design and Applications, Advances in Intelligent Systems and Computing ; Springer: Cham, Switzerland, 2021; Volume 1181. [ Google Scholar ] [ CrossRef ]
  • Dash, S.P. Study of Blackhole Attack and Wormhole Attack in Vanet Environment and Their Countermeasure. Master’s Thesis, Michigan Technological University, Houghton, MI, USA, 2019. [ Google Scholar ]
  • Sivanesh, S.; Dhulipala, V.S. Comparaitive Analysis of Blackhole and Rushing Attack in MANET. In Proceedings of the In-ternational Conference on Microwave Integrated Circuits, Photonics and Wireless Networks, Tiruchirappalli, India, 22–24 May 2019; pp. 495–499. [ Google Scholar ] [ CrossRef ]
  • Chavan, A.; Kurule, D.; Dere, P. Performance Analysis of AODV and DSDV Routing Protocol in MANET and Modifications in AODV against Black Hole Attack. Procedia Comput. Sci. 2016 , 79 , 835–844. [ Google Scholar ] [ CrossRef ]
  • Cali, F.; Conti, M.; Gregori, E. IEEE 802.11 protocol: Design and performance evaluation of an adaptive backoff mechanism. IEEE J. Sel. Areas Commun. 2000 , 18 , 1774–1786. [ Google Scholar ] [ CrossRef ]
  • Vo, T.T.; Luong, T.N. Vra-Aodv: Routing Protocol Detects Blackhole and Grayhole Attacks in Mobile Ad hoc Network. J. Comput. 2018 , 13 , 222–235. [ Google Scholar ] [ CrossRef ]
  • Mai, Y.; Bai, Y.; Wang, N. Performance Comparison and Evaluation of the Routing Protocols for MANETs Using NS3. J. Electr. Eng. 2017 , 5 , 187–195. [ Google Scholar ] [ CrossRef ]
  • Gurung, S.; Chauhan, S. A dynamic threshold based algorithm for improving security and performance of AODV under black-hole attack in MANET. Wirel. Netw. 2019 , 25 , 1685–1695. [ Google Scholar ] [ CrossRef ]
  • Ourouss, K.; Naja, N.; Jamali, A. Defending Against Smart Grayhole Attack Within MANETs: A Reputation-Based Ant Colony Optimization Approach for Secure Route Discovery in DSR Protocol. Wirel. Pers. Commun. 2021 , 116 , 207–222. [ Google Scholar ] [ CrossRef ]
  • Gurung, S.; Chauhan, S. A novel approach for mitigating gray hole attack in MANET. Wirel. Netw. 2018 , 24 , 565–579. [ Google Scholar ] [ CrossRef ]
  • Husieen, N.A.; Kadhum, A.N. The Effect of Pause Time on the Performance of Mobile Ad-hoc Network Routing Protocols. In Proceedings of the 4th International Conference on Intelligent Information Technology Application, Qinghuangdao, China, 5–7 November 2010. [ Google Scholar ]
  • El-Kabbany, A.F.; Ali, H.M.; Hussein, A.; Tawfeek, B. Comparative study of routing protocols for mobile ad hoc networks. Int. J. Intell. Comput. Inf. Sci. 2017 , 17 , 31–43. [ Google Scholar ] [ CrossRef ]
  • Hassnawi, L.A.; Ahmad, R.B.; Yahya, A.; Aljunid, S.A.; Elshaikh, M. Performance Analysis of Various Routing Protocols for Motorway Surveillance System Cameras’ Network. Int. J. Comput. Sci. Issues (IJCSI) 2012 , 9 , 7. [ Google Scholar ]
  • Priyambodo, T.K.; Wijayanto, D.; Gitakarma, M.S. Performance Optimization of MANET Networks through Routing Protocol Analysis. Computers 2021 , 10 , 2. [ Google Scholar ] [ CrossRef ]
  • Mohammad, S.N. Security Attacks in MANETS (Survey Prospective). Int. J. Eng. Adv. Technol. 2017 , 6 , 93–96. [ Google Scholar ]
  • Kumar, M.; Jain, V.; Jain, A.; Bisht, U.S.; Gupta, N. Evaluation of black hole attack with avoidance scheme using AODV protocol in VANET. J. Discret. Math. Sci. Cryptogr. 2019 , 22 , 277–291. [ Google Scholar ] [ CrossRef ]
  • Tripathi, K.N.; Jain, G.; Yadav, A.M.; Sharma, S.C. Entity-Centric Combined Trust (ECT) Algorithm to Detect Packet Dropping Attack in Vehicular Ad Hoc Networks (VANETs). In Next Generation Information Processing System. Advances in Intelligent Systems and Computing ; Springer: Singapore, 2021; Volume 1162. [ Google Scholar ] [ CrossRef ]
  • Alsmady, A.; Alazzam, H.; Al-Shorman, A. Blackhole attack prevention in MANET using enhanced AODV protocol. In Proceedings of the Second International Conference on Data Science, E-Learning and Information Systems. Association for Computing Machinery, Seoul, Republic of Korea, 19–21 July 2019; pp. 1–5. [ Google Scholar ] [ CrossRef ]
  • Kumar, A.; Sinha, M. Design and analysis of an improved AODV protocol for black hole and flooding attack in vehicular ad-hoc network (VANET). J. Discret. Math. Sci. Cryptogr. 2019 , 22 , 453–463. [ Google Scholar ] [ CrossRef ]
  • Imran, M.; Khan, F.A.; Abbas, H.; Iftikhar, M. Detection and Prevention of Black Hole Attacks in Mobile Ad hoc Networks. In Ad-Hoc Networks and Wireless, Lecture Notes in Computer Science ; Springer: Berlin/Heidelberg, Germany, 2015; Volume 8629. [ Google Scholar ] [ CrossRef ]
  • Singh, M.M.; Mandal, J.K. Gray Hole Attack Analysis in AODV Based Mobile Adhoc Network with Reliability Metric. In Proceedings of the IEEE 4th International Conference on Computer and Communication Systems, Singapore, 23–25 February 2019; pp. 565–569. [ Google Scholar ] [ CrossRef ]
  • Jha, H.N.; Gupta, S.; Maity, D. Effect of Wormhole Attacks on MANET. In Design Frameworks for Wireless Networks ; Lecture Notes in Networks and Systems; Springer: Singapore, 2020; Volume 82. [ Google Scholar ] [ CrossRef ]
  • Dubey, N.; Joshi, K.K. An Approach to Detect Wormhole Attack in AODV based MANET. Int. J. Comput. Appl. 2015 , 114 , 32–39. [ Google Scholar ] [ CrossRef ]
  • Sachan, K.; Lokhande, M. An approach to prevent Gray-hole attacks on Mobile Ad-Hoc Networks. In Proceedings of the International Conference on ICT in Business Industry & Government, Qingdao, China, 10–11 July 2017; pp. 1–6. [ Google Scholar ] [ CrossRef ]
  • Jhaveri, R.H.; Patel, S.J.; Jinwala, D.C. A Novel Solution for Grayhole Attack in AODV Based MANETs. In Advances in Communication, Network, and Computing ; Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering; Springer: Berlin, Heidelberg, 2012; Volume 108. [ Google Scholar ] [ CrossRef ]
  • El-Semary, A.M.; Diab, H. BP-AODV: Blackhole Protected AODV Routing Protocol for MANETs Based on Chaotic Map. IEEE Access 2019 , 7 , 95197–95211. [ Google Scholar ] [ CrossRef ]
  • Hassan, Z.; Mehmood, A.; Maple, C.; Khan, M.A.; Aldegheishem, A. Intelligent Detection of Black Hole Attacks for Secure Communication in Autonomous and Connected Vehicles. IEEE Access 2020 , 8 , 199618–199628. [ Google Scholar ] [ CrossRef ]
  • Ramya, P.; SairamVamsi, T. Impact Analysis of Blackhole, Flooding, and Grayhole Attacks and Security Enhancements in Mobile Ad Hoc Networks Using SHA3 Algorithm. In Microelectronics, Electromagnetics, and Telecommunications ; Lecture Notes in Electrical Engineering; Springer: Singapore, 2018; Volume 471. [ Google Scholar ] [ CrossRef ]
  • Ali, S.; Nand, P. Comparative performance analysis of AODV and DSR routing protocols under wormhole attack in mobile ad hoc network on different node’s speeds. In Proceedings of the International Conference on Computing, Communication, and Automation, Greater Noida, India, 29–30 April 2016; pp. 641–644. [ Google Scholar ] [ CrossRef ]
  • Hai, T.H.; Toi, N.D.; Huh, E.N. Performance Evaluation of AODV and AOMDV Routing Protocols Under Collaborative Blackhole and Wormhole Attacks. In Advances in Computer Science and Ubiquitous Computing ; Lecture Notes in Electrical Engineering; Springer: Singapore, 2021; Volume 715. [ Google Scholar ] [ CrossRef ]
  • Afdhal, A.; Muchallil, S.; Walidainy, H.; Yuhardian, Q. Black hole attacks analysis for AODV and AOMDV routing performance in VANETs. In Proceedings of the International Conference on Electrical Engineering and Informatics, Banda Aceh, Indonesia, 18–20 October 2017; pp. 29–34. [ Google Scholar ] [ CrossRef ]
  • Tripathi, S. Performance Analysis of AODV and DSR Routing Protocols of MANET under Wormhole Attack and a Suggested Trust Based Routing Algorithm for DSR. In Proceedings of the IEEE International WIE Conference on Electrical and Computer Engineering, Bangalore, India, 15–16 November 2019; pp. 1–5. [ Google Scholar ] [ CrossRef ]
  • Haglan, H.M.; Mostafa, S.A.; Safar, N.Z.M.; Mustapha, A.; Saringatb, M.Z.; AlHakami, H.; AlHakami, W. Analyzing the impact of the number of nodes on the performance of the routing protocols in manet environment. Bull. Electr. Eng. Inform. 2021 , 10 , 434–440. [ Google Scholar ] [ CrossRef ]
  • Ismail, Z.; Hassan, R. A performance study of various mobility speed on AODV routing protocol in homogeneous and heterogeneous MANET. In Proceedings of the 17th Asia Pacific Conference on Communications, Sabah, Malaysia, 2–5 October 2011; pp. 637–642. [ Google Scholar ] [ CrossRef ]
  • Singh, M.M.; Mandal, J.K. Logistic Regression Based Reliability Analysis for Mobile Ad Hoc Network with Fixed Maximum Speed and Varying Pause Times. J. Sci. Ind. Res. 2017 , 76 , 81–84. [ Google Scholar ]
  • Sisodia, D.S.; Singhal, R.; Khandal, V. A Performance Review of Intra and Inter-Group MANET Routing Protocols under Varying Speed of Nodes. Int. J. Electr. Comput. Eng. 2017 , 7 , 2721–2730. [ Google Scholar ] [ CrossRef ]
  • Mafirabadza, C.; Khatri, P. Energy analysis of AODV routing protocol in MANET. In Proceedings of the International Con-ference on Communication and Signal Processing, Tamilnadu, India, 6–8 April 2016; pp. 1125–1129. [ Google Scholar ] [ CrossRef ]
  • Purnomo, A.; Najib, W.; Hartono, R. Performance Comparison of Modified AODV-ETX with AODV and AODV-ETX Routing Protocol in an MANET. IOP Conf. Ser. Mater. Sci. Eng. 2019 , 578 , 012082. [ Google Scholar ] [ CrossRef ]
  • Osman, H.; Ebedon, M.M.; Saad, A. A Review on Parameters of Internet Gateway Discovery in MANETS. Int. J. Online Biomed. Eng. (iJOE) 2021 , 17 , 38–59. [ Google Scholar ] [ CrossRef ]

