Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Vadivel, R.
- Improved Wolf Prey Inspired Protocol for Routing in Cognitive Radio Ad Hoc Networks
Abstract Views :267 |
PDF Views:0
Authors
J. Ramkumar
1,
R. Vadivel
2
Affiliations
1 Department of Computer Science, VLB Janakiammal College of Arts and Science, Coimbatore, Tamil Nadu, IN
2 Department of Information Technology, Bharathiar University, Coimbatore, Tamil Nadu, IN
1 Department of Computer Science, VLB Janakiammal College of Arts and Science, Coimbatore, Tamil Nadu, IN
2 Department of Information Technology, Bharathiar University, Coimbatore, Tamil Nadu, IN
Source
International Journal of Computer Networks and Applications, Vol 7, No 5 (2020), Pagination: 126-136Abstract
Fifth Generation (5G) technology has started providing the brand new facilities to the mobile communication world. With its enhanced performance and scalability, it has attracted many domains. Routing overhead in 5G networks is increased rapidly because of the complexity present in the route discovery process, where optimization in routing. Poor routing becomes a sophisticated and dynamic challenge in the 5G network. Hence, there exists a need for finding the best route in an optimized manner. This paper proposes an Improved Wolf Prey Inspired Protocol (IWPIP) for finding the ideal route in the dynamic environment like 5G based cognitive radio ad-hoc network. IWPIP focuses on finding the ideal route based on the reliability of route, shorter distance, and shorter hops that minimize the consumption of energy to increase the network lifetime. Before sending the data packets, routes are evaluated using a fitness function. IWPIP's efficiency has been demonstrated through comprehensive simulation, which resulted in promising outcomes in terms of throughput, packet delivery and drop ratio, delay, and energy consumption.Keywords
Optimization, Routing, Bio-Inspired, Energy, Delay, Cognitive Radio Ad Hoc Networks, Wolf Prey Inspired Protocol.References
- F. Palmieri, "A Reliability and latency-aware routing framework for 5G transport infrastructures", Computer Networks, vol. 179, p. 107365, 2020. https://doi.org/10.1016/j.comnet.2020.107365
- J. Mu, "An improved AODV routing for the zigbee heterogeneous networks in 5G environment", Ad Hoc Networks, vol. 58, pp. 13-24, 2017. https://doi.org/10.1016/j.adhoc.2016.12.002
- Z. Li, Y. Hu, T. Hu and R. Ma, "PARS-SR: A scalable flow forwarding scheme based on Segment Routing for massive giant connections in 5G networks", Computer Communications, vol. 159, pp. 206-214, 2020. https://doi.org/10.1016/j.comcom.2020.05.014
- H. Riasudheen, K. Selvamani, S. Mukherjee and I. Divyasree, "An efficient energy-aware routing scheme for cloud-assisted MANETs in 5G", Ad Hoc Networks, vol. 97, p. 102021, 2020. https://doi.org/10.1016/j.adhoc.2019.102021
- A. Mesodiakaki, E. Zola, R. Santos and A. Kassler, "Optimal user association, backhaul routing and switching off in 5G heterogeneous networks with mesh millimeter wave backhaul links", Ad Hoc Networks, vol. 78, pp. 99-114, 2018. https://doi.org/10.1016/j.adhoc.2018.05.008
- M. Abolhasan, M. Abdollahi, W. Ni, A. Jamalipour, N. Shariati and J. Lipman, "A Routing Framework for Offloading Traffic From Cellular Networks to SDN-Based Multi-Hop Device-to-Device Networks", IEEE Transactions on Network and Service Management, vol. 15, no. 4, pp. 1516-1531, 2018. https://doi.org/10.1109/TNSM.2018.2875696
- H. Rastegarfar, T. Svensson and N. Peyghambarian, "Optical Layer Routing Influence on Software-Defined C-RAN Survivability", Journal of Optical Communications and Networking, vol. 10, no. 11, p. 866, 2018. https://doi.org/10.1364/JOCN.10.000866
- Martin, L. Dooley and K. Wong, "5G multi-layer routing strategies for TV white space secondary user access", IET Communications, vol. 13, no. 12, pp. 1801-1807, 2019. https://doi.org/10.1049/iet-com.2018.5848
- P. Yan, S. Choudhury, F. Al-Turjman and I. Al-Oqily, "An energy-efficient topology control algorithm for optimizing the lifetime of wireless ad-hoc IoT networks in 5G and B5G", Computer Communications, vol. 159, pp. 83-96, 2020. https://doi.org/10.1016/j.comcom.2020.05.010
- Z. Ma, B. Li, Z. Yan and M. Yang, "Remaining bandwidth based multipath routing in 5G millimeter wave self-backhauling network", Wireless Networks, vol. 25, no. 7, pp. 3839-3855, 2019. https://doi.org/10.1007/s11276-018-01919-y
- Z. Khan, P. Fan, F. Abbas, H. Chen and S. Fang, "Two-Level Cluster Based Routing Scheme for 5G V2X Communication", IEEE Access, vol. 7, pp. 16194-16205, 2019. https://doi.org/10.1109/ACCESS.2019.2892180
- J.Ramkumar and R.Vadivel, "Performance Modeling of Bio-Inspired Routing Protocols in Cognitive Radio Ad Hoc Network to Reduce End-to-End Delay", International Journal of Intelligent Engineering and Systems, Vol.12, No.1, pp. 221-231, 2019. https://doi.org/10.22266/ijies2019.0228.22
- X. Jin, R. Zhang, J. Sun and Y. Zhang, "TIGHT: A Geographic Routing Protocol for Cognitive Radio Mobile Ad Hoc Networks", IEEE Transactions on Wireless Communications, vol. 13, no. 8, pp. 4670-4681, 2014. https://doi.org/10.1109/TWC.2014.2320950
- R. Sahu, S. Sharma, M.A. Rizvi, "ZBLE: Zone Based Leader Election Energy Constrained AOMDV Routing Protocol", International Journal of Computer Networks and Applications, Vol. 6, no. 3, pp. 39-46, 2019. https://doi.org/10.22247/ijcna/2019/49643
