Table of Contents Author Guidelines Submit a Manuscript
Journal of Sensors
Volume 2016, Article ID 5486437, 18 pages
http://dx.doi.org/10.1155/2016/5486437
Research Article

Adaptive Cross-Layer Multipath Routing Protocol for Mobile Ad Hoc Networks

1Institute of Information Technology, Kohat University of Science and Technology (KUST), Kohat City 26000, Pakistan
2Integrated Management Coastal Research Institute, Universidad Politecnica de Valencia, Camino de Vera, 46022 Valencia, Spain
3Biomedical Technology Department, College of Applied Medical Sciences, King Saud University, Riyadh 11633, Saudi Arabia

Received 24 March 2016; Accepted 26 May 2016

Academic Editor: Jian Shu

Copyright © 2016 Zeeshan Iqbal et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. L. Abusalah, A. Khokhar, and M. Guizani, “A survey of secure mobile Ad hoc routing protocols,” IEEE Communications Surveys and Tutorials, vol. 10, no. 4, pp. 78–93, 2008. View at Publisher · View at Google Scholar · View at Scopus
  2. R. Lacuesta, M. Garcia, J. Lloret, and G. Palacios, “Study and performance of ad hoc routing protocols,” in Mobile Ad Hoc Networks: Current Status and Future Trends, pp. 71–101, CRC Press, Taylor and Francis, 2011. View at Google Scholar
  3. C. E. Perkins and P. Bhagwat, “Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers,” in Proceedings of the Conference on Communications Architectures, Protocols and Applications (SIGCOMM '94), pp. 234–244, London, UK, September 1994. View at Publisher · View at Google Scholar
  4. S. Murthy and J. Garcia-Luna-Aceves, “An efficient routing protocol for wireless networks,” Mobile Networks and Applications, vol. 1, no. 2, pp. 183–197, 1996. View at Publisher · View at Google Scholar
  5. G. Pei, M. Gerla, and T.-W. Chen, “Fisheye State Routing: a routing scheme for ad hoc wireless networks,” in Proceedings of the IEEE International Conference on Communications (ICC '00), pp. 70–74, New Orleans, La, USA, June 2000. View at Scopus
  6. J. J. Garcia-Luna-Aceves and M. Spohn, “Source-tree routing in wireless networks,” in Proceedings of the 7th International Conference on Network Protocols (ICNP '99), pp. 273–282, October-November 1999. View at Publisher · View at Google Scholar · View at Scopus
  7. G. Malkin and M. Steenstrup, “Distance-vector routing,” in Routing in Communications Networks, pp. 83–98, Prentice Hall, Englewood Cliffs, NJ, USA, 1995. View at Google Scholar
  8. J. Moy, “Link-state routing,” in Link-State Routing, Routing in Communications Networks, pp. 135–157, Prentice Hall, Englewood Cliffs, NY, USA, 1995. View at Google Scholar
  9. C. E. Perkins and E. M. Royer, “Ad-hoc on-demand distance vector routing,” in Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications (WMCSA '99), pp. 90–100, New Orleans, La, USA, February 1999. View at Publisher · View at Google Scholar · View at Scopus
  10. D. Johnson, D. Maltz, and J. Broch, “DSR: the dynamic source routing protocol for multi-hop wireless ad hoc networks,” in Ad Hoc Networking, pp. 139–172, Addison-Wesley, 2001. View at Google Scholar
  11. C.-K. Toh, “Associativity-Based routing for ad-hoc mobile networks,” Wireless Personal Communications, vol. 4, no. 2, pp. 103–139, 1997. View at Publisher · View at Google Scholar · View at Scopus
  12. V. D. Park and M. S. Corson, “Highly adaptive distributed routing algorithm for mobile wireless networks,” in Proceedings of the 16th IEEE Annual Conference on Computer Communications (INFOCOM '97), pp. 1405–1413, April 1997. View at Scopus
  13. M. R. Pearlman and Z. J. Haas, “Determining the optimal configuration for the zone routing protocol,” IEEE Journal on Selected Areas in Communications, vol. 17, no. 8, pp. 1395–1414, 1999. View at Publisher · View at Google Scholar · View at Scopus