Click here to enlarge figure

NotationMeaning
MANETsMobile ad hoc networks
AODVAd hoc on-demand distance vector
DSRDynamic source routing
OLSROptimized link state routing protocol
RREQRoute request
RREPRoute reply
DPCDelete period constant
RERRRoute error
TCTopology control
MPRMultipoint relays
mphMile per hour
DBDecibel
DDoSDistributed denial of service
THPTAverage throughput
AETEDAverage end-to-end delay time
PDRPacket delivery ratio
PLRPacket loss ratio
RORRouting overhead ratio
NRLNormalized routing load
NLNetwork load
AODV ParameterDefault Value
NetworkDiameter35 hops
NodeTransversalTime40 ms
NetworkTransversalTime1400 ms
RouteRequestRetry2 retries
BlackListTimeout2800 ms
RouteRequestRateLimits10 packets/s
ActiveRouteTimeout3000 ms
HelloInterval1000 ms
AllowedHelloLoss2 times
Delete Period Constant5 s
DSR ParameterDefault Value
DiscoveryHopLimit1 hop
BroadcastJitter10 ms
RouteCacheTimeout300 ms
SendBufferTimeout30 s
MaxRequestPeriod10 s
RetransmitBufferSize50 packet
MaxMaintenanceRetransmit2 times
OLSR ParameterDefault Value
WillingnessWILL_DEFAULT (3)
TCInterval5 s
RefreshInterval2 s
NeighbHoldTime6 s
TopHoldTime15 s
HelloInterval2 s
Simulator NameLanguages SupportedPlatform SupportLicenseAdvantagesDisadvantages
OPNETC, C++Windows, Sun Solaris, RedHat LinuxCommercial, Free Educational License
OMNeT++C++, NEDWindows, MacOS, and any Unix-like systemsOpen source
NS-2C++, OTCLWindows, MacOS, Ubuntu, Sun Solaris, Fedora Linux, and any Unix-like systemsOpen source
NS-3C++, PythonMacOS, FreeBSD, LinuxOpen source
GloMoSimC, PERSECWindows XP/7, FreeBSD, Sun Solaris, Fedora LinuxFree
QualNet and EXATA/cyberJAVAWindows NT/2000/XP/Professional, macOS, Sun Solaris, and most Unix-like systemsCommercial
JIST/SWANSJAVA, TclWindows, macOS, Sun Solaris LinuxCommercial
J-SIMJAVAWindows, Sun Solaris LinuxOpen source
Reference NameRouting ProtocolNetwork DiameterNode
Transversal Time
RREQ RetriesMax RREQ TimeoutActive Route TimeoutDelete Period Timeout
Observation of AODV Routing Protocol’s Performance at Variation in ART Value for Various Node’s Mobility [ ]AODVxxx-xx
Impact of Active Route Time Out and Delete Period Constant on AODV Performance [ ]AODV, DSR----xx
Comparative Performance Analysis of AODV for CBR and VBR Traffic under Influence of ART and DPC [ ]AODV----xx
Performance Optimization of MANET Networks through Routing Protocol Analysis [ ]AODV, OLSR--xx--
Routing ParameterPapersPercentage of Usage
Network diameter1 of 502%
Node transversal time1 of 502%
RREQ retries2 of 504%
Max RREQ timeout1 of 502%
Active route timeout3 of 506%
Delete period3 of 506%
Other parameters0 of 500%
Reference NameSimulatorNetwork AreaSimulation TimeMobility Speed (m/s)Number of Network NodesNumber of Malicious NodesAttack TypePacket Rate (Packet/s)Mobility Model
Performance Analysis of MANET under Grayhole Attack Using AODV Protocol [ ]NS-21000 m × 850 m1200 s-101Grayhole-Random waypoint
A Comparative Study of Reactive, Proactive, and Hybrid Routing Protocol in Wireless Sensor Network Under Wormhole Attack [ ]QualNet 5.0400 m × 400 m17 min10501, 8Wormhole-Random waypoint
Securing Blackhole Attacks in MANETs using Modified Sequence Number in AODV Routing Protocol [ ]NS-2500 m × 500 m100 s-[10–50][1–10]Blackhole-Random waypoint
Simulation-Based Study of Blackhole Attack under AODV Protocol [ ]NS-2500 m × 500 m[20–100] s0, 50[20–100]0–1Blackhole[5–25]Random waypoint
Blackhole Attack Detection in Vehicular Ad Hoc Network Using Secure AODV Routing Algorithm [ ]NS-2650 m × 1000 m100 s-1001Blackhole--
Identifying the Impacts of Active and Passive Attacks on Network Layer in a Mobile Ad Hoc Network: A Simulation Perspective [ ]NS-2-5 s-10, 15, 20, 25, 301, 2Blackhole, Wormhole, Grayhole--
An Effective Approach to Detect and Prevent Collaborative Grayhole Attack by Malicious Node in MANET [ ]NS-3300 m × 1500 m200 s-500, 10Grayhole-Random waypoint
Comparative Analysis of Blackhole and Rushing Attack in MANET [ ]NS-21000 m × 1000 m200 s-505, 10, 15, 20Blackhole, Rushing--
VRA-AODV: Routing Protocol Detects Blackhole and Grayhole Attacks in Mobile Ad Hoc Network [ ]NS-23200 m × 1000 m200 s-1001Blackhole, Grayhole2 packets/sRandom waypoint
A Dynamic Threshold-based Algorithm for Improving Security and Performance of AODV Under Black-hole Attack in MANET [ ]NS-2750 m × 750 m500 s2010, 600, 1Blackhole, Grayhole-Random waypoint
Defending Against Smart Grayhole Attack Within MANETs: A Reputation Based Ant Colony Optimization Approach for Secure Route Discovery in DSR Protocol [ ]NS-2200 m × 200 m300 s--1Grayhole-Random waypoint
A Novel Approach for Mitigating Gray hole Attack in MANET [ ]NS-2750 m × 750 m500 s5, 15, 25, 35480, 1, 2Grayhole-Random waypoint
Evaluation of Blackhole Attack with Avoidance Scheme using AODV Protocol in VANET [ ]NS-2650 m × 650 m1000 s-200, 1Blackhole-Random waypoint, Highway, City
Entity-Centric Combined Trust (ECT) Algorithm to Detect Packet Dropping Attack in Vehicular Ad Hoc Networks (VANETs) [ ]NS-23000 m × 3000 m500 s30[100–600]10, 20, 30, 40, 50, 60Blackhole-Highway
Blackhole Attack Prevention in MANET Using Enhanced AODV Protocol [ ]GloMoSim 2.031600 m × 1600 m1 h1, 5, 10, 20, 50201Blackhole1, 2, 4, 6, 8 packet/sRandom waypoint
Design and Analysis of an Improved AODV Protocol for Black hole and Flooding Attack in Vehicular Ad Hoc Network (VANET) [ ]NS-2---3, 5, 101Blackhole, Flooding--
Detection and Prevention of Black Hole Attacks in Mobile Ad Hoc Networks [ ]NS-21000 m × 1000 m500 s[0–20]500, 1, 2Blackhole-Random waypoint
Gray Hole Attack Analysis in AODV Based Mobile Adhoc Network with Reliability Metric [ ]NS-27000 m × 500 m100 s5, 10, 15, 20, 2550, 100, 150, 5000, 5, 10Grayhole-Random waypoint
Effect of Wormhole Attacks on MANET [ ]NS-21000 m × 850 m1200 s 5, 300, 2Wormhole-Random waypoint
An Approach to Detect Wormhole Attack in AODV based MANET [ ]NS-2750 m × 750 m--10, 20, 500,1Wormhole-Random waypoint
An Approach to Prevent Gray-hole Attacks on Mobile Ad Hoc Networks [ ]NS-2750 m × 550 m500 s-20, 30, 40-Grayhole--
A Novel Solution for Grayhole Attack in AODV Based MANETs [ ]NS-2800 m × 800 m50 s205, 301, 7Grayhole--
BP-AODV: Blackhole Protected AODV Routing Protocol for MANETs Based on Chaotic Map [ ]NS-21000 m × 500 m200 s20, 25251Blackhole--
Intelligent Detection of Black Hole Attacks for Secure Communication in Autonomous and Connected Vehicles [ ]NS-21000 m × 1000 m500 s3050, 60, 70, 800, 4Blackhole--
Impact Analysis of Blackhole, Flooding, and Grayhole Attacks and Security Enhancements in Mobile Ad Hoc Networks Using SHA3 Algorithm [ ]NS-21200 m × 1200 m-3010, 1001, 5Blackhole, Grayhole, Flooding--
Comparative Performance Analysis of AODV and DSR Routing Protocols under Wormhole Attack in Mobile Ad Hoc Network on Different Node’s Speeds [ ]QualNet 5.01500 m × 1500 m300 s10, 15, 20, 25, 30202Wormhole-Random waypoint
Performance Evaluation of AODV and AOMDV Routing Protocols under Collaborative Blackhole and Wormhole Attacks [ ]NS-21200 m × 800 m--50, 80, 100, 1200, 1, 2Blackhole, Wormhole--
Black Hole Attacks Analysis for AODV and AOMDV Routing Performance in VANETs [ ]NS-21000 m × 1000 m100 s11, 16, 22101Blackhole--
Performance Analysis of AODV and DSR Routing Protocols of MANET under Wormhole Attack and a Suggested Trust-Based Routing Algorithm for DSR [ ]EXata/Cyber 1.22500 m × 2500 m300 s-20, 40, 60, 80, 100, 120, 140, 160, 180, 2002, 3, 4Wormhole-Random waypoint
ParameterRange of Used Values
Network area (m )[200 × 200, 2500 × 2500]
Simulation time (s)[5, 3600]
Mobility speed (m/s)[0, 50]
Number of network nodes[3, 600]
Number of malicious nodes[0, 60]
Packet rate (packet/s)[1, 25]
Reference NameThroughputAverage End-to-End DelayPacket Delivery RatioPacket Loss RatioRouting Overhead RatioNormalized Routing LoadNetwork Load
Performance Analysis of MANET under Grayhole Attack Using AODV Protocol [ ]x------
Performance Evaluation of AODV, OLSR, and GRP for Transmitting Video Conferencing over MANETs [ ]xxx---x
Performance Analysis of Routing Protocols AODV, OLSR, and DSDV on MANET using NS3 [ ]xxxx---
Performance Evaluation and Analysis of Proactive and Reactive MANET Protocols at Varied Speeds [ ]-xx----
A Comparative Study of Reactive, Proactive, and Hybrid Routing Protocol in Wireless Sensor Network Under Wormhole Attack [ ]xx-----
Performance Comparison and Evaluation of the Proactive and Reactive Routing Protocols for MANETs [ ]xxx----
Securing Blackhole Attacks in MANETs using Modified Sequence Number in AODV Routing Protocol [ ]x-x----
Simulation-Based Study of Blackhole Attack under AODV Protocol [ ]xxxxx--
Observation of AODV Routing Protocol’s Performance at Variation in ART Value for Various Node’s Mobility [ ]xx-----
Impact of Active Route Time Out and Delete Period Constant on AODV Performance [ ]xxx----
Survey on Performance Analysis of AODV, DSR, and DSDV in MANET [ ]xxxx---
Analysis of Routing Protocols for Ad Hoc Networks [ ]xxx-x--
Comparative Performance Analysis of AODV for CBR and VBR Traffic under Influence of ART and DPC [ ]xx-----
Performance Evaluation of OLSR and AODV Routing Protocols over Mobile Ad Hoc Networks [ ]xxxxx--
Investigating the Impact of Mobility Models on MANET Routing Protocols [ ]xx----x
Blackhole Attack Detection in Vehicular Ad Hoc Network Using Secure AODV Routing Algorithm [ ]x-x----
Identifying the Impacts of Active and Passive Attacks on Network Layer in a Mobile Ad Hoc Network: A Simulation Perspective [ ]xxxx---
Performance Analysis of Black Hole Attack and Flooding Attack AODV Routing Protocol on VANET (Vehicular Ad Hoc Network) [ ]xx-----
An Effective Approach to Detect and Prevent Collaborative Grayhole Attack by Malicious Node in MANET [ ]x-xxx--
Comparative Analysis of Blackhole and Rushing Attack in MANET [ ]xxxx---
VRA-AODV: Routing Protocol Detects Blackhole and Grayhole Attacks in Mobile Ad Hoc Network [ ]x-x-x--
A Dynamic Threshold-based Algorithm for Improving Security and Performance of AODV Under Black-hole Attack in MANET [ ]x-xxxx-
Defending Against Smart Grayhole Attack Within MANETs: A Reputation Based Ant Colony Optimization Approach for Secure Route Discovery in DSR Protocol [ ]xxxx---
A Novel Approach for Mitigating Grayhole Attack in MANET [ ]xxxxxx-
Comparative Study of Routing Protocols for Mobile Ad Hoc Networks [ ]xxxxxx-
Performance Optimization of MANET Networks through Routing Protocol Analysis [ ]xxxxx--
Evaluation of Black Hole Attack with Avoidance Scheme Using AODV Protocol in VANET [ ]xxxx---
Entity-Centric Combined Trust (ECT) Algorithm to Detect Packet Dropping Attack in Vehicular Ad Hoc Networks (VANETs) [ ]xxxxx--
Blackhole Attack Prevention in MANET Using Enhanced AODV Protocol [ ]-xx-x--
Design and Analysis of an Improved AODV Protocol for Black Hole and Flooding Attack in Vehicular Ad Hoc Network (VANET) [ ]-xxxx--
Detection and Prevention of Black Hole Attacks in Mobile Ad Hoc Networks [ ]x--xx--
Grayhole Attack Analysis in AODV Based Mobile Adhoc Network with Reliability Metric [ ]x------
Effect of Wormhole Attacks on MANET [ ]x------
An Approach to Detect Wormhole Attack in AODV based MANET [ ]--x----
An Approach to Prevent Gray-hole Attacks on Mobile Ad Hoc Networks [ ]xxx----
A Novel Solution for Grayhole Attack in AODV Based MANETs [ ]-xx--x-
BP-AODV: Blackhole Protected AODV Routing Protocol for MANETs Based on Chaotic Map [ ]xxx----
Intelligent Detection of Black Hole Attacks for Secure Communication in Autonomous and Connected Vehicles [ ]xxxxx--
Impact Analysis of Blackhole, Flooding, and Grayhole Attacks and Security Enhancements in Mobile Ad Hoc Networks Using SHA3 Algorithm [ ]xxx----
Comparative Performance Analysis of AODV and DSR Routing Protocols under Wormhole Attack in Mobile Ad Hoc Network on Different Node’s Speeds [ ]xx-----
Performance Evaluation of AODV and AOMDV Routing Protocols under Collaborative Blackhole and Wormhole Attacks [ ]xxx----
Black Hole Attacks Analysis for AODV and AOMDV Routing Performance in VANETs [ ]x--x---
Performance Analysis of AODV and DSR Routing Protocols of MANET Under Wormhole Attack and a Suggested Trust-Based Routing Algorithm for DSR [ ]xx-----
Analyzing the Impact of the Number of Nodes on the Performance of the Routing Protocols in a MANET Environment [ ]xxx----
A Performance Study of Various Mobility Speed on AODV Routing Protocol in Homogeneous and Heterogeneous MANET [ ]x-x----
Logistic Regression Based Reliability Analysis for Mobile Ad Hoc Network with Fixed Maximum Speed and Varying Pause Times [ ]x------
A Performance Review of Intra and Inter-Group MANET Routing Protocols under Varying Speed of Nodes [ ]xxx-x--
Energy Analysis of AODV Routing Protocol in MANET [ ]x-x----
Performance Comparison of Modified AODV-ETX with AODV and AODV-ETX Routing Protocol in a MANET [ ]xxx----
Our Survey PaperA Review on Parameters of Internet Gateway Discovery in MANETS [ ]
Number of papers used in the survey5072
Covered simulation toolsProvide simulation tool key features + Cover statistics of the following simulators: Cover statistics of the following simulators:
Covered simulation parametersCover statistics of the following simulation parameters: Cover statistics of the following simulation parameters:
Covered routing parametersCover the following routing protocols + All related routing parameters: -
Covered attack parametersCover attack types in MANETs + Cover the following attack parameters: -
Covered evaluation metricsCover statistics of the following evaluation metrics: Cover statistics of the following evaluation metrics:
The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