- R. Yadav, R. Misra and D. Saini, "Energy aware cluster based routing protocol over distributed cognitive radio sensor network", Computer Communications, vol. 129, pp. 54-66, 2018. https://doi.org/10.1016/j.comcom.2018.07.020
- H. Salameh, S. Otoum, M. Aloqaily, R. Derbas, I. Ridhawi and Y. Jararweh, "Intelligent jamming-aware routing in multi-hop IoT-based opportunistic cognitive radio networks", Ad Hoc Networks, vol. 98, p. 102035, 2020. https://doi.org/10.1016/j.adhoc.2019.102035
- F. Tang, H. Zhang, L. Fu and X. Li, "Distributed Stable Routing with Adaptive Power Control for Multi-Flow and Multi-Hop Mobile Cognitive Networks," IEEE Transactions on Mobile Computing, vol. 18, no. 12, pp. 2829-2841, 2019. https://doi.org/10.1109/TMC.2018.2885762
- J. Singh and M. Rai, "CROP: Cognitive radio ROuting Protocol for link quality channel diverse cognitive networks", Journal of Network and Computer Applications, vol. 104, pp. 48-60, 2018. https://doi.org/10.1016/j.jnca.2017.12.014
- X. Tang, J. Zhou, S. Xiong, J. Wang and K. Zhou, "Geographic Segmented Opportunistic Routing in Cognitive Radio Ad Hoc Networks Using Network Coding," IEEE Access, vol. 6, pp. 62766-62783, 2018. https://doi.org/10.1109/ACCESS.2018.2875566
- J.Ramkumar and R.Vadivel, "Improved frog leap inspired protocol (IFLIP) – for routing in cognitive radio ad hoc networks (CRAHN)", World Journal of Engineering, vol. 15, no. 2, pp. 306-311, 2018. https://doi.org/10.1108/WJE-08-2017-0260
- J.Ramkumar and R.Vadivel, "CSIP—Cuckoo Search Inspired Protocol for Routing in Cognitive Radio Ad Hoc Networks", Advances in Intelligent Systems and Computing, Vol. 556, pp. 145-153, 2017. https://doi.org/10.1007/978-981-10-3874-7_14
- I. Akyildiz, W. Lee and K. Chowdhury, "CRAHNs: Cognitive radio ad hoc networks", Ad Hoc Networks, vol. 7, no. 5, pp. 810-836, 2009. https://doi.org/10.1016/j.adhoc.2009.01.001
- J.Ramkumar and R.Vadivel, "Intelligent Fish Swarm Inspired Protocol (IFSIP) For Dynamic Ideal Routing in Cognitive Radio Ad-Hoc Networks", International Journal of Computing and Digital Systems, Vol. 10, pp. 2-11. 2020. https://journal.uob.edu.bh:443/handle/123456789/3961
- R. Rahim, S. Murugan, S. Priya, S. Magesh and R. Manikandan, "Taylor Based Grey Wolf Optimization Algorithm (TGWOA) For Energy Aware Secure Routing Protocol", International Journal of Computer Networks and Applications, vol. 7, no. 4, p. 93, 2020. https://doi.org/10.22247/ijcna/2020/196041
- Ensemble Miscellaneous Classifiers Based Misbehavior Detection Model for Vehicular Ad-Hoc Network Security
Abstract Views :311 |
PDF Views:1
Authors
S. Sumithra
1,
R. Vadivel
1
Affiliations
1 Department of Information Technology, Bharathiar University, Coimbatore, Tamil Nadu, IN
1 Department of Information Technology, Bharathiar University, Coimbatore, Tamil Nadu, IN
Source
International Journal of Computer Networks and Applications, Vol 8, No 2 (2021), Pagination: 90-107Abstract
Vehicular Ad-Hoc Network is an emerging technology, mainly developed for road safety applications, entertainment applications, and effective traffic conditions. VANET applications work based on the accurate mobility information shared among the vehicles. Sometimes attackers manipulate the mobility information shared by the adjacent vehicle or neighboring vehicle, which results in terrible consequences. To deal with the illusion-based type of attacks, researchers have proposed enormous solutions. Unfortunately, those solutions could not deal with the dynamic vehicle conditions and variable cyber malfunctions, which reduces the misbehavior detection accurateness and increases the false-positive rate. In this paper, the dynamic vehicle context is taken into account to propose a two solutions such as Miscellaneous VANET Classifiers based Misbehavior Detection Model (MVC-MDM) and Ensemble Miscellaneous VANET Classifiers based Misbehavior Detection Model (EMVC-MDM). This model is constructed based on the Mobility Data Gathering phase, Mobility Context Feature Extraction phase, Mobility Context Feature Level Fixing phase, Hampel Filter based Context Reference Building phase, Constructing Miscellaneous VANET Classifiers based Misbehavior Detection model and Ensemble Miscellaneous VANET Classifiers based Misbehavior Detection phase. Vehicle context is prepared using the data-centric features and the behavior-based features of the vehicles. The Nonparametric Hampel filter and Kalman filter are used to building the context reference model. These filters discover the temporal and spatial correlation of the uniformity in the current mobility information. Vehicle features are extracted locally according to the stability, likelihood, and performance of the vehicles' mobility information. A random forest based learning algorithm is used to train and test the classifiers. The proposed MVC-MDM and EMVC-MDM has been simulated in various context scenarios and the presence of misbehaving vehicles. NGSIM dataset has been used for extensive simulation. The results prove that the effectiveness and the reliability of the proposed MVC-MDM and EMVC-MDM are higher than the existing misbehavior detection systems.Keywords
Stability, Likelihood, Performance, Hampel Filter, Kalman Filter.References
- Lim, Kiho, Kastuv M. Tuladhar, and Hyunbum Kim. Detecting location spoofing using ADAS sensors in VANETs, in 2019 16th IEEE annual consumer communications & networking conference (CCNC), IEEE, 2019, pp. 1-4.