  14. T. Hamma, T. Katoh, B. B. Bista, and T. Takata, “An efficient ZHLS routing protocol for mobile ad HOC networks,” in Proceedings of the 17th International Conference on Database and Expert Systems Applications (DEXA '06), pp. 66–70, Krakow, Poland, September 2006. View at Scopus
  15. A. Kumar, D. Manjunath, and J. Kuri, Communication Networking: an Analytical Approach, Morgan Kaufmann, Los Altos, Calif, USA, 2004.
  16. S.-T. Chou, H.-T. Chern, C.-M. Shiao, and Z.-J. Lee, “Cross-layer design of AODV protocol for multi-hop flow in ad hoc network,” Ad-Hoc and Sensor Wireless Networks, vol. 17, no. 3-4, pp. 233–252, 2013. View at Google Scholar · View at Scopus
  17. M. M. Zoulikha and B. Amal, “Cross-layer approach among physical, MAC and routing layer in a shadowing environment,” Ad-Hoc and Sensor Wireless Networks, vol. 21, no. 1-2, pp. 101–119, 2014. View at Google Scholar · View at Scopus
  18. V. Carrascal, G. Delgado, and M. Igartua, “Multipath routing with layered coded video to provide QoS for video streaming applications over MANETs,” in Proceedings of the 14th IEEE International Conference on Communication Networks (ICON '06), pp. 1–6, Singapor, 2006. View at Publisher · View at Google Scholar
  19. V. Loscrì, F. De Rango, and S. Marano, “Performance evaluation of on-demand multipath distance vector routing protocol over two MAC layers in mobile ad hoc networks,” in Proceedings of the 1st International Symposium on Wireless Communication Systems (ISWCS '04), pp. 413–417, September 2004. View at Scopus
  20. Y. Zhen, M.-Q. Wu, D.-P. Wu, Q.-J. Zhang, and C.-X. Xu, “Toward path reliability by using adaptive multi-path routing mechanism for multimedia service in mobile Ad-hoc network,” Journal of China Universities of Posts and Telecommunications, vol. 17, no. 1, pp. 93–100, 2010. View at Publisher · View at Google Scholar · View at Scopus
  21. P. Jacquet and T. Clausen, Optimized Link State Routing Protocol (OLSR), Internet Draft, IETF MANET Working Group, 2001.
  22. S. H. Shah and K. Nahrstedt, “Predictive location-based QoS routing in mobile ad hoc networks,” in Proceedings of the International Conference on Communications (ICC '02), vol. 2, pp. 1022–1027, May 2002. View at Scopus
  23. E. Royer and C. Perkins, “Quality of service for adhoc on-demand distance vector routing,” IETF Internet Draft, July 2000. View at Google Scholar
  24. R. Sivakumar, P. Sinha, and V. Bharghavan, “CEDAR: a core-extraction distributed ad hoc routing algorithm,” IEEE Journal on Selected Areas in Communications, vol. 17, no. 8, pp. 1454–1465, 1999. View at Publisher · View at Google Scholar · View at Scopus
  25. M. G. Zapata, “Secure ad hoc on-demand distance vector routing,” ACM SIGMOBILE Mobile Computing and Communications Review, vol. 6, no. 3, p. 106, 2002. View at Publisher · View at Google Scholar
  26. S. Khan and J. Loo, “Cross layer secure and resource-aware on-demand routing protocol for hybrid wireless mesh networks,” Wireless Personal Communications, vol. 62, no. 1, pp. 201–214, 2012. View at Publisher · View at Google Scholar · View at Scopus
  27. V. Sharma and B. Alam, “Unicaste routing protocols in mobile ad hoc networks: a survey,” International Journal of Computer Applications, vol. 51, no. 14, pp. 9–18, 2012. View at Publisher · View at Google Scholar
  28. D. Tepsic, M. Veinovic, D. Zivkovic, and N. Ilic, “A novel proactive routing protocol in mobile ad hoc networks,” Ad-Hoc and Sensor Wireless Networks, vol. 27, no. 3-4, pp. 239–261, 2015. View at Google Scholar · View at Scopus
  29. M. Tarique, K. E. Tepe, S. Adibi, and S. Erfani, “Survey of multipath routing protocols for mobile ad hoc networks,” Journal of Network and Computer Applications, vol. 32, no. 6, pp. 1125–1143, 2009. View at Publisher · View at Google Scholar · View at Scopus
