A survey: Optimal node routing strategies in MANET

MANET, a self-organizing network of various devices responsible for seamless communication. Routing protocols involved in the communication adopts new strategies to assure energy, security, traffic minimization, overhead. Dynamic nature of the MANET requires the modification in routing protocols for performance improvement. This paper presents the detailed survey of strategies involved in the implementation of routing protocols in the MANET. The survey categorized into four phases namely, routing protocols, neighborhood discovery, centralized / distributed hash tables, and bloom filter involved in MANET routing applications. First, the categorization of routing protocols on the basis of various traffic models presents the MANET structure. Second, a neighborhood discovery mechanism conveys the improvement in the routing configurations. Third, application of hash table mechanisms (centralized / distributed) to MANET to improve the matching efficiencies and computational speed. Finally, the application of bloom filter concept to improve service discovery rate and reduce the fake identities. Traditionally, the uncertainty occurs during the prediction of optimal node routing due to the dynamic nature of the MANET. Moreover, the presence of removed malicious node in another cluster degraded the link stability. This survey conveys the difficulties namely, storage overhead, mobility nature, malicious nodes and false positive rates in the traditional methods. The detailed survey leads to the stone of integration of Distributed Hash Table (DHT) with a bloom filter to overcome the difficulties in traditional research works.

[1]  Eduardo da Silva,et al.  Towards a fully self-organized identity-based key management system for MANETs , 2013, 2013 IEEE 9th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[2]  P. M. Khilar,et al.  CSRP: A Centralized Secure Routing Protocol for mobile ad hoc network , 2012, 2012 Third International Conference on Emerging Applications of Information Technology.

[3]  Shahbaz Akhtar Abid,et al.  Exploiting 3D Structure for Scalable Routing in MANETs , 2013, IEEE Communications Letters.

[4]  H. Hasbullah,et al.  An efficient defense method against UDP spoofed flooding traffic of denial of service (DoS) attacks in VANET , 2013, 2013 3rd IEEE International Advance Computing Conference (IACC).

[5]  Feng Zhao,et al.  CSR: Classified Source Routing in Distributed Networks , 2018, IEEE Transactions on Cloud Computing.

[6]  Laura Carrea,et al.  Optimized hash for network path encoding with minimized false positives , 2014, Comput. Networks.

[7]  Jaime C. Acosta,et al.  Survivability prediction of ad hoc networks under attack , 2012, MILCOM 2012 - 2012 IEEE Military Communications Conference.

[8]  Gene Tsudik,et al.  Privacy-Preserving Location-Based On-Demand Routing in MANETs , 2011, IEEE Journal on Selected Areas in Communications.

[9]  Ankurkumar Patel Group Mobility Model Based Proactive and Reactive Routing Protocol in MANET , 2012 .

[10]  Ralf Steinmetz,et al.  CBFR: Bloom filter routing with gradual forgetting for tree-structured wireless sensor networks with mobile nodes , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).

[11]  Hermann Hellwagner,et al.  A hybrid MANET-DTN routing scheme for emergency response scenarios , 2013, 2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).

[12]  Teresa Maria Vazão,et al.  Routing on large scale mobile ad hoc networks using bloom filters , 2014, Ad Hoc Networks.

[13]  Ruoyu Wu,et al.  Risk-Aware Mitigation for MANET Routing Attacks , 2012, IEEE Transactions on Dependable and Secure Computing.

[14]  Isaac Keslassy,et al.  Maximizing the Throughput of Hash Tables in Network Devices with Combined SRAM/DRAM Memory , 2015, IEEE Transactions on Parallel and Distributed Systems.

[15]  Shrideep Pallickara,et al.  Evaluating Geospatial Geometry and Proximity Queries Using Distributed Hash Tables , 2014, Computing in Science & Engineering.

[16]  Teresa Maria Vazão,et al.  HRAN - A Scalable Routing Protocol for Multihop Wireless Networks Using Bloom Filters , 2011, WWIC.

[17]  Muneer O. Bani Yassein,et al.  Neighborhood-Based Route Discovery Protocols for Mobile Ad Hoc Networks , 2013, Int. J. Mob. Comput. Multim. Commun..

[18]  Rafael Timóteo de Sousa Júnior,et al.  Trust-based security for the OLSR routing protocol , 2013, Comput. Commun..

[19]  Ing-Ray Chen,et al.  Scalable and efficient dual-region based mobility management for ad hoc networks , 2014, Ad Hoc Networks.

[20]  Mohamed Slim Ben Mahmoud,et al.  An ADS-B Based Secure Geographical Routing Protocol for Aeronautical Ad Hoc Networks , 2013, 2013 IEEE 37th Annual Computer Software and Applications Conference Workshops.

[21]  Iain Parris,et al.  Privacy-enhanced social-network routing , 2012, Comput. Commun..

[22]  Chen Yan Distributed Hash Table Based Routing Algorithm for Wireless Sensor Networks , 2014, 2014 Fifth International Conference on Intelligent Systems Design and Engineering Applications.

[23]  Ditipriya Sinha,et al.  CBSRP: Cluster based secure routing protocol , 2014, 2014 First International Conference on Networks & Soft Computing (ICNSC2014).

[24]  Enrique Alba,et al.  Fast energy-aware OLSR routing in VANETs by means of a parallel evolutionary algorithm , 2012, Cluster Computing.

[25]  Stefan Weber,et al.  Below Cross-Layer: An Alternative Approach to Service Discovery for MANETs , 2012, ADHOCNETS.

[26]  Laxmi Shrivastava,et al.  Performance Evaluation of Routing Protocols in MANET with Different Traffic Loads , 2011, 2011 International Conference on Communication Systems and Network Technologies.

[27]  Danai Chasaki,et al.  Identifying malicious behavior in MANET through data path information , 2014, 2014 International Conference on Computing, Networking and Communications (ICNC).

[28]  Minglu Li,et al.  H-Tree: An Efficient Index Structurefor Event Matching in Content-BasedPublish/Subscribe Systems , 2015, IEEE Transactions on Parallel and Distributed Systems.

[29]  Mario Gerla,et al.  Path Heuristics Using ACO for Inter-domain Routing in Mobile Ad Hoc and Sensor Networks , 2010, BIONETICS.

[30]  David J. Fleet,et al.  Fast Exact Search in Hamming Space With Multi-Index Hashing , 2013, IEEE Transactions on Pattern Analysis and Machine Intelligence.

[31]  Frank T. Johnsen,et al.  Distributed chat in dynamic networks , 2011, 2011 - MILCOM 2011 Military Communications Conference.

[32]  Roksana Boreli,et al.  Improving the efficiency of anonymous routing for MANETs , 2012, Comput. Commun..

[33]  Zahir Tari,et al.  An ID-based approach to the caching and distribution of peer-to-peer, proxy-based video content , 2014, J. Netw. Comput. Appl..

[34]  Rajesh Shrivastava,et al.  Energy Consumption using Traffic Models for MANET Routing Protocols , 2011 .