- H. Vahdat-Nejad, A. Ramazani, T. Mohammadi, and W. Mansoor, A survey on context-aware vehicular network applications, Vehicular Communication, vol. 3, Jan. 2016, pp. 43-57.
- O. A. Wahab, A. Mourad, H. Otrok, and J. Bentahar, CEAP: SVM based intelligent detection model for clustered vehicular ad hoc networks, Expert System Applications, vol. 50, May 2016, pp. 40-54.
- R.W. van der Heijden, S. Dietzel, T. Leinmüller, and F. Kargl, Survey on misbehavior detection in cooperative intelligent transportation systems, IEEE Commun. Surveys Tuts., vol. 21, no. 1, 4th Quart, 2018, pp. 779-811.
- F. Sakiz and S. Sen, A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV, Ad Hoc Network., vol. 61, Jun. 2017, pp. 33-50.
- M. N. Mejri, J. Ben-Othman, and M. Hamdi, Survey on VANET security challenges and possible cryptographic solutions, Vehicular Communication, vol. 1, no. 2, Apr. 2014, pp. 53-66.
- S. Sumithra and R. Vadivel, An overview of various trust models for VANET security establishment, 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT), IEEE, 2018, pp. 1-7.
- J. Wang, Y. Shao, Y. Ge, and R. Yu, A survey of vehicle to everything (V2X) testing, Sensors, vol. 19, Jan. 2019, pp. 334.
- R. K. Pearson, Y. Neuvo, J. Astola, and M. Gabbouj, Generalized Hampel filters, EURASIP J. Adv. Signal Process., vol. 2016, pp. 87.
- U. Khan, S. Agrawal, and S. Silakari, A detailed survey on misbehavior node detection techniques in vehicular ad Hoc networks, in Information Systems Design and Intelligent Applications (Advances in Intelligent Systems and Computing), New Delhi, India: Springer, vol. 339, 2015, pp. 11-19.
- F. A. Ghaleb, A. Zainal, A. M. Rassam, and F. Saeed, ``Driving-situation aware adaptive broadcasting rate scheme for vehicular adhoc network, Journal of Intelligent Fuzzy Systems, vol. 35, 2018, pp. 423-438.
- X. Y. Tian, Y. H. Liu, J. Wang, W. W. Deng, and H. Oh, Computational security for context-awareness in vehicular ad-hoc networks, IEEE Access, vol. 4, 2016, pp. 5268-5279.
- S. Dietzel, J. Petit, G. Heijenk, and F. Kargl, Graph-based metrics for insider attack detection in VANET multihop data dissemination protocols, IEEE Transaction on Vehicular Technology, vol. 62, no. 4, May 2013, pp. 1505-1518.
- S. Ruj, M. A. Cavenaghi, Z. Huang, A. Nayak, and I. Stojmenovic, On data-centric misbehavior detection in VANETs, in Proc. IEEE Vehicular Technology. Conf. (VTC Fall), Sep. 2011, pp. 1-5.
- S. Sumithra and R. Vadivel, NB-FTBM model for entity trust evaluation in vehicular ad hoc network security, 2nd International Conference on Ubiquitous Communications and Network Computing, Springer, Cham, 2019, pp. 173-187.
- N. Bissmeyer, W. Michael, and K. Frank, Misbehavior detection and attacker identification in vehicular ad-hoc networks, Tech. Univ. Darmstadt, Darmstadt, Germany, Tech. Rep., 2014.
- A Ghaleb, Fuad, Faisal Saeed, Mohammad Al-Sarem, Bander Ali Saleh Al-rimy, Wadii Boulila, A. E. M. Eljialy, Khalid Aloufi, and Ma1111moun Alazab. Misbehavior-aware on-demand collaborative intrusion detection system using distributed ensemble learning for VANET, Electronics, vol.9, no. 9, 2020, pp.1411.
- H. Stubing, Car-to-X communication: System architecture and applications, in Multilayered Security and Privacy Protection in Car-to-XNetworks. Wiesbaden, Germany: Springer, 2013, pp. 9-19.
- Zhang, Chunhua, Kangqiang Chen, Xin Zeng, and Xiaoping Xue. "Misbehavior detection based on support vector machine and Dempster-Shafer theory of evidence in VANETs." IEEE Access, vol.6, 2018: 59860-59870.
- S. Sumithra and R. Vadivel, Optimal Innovation-Based Adaptive Estimation Kalman Filter For Measuring Noise Uncertainty During Vehicle Positioning In VANET, International Journal of Applied Mathematics and Computer Science (AMCS), Vol. 31, No. 1, March 2021.
- Kamel, Joseph, Mohammad Raashid Ansari, Jonathan Petit, Arnaud Kaiser, Ines Ben Jemaa, and Pascal Urien. "Simulation framework for misbehavior detection in vehicular networks." IEEE transactions on vehicular technology, vol.69, no. 6, 2020, pp.6631-6643.
- K. Zaidi, M. B. Milojevic, V. Rakocevic, A. Nallanathan, and M. Rajarajan, Host-based intrusion detection for VANETs: A statistical approach to rogue node detection, IEEE Transaction on Vehicular Technology, vol. 65, no. 8, Aug. 2016, pp. 6703-6714.