  30. A. Tsirigos, Z. Haas, and S. Tabrizi, “Multipath routing in mobile ad hoc networks or how to route in the presence of frequent topology changes,” in Proceedings of the Military Communications Conference, pp. 878–883, Vienna, Va, USA, October 2001.
  31. L. Wang, S. Jang, and T.-Y. Lee, “Redundant source routing for real-time services in ad hoc networks,” in Proceedings of the 2nd IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS '05), pp. 87–93, Washington, DC, USA, November 2005. View at Publisher · View at Google Scholar · View at Scopus
  32. S. Mao, S. Lin, Y. Wang, S. S. Panwar, and Y. Li, “Multipath video transport over ad hoc networks,” IEEE Wireless Communications, vol. 12, no. 4, pp. 42–49, 2005. View at Publisher · View at Google Scholar · View at Scopus
  33. A. Nasipuri and S. Das, “On-demand multipath routing for mobile ad hoc networks,” in Proceedings of the 8th International Conference on Computer Communications and Networks, pp. 64–70, IEEE, Boston, Mass, USA, 1999. View at Publisher · View at Google Scholar
  34. Z.-t. Li, Q. Chen, G.-m. Zhu, Y.-j. Choi, and H. Sekiya, “A low latency, energy efficient mac protocol for wireless sensor networks,” International Journal of Distributed Sensor Networks, vol. 2015, Article ID 946587, 9 pages, 2015. View at Publisher · View at Google Scholar · View at Scopus
  35. Z. Zheng, A. Liu, L. X. Cai, Z. Chen, and X. S. Shen, “Energy and memory efficient clone detection in wireless sensor networks,” IEEE Transactions on Mobile Computing, vol. 15, no. 5, pp. 1130–1143, 2016. View at Publisher · View at Google Scholar
  36. M. Dong, K. Ota, A. Liu, and M. Guo, “Joint optimization of lifetime and transport delay under reliability constraint wireless sensor networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 27, no. 1, pp. 225–236, 2016. View at Publisher · View at Google Scholar
  37. S. Hamrioui, P. Lorenz, J. Lloret, and M. Lalam, “A cross layer solution for better interactions between routing and transport protocols in MANET,” Journal of Computing and Information Technology, vol. 21, no. 3, pp. 137–147, 2013. View at Publisher · View at Google Scholar · View at Scopus
  38. R. Sanchez-Iborra and M. Cano, “An approach to a cross layer-based QoE improvement for MANET routing protocols,” Network Protocols and Algorithms, vol. 6, no. 3, pp. 18–34, 2014. View at Publisher · View at Google Scholar
  39. L. Abusalah, A. Khokhar, and M. Guizani, “A survey of secure mobile ad hoc routing protocols,” IEEE Communications Surveys and Tutorials, vol. 10, no. 4, pp. 78–93, 2008. View at Publisher · View at Google Scholar · View at Scopus
  40. J. L. Tornos, J. L. Salazar, and J. J. Piles, “Secure trust management with source routing protocol for MANETs,” Network Protocols and Algorithms, vol. 7, no. 2, pp. 42–59, 2015. View at Google Scholar
  41. J.-H. Cho, A. Swami, and I.-R. Chen, “A survey on trust management for mobile ad hoc networks,” IEEE Communications Surveys and Tutorials, vol. 13, no. 4, pp. 562–583, 2011. View at Publisher · View at Google Scholar · View at Scopus
  42. A. Nasipuri and S. Das, “On-demand multipath routing for mobile ad hoc networks,” in Proceedings of the 8th International Conference on Computer Communications and Networks (IC3N '99), pp. 64–70, Boston, Mass, USA, October 1999. View at Publisher · View at Google Scholar
  43. S. Buchegger and J.-Y. Le Boudec, “Performance analysis of the CONFIDANT protocol (cooperation of nodes—fairness in dynamic ad-hoc networks),” in Proceedings of the 3rd Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '02), pp. 226–236, ACM Press, Lausanne, Switzerland, June 2002.