Eltahlawy, A.M.; Aslan, H.K.; Abdallah, E.G.; Elsayed, M.S.; Jurcut, A.D.; Azer, M.A. A Survey on Parameters Affecting MANET Performance. Electronics 2023 , 12 , 1956. https://doi.org/10.3390/electronics12091956

Eltahlawy AM, Aslan HK, Abdallah EG, Elsayed MS, Jurcut AD, Azer MA. A Survey on Parameters Affecting MANET Performance. Electronics . 2023; 12(9):1956. https://doi.org/10.3390/electronics12091956

Eltahlawy, Ahmed M., Heba K. Aslan, Eslam G. Abdallah, Mahmoud Said Elsayed, Anca D. Jurcut, and Marianne A. Azer. 2023. "A Survey on Parameters Affecting MANET Performance" Electronics 12, no. 9: 1956. https://doi.org/10.3390/electronics12091956

Article Metrics

Article access statistics, further information, mdpi initiatives, follow mdpi.

MDPI

Subscribe to receive issue release notifications and newsletters from MDPI journals

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here .

Loading metrics

Open Access

Peer-reviewed

Research Article

Introducing a new routing method in the MANET using the symbionts search algorithm

Roles Conceptualization, Data curation, Formal analysis, Funding acquisition, Investigation, Methodology, Project administration, Resources, Software, Supervision, Validation, Visualization, Writing – original draft, Writing – review & editing

* E-mail: [email protected]

Affiliation Department of Computer Engineering, Higher Education Complex of Saravan, Saravan, Iran

ORCID logo

  • Shayesteh Tabatabaei

PLOS

  • Published: August 25, 2023
  • https://doi.org/10.1371/journal.pone.0290091
  • Reader Comments

Fig 1

A wireless MANET network is a grouping of wireless nodes that communicate without the use of a centralized network infrastructure. The lack of reliable elements, such as routers, as well as severe resource constraints, have an important impact on the performance of these networks. To improve the efficiency of MANET, intelligent routing algorithms are required; in fact, the design of a smart and efficient routing algorithm can significantly affect the efficiency of these networks. In this regard, this paper proposes an intelligent routing method for MANET networks based on (SOS) symbiotic organism search. The proposed method is implemented in dynamic environments by considering four important criteria: available bandwidth, remaining battery energy, mobility speed, and hop count. The simulation results show that the learning process of the symbionts search algorithm has a significant impact on network performance and outperforms the FBRP algorithms in terms of throughput rate, data loss rate, packet delivery rate, and the number of hops.

Citation: Tabatabaei S (2023) Introducing a new routing method in the MANET using the symbionts search algorithm. PLoS ONE 18(8): e0290091. https://doi.org/10.1371/journal.pone.0290091

Editor: Chakchai So-In, Khon Kaen University, THAILAND

Received: June 3, 2022; Accepted: August 1, 2023; Published: August 25, 2023

Copyright: © 2023 Shayesteh Tabatabaei. This is an open access article distributed under the terms of the Creative Commons Attribution License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.

Data Availability: All relevant data are within the manuscript and its Supporting information files.

Funding: The authors received no specific funding for this work.

Competing interests: The authors have declared that no competing interests exist.

1. Introduction

Because of the growing popularity of mobile devices and wireless networks in recent years, the MANET network has become one of the most animated and dynamic fields of communication. MANET is essentially an organization-less network of transportable devices with wireless communication capabilities that can dynamically connect at any time and location. These networks are made up of portable devices such as laptops, smartphones, sensors, and so on that communicate with one another via wireless links [ 1 ]. These devices work together to provide essential network functions without an immovable organization in a distributed manner.

MANET networks allow devices to move freely and autonomously in any direction. The nodes can detach and reconnect to the network at will. As a result, variations in the node’s link state with other nodes are experienced regularly. The movement in the MANET network changes link states and other wireless transmission characteristics such as attenuation, multipath propagation, interference, and so on. This issue poses challenges for routing protocols operating in MANET.

Furthermore, the power of MANET nodes for communication is provided by a limited-capacity battery. This battery may run out of power and turn off during data routing. This issue invalidates the route between source and destination, so optimal energy consumption in this type of network is essential [ 2 ].

As a result, in order to prevent reducing the quality of services in such a network (whose topology is constantly changing and whose nodes have energy constraints), it is necessary to design intelligent routing protocols that minimize energy consumption and provide stable routes between sources and destinations.

Achieving an optimal routing algorithm in MANETs is an NP-hard problem that can be solved by soft computing and optimization techniques [ 3 ]. Based on this, in recent years, many smart algorithms have been presented for routing mobile ad hoc networks, with different aims, among which FBRP (to reduce energy consumption) can be mentioned.

In MANETs, other routing criteria, such as available bandwidth and mobility speed should also be checked to improve the quality of the link and the performance of the routing protocols. Each criterion can be viewed as a collection of measurements that helps the routing algorithms to estimate the new weight for each step/link in the intended routes. Although so far, various routing criteria have been proposed to evaluate link quality, only a few of them have been implemented and tested in a real network simultaneously [ 4 ]. Not paying attention to any of these criteria can reduce the efficiency of the network; thus, considering a limited number of them in routing can be a significant weakness for such protocols.

As said above, changes in the network topology are one of the prominent features of the MANETs, so always establishing a stable path between source and destination in this type of network is a major challenge; therefore, routing protocols should be created to discover routes with high reliability until the end of the data transmission phase.

In this study, a new method for MANET routing using the symbiotic organisms search algorithm is proposed.

The symbiotic organisms search algorithm has three separate and strong processes: mutualism, communication, and parasitic life. The proposed method improves the solutions in the population with the help of these three processes. One of the advantages of this algorithm is not having any parameters to adjust the two operations between exploration and productivity. Therefore, the processing cost is expected to be reduced due to the simplicity of implementing the algorithm. This issue decreases the energy consumption in MANET.

One of the important features of the SOSBRA algorithm is that it encourages nodes to thoroughly investigate their surroundings before converging on the best global route. As a result, it prevents falling into the local optimum. Therefore, paths with high stability are discovered.

To evaluate the proposed method, in addition to this method, the FBRP algorithm (as a well-known intelligent protocol) is also simulated in OPNET software.

An important point that needs to be mentioned is that: the proposed method is implemented in dynamic environments by considering four important criteria of available bandwidth, remaining battery energy, mobility speed, and the number of hops. This issue is considered an important strength of this algorithm, and it will guarantee the achievement of reliable routes in different time and place conditions. However, other research works have yet to consider these four parameters simultaneously.

This paper’s main contribution is the use of the Modified routing algorithm to enhance the performance of mobile ad hoc networks as follows:

The hello message is used to identify the new neighbor nodes, and the neighbor table is updated as new responses are received from the neighbor node.

The proposed method is implemented in dynamic environments.

We consider available bandwidth, remaining battery energy, mobility speed, and hop count to choose the best path.

We employ a sophisticated routing technique based on (SOS) symbiotic organism search, which has been shown to perform well and achieve high convergence accuracy when optimizing multidimensional functions with higher dimensions.