- Ghaleb, Fuad A., Anazida Zainal, Murad A. Rassam, and Fathey Mohammed, An effective misbehavior detection model using artificial neural network for vehicular ad hoc network applications, In 2017 IEEE Conference on Application, Information and Network Security (AINS), IEEE, 2017, pp. 13-18.
- S. A. Soleymani, A. H. Abdullah,W. H. Hassan, M. H. Anisi, S. Goudarzi, and M. A. R. Baee, Trust management in vehicular ad hoc network: A systematic review, EURASIP J. Wireless Communication Network, vol. 1, Dec. 2015, pp. 146.
- Y. Zhang, L. Lazos, and W. Kozma, AMD: Audit-based misbehavior detection in wireless ad hoc networks, IEEE Transaction on Mobile Computing., vol. 15, no. 8, Aug. 2016, pp. 1893-1907.
- Dietzel, Stefan, Rens van der Heijden, Hendrik Decke, and Frank Kargl, A flexible, subjective logic-based framework for misbehavior detection in V2V networks, In Proceeding of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, IEEE, 2014, pp.1-6.
- N. Lyamin, A. Vinel, M. Jonsson, and B. Bellalta, ``Cooperative awareness in VANETs: On ETSI EN 302 637-2 performance,'' IEEE Transaction on Vehicular Technology, vol. 67, no. 1, Jan. 2018, pp. 17-28.
- Sakiz, F.; Sen, S, A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV, Ad Hoc Networks, vol.61, 2017, pp. 33–50.
- Van der Heijden, R.W.; Stefan, D.; Tim, L.; Frank, K, Survey on misbehavior detection in cooperative intelligent transportation systems, IEEE Communications Surveys & Tutorials, vol.21, no.1, 2019, pp.779–811.
- Ho, Yao-Hua, Chun-Han Lin, and Ling-Jyh Chen, On-demand misbehavior detection for vehicular ad hoc network, International Journal of Distributed Sensor Networks, vol.12, no. 10, 2016, 1550147716673928.
- Ghaleb, Fuad A., Mohd Aizaini Maarof, Anazida Zainal, Murad A. Rassam, Faisal Saeed, and Mohammed Alsaedi, Context-aware data-centric misbehavior detection scheme for vehicular ad hoc networks using sequential analysis of the temporal and spatial correlation of the consistency between the cooperative awareness messages, Vehicular Communications, vol.20, 2019, 100186.
- Erskine, Samuel Kofi, and Khaled M. Elleithy, Real-time detection of DoS attacks in IEEE 802.11 p using fog computing for a secure intelligent vehicular network, Electronics 8, no. 7, 2019, pp.776.
- Whale Optimization Routing Protocol for Minimizing Energy Consumption in Cognitive Radio Wireless Sensor Network
Abstract Views :258 |
PDF Views:1
Authors
J. Ramkumar
1,
R. Vadivel
2
Affiliations
1 Department of Computer Science, VLB Janakiammal College of Arts and Science, Coimbatore, Tamil Nadu, IN
2 Department of Information Technology, Bharathiar University, Coimbatore, Tamil Nadu, IN
1 Department of Computer Science, VLB Janakiammal College of Arts and Science, Coimbatore, Tamil Nadu, IN
2 Department of Information Technology, Bharathiar University, Coimbatore, Tamil Nadu, IN
Source
International Journal of Computer Networks and Applications, Vol 8, No 4 (2021), Pagination: 455-464Abstract
Cognitive Radio Wireless Sensor Networks (CR-WSN) works on nodes that are dependent on batteries. A critical problem with CR-WSN is a lack of energy, especially in situations such as warfare where rapid and aggressive action is needed. The battery level of nodes degrades CR-WSN performance. Researchers face significant difficulty developing a routing protocol for CR-WSN, and that obstacle is posed by energy consumption to deliver a packet. A substantial number of nodes reside in CR-WSN. Every node in CR-WSN is constrained by battery. To minimize network cost, it should be feasible to have the routing protocol used for CR-WSN to be energy efficient. This paper proposes an optimization-based routing protocol, namely Whale Optimization Routing Protocol (WORP), for identifying the best route in CR-WSN to minimize the delay and lead to network efficiency. WORP draws inspiration from the behaviors of whales as they forage, similar to their hunting activity. By prioritizing residual energy and the total energy of the nodes in the route, WORP encourages energy-aware route selection. WORP is examined via simulation with NS2 against current routing protocols. Benchmark performance metrics are used to assess the effectiveness of WORP. Results make an indication that WORP has superior performance than current routing protocols in CR-WSN.Keywords
WSN, CR-WSN, Routing, Optimization, Delay, Energy Consumption.References
- K. Vijayan, G. Ramprabu, S. SelvakumaraSamy, and M. Rajeswari, “Cascading Model in Underwater Wireless Sensors using Routing Policy for State Transitions,” Microprocess. Microsyst., vol. 79, Article-id: 103298, 2020. https://doi.org/10.1016/j.micpro.2020.103298.
- P. Sethu Lakshmi and M. G. Jibukumar, “Performance Analysis of SWIPT in Multi-hop Wireless Sensor Networks,” in Procedia Computer Science, 2020, vol. 171, pp. 2157–2166, https://doi.org/10.1016/j.procs.2020.04.233.
- R. N. Yadav, R. Misra, and D. Saini, “Energy aware cluster based routing protocol over distributed cognitive radio sensor network,” Comput. Commun., vol. 129, pp. 54–66, 2018. https://doi.org/10.1016/j.comcom.2018.07.020.
- G. Jaber and R. Kacimi, “A collaborative caching strategy for content-centric enabled wireless sensor networks,” Comput. Commun., vol. 159, pp. 60–70, 2020. https://doi.org/10.1016/j.comcom.2020.05.018.
- B. Kabakulak, “Sensor and sink placement, scheduling and routing algorithms for connected coverage of wireless sensor networks,” Ad Hoc Networks, vol. 86, pp. 83–102, 2019. https://doi.org/10.1016/j.adhoc.2018.11.005.
- F. Niaz, M. Khalid, Z. Ullah, N. Aslam, M. Raza, and M. K. Priyan, “A bonded channel in cognitive wireless body area network based on IEEE 802.15.6 and internet of things,” Comput. Commun., vol. 150, pp. 131–143, 2020. https://doi.org/10.1016/j.comcom.2019.11.016.
- Z. Liu, M. Zhao, Y. Yuan, and X. Guan, “Sub channel and resource allocation in cognitive radio sensor network with wireless energy harvesting,” Comput. Networks, vol. 167, 2020. https://doi.org/10.1016/j.comnet.2019.107028.
- M. M. Hassani and R. Berangi, “A new congestion control mechanism for transport protocol of cognitive radio sensor networks,” AEU–Int. J. Electron. Commun., vol. 85, pp. 134–143, 2018. https://doi.org/10.1016/j.aeue.2017.12.026.
- C. Singhal and V. Patil, “HCR-WSN: Hybrid MIMO cognitive radio system for wireless sensor network,” Comput. Commun., vol. 169, pp. 11–25, 2021. https://doi.org/10.1016/j.comcom.2020.12.025.
- F. Al-Turjman, “Cognitive routing protocol for disaster-inspired Internet of Things,” Futur. Gener. Comput. Syst., vol. 92, pp. 1103–1115, 2019. https://doi.org/10.1016/j.future.2017.03.014.
- B. S. Awoyemi and B. T. Maharaj, “Quality of service provisioning through resource optimisation in heterogeneous cognitive radio sensor networks,” Comput. Commun., vol. 165, pp. 122–130, 2021. https://doi.org/10.1016/j.comcom.2020.11.006.
- V. Van Huynh, H. S. Nguyen, L. T. T. Hoc, T. S. Nguyen, and M. Voznak, “Optimization issues for data rate in energy harvesting relay-enabled cognitive sensor networks,” Comput. Networks, vol. 157, pp. 29–40, Jul. 2019. https://doi.org/10.1016/j.comnet.2019.04.012.
- A. S. Cacciapuoti, M. Caleffi, and L. Paura, “Reactive routing for mobile cognitive radio ad hoc networks,” Ad Hoc Networks, vol. 10, no. 5, pp. 803–815, 2012. Accessed: Feb. 28, 2021. [Online]. Available: http://www.sciencedirect.com/science/article/pii/S1570870511000813.
- J. Lee and J. Lim, “Cognitive routing for multi-hop mobile cognitive radio ad hoc networks,” J. Commun. Networks, vol. 16, no. 2, pp. 155–161, 2014, doi: 10.1109/JCN.2014.000026.
- L. Cheng, L. Zhong, X. Zhang, and J. Xing, “A staged adaptive firefly algorithm for UAV charging planning in wireless sensor networks,” Comput. Commun., vol. 161, pp. 132–141, 2020. https://doi.org/10.1016/j.comcom.2020.07.019.
- P. Feng, Y. Bai, J. Huang, W. Wang, Y. Gu, and S. Liu, “CogMOR-MAC: A cognitive multi-channel opportunistic reservation MAC for multi-UAVs ad hoc networks,” Comput. Commun., vol. 136, pp. 30–42, 2019. https://doi.org/10.1016/j.comcom.2019.01.010.
- S. Gopikrishnan, P. Priakanth, and G. Srivastava, “DEDC: Sustainable data communication for cognitive radio sensors in the Internet of Things,” Sustain. Comput. Informatics Syst., vol. 29, 2021. https://doi.org/10.1016/j.suscom.2020.100471.
- S. Aswale and V. R. Ghorpade, “Geographic Multipath Routing based on Triangle Link Quality Metric with Minimum Inter-path Interference for Wireless Multimedia Sensor Networks,” J. King Saud Univ.–Comput. Inf. Sci., vol. 33, no. 1, pp. 33–44, 2021. https://doi.org/10.1016/j.jksuci.2018.02.001.
- Y. U. Xiu-wu, Y. U. Hao, L. Yong, and X. Ren-rong, “A clustering routing algorithm based on wolf pack algorithm for heterogeneous wireless sensor networks,” Comput. Networks, vol. 167, p. 106994, 2020. https://doi.org/10.1016/j.comnet.2019.106994.
- C. Gu, M. Bradbury, J. Kirton, and A. Jhumka, “A decision theoretic framework for selecting source location privacy aware routing protocols in wireless sensor networks,” Futur. Gener. Comput. Syst., vol. 87, pp. 514–526, 2018. https://doi.org/10.1016/j.future.2018.01.046.
- I. Jemili, D. Ghrab, A. Belghith, and M. Mosbah, “Cross-layer adaptive multipath routing for multimedia Wireless Sensor Networks under duty cycle mode,” Ad Hoc Networks, vol. 109, p. 102292, 2020. https://doi.org/10.1016/j.adhoc.2020.102292.
- J. Ramkumar and R. Vadivel, “Performance Modeling of Bio-Inspired Routing Protocols in Cognitive Radio Ad Hoc Network to Reduce End-to-End Delay,” Int. J. Intell. Eng. Syst., vol. 12, no. 1, pp. 221–231, 2019. https://doi.org/10.22266/ijies2019.0228.22.
- J. Ramkumar and R. Vadivel, “Multi-Adaptive Routing Protocol for Internet of Things based Ad-hoc Networks,” Wirel. Pers. Commun., pp. 1–23,2021. https://doi.org/ 10.1007/s11277-021-08495-z.