The proposed routing algorithms implement over mobile ad hoc nodes using a network simulator (OPNET).

This article is divided into the following sections: The second section describes related work on routing protocols in MANETs, the third section states the proposed method, and the fourth section provides simulation and simulation results in the OPNET simulator. The conclusion is stated in the fifth section.

2. Related works

Omar et al. [ 5 ] presented a protocol based on source routing, in which the source node inserts routing information into data packets and allows the intermediate nodes to find the route to the destination. In the proposed method, instead of complete information about the address of the intermediate nodes, the data packets carry only a small numerical value that is a summary of the route to the destination and helps the data packets find their way to the destination.

The proposed method is divided into route discovery and data packet routing phases. If a source node’s cache does not contain any routes to its destination, the route discovery phase is started by using route request packets (RREQ) before sending data. After discovering the route, the data is sent from the source to the destination. In this article, only the mobility criterion was used for routing, and the critical criterion of battery energy level was not considered.

Khalid et al. [ 6 ] introduced a response rate-aware routing protocol for MANET. In the proposed method, nodes check the ongoing transmissions to estimate the transmission rate. In addition, instead of updating the entities in the routing table, a uniform rate of Hello messages is sent to the sending node. If the sending node receives that message, it will know that it has the correct information about the status of the sending rate. This node then stores this information and sends it to all of the nodes from which the data is received. Compared to other algorithms, this algorithm finds reliable routes while reducing the overhead caused by sending Hello messages periodically.

In the article [ 6 ], only two criteria, Medium Time Metric, and the hop count were used. This paper did not take into account the amount of energy consumption, the mobility of nodes, and the available bandwidth for routing, which are among the basic and determining parameters in MANET routing protocols.

Sumathi and Priyadharshini [ 7 ] introduced a new routing algorithm that uses multiple channels to improve the efficiency of MANETs. The proposed interlayer method employs a channel allocation strategy and collision control techniques. Channels are divided into two categories: data channels and control channels.

The data channel is used for data transmission, while the control channel is used for scheduling. The authors of this article assume that each node has a wireless network card and can send or receive data on any channel at any time. In the article, only the packet capacity criterion was checked, and the other important criteria were not mentioned.

Wang and Garcia [ 8 ] presented a new interlayer routing protocol that uses the multi-factor Q-learning algorithm to control transmission rate and node energy. This method assigns a reward to the next steps by continuously observing the reward of all status-actions, then uses the links with the highest reward for each route leading to the destination. The proposed algorithm reduces the amount of energy consumed by mobile nodes.

In this article, the criteria of node mobility speed and available bandwidth of the node were not checked.

Tabatabaei and Behravesh [ 9 ] used the reinforcement learning method to find a highly reliable route in MANETs. To calculate the reward, this method uses fuzzy logic with three inputs: the available bandwidth, the number of steps, and the remaining energy of the battery. In this article, mobile MANET routing was done once with fuzzy logic, once with reinforcement learning, and finally with a combination of these two algorithms. Simulations showed that the combined method produced a better result regarding energy consumption, efficiency rate, and latency. In this article, the mobility criterion (which changes the topology with the nodes’ mobility) was not considered.

Chettibi and Chikhi [ 10 ] proposed an Ad hoc On-Demand Distance Vector (AODV) routing protocol based on the fuzzy method to reduce energy consumption in MANETs. This algorithm makes the decision about sending the route request using a Mamdani fuzzy logic system with the inputs, the remaining battery energy, and the amount of energy loss of mobile nodes.

In this article, only the energy level of the battery was considered, and other important criteria, such as mobility and available bandwidth, were not considered.

Chatterjee and Das [ 11 ] used the ant colony optimization algorithm to improve the dynamic source routing protocol (DSR). Routing in the proposed method is done using a technique similar to the biological behavior of ants to find food, where ants first scatter in all directions. This method discovers multiple routes and has a high packet delivery rate, low end-to-end delay, and low energy consumption.

In this article, only three criteria, length, congestion, and reliability of the path, were used for choosing the paths; and the important criteria, such as the level of battery energy and mobility, were not considered.

In [ 12 ], the best routes were chosen using an interlayer routing method and a fuzzy method considering decision criteria such as node mobility and energy parameters. This algorithm allows mobile nodes to find better routes with more bandwidth and higher quality of service. This method also extends the network lifetime and improves multimedia flow quality.

Unfortunately, this article did not consider important criteria such as available bandwidth, distance to the destination, or the number of hops.

In [ 13 ], a Fuzzy logic-based on-demand routing protocol (in brief FBRP) for MANETs was proposed that selects routes based on battery energy level and mobile node speed. The simulation results showed that the proposed method has good performance and high error tolerance, especially during node failure.

It should be noted that in this article, only two criteria of battery energy level and mobility were considered for routing.

In 2019, to evaluate the fit of each node in WSNs, a clustering method-based optimized invasive weed algorithm using fuzzy modeling was proposed [ 14 ]. This method can choose the best node to be the cluster head and extend the network’s lifespan. The simulation results showed that it could reduce the number of dead nodes in each run while lowering sensor energy consumption.

Although the proposed method can quickly find the global optimal using the optimized aggressive weed algorithm, it suffers from a high processing cost (due to using fuzzy logic).

Gorgich and Tabatabaei [ 15 ] presented a new method for improving energy consumption in wireless sensor networks using a fish swarm optimization algorithm. To evaluate the proposed protocol, the protocol was compared with the ERA (Energy Aware Routing Algorithm) protocol. The disadvantage of this method is that fish optimization is used in static environments, and the convergence speed may be reduced in dynamic environments such as sensor networks.

In [ 16 ], a fuzzy inference system used the shuffled frog leaping algorithm to automatically configure and optimize the base rule table. This method has two steps: cluster head selection (CH) and parent selection. The CHs are chosen from the candidate nodes based on the fuzzy output, energy threshold, and the overlap rate of adjacent CHs. The parent selection phase starts with determining the network’s CHs level. The parents of each CH are determined at the end of this step. Finally, the information gathered by the CHs is forwarded to the BS by their parents. Although this method saves energy, it has a high processing cost.

In [ 17 ], an improved protocol based on AODV was proposed that works based on clustering in VANET. This protocol uses fuzzy logic to select reliable routes between cluster members. Fuzzy logic input parameters are the link expiration time and link reliability. Also, in this article, Tabu search was used for routing between the cluster heads and the sinks based on criteria distance, direction, and velocity. The simulation results indicated the suitable performance of the proposed protocol in terms of the average packet delivery rate, the average end-to-end delays, and the number of packet losses. In this method, the energy level of the battery was not considered.

In [ 18 ], an inter-vehicle routing protocol using fuzzy logic was proposed to select the most reliable link and to avoid packet replays in the geographic range. This method uses effective distance, direction, and velocity parameters to find the next-hop node. The simulation results show that the proposed protocol increases packet delivery rate and decreases packet loss rate and end-to-end delay.

In this article, only two parameters, the link expiration time and the probability adapt density, were considered. The proposed method had a high processing cost.

In [ 19 ], the division of the dedicated short-range communication channel with three types of priority was used to transfer the data message quickly. Furthermore, the multi-hop directional routing method was used to increase reliability. Moreover, the storage and distribution method was used during communication gaps to increase efficiency. The processing cost was high in the proposed method since several methods were combined.

In [ 19 ], a fuzzy logic-based routing method with authentication capability in VANET was presented. This method includes the clustering, routing, and authentication phases. In the clustering phase, vehicles are clustered. Data routing is done in the routing phase. In the authentication phase for secure data, the packets use an authentication mechanism based on message authentication code and symmetric key cryptography. The simulations showed that the proposed method improves end-to-end delay, packet collision, packet delivery rate, packet loss rate, and throughput. However, it increases the routing overhead slightly.

According to what has been said above, the common routing protocols in MANETs consider only one or two of four important parameters: available bandwidth, remaining battery energy, mobility speed, and the number of hops to discover the best routes.

But not paying attention to any of these parameters in different times or place situations can prevent finding the local optimum and discovering reliable routes.

As a result, Implementing a comprehensive protocol that considers all the above four parameters in its evaluation simultaneously is essential.

3. Proposed method

3-1 introduction.

A MANET is a network of battery-powered mobile nodes with limited bandwidth. One of the most fundamental challenges in this type of network is routing. An intelligent routing protocol based on symbiont search algorithms is presented in this study. Cheng and Prayogo [ 20 ] are the pioneers of the symbiont search algorithm.

This algorithm is a population search method that simulates how living things interact with each other to survive in nature. The symbiont search algorithm begins with a population known as an ecosystem. This algorithm searches the answer space of the problem for the best answers using the ecosystem and its mechanism. The ecosystem comprises a number of organisms or living things, each representing a candidate to answer the problem. In fact, every organism is a point with the number of components corresponding to the number of problem decision variables. As a result, the value of the objective function for each organism can be calculated. The value of the obtained objective function indicates the organism’s compatibility with nature. The task of generating a new population in the symbiotic organism search algorithm is the responsibility of three actors, each representing a type of symbiosis including mutualism, commensalism, and parasitism.

The most important symbiotic relationships between creatures in nature are:

  • Mutualism symbiosis (a relationship between two different species that benefits both),
  • Commensalism symbiosis (a relationship between two different species that benefits one but has no effect on the other), and
  • Parasitic symbiosis (a symbiosis between two different species that is beneficial for one and harmful for the other.).

Thus, this search method, which is inspired by the pattern of symbiosis between living things in nature, employs three stages: mutualism symbiosis, commensalism symbiosis, and parasitic symbiosis. Each phase of this algorithm is described below:

  • Phase one: mutualism symbiosis (win, win)

At this phase, one answer X j (i ≠ j) is chosen randomly from the population for each answer X i in the population. Then, to improve the fit, both X i and X j answers enter into a mutualism symbiosis relationship. X i and X j are produced according to Eqs ( 1 ) to ( 3 ).

ieee research paper on manet

In the above relationships, rand (0,1) is a random number in the range [0,1], and X best represents the population’s best response. BF 1 and BF 2 are two coefficients that can be either 0 or 1. In fact, these coefficients demonstrate that the degree of the benefit provided by two beings to each other in a symbiotic relationship is not always equal; and it can even be many times more for one of the two creatures than the other. This algorithm considers this amount to be a maximum of two times. If the fit of the answers X inew and X jnew be better than the fit of the answers X i and X j , these two new answers replace the previous values; otherwise, the previous answers will be preserved.

  • Phase two: commensalism or self-help symbiosis (win—indifferent)

At this stage, one answer X j (i ≠ j) is randomly selected from the population for each answer X i in the population. Then, X i and X j form a self-help symbiotic relationship to improve the fit of answers. The new candidate’s answer X inew is generated by Eq (4) .

ieee research paper on manet

The reason for selecting the interval [-1,1] to generate a random number in this equation is to increase the scanning power of the search for symbionts. After using this step, If the fit of the answer X inew is better than the fit of the answer X i , X inew replaces X i ; Otherwise, X i will be preserved.

  • Phase three: parasitism symbiosis (win-lose)

At this phase, one answer X j (i ≠ j), is chosen randomly for each answer X i in the population. The answer X k is then generated by applying a random change to X i ; if the fit of X k is better than X j , it replaces X j , and otherwise, X k will be disappeared.

The most significant advantage of symbiont organisms is that they lack a specific parameter that can reduce the number of calculations (except the population parameter, which is also present in other metaheuristic methods, no other parameter is seen in this algorithm).

The following section describes how to use this algorithm to route a MANET.

3-2 Determining the best route by the symbionts search algorithm

In this stage, the source node creates a special packet called the route request packet to know the next hop to the destination. The source node then sends the request packet to neighbors as a multicast to find the location of the destination. Before sending the packet, the number of hops is reduced to zero. When a route request packet arrives at an intermediate node, the attribute pairs of the source address and the request ID are first checked in a local table that stores records of such packets to see if it has already been received and processed. If it is a duplicate, the packet will be deleted, and its processing will be terminated. If it is not a duplicate, these attribute pairs are entered in the record table to prevent a similar package from being processed in the future, and the processing process continues. The receiver then searches its routing table to find the destination address. If a new route to this destination is discovered, a route reply packet is returned to the source so that the source knows how to reach the destination. If the receiver does not have a new route to the destination, it increments the value of the hop counter by one unit and republishes the route reply package around it.

This process is repeated until the route request message arrives at the destination. The destination node generates a route reply packet in response to the incoming request. The above node copies the source and destination address fields (extracted directly from the route request packet) to the route reply packet. This packet is sent only to the node through which the route request packet was received. A unit is added to the value of the hop counter field in each node so that each node that sees it knows how far it is from the destination node.

Each intermediate node for each destination in the routing table checks the existence of the candidate node for the next hop. If there are at least two candidate answers for a destination, that destination is considered an element of the candidate answer in the last node. On the other hand, only nodes can implement the ultra-innovative symbionts search algorithm if the candidate answer contains at least one element. As a result, the candidate answer of a node may have three elements, while the candidate answer of the neighboring node may have only one element. Assume k is the set of candidate answers and, is the answer i th of the candidate.

Also, suppose that the vectors X j , Y j and Z j are respectively the locations of the solution of element K i , on the X, Y and Z axes, so that X ij , Y ij and Z ij are the locations of the selected next hop to the destination for the j th of the destination node.

Now, each node that has the candidate answers chooses m random answers, where m is the size of the ecosystem’s population.

In short, and to summarize the stated content, it can be said that:

In the route discovery phase, the route request packet that is generated and sent by the source will be received by intermediate nodes. For each intermediate node, there is a table called the routing table, which contains information on the available routes from that intermediate node to the specified destination. For the specified destination in the route request packet, the intermediate node checks the existence of the candidate node for the next hop from its routing table. Nodes having the candidate answer add a unit to the variable routing_num_iteration and set the variable I to 1. Then, these nodes send the route request message containing the IP of the candidate node to its neighbors (as the next step for the destinations in the routing table) in a multicast manner.

Then the intermediate node sends a useful message containing four parameters of available bandwidth, mobility speed, number of hops, and the energy level of the neighboring node to the next hop node to the destination so that the next hop node calculates the fitness of the best node.

ieee research paper on manet

The usefulness of each intermediate node’s candidate answer is then calculated using Eq (9) , and the best candidate answer is identified and placed in k best . Then, for each candidate answer k i , the vectors X i ، Y i and Z i are calculated, and finally, the following steps are performed:

Two-way utility stage.

In this step, for each intermediate node (current candidate node) k i , a candidate node named k j (i ≠ j) (new candidate node) is randomly selected.

Then, to improve the fit of both answers (current and new), the vectors X i ، Y i and Z i form a symbiotic relationship. The new candidate answers for X i ، Y i and Z are generated as a result of the mutual symbiosis between the two responses using Eqs ( 10 ) to ( 18 ).

ieee research paper on manet

The nearest neighboring node to X inew , Y inew and Z inew is considered the candidate answer for K i . Also, the nearest neighboring node to X jnew , Y jnew and Z jnew is considered the candidate answer for K j . The usefulness of K inew and K jnew is then calculated using an Eq (9) .

If the usefulness of candidate answers K inew and K jnew is greater than that of K i and K j candidate answers, respectively, K inew and K jnew will replace K i and K j .

One-way utility stage.

At this step, one response K j (i ≠ j) is randomly chosen from the population for each response k i . The vectors X i ، Y i and Z i are then Calculated; these vectors enter a commensalism symbiotic relationship. Eqs ( 4 ), ( 19 ) and ( 20 ) are used to generate new candidate answers for X i ، Y i and Z i .

ieee research paper on manet

The nearest neighbor node to X inew , Y inew and Z inew is considered as the candidate answer K inew . Eq (9) is used to calculate the usefulness of the candidate answer K inew . If the usefulness of K inew is greater than that of K i , K inew will replace K i .

Parasitism stage.

In this step, for the IP of each candidate node k i in the route request packet, k j (i ≠ j) is randomly selected from among the new candidate nodes. The corresponding vectors X i ، Y i and Z i are then obtained.

The worst candidate answer K Worst is Identified from the set of candidate answers. Using the location of nodes K j , K Worst and K best on the X, Y and Z axes, the approximation position of the parasitic vector K parasitic is calculated (using Eqs ( 21 )–( 23 ).

The nearest neighbor node to X parasite , Y parasite , and Z parasite is considered the candidate answer K parasitic .

If the usefulness of K parasite is greater than the usefulness of K j , K parasite replaces K j .

ieee research paper on manet

The above steps are repeated until the termination condition is reached (the current answer becomes better than the previous answer) so that the best route to the destination can be found.

The general procedure of the proposed algorithm is shown in Fig 1 .

thumbnail

  • PPT PowerPoint slide
  • PNG larger image
  • TIFF original image

https://doi.org/10.1371/journal.pone.0290091.g001

By using such method, it is expected that the SOSBRA algorithm shows that a suitable efficiency (as depicted in Figs 4–7) due to advantages such as the following:

First, by moving towards the best global path, the SOSBRA algorithm prevents premature convergence. Second, it encourages nodes to thoroughly investigate their surroundings before converging on the best global route. Furthermore, as stated, the proposed method is implemented by considering four important criteria: available bandwidth, remaining battery energy, mobility speed, and the number of hops simultaneously.

4. Simulation of the proposed method

4-1 simulation environment.

In this paper, the proposed method is simulated and compared with the FBRP protocol using OPNET modeler simulation software. Table 1 shows the parameters of the implemented model for each layer, and Table 2 shows the simulation parameters. Fig 2 depicts the proposed network connection method, which considers 50 nodes. In the first scenario, mobile nodes are randomly distributed in the environment and are routed using the fuzzy method (FBRP) described in the article [ 13 ]. In the second scenario, nodes are randomly distributed and routed using the Symbiotic Organism Search Based Routing Algorithm (SOSBRA).

thumbnail

https://doi.org/10.1371/journal.pone.0290091.g002

thumbnail

https://doi.org/10.1371/journal.pone.0290091.t001

thumbnail

https://doi.org/10.1371/journal.pone.0290091.t002

The model node editor is shown in Fig 3 .

thumbnail

https://doi.org/10.1371/journal.pone.0290091.g003

Each node in a network is free to move independently in any direction, changing its connections to other devices frequently as a result. Each node also acts as a router by forwarding traffic unrelated to its own use.

4-2 Simulation results

The following criteria are used to evaluate the effectiveness of the proposed method.

  • DR (delivery ratio): The ratio of the total number of messages delivered (m del ) to the total number of messages generated (m cre ) defines this parameter.
  • Packet loss rate: The ratio of data packets lost at the destination to the packets generated at the source defines this parameter as a result of route failure or buffer overload.
  • Throughput ratio: It is the number of bits transmitted in a unit of time between the source and destination.
  • Route length: The number of steps / links that exist between the two points.

Fig 4 depicts the throughput rate. The horizontal axis represents simulation time, and the vertical axis represents the number of packets delivered at the time or throughput rate.

thumbnail

https://doi.org/10.1371/journal.pone.0290091.g004

According to Fig 4 , the ratio of the number of packets successfully delivered to the destination node to the total packets transmitted by the network nodes is lower in the FBRP protocol than the proposed SOSBRA method.

The most important feature of the SOSBRA algorithm is that it encourages nodes to thoroughly investigate their surroundings before converging on the best global route. As a result, it prevents falling into the local optimum. Therefore, paths with high stability are discovered. Furthermore, in the FBRP protocol, only two criteria are taken into account: mobility speed and node energy, while other important criteria, such as available bandwidth or distance to the destination, are not. On the other hand, the proposed method considers all four above parameters simultaneously; thus, the throughput rate is higher in this scenario.

The data packet loss rate is depicted in Fig 5 . The horizontal axis represents simulation time, while the vertical axis represents the data packet loss rate. Fig 5 shows that the FBRP protocol has a higher data packet loss rate than the SOSBRA method.

thumbnail

https://doi.org/10.1371/journal.pone.0290091.g005

Since the lack of access to a route to the destination can be one of the reasons for the loss of data packets in the network, the SOSBRA method attempts to select routes that are stable, at least until the end of the data transfer phase. This issue reduces the number of lost data packets and the average delay.

It should be noted that the data loss rates in the FBRP protocol may also increase due to a lack of available bandwidth.

Fig 6 compares the data packet delivery rate of the proposed SOSBRA method with the FBRP protocol. The SOSBRA method will have a data packet delivery rate higher than the FBRP protocol because it finds a new route before failing caused by mobility or a lack of necessary bandwidth.

thumbnail

https://doi.org/10.1371/journal.pone.0290091.g006

It should be noted that if the proposed method is not very successful in finding the route before failure, Since it prefers longer routes but more stable to the shortest unstable routes, It could take longer than FBRP.

According to Fig 6 , the proposed method’s data packet delivery rate increases faster than the FBRP protocol as simulation time increases. Because the proposed method is capable of determining the most appropriate and stable links for data transmission, in other words, routes are created that will most likely lead the package to its destination.

Fig 7 depicts the number of hops required to reach the destination using the proposed SOSBRA method and the FBRP protocol. The horizontal axis represents simulation time, while the vertical axis represents the number of hops. Fig 7 shows that the proposed protocol chooses a shorter route than the FBRP protocol. This problem originates from the fact that in the proposed protocol, the parameter of hops number is considered one of the four important criteria in routing. At the same time, route stability and distance issues are also taken into account. Furthermore, in the FBRP protocol, the route may be invalidated due to a lack of bandwidth.

thumbnail

https://doi.org/10.1371/journal.pone.0290091.g007

5. Conclusion

In this article, considering that meta-heuristic algorithms inspired by nature are widely used to find the right answer in optimization problems, a new method using the search algorithm symbiotic organisms called SOSBRA has been proposed. The symbionts search algorithm is one of the most recent meta-heuristic algorithms that has demonstrated good performance and high convergence in optimizing multidimensional functions with higher dimensions. The proposed method can increase the data delivery rate by selecting routes with high stability between source and destination. In the OPNET simulator, SOSBRA and the FBRP protocols are simulated. Comparing the results shows that SOSBRA performs better for network features such as power consumption, throughput rate, number of hops, and latency. By moving toward the best global direction, the SOSBRA algorithm prevents premature convergence. Furthermore, it encourages nodes to thoroughly investigate their surroundings before converging on the best global route.

According to the high speed of MANETs or other factors such as; the rapid disconnection of routing links, the sudden shutdown of nodes due to battery depletion, and the high probability of error in this type of network, the SOSBRA proposed algorithm considers four criteria, battery level energy, mobility speed, number of hops and bandwidth for routing at the same time that can be very efficient and productive in routing.

Supporting information

S1 dataset..

https://doi.org/10.1371/journal.pone.0290091.s001

  • View Article
  • Google Scholar
  • 6. Khalid, A., Ahn, H., & Kim, C. (2016, January). Reliable and Efficient Multi-rate Aware Reactive (REMAR) routing for IEEE 802.11 based MANET. In Information Networking (ICOIN) , 2016 International Conference on (pp. 81–85). IEEE.
  • 8. Y. Wang and J. Garcia-Luna-Aceves, “A distributed cross-layer routing protocol with channel assignment in multi-channel MANET”, in Computing, Networking and Communications (ICNC), 2015 International Conference on, pp. 1050–1054, 2015.