- B. Abbache et al., “Dissimulation-based and load-balance-aware routing protocol for request and event oriented mobile wireless sensor networks,” AEU–Int. J. Electron. Commun., vol. 99, pp. 264–283, 2019. https://doi.org/10.1016/j.aeue.2018.12.003.
- M. K, C. K, and S. C, “An energy efficient clustering scheme using multilevel routing for wireless sensor network,” Comput. Electr. Eng., vol. 69, pp. 642–652, 2018. https://doi.org/10.1016/j.compeleceng.2017.10.007.
- F. H. Awad, “Optimization of relay node deployment for multisource multipath routing in Wireless Multimedia Sensor Networks using Gaussian distribution,” Comput. Networks, vol. 145, pp. 96–106, 2018. https://doi.org/10.1016/j.comnet.2018.08.021.
- R. Almesaeed and A. Jedidi, “Dynamic directional routing for mobile wireless sensor networks,” Ad Hoc Networks, vol. 110, p. 102301, 2021.https://doi.org/10.1016/j.adhoc.2020.102301.
- L. Rui, X. Wang, Y. Zhang, X. Wang, and X. Qiu, “A self-adaptive and fault-tolerant routing algorithm for wireless sensor networks in microgrids,” Futur. Gener. Comput. Syst., vol. 100, pp. 35–45, 2019. https://doi.org/10.1016/j.future.2019.04.024.
- A. Agrawal, V. Singh, S. Jain, and R. K. Gupta, “GCRP: Grid-cycle routing protocol for wireless sensor network with mobile sink,” AEU–Int. J. Electron. Commun., vol. 94, pp. 1–11, 2018. https://doi.org/10.1016/j.aeue.2018.06.036.
- K. Thangaramya, K. Kulothungan, R. Logambigai, M. Selvi, S. Ganapathy, and A. Kannan, “Energy aware cluster and neuro-fuzzy based routing algorithm for wireless sensor networks in IoT,” Comput. Networks, vol. 151, pp. 211–223, 2019. https://doi.org/10.1016/j.comnet.2019.01.024.
- R. Yarinezhad, “Reducing delay and prolonging the lifetime of wireless sensor network using efficient routing protocol based on mobile sink and virtual infrastructure,” Ad Hoc Networks, vol. 84, pp. 42–55, 2019. doi: https://doi.org/10.1016/j.adhoc.2018.09.016.
- J. Ramkumar and R. Vadivel, “CSIP—cuckoo search inspired protocol for routing in cognitive radio ad hoc networks,” in Advances in Intelligent Systems and Computing, vol. 556, pp. 145–153, 2017. https://doi.org/10.1007/978-981-10-3874-7_14.
- J. Ramkumar and R. Vadivel, “Bee inspired secured protocol for routing in cognitive radio ad hoc networks,” IIndianJpurnal of Science and Technology, vol. 13, no. 30, pp. 3059–3069, 2020. https://doi.org/10.17485/IJST/v13i30.1152.
- J. Ramkumar and R. Vadivel, “Meticulous elephant herding optimization based protocol for detecting intrusions in cognitive radio ad hoc networks,” Int. J. Emerg. Trends Eng. Res., vol. 8, no. 8, pp. 4549–4554, 2020. https://doi.org/10.30534/ijeter/2020/82882020.
- Dr.R.Vadivel and J.Ramkumar. “QoS-Enabled Improved Cuckoo Search-Inspired Protocol (ICSIP) for IoT-Based Healthcare Applications”, Incorporating the Internet of Things in Healthcare Applications and Wearable Devices, Chapter 6, Pages 109-121, 2020. https://doi.org/10.4018/978-1-7998-1090-2.ch006.
- J. Ramkumar and R. Vadivel, “Intelligent Fish Swarm Inspired Protocol (IFSIP) For Dynamic Ideal Routing in Cognitive Radio Ad-Hoc Networks,” Int. J. Comput. Digit. Syst., vol. 10, pp. 2–11, 2020, Accessed: Dec. 02, 2020. [Online]. Available: http://journals.uob.edu.bh.
- M. Tubishat, N. Idris, and M. Abushariah, “Explicit aspects extraction in sentiment analysis using optimal rules combination,” Futur. Gener. Comput. Syst., vol. 114, pp. 448–480, 2021. https://doi.org/10.1016/j.future.2020.08.019.
- M. Lingaraj, T. N. Sugumar, C. Stanly Felix and J. Ramkumar, "Query Aware Routing Protocol for Mobility Enabled Wireless Sensor Network", International Journal of Computer Networks and Applications (IJCNA), vol. 8, no.3, pp. 258-267, 2021. https://doi.org/10.22247/ijcna/2021/209192.
- S. Boopalan and S. Jayasankari, "Dolphin Swarm Inspired Protocol (DSIP) for Routing in Underwater Wireless Sensor Networks", International Journal of Computer Networks and Applications (IJCNA), vol. 8, no.1, pp. 44–53, 2021. https://doi.org/10.22247/ijcna/2021/207981.