Advertisement

Advertisement

Routing Algorithms for MANET-IoT Networks: A Comprehensive Survey

  • Published: 12 May 2022
  • Volume 125 , pages 3501–3525, ( 2022 )

Cite this article

ieee research paper on manet

  • Vu Khanh Quy   ORCID: orcid.org/0000-0002-0242-5606 1 ,
  • Vi Hoai Nam 1 ,
  • Dao Manh Linh 1 &
  • Le Anh Ngoc 2  

1012 Accesses

21 Citations

Explore all metrics

With the powerful evolution of wireless communication systems in recent years, mobile ad hoc networks (MANET) are more and more applied in many fields such as environment, energy efficiency, intelligent transport systems, smart agriculture, and IoT ecosystems, as well as expected to contribute role more and more important in the future Internet. However, due to the characteristic of the mobile ad hoc environment, the performance is dependent mainly on the deployed routing protocol and relative low. Therefore, routing protocols should be more flexible and intelligent to enhance network performance. This paper surveyed and analysed a series of recently proposed routing protocols for MANET-IoT networks. Results have shown that these protocols are classified into four main categories: performance improvement, quality of service (QoS-aware), energy-saving, and security-aware. Most protocols are evolved from these existing traditional protocols. Then, we compare the performance of the four traditional routing protocols under the different movement speeds of the network node aim determines the most stable routing protocol in smart cities environments. The experimental results showed that the proactive protocol work is good when the movement network nodes are low. However, the reactive protocols have more stable and high performance for high movement network scenarios. Thus, we confirm that the proposal of the routing protocols for MANET becomes more suitable based on improving the ad hoc on-demand distance vector routing protocol. This study is the premise for our further in-depth research on IoT ecosystems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save.

  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime

Price includes VAT (Russian Federation)

Instant access to the full article PDF.

Rent this article via DeepDyve

Institutional subscriptions

ieee research paper on manet

Similar content being viewed by others

ieee research paper on manet

A Saving Energy MANET Routing Protocol in 5G

ieee research paper on manet

An Adaptive Routing Protocol for the IoT Environment

ieee research paper on manet

Taxonomy of Routing Protocols in MANETs

Explore related subjects.

  • Artificial Intelligence

Abuashour, A., et al. (2017). Performance improvement of cluster-based routing protocol in VANET. IEEE Access, 5 , 15354–15371. https://doi.org/10.1109/ACCESS.2017.2733380

Article   Google Scholar  

Accessed on: Feb. 12, 2022, [Online] Available: https://www.ietf.org/rfc/rfc3561

Accessed on: Feb. 12, 2022, [Online] Available: https://www.ietf.org/rfc/rfc4728

Accessed on: Feb. 12, 2022, [Online] Available: https://www.ietf.org/rfc/rfc3626

Ahmad, M., Hameed, A., Ikram, A. A., & Wahid, I. (2019). State-of-the-art clustering schemes in mobile ad hoc networks: objectives, challenges, and future directions. IEEE Access, 7 , 17067–17081. https://doi.org/10.1109/ACCESS.2018.2885120

Akande, D. O., & Mohd Salleh, M. F. (2019). A network lifetime extension-aware cooperative MAC protocol for MANETs with optimized power control. IEEE Access, 7 , 18546–18557. https://doi.org/10.1109/ACCESS.2019.2895342

AlShahwan, F., Alshamrani, M., & Amer, A. A. (2018). Dynamic novel cross-layer performance enhancement approach for SIP over OLSR. IEEE Access, 6 , 71947–71964. https://doi.org/10.1109/ACCESS.2018.2880917

Chen, Y., Hu, C., Wu, E. H., Chuang, S., & Chen, G. (2018). A delay-sensitive multicast protocol for network capacity enhancement in multirate MANETs. IEEE Systems Journal, 12 (1), 926–937. https://doi.org/10.1109/JSYST.2017.2677952

Chen, Y., Wu, E. H., Lin, C., & Chen, G. (2018). Bandwidth-satisfied and coding-aware multicast protocol in MANETs. IEEE Transactions on Mobile Computing, 17 (8), 1778–1790. https://doi.org/10.1109/TMC.2017.2778262

Chen, Z., Zhou, W., Wu, S., & Cheng, L. (2020). An adaptive on-demand multipath routing protocol with QoS support for high-speed MANET. IEEE Access, 8 , 44760–44773. https://doi.org/10.1109/ACCESS.2020.2978582

Din, S., Qureshi, K. N., Afsar, M. S., Rodrigues, J. J. P. C., Ahmad, A., & Choi, G. S. (2020). Beaconless traffic-aware geographical routing protocol for intelligent transportation system. IEEE Access, 8 , 187671–187686. https://doi.org/10.1109/ACCESS.2020.3030982

Fan, B., He, Z., Tian, H., Kong, D., & Chen, Y. (2020). Energy-efficient resource allocation for dynamic priority-based vehicular mobile-health communications. IEEE Systems Journal, 14 (2), 2097–2108. https://doi.org/10.1109/JSYST.2019.2919569

Fatemidokht, H., Rafsanjani, M. K., Gupta, B. B., & Hsu, C.-H. (2021). Efficient and secure routing protocol based on artificial intelligence algorithms with UAV-assisted for vehicular ad hoc networks in intelligent transportation systems. IEEE Transactions on Intelligent Transportation Systems . https://doi.org/10.1109/TITS.2020.3041746

Hatzivasilis, G., Papaefstathiou, I., & Manifavas, C. (2017). SCOTRES: secure routing for IoT and CPS. IEEE Internet of Things Journal, 4 (6), 2129–2141. https://doi.org/10.1109/JIOT.2017.2752801

Hurley-Smith, D., Wetherall, J., & Adekunle, A. (2017). SUPERMAN: security using pre-existing routing for mobile ad hoc networks. IEEE Transactions on Mobile Computing, 16 (10), 2927–2940. https://doi.org/10.1109/TMC.2017.2649527

Jabbar, W. A., Saad, W. K., & Ismail, M. (2018). MEQSA-OLSRv2: a multicriteria-based hybrid multipath protocol for energy-efficient and QoS-aware data routing in MANET-WSN convergence scenarios of IoT. IEEE Access, 6 , 76546–76572. https://doi.org/10.1109/ACCESS.2018.2882853

Kang, J. J., Yang, W., Dermody, G., Ghasemian, M., Adibi, S., & Haskell-Dowland, P. (2020). No soldiers left behind: an IoT-based low-power military mobile health system design. IEEE Access, 8 , 201498–201515. https://doi.org/10.1109/ACCESS.2020.3035812

Kao, Y.-W., Samani, H., Tasi, S.-C., Jalaian, B., Suri, N., & Lee, M. (2019). Intelligent search, rescue, and disaster recovery via internet of things. Global IoT Summit (GIoTS), 2019 , 1–7. https://doi.org/10.1109/GIOTS.2019.8766391

Khattak, H. A., Farman, H., Jan, B., & Din, I. U. (2019). Toward integrating vehicular clouds with IoT for smart city services. IEEE Network, 33 (2), 65–71. https://doi.org/10.1109/MNET.2019.1800236

Khudayer, B. H., Anbar, M., Hanshi, S. M., & Wan, T. (2020). Efficient route discovery and link failure detection mechanisms for source routing protocol in mobile ad-hoc networks. IEEE Access, 8 , 24019–24032. https://doi.org/10.1109/ACCESS.2020.2970279

Kim, N., Na, W., & Cho, S. (2020). Dual-channel-based mobile ad hoc network routing technique for indoor disaster environment. IEEE Access, 8 , 126713–126724. https://doi.org/10.1109/ACCESS.2020.3008682

Lin, D., Kang, J., Squicciarini, A., Wu, Y., Gurung, S., & Tonguz, O. (2017). MoZo: a moving zone based routing protocol using pure V2V communication in VANETs. IEEE Transactions on Mobile Computing, 16 (5), 1357–1370. https://doi.org/10.1109/TMC.2016.2592915

Liu, W., & Yu, M. (2014). AASR: authenticated anonymous secure routing for MANETs in adversarial environments. IEEE Transactions on Vehicular Technology, 63 (9), 4585–4593. https://doi.org/10.1109/TVT.2014.2313180

Luo, Q., & Wang, J. (2017). Multiple QoS parameters-based routing for civil aeronautical ad hoc networks. IEEE Internet of Things Journal, 4 (3), 804–814. https://doi.org/10.1109/JIOT.2017.2669993

Maddikunta, P. K. R., et al. (2021). Unmanned aerial vehicles in smart agriculture: applications, requirements, and challenges. IEEE Sensors Journal . https://doi.org/10.1109/JSEN.2021.3049471

Mezher, M., & Igartua, M. A. (2017). Multimedia multimetric map-aware routing protocol to send video-reporting messages over VANETs in smart cities. IEEE Transactions on Vehicular Technology, 66 (12), 10611–10625. https://doi.org/10.1109/TVT.2017.2715719

Oubbati, O. S., Atiquzzaman, M., Lorenz, P., Tareque, M. H., & Hossain, M. S. (2019). Routing in flying ad hoc networks: survey, constraints, and future challenge perspectives. IEEE Access, 7 , 81057–81105. https://doi.org/10.1109/ACCESS.2019.2923840

Perkins, C. E., & Bhagwat, P. (1994). Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. SIGCOMM Comput. Commun. Rev., 24 (4), 234–244. https://doi.org/10.1145/190809.190336

Quy, V. K., Ban, N. T., & Han, N. D. (2018). A high performance and longer lasting network lifetime routing protocol for MANETs. International Conference on Advanced Technologies for Communications (ATC), 2018 , 237–241. https://doi.org/10.1109/ATC.2018.8587432

Quy, V. K., Chuan, P. M., Nam, V. H., Linh, D. M., Ban, N. T., & Han, N. D. (2021). A high-performance routing protocol based on mobile agent for mobile ad hoc networks. International Journal of Interactive Mobile Technologies, 15 (3), 30–42. https://doi.org/10.3991/ijim.v15i03.13007

Quy, V. K., Hau, N. V., Anh, D. V., et al. (2021). Smart healthcare IoT applications based on fog computing: architecture, applications and challenges. Complex & Intelligent Systems . https://doi.org/10.1007/s40747-021-00582-9

Quy, V. K., Nam, V. H., Linh, D. M., et al. (2022). Communication solutions for vehicle ad-hoc network in smart cities environment: a comprehensive survey. Wireless Personal Communications, 122 (3), 2791–2815. https://doi.org/10.1007/s11277-021-09030-w

Quy, V. K., Nam, V. H., Linh, D. M., Ngoc, L. A., & Gwanggil, J. (2022). Wireless communication technologies for IoT in 5G: vision, applications, and challenges. Wireless Communications and Mobile Computing . https://doi.org/10.1155/2022/3229294

Rayhana, R., & Xiao and Z. Liu, G. (2020). Internet of things empowered smart greenhouse farming. IEEE Journal of Radio Frequency Identification, 4 (3), 195–211. https://doi.org/10.1109/JRFID.2020.2984391

Rehman, S. U., Khan, M. A., Imran, M., Zia, T. A., & Iftikhar, M. (2017). Enhancing quality-of-service conditions using a cross-layer paradigm for ad-hoc vehicular communication. IEEE Access, 5 , 12404–12416. https://doi.org/10.1109/ACCESS.2017.2717501

Serhani, A., Naja, N., & Jamali, A. (2020). AQ-routing: mobility-, stability-aware adaptive routing protocol for data routing in MANET–IoT systems. Cluster Computing, 23 (1), 13–27. https://doi.org/10.1007/s10586-019-02937-x