- Constrained Cuckoo Search Optimization Based Protocol for Routing in Cloud Network
Abstract Views :205 |
PDF Views:1
Authors
Affiliations
1 PG and Research Department of Computer Science, Dr. N.G.P. Arts and Science College, Coimbatore, Tamil Nadu, IN
2 Department of Information Technology, Bharathiar University, Coimbatore, Tamil Nadu, IN
3 Department of Computer Technology, Dr. N.G.P. Arts and Science College, Coimbatore, Tamil Nadu, IN
1 PG and Research Department of Computer Science, Dr. N.G.P. Arts and Science College, Coimbatore, Tamil Nadu, IN
2 Department of Information Technology, Bharathiar University, Coimbatore, Tamil Nadu, IN
3 Department of Computer Technology, Dr. N.G.P. Arts and Science College, Coimbatore, Tamil Nadu, IN
Source
International Journal of Computer Networks and Applications, Vol 8, No 6 (2021), Pagination: 795-803Abstract
Cloud Computing (CC) is the process of providing on-demand data to the user via the internet. In CC, users don't need to manage data storage and computational power actively. Finding the best route in a cloud network is entirely different from other general networks which it is due to high scalability. Protocols developed for other general networks will never suit or give better performance in cloud networks due to its scalability. This paper proposes a bio-inspired protocol for routing in a cloud network, namely Constrained Cuckoo Search Optimization-based Protocol (CCSOP). The routing strategy of CCSOP is inspired by the natural characteristics of the cuckoo bird towards finding a nest to lay its eggs. Levy Flight concept is applied with different constraints to enhance optimization performance towards finding the best route in a cloud network that minimizes energy consumption. CCSOP is evaluated in Greencloud using benchmark network performance metrics against the current routing protocols. The efficacy of CCSOP is evaluated using benchmark performance measures. CCSOP appears to outperform current cloud network routing protocols in terms of energy consumption.Keywords
Cuckoo, Cloud, Energy, Flight, Levy, Optimization, Routing, Scalability.References
- J. Ramkumar and R. Vadivel, “CSIP—cuckoo search inspired protocol for routing in cognitive radio ad hoc networks,” in Advances in Intelligent Systems and Computing, 2017, vol. 556, pp. 145–153, doi: 10.1007/978-981-10-3874-7_14.
- J. Ramkumar and R. Vadivel, “Meticulous elephant herding optimization based protocol for detecting intrusions in cognitive radio ad hoc networks,” Int. J. Emerg. Trends Eng. Res., vol. 8, no. 8, pp. 4549–4554, 2020, doi: 10.30534/ijeter/2020/82882020.
- J. Ramkumar and R. Vadivel, “Bee inspired secured protocol for routing in cognitive radio ad hoc networks,” INDIAN J. Sci. Technol., vol. 13, no. 30, pp. 3059–3069, 2020, doi: 10.17485/IJST/v13i30.1152.
- M. Faheem, R. A. Butt, R. Ali, B. Raza, M. A. Ngadi, and V. C. Gungor, “CBI4.0: A Cross-layer Approach for Big Data Gathering for Active Monitoring and Maintenance in the Manufacturing Industry 4.0,” J. Ind. Inf. Integr., p. 100236, 2021, doi: https://doi.org/10.1016/j.jii.2021.100236.
- C. Y. Huang and Y. J. Chang, “An adaptively multi-attribute index framework for big IoT data,” Comput. Geosci., p. 104841, 2021, doi: https://doi.org/10.1016/j.cageo.2021.104841.
- J. Qu, “Research on mobile learning in a teaching information service system based on a big data driven environment,” Educ. Inf. Technol., pp. 1–19, Jun. 2021, doi: 10.1007/s10639-021-10614-z.
- R. Vadivel and J. Ramkumar, “QoS-Enabled Improved Cuckoo Search-Inspired Protocol (ICSIP) for IoT-Based Healthcare Applications,” pp. 109–121, 2019, doi: 10.4018/978-1-7998-1090-2.ch006.
- J. Ramkumar and R. Vadivel, “Multi-Adaptive Routing Protocol for Internet of Things based Ad-hoc Networks,” Wirel. Pers. Commun., pp. 1–23, Apr. 2021, doi: 10.1007/s11277-021-08495-z.
- J. Ramkumar and R. Vadivel, “Improved Wolf prey inspired protocol for routing in cognitive radio Ad Hoc networks,” Int. J. Comput. Networks Appl., vol. 7, no. 5, pp. 126–136, 2020, doi: 10.22247/ijcna/2020/202977.
- J. Ramkumar and R. Vadivel, “Performance modeling of bio-inspired routing protocols in Cognitive Radio Ad Hoc Network to reduce end-to-end delay,” Int. J. Intell. Eng. Syst., vol. 12, no. 1, pp. 221–231, 2019, doi: 10.22266/IJIES2019.0228.22.
- R. R. Hoy, “Quantitative skills in undergraduate neuroscience education in the age of big data,” Neurosci. Lett., p. 136074, 2021, doi: https://doi.org/10.1016/j.neulet.2021.136074.
- P. L. Martínez, R. Dintén, J. M. Drake, and M. Zorrilla, “A big data-centric architecture metamodel for Industry 4.0,” Futur. Gener. Comput. Syst., 2021, doi: https://doi.org/10.1016/j.future.2021.06.020.
- M. Rhahla, S. Allegue, and T. Abdellatif, “Guidelines for GDPR compliance in Big Data systems,” J. Inf. Secur. Appl., vol. 61, p. 102896, 2021, doi: https://doi.org/10.1016/j.jisa.2021.102896.
- A. Sevtsuk, R. Basu, X. Li, and R. Kalvo, “A big data approach to understanding pedestrian route choice preferences: Evidence from San Francisco,” Travel Behav. Soc., vol. 25, pp. 41–51, 2021, doi: https://doi.org/10.1016/j.tbs.2021.05.010.
- V. Keskar, J. Yadav, and A. Kumar, “Perspective of anomaly detection in big data for data quality improvement,” Mater. Today Proc., 2021, doi: https://doi.org/10.1016/j.matpr.2021.05.597.
- T. G. Kim and S. Yu, “Big Data Analysis of the Risk of Intracranial Hemorrhage in Korean Populations Taking Low-Dose Aspirin,” J. Stroke Cerebrovasc. Dis., vol. 30, no. 8, p. 105917, 2021, doi: https://doi.org/10.1016/j.jstrokecerebrovasdis.2021.105917.