Sivaram, M., Porkodi, V., Mohammed, A. S., Manikandan, V., & Yuvaraj, N. (2019). Retransmission DBTMA protocol with fast retransmission strategy to improve the performance of MANETs. IEEE Access, 7 , 85098–85109. https://doi.org/10.1109/ACCESS.2019.2918723

Srilakshmi, U., Veeraiah, N., Alotaibi, Y., Alghamdi, S. A., Khalaf, O. I., & Subbayamma, B. V. (2021). An improved hybrid secure multipath routing protocol for MANET. IEEE Access, 9 , 163043–163053. https://doi.org/10.1109/ACCESS.2021.3133882

Tahboush, M., & Agoyi, M. (2021). A hybrid wormhole attack detection in mobile ad-hoc network (MANET). IEEE Access, 9 , 11872–11883. https://doi.org/10.1109/ACCESS.2021.3051491

Tariq, A., Rehman, R., & Kim, B. (2020). Forwarding strategies in NDN-based wireless networks: a survey. IEEE Communications Surveys & Tutorials, 22 (1), 68–95. https://doi.org/10.1109/COMST.2019.2935795

Trotta, M., & L., Felice, M. D. and Bononi, L. (2020). A GPS-free flocking model for aerial mesh deployments in disaster-recovery scenarios. IEEE Access, 8 , 91558–91573. https://doi.org/10.1109/ACCESS.2020.2994466

Tu, J., Tian, D., & Wang, Y. (2021). An active-routing authentication scheme in MANET. IEEE Access, 9 , 34276–34286. https://doi.org/10.1109/ACCESS.2021.3054891

Veeraiah, N., et al. (2021). Trust aware secure energy efficient hybrid protocol for MANET. IEEE Access, 9 , 120996–121005. https://doi.org/10.1109/ACCESS.2021.3108807

Article   MathSciNet   Google Scholar  

Wazid, M., Das, A. K., Shetty, S., & Jo, M. (2020). A tutorial and future research for building a blockchain-based secure communication scheme for internet of intelligent things. IEEE Access, 8 , 88700–88716. https://doi.org/10.1109/ACCESS.2020.2992467

Xie, J., & Murase, T. (2020). Multiple user cooperative mobility in mobile ad hoc networks: an interaction position game. IEEE Access, 8 , 126297–126314. https://doi.org/10.1109/ACCESS.2020.3007931

Xu, J., et al. (2020). Design of smart unstaffed retail shop based on IoT and artificial intelligence. IEEE Access, 8 , 147728–147737. https://doi.org/10.1109/ACCESS.2020.3014047

Xu, C., Xiong, Z., Kong, X., Zhao, G., & Yu, S. (2020). A packet reception probability-based reliable routing protocol for 3D VANET. IEEE Wireless Communications Letters, 9 (4), 495–498. https://doi.org/10.1109/LWC.2019.2960236

Zhang, D., et al. (2020). A multipath routing protocol based on link lifetime and energy consumption prediction for mobile edge computing. IEEE Access, 8 , 69058–69071. https://doi.org/10.1109/ACCESS.2020.2986078

Zhang, D.-G., et al. (2020). A multi-path routing protocol based on link lifetime and energy consumption prediction for mobile edge computing. IEEE Access, 8 , 69058–69071. https://doi.org/10.1109/ACCESS.2020.2986078

Download references

Acknowledgements

This research is funded by Hung Yen University of Technology and Education under grand number UTEHY.L.2022.06.

Author information

Authors and affiliations.

Faculty of Information Technology, Hung Yen University of Technology and Education, Hungyen, Vietnam

Vu Khanh Quy, Vi Hoai Nam & Dao Manh Linh

Swinburne Vietnam, FPT University, Hanoi, Vietnam

Le Anh Ngoc

You can also search for this author in PubMed   Google Scholar

Contributions

Dr. V.K.Q has performed the study conception and deployment. Data collection and analysis were performed by V.K.Q, V.H.N, L.A.N and D.M.L. The first manuscript was written by V.K.Q. L.A.N and V.K.Q proofreading the final manuscript. All authors commented on previous versions of the manuscript. All authors read and approved the final manuscript. The author corresponding is V.K.Q.

Corresponding author

Correspondence to Vu Khanh Quy .

Ethics declarations

Conflict of interest.

The authors declare no conflict of interest.

Additional information

Publisher's note.

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

See Table 6 .

Rights and permissions

Reprints and permissions

About this article

Quy, V.K., Nam, V.H., Linh, D.M. et al. Routing Algorithms for MANET-IoT Networks: A Comprehensive Survey. Wireless Pers Commun 125 , 3501–3525 (2022). https://doi.org/10.1007/s11277-022-09722-x

Download citation

Accepted : 14 April 2022

Published : 12 May 2022

Issue Date : August 2022

DOI : https://doi.org/10.1007/s11277-022-09722-x

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • IoT ecosystems
  • Smart cities
  • Internet of Things
  • Routing protocol
  • Find a journal
  • Publish with us
  • Track your research

Routing Algorithms for MANET-IoT Networks: A Comprehensive Survey

New citation alert added.

This alert has been successfully added and will be sent to:

You will be notified whenever a record that you have chosen has been cited.

To manage your alert preferences, click on the button below.

New Citation Alert!

Please log in to your account

Information & Contributors

Bibliometrics & citations, view options.

  • Sugumaran V Rajaram A (2023) Lightweight blockchain-assisted intrusion detection system in energy efficient MANETs Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology 10.3233/JIFS-231340 45 :3 (4261-4276) Online publication date: 1-Jan-2023 https://dl.acm.org/doi/10.3233/JIFS-231340
  • Quy V Chehri A Quy N Nguyen V Ban N (2023) An Efficient Routing Algorithm for Self-Organizing Networks in 5G-Based Intelligent Transportation Systems IEEE Transactions on Consumer Electronics 10.1109/TCE.2023.3329390 70 :1 (1757-1765) Online publication date: 1-Nov-2023 https://dl.acm.org/doi/10.1109/TCE.2023.3329390

Index Terms

Network protocols

Network layer protocols

Routing protocols

Network types

Mobile networks

Wireless access networks

Recommendations

Highly reputed authenticated routing in manet (hraran).

An ad hoc network is a multi-hop wireless communication network supporting mobile users without any existing infrastructure. Security is an essential requirement in mobile ad hoc network to provide protected communication between mobile nodes by ...

Optimized ant based routing protocol for MANET

The basic routing problem in MANET deals with methods to transport a packet across a network from source node to destination node. In this paper, we introduce a new ant based routing protocol to optimize the route discovery and maximize the efficiency ...

MANET Routing Protocols Comparison for Composite Traffic Network

The choice of routing protocols is an important issue in the establishment and design of Ad hoc networks. However, existing routing protocols are based on single traffic source or simple traffic models used in conventional networks like HTTP and video ...

Information

Published in.

Kluwer Academic Publishers

United States

Publication History

Author tags.

  • IoT ecosystems
  • Smart cities
  • Internet of Things
  • Routing protocol
  • Review-article

Contributors

Other metrics, bibliometrics, article metrics.

  • 1 Total Citations View Citations
  • 0 Total Downloads
  • Downloads (Last 12 months) 0
  • Downloads (Last 6 weeks) 0

View options

Login options.

Check if you have access through your login credentials or your institution to get full access on this article.

Full Access

Share this publication link.

Copying failed.

Share on social media

Affiliations, export citations.

  • Please download or close your previous search result export first before starting a new bulk export. Preview is not available. By clicking download, a status dialog will open to start the export process. The process may take a few minutes but once it finishes a file will be downloadable from your browser. You may continue to browse the DL while the export process is in progress. Download
  • Download citation
  • Copy citation

We are preparing your search results for download ...

We will inform you here when the file is ready.

Your file of search results citations is now ready.

Your search export query has expired. Please try again.

Academia.edu no longer supports Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to  upgrade your browser .

Enter the email address you signed up with and we'll email you a reset link.

  • We're Hiring!
  • Help Center

paper cover thumbnail

IJERT-A Study on Manet: Applications, Challenges and Issues

Profile image of IJERT Journal

2020, International Journal of Engineering Research and Technology (IJERT)

https://www.ijert.org/a-study-on-manet-applications-challenges-and-issues https://www.ijert.org/research/a-study-on-manet-applications-challenges-and-issues-IJERTCONV8IS03003.pdf Wireless ad hoc networks have become an important area of research in wireless communications systems. Mobile Ad hoc Network is an ad hoc network that can be formed to allow nodes to communicate without any infrastructure. The set up of MANET makes it very popular as compared to the traditional wireless network. In traditional wireless network, mid-point is required for overall process of the network, whereas MANET is self-organized and infrastructure-free network, which is considered as a good approach for some specific applications such as battlefield survivability, communication in the natural or manmade disaster areas, emergency or rescue operations. This research work attempts to provide a wide overview of this active field and it first explains detailed survey of MANET in different fields and then takes over several challenges and issues in the Ad hoc networking area. Finally specify the active application areas of MANET and describes the future work.

Related Papers

Ijca Proceedings on Recent Advances in Wireless Communication and Artificial Intelligence

Piyush Sharma

ieee research paper on manet

sufiyan gani

Due to growth in number of wireless devices, MANET have become focus of research. This paper discusses characteristics, routing algorithms, security issues, applications and design challenges in Mobile Ad-hoc Networks. We expect that this paper will give an introduction of Mobile Ad-hoc networks to students who want to research in this field.

Gajendra Kumar Ahirwar , Mahendra Kumar Ahirwar

— A mobile ad hoc network is the self-configure and self-organized infrastructure less network that is used for wireless. Mobile ad hoc network (MANET) are not used any centralized device to manage the nodes [1]. The range or the paths between the nodes are limited. When a node are move far from the range that node are out of network. This paper presents the study of the Manet Types, Features and its Challenges.

International Journal of Engineering and Computer Science

Khalid Bilal

Mobile Ad Hoc Network (MANET) is the one of the type of ad hoc network, the MANET is a collection of two or more devices or nodes or terminals with wireless communications and networking capability that communicate with each other without the aid of any centralized administrator also the wireless nodes that can dynamically form a network to exchange information without using any existing fixed network infrastructure. And it's an autonomous system in which mobile hosts connected by wireless links are free to be dynamically and sometime act as routers at the same time, In MANET, the mobile nodes require to forward packets for each other to enable communication among nodes outside of transmission range. The nodes in the network are free to move independently in any direction, leave and join the network arbitrarily. Thus a node experiences changes in its link states regularly with other devices. Eventually, the mobility in the ad hoc network, change of link states and other proper...

International Journal of Emerging Trends in Engineering and Development

SUNITI PURBEY

Gnana Jayanthi

Mobile Adhoc NETwork (MANET) is a current and a hot topic in the Internet world. Because the Internet usage has increased and moved from the wired communication to wireless communication. In a MANET, the architecture and routing process follow arbitrary manner. MANET has unique characteristics based on its usage in several application areas such as military, commercial sectors, disaster areas, etc. This paper deals detailed concepts of MANET applications, architecture in OSI layers and various routing protocols.

International Journal of Scientific Research in Science, Engineering and Technology IJSRSET

As the popularity of mobile device and wireless networks significantly increase over the past few years, wireless ad-hoc networks has now become one of the most vibrant and active field of communications of networks. Due to serve challenges the special features of MANET bring the technology great opportunities together. Our project describes fundamental problems of ad-hoc network by giving its related research background including the concept, features, status and vulnerabilities of MANET.

International Journal of Scientific Research in Science and Technology

International Journal of Scientific Research in Science and Technology IJSRST

MANET is a collection of various mobile nodes that are helpful to communicate with each other without any centralized control which are wireless and work as dynamic network. The current generation is much advanced in using such type of networks, which is very flexible and portable to the end users, which is most economical. The applications of this MANETs are used world wide due to its advantages, but still there are some issues which need to be resolved, known as challenges. This paper is on the various challenges and characteristics of MANET.

Ad-hoc networks are the collection of autonomous nodes where all the nodes are configured dynamically without any centralized management system. Mobile Ad-hoc Networks (MANETs) are self-configuring network of mobile routers connected via a wireless link. A MANET is a most promising and rapidly growing technology and it have become a very popular research topic in recent years. This paper gives an overview of MANETs with respect to services, parameters, applications, attacks and challenges.

Indonesian Journal of Electrical Engineering and Computer Science

Mashkuri Yaacob

Mobile ad hoc networks or MANETs, also referred to as mobile mesh networks at times, are self-configuring networks of mobile devices that are joined using wireless channels. These represent convoluted distributed systems comprising of wireless mobile nodes which are free to move and self-organise dynamically into temporary and arbitrary, ad hoc topologies. This makes it possible for devices as well as people to internetwork seamlessly in such regions that have no communication infrastructure in place. Conventionally, the single communication networking application following the ad hoc concept had been tactical networks. Lately, new technologies have been introduced such as IEEE 802.11, Hyperlan and Bluetooth that are assisting in the deployment of commercial MANETs external to the military realm. Such topical evolutions infuse a new and rising interest in MANET research and development. This paper provides an overview of the dynamic domain of MANETs. It begins with the discussion on...

Loading Preview

Sorry, preview is currently unavailable. You can download the paper by clicking the button above.

RELATED PAPERS

International Journal of Computer Applications

Priya Shrivastava

Prof. Rahul Rishi CSE, UIET

Meenakshi Yadav

IRJET Journal

Asia-pacific Journal of Convergent Research Interchange

Christian C. Ojiegbe

International Journal of Network Management

Dinesh Senior

umer bashir

The Third International Conference on e-Technologies and Networks for Development (ICeND2014)

Soha S. Zaghloul

North Asian International Research Journal Consortium

Communications in Computer and Information Science

Aleem BRAVO

IOSR Journal of Computer Engineering

Mohamed E1-Otmani

International Journal of Advanced Research in Computer Science and Software Engineering

Bodhy Krishna

soni changlani

International Journal of Advanced Research in Computer Science

sarita soni

Ad Hoc Networks

Simon Matabva

International Journal of Engineering Research and Technology (IJERT)

IJERT Journal

Journals Pub

Anandhi Giri

Karthik Subburathinam

International Engineering and …

Lokanatha Reddy

IJESRT Journal

Eighth Sense Research Group

IJCST Eighth Sense Research Group

International Journal of Computer Trends and Technology

RELATED TOPICS

  •   We're Hiring!
  •   Help Center
  • Find new research papers in:
  • Health Sciences
  • Earth Sciences
  • Cognitive Science
  • Mathematics
  • Computer Science
  • Academia ©2024

free research papers-manet mobile ad hoc network

Sinkhole attack in manets, odmrp protocols in manets, request paperoptimal monotone forwarding policies in delay tolerant mobile ad-hoc networks, free ieee paper and projects, ieee projects 2022, seminar reports, free ieee projects ieee papers.

IEEE Account

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

IMAGES

  1. Project management in research projects

    ieee research paper on manet

  2. Multi-Stage Optimized Machine Learning Framework for Network Intrusion

    ieee research paper on manet

  3. (PDF) A Research on Machine Learning Methods and Its Applications

    ieee research paper on manet

  4. Application of multiuser detection on CDMA-based MANET

    ieee research paper on manet

  5. (PDF) Performance evaluation of MANET routing protocols based on QoS

    ieee research paper on manet

  6. Discernibility Analysis and Accuracy Improvement of Machine Learning

    ieee research paper on manet

COMMENTS

  1. Routing Protocols in MANET: An Overview

    Published in: 2019 2nd International Conference on Intelligent Computing, Instrumentation and Control Technologies (ICICICT) Date of Conference: 05-06 July 2019. Date Added to IEEE Xplore: 13 February 2020. ISBN Information: DOI: 10.1109/ICICICT46008.2019.8993294.

  2. MANET Routing Protocols with Emphasis on Zone Routing ...

    Mobile Ad Hoc Networks (MANETs) play a key role in communication. Routing protocols for MANETs have been highly studied and researched upon. This paper reviews the current best-known techniques for routing in such networks, which comprise reactive, proactive and hybrid routing techniques. We especially emphasize the hybrid routing protocol, namely the Zone Routing Protocol (ZRP) and entail its ...

  3. A Study on MANET: Along with Recent Trends, Applications ...

    This paper provides view on the features, applications of ad hoc networks, characteristics and various attacks and challenges faced by programmers and Users . We analyze MANET security objectives and will outline the features, structure, types and challenges of research and the latest trend analysis presented on Mobile Ad Hoc Network to explore ...

  4. From MANET to people-centric networking: milestones and open research

    among users devices: Bluetooth (IEEE 802.15.1), for personal area networks, and the 802.11 ... research on MANET protocol can now be considered a cold research topic. Indeed it is interesting to ... only one paper with the keyword "MANET", in the title, has been published in Computer Communications. Furthermore, only a few papers, focusing ...

  5. A Survey on Parameters Affecting MANET Performance

    A mobile ad hoc network (MANET) is an infrastructure-less network where mobile nodes can share information through wireless links without dedicated hardware that handles the network routing. MANETs' nodes create on-the-fly connections with each other to share information, and they frequently join and leave MANET during run time. Therefore, flexibility in MANETs is needed to be able to handle ...

  6. An Overview of MANETs: Applications, Characteristics, Challenges, and

    Mobile ad -hoc Networks (MANETs) is a g roup of self-organized. and self-configured wireless m obile nodes (MNs) such as m obile. devices, laptops ,and PDAs , able to communicate with each other ...

  7. (PDF) A Survey on MANETs: Architecture, Evolution, Applications

    IEEE International Conference on Pervasive Services. IEEE. 2007 Jul 15: 118-127. [20] Olanrewaju RF, Khan BU, Mir RN, Shah A. Behaviour visualization for malicious-attacker node coll usion in

  8. Techniques for Real-World Implementation of a MANET

    To fulfill the demands of present scenario cellular or Ad-Hoc communication is desired. Mobile ad-hoc networks (MANETs) are composed of wireless motile nodes, which actively interchange data among themselves in the absence of a permanent set-up. A Test-bed is a structure which supports testing, contrasting % computing designs and protocols in the physical-world. Some essential requirements of ...

  9. Introducing a new routing method in the MANET using the symbionts

    A wireless MANET network is a grouping of wireless nodes that communicate without the use of a centralized network infrastructure. The lack of reliable elements, such as routers, as well as severe resource constraints, have an important impact on the performance of these networks. To improve the efficiency of MANET, intelligent routing algorithms are required; in fact, the design of a smart ...

  10. Routing Algorithms for MANET-IoT Networks: A Comprehensive Survey

    This study is the premise for our further in-depth research on IoT ecosystems. ... conclusions lead us to the novel vision about a routing framework for MANET-IoT scenarios. The rest of the paper is presented as follows. ... O. I., & Subbayamma, B. V. (2021). An improved hybrid secure multipath routing protocol for MANET. IEEE Access, 9, 163043 ...

  11. Routing Algorithms for MANET-IoT Networks: A Comprehensive Survey

    However, the reactive protocols have more stable and high performance for high movement network scenarios. Thus, we confirm that the proposal of the routing protocols for MANET becomes more suitable based on improving the ad hoc on-demand distance vector routing protocol. This study is the premise for our further in-depth research on IoT ...

  12. (PDF) A Study of Routing Protocols for MANETs

    Abstract and Figures. A Mobile Ad hoc Network (MANET) is an autonomous set of mobile nodes, which can continue communication while moving from one place to another, without any fixed and permanent ...

  13. Enhancement of the performance of MANET using machine ...

    This research on packet flow control in a WSN makes advantage of SDN architecture. Longevity and efficiency can both be improved by spreading the net load evenly among all of its nodes. To maximize the WSN node's ability to collect more data in a shorter amount of time, this balance can considerably extend the node's life span.

  14. MANETs Interoperability: Current Trends and Open Research

    Wireless networks have gained wide attention in recent years including studies on Mobile Ad-hoc Networks (MANET). Among the rich literature produced by the researchers, the problematic of MANET interoperability is becoming of high interest. Interoperability in a MANET refers to the communication between two separate domains or networks. This is an important research area aiming at enhancing ...

  15. IJERT-A Study on Manet: Applications, Challenges and Issues

    Lately, new technologies have been introduced such as IEEE 802.11, Hyperlan and Bluetooth that are assisting in the deployment of commercial MANETs external to the military realm. Such topical evolutions infuse a new and rising interest in MANET research and development. This paper provides an overview of the dynamic domain of MANETs.

  16. Ieee Research Paper On Manet

    Ieee Research Paper on Manet - Free download as PDF File (.pdf), Text File (.txt) or read online for free. ieee research paper on manet

  17. (PDF) Current Research Work on Routing Protocols for MANET: A

    This paper. is a survey of active research work on routing protocols for. MANET. Keywords- MANET, Proactive and Reactive routing protocols, Unicasting, Multicasting. I. NTRODUCTION. Active ...

  18. Reliable MANET Routing for Multimedia Communication

    Published in: 2022 International Conference on Advances in Computing, Communication and Applied Informatics (ACCAI) Article #: Date of Conference: 28-29 January 2022. Date Added to IEEE Xplore: 15 April 2022. ISBN Information: Electronic ISBN: 978-1-6654-9529-5. Print on Demand (PoD) ISBN: 978-1-6654-9530-1. INSPEC Accession Number:

  19. free research papers-manet mobile ad hoc network TECHNOLOGY, IEEE PAPER

    A mobile ad hoc network (MANET), is a self-configuring infrastructure less network of mobile devices connected by wireless links. ad hoc is Latin and means for this purpose . Each device in a MANET is free to move independently in any direction, and will therefore change its links to other devices frequently. Each must forward traffic unrelated ...

  20. Security Attacks in MANET: A Complete Analysis

    In this paper, various attacks in MANET are briefly explained. The study of these attacks is helpful to prevent networks from security challenges. Published in: 2022 6th International Conference on Devices, Circuits and Systems (ICDCS) Date of Conference: 21-22 April 2022. Date Added to IEEE Xplore: 30 May 2022.

  21. Performance Analysis of Reactive Routing Protocols in MANET under CBR

    This paper gives a depth analysis of various Reactive Routing Protocols under CBR traffic in the Mobile Ad-Hoc Network. The protocols are DSR, AODV and DSDV. The performance is evaluated based on throughput, packet delivery ratio, normalized routing overhead and average end-to-end delay. This comparison is done by implementing these routing protocols in NS2. This simulation is carried out in ...

  22. [Call for paper]IEEE 2024 6th International Conference ...

    All papers, both invited and contributed, the accepted papers, will be published in IEEE(ISBN: 979-8-3503-9031-5) and submitted for inclusion into IEEE Xplore subject to meeting IEEE Xplore's ...

  23. Self-regulated decision for stable MANET node movement

    This paper proposes an algorithm that enables mobile nodes implement self-regulated movements in mobile ad-hoc networks (MANETs). It is important for mobile nodes to maintain a certain level of network-based stability by harmonizing these nodes' movements autonomously due to their limited transmission range and dynamic topology. Entropy methods based on relative position are suggested as a ...

  24. Research on Analysis Model of MANET Survivability

    The paper mainly presents the analytical discussion of MANET and network survivability research that have been done so far. As MANET were open and complex, system hierarchical model was provided, which converted the traditional survivability analysis into hierarchical relation between the key services and the atomic components. This analysis can be applied in quantitative analysis of MANET ...