- D. Balazka, D. Houtman, and B. Lepri, “How can big data shape the field of non-religion studies? And why does it matter?,” Patterns, vol. 2, no. 6, p. 100263, 2021, doi: https://doi.org/10.1016/j.patter.2021.100263.
- Y. Su and X. Wang, “Innovation of Agricultural Economic Management in the Process of Constructing Smart Agriculture by Big Data,” Sustain. Comput. Informatics Syst., p. 100579, 2021, doi: https://doi.org/10.1016/j.suscom.2021.100579.
- C. Wen, J. Yang, L. Gan, and Y. Pan, “Big data driven Internet of Things for credit evaluation and early warning in finance,” Futur. Gener. Comput. Syst., vol. 124, pp. 295–307, 2021, doi: https://doi.org/10.1016/j.future.2021.06.003.
- M. Nilashi et al., “Big social data and customer decision making in vegetarian restaurants: A combined machine learning method,” J. Retail. Consum. Serv., vol. 62, p. 102630, 2021, doi: https://doi.org/10.1016/j.jretconser.2021.102630.
- N. B. Long, H. Tran-Dang, and D. Kim, “Energy-Aware Real-Time Routing for Large-Scale Industrial Internet of Things,” IEEE Internet Things J., vol. 5, no. 3, pp. 2190–2199, 2018, doi: 10.1109/JIOT.2018.2827050.
- Y. Xu, Z. Yue, and L. Lv, “Clustering Routing Algorithm and Simulation of Internet of Things Perception Layer Based on Energy Balance,” IEEE Access, vol. 7, pp. 145667–145676, 2019, doi: 10.1109/ACCESS.2019.2944669.
- H. A. Omar, W. Zhuang, and L. Li, “Gateway Placement and Packet Routing for Multihop In-Vehicle Internet Access,” IEEE Trans. Emerg. Top. Comput., vol. 3, no. 3, pp. 335–351, 2015, doi: 10.1109/TETC.2015.2395077.
- Z. Ding, L. Shen, H. Chen, F. Yan, and N. Ansari, “Energy-Efficient Relay-Selection-Based Dynamic Routing Algorithm for IoT-Oriented Software-Defined WSNs,” IEEE Internet Things J., vol. 7, no. 9, pp. 9050–9065, 2020, doi: 10.1109/JIOT.2020.3002233.
- J. V. V Sobral, J. J. P. C. Rodrigues, R. A. L. Rabêlo, K. Saleem, and S. A. Kozlov, “Improving the Performance of LOADng Routing Protocol in Mobile IoT Scenarios,” IEEE Access, vol. 7, pp. 107032– 107046, 2019, doi: 10.1109/ACCESS.2019.2932718.
- T. Mick, R. Tourani, and S. Misra, “LASeR: Lightweight Authentication and Secured Routing for NDN IoT in Smart Cities,” IEEE Internet Things J., vol. 5, no. 2, pp. 755–764, 2018, doi: 10.1109/JIOT.2017.2725238.
- Q. Zhang, M. Jiang, Z. Feng, W. Li, W. Zhang, and M. Pan, “IoT Enabled UAV: Network Architecture and Routing Algorithm,” IEEE Internet Things J., vol. 6, no. 2, pp. 3727–3742, 2019, doi:10.1109/JIOT.2018.2890428.
- Z. Zhou, B. Yao, R. Xing, L. Shu, and S. Bu, “E-CARP: An Energy Efficient Routing Protocol for UWSNs in the Internet of Underwater Things,” IEEE Sens. J., vol. 16, no. 11, pp. 4072–4082, 2016, doi: 10.1109/JSEN.2015.2437904.
- C. Wang, L. Zhang, Z. Li, and C. Jiang, “SDCoR: Software Defined Cognitive Routing for Internet of Vehicles,” IEEE Internet Things J., vol. 5, no. 5, pp. 3513–3520, 2018, doi: 10.1109/JIOT.2018.2812210.
- K. Z. Ghafoor, L. Kong, D. B. Rawat, E. Hosseini, and A. S. Sadiq, “Quality of Service Aware Routing Protocol in Software-Defined Internet of Vehicles,” IEEE Internet Things J., vol. 6, no. 2, pp. 2817–2828, 2019, doi: 10.1109/JIOT.2018.2875482.
- W. Itani, C. Ghali, R. Bassil, A. Kayssi, and A. Chehab, “ServBGP: BGP-inspired autonomic service routing for multi-provider collaborative architectures in the cloud,” Futur. Gener. Comput. Syst., vol. 32, pp. 99–117, 2014, doi: https://doi.org/10.1016/j.future.2012.05.013.
- T. Baker, B. Al-Dawsari, H. Tawfik, D. Reid, and Y. Ngoko, “GreeDi: An energy efficient routing algorithm for big data on cloud,” Ad Hoc Networks, vol. 35, pp. 83–96, Dec. 2015, doi: https://doi.org/10.1016/j.adhoc.2015.06.008.
- S. Kaja, E. M. Shakshuki, and A. Yasar, “Long Short-Term Memory Approach for Routing Optimization in Cloud ACKnowledgement Scheme for Node Network,” Procedia Comput. Sci., vol. 184, pp. 461–468, 2021, doi: https://doi.org/10.1016/j.procs.2021.03.058.
- X. Peng and Y. Chang, “Energy-efficient routing technique for reliable data transmission under the background of big data for disaster region,” Comput. Intell., vol. 36, no. 4, 2020, doi: 10.1111/coin.12294.
- L. Zhao, Z. Bi, M. Lin, A. Hawbani, J. Shi, and Y. Guan, “An intelligent fuzzy-based routing scheme for software-defined vehicular networks,” Comput. Networks, vol. 187, p. 107837, Mar. 2021, doi: 10.1016/j.comnet.2021.107837.