Download as pdf or txt
Download as pdf or txt
You are on page 1of 14

Journal of Ambient Intelligence and Humanized Computing

https://doi.org/10.1007/s12652-020-02552-4

ORIGINAL RESEARCH

Flexible multipoint relay selection for suitable route in mobile ad hoc


networks
Trilok Kumar Saini1   · Subhash C. Sharma2

Received: 19 April 2020 / Accepted: 11 September 2020


© Springer-Verlag GmbH Germany, part of Springer Nature 2020

Abstract
The dynamic formations of the mobile ad hoc networks require routing protocols to handle the routing requirements in run-
time. The purpose of this work is to improve the endurance, quality, and trust of the path chosen by the link state routing
in mobile ad hoc networks. The multipoint relay concept has been fascinating in link sate routing optimization to reduce
duplicate retransmissions in the same region. In this paper, we present the notion of flexibility and suitability in choosing the
multipoint relays. A suitable multipoint relay selection algorithm has been proposed to choose the appropriate multipoint
relays which are trustworthy, restrain appropriate residual battery and possess a good quality link for interconnections. The
algorithm also takes care of the willingness, reachability, degree, and the relative mobility of the nodes in the selection
process. The results illustrate that the selection of the appropriate relay nodes offers substantial improvements.

Keywords  Ad hoc network · Suitable multipoint relay · Routing protocol · Tactical network · MANET

1 Introduction discovery are the two classic route finding approaches. The
on-demand route discovery assists in reducing the routing
Mobile ad hoc networks offer quick and dynamic formation overhead (Saini et al. 2020), while the proactive approach
of the network of the nodes having moving competency and formulates the routes in advance that assist in overcoming
wireless capability without requiring the central administra- the delay incurred in the route discovery process. The prior
tion. These autonomous and self-organized networks have information of the routes of the networks with periodic
been useful for information exchange in emergency situ- maintenance makes the proactive approach more determinis-
ations. The quick formation of the self-configuring, self- tic even under the dynamism of the ad hoc network (Murthy
organized, multi-hop network reflects the usability aspect of and Manoj 2013). Optimized link state routing (OLSR) is a
these networks (Conti and Giordano 2014). The infrastruc- promising proactive routing protocol. The protocol uses the
ture-less nature, non-discrimination of host and routers, and technique of multipoint relays (MPRs) for efficient flooding
possible extendibility to the backbone networks make these in the network, and the concept also reduces the number of
networks a striking choice for widespread applications (Har- control messages in the network (Clausen and Jacquet 2003).
rag et al. 2019). Routing is the key mechanism of multi-hop The native multipoint relay selection algorithm of the OLSR
ad hoc networks, and routing protocols play an important does not consider many vital information of the node, link,
role in the route finding process (Karthikeyan et al. 2020). and the network, which can be expedient for appropriate
The proactive calculation of the routes and on-demand route multipoint relay selection. We look into this aspect, care-
fully choose appropriate metrics, modify the MPR selection
algorithm, and analyze the improvement. The participating
* Trilok Kumar Saini nodes in the mobile ad hoc networks are small in form-factor
trilok.saini@deal.drdo.in and are mostly battery operated. It is desirable that route
Subhash C. Sharma selection should consider the residual battery to reduce the
scs60fpt@iitr.ac.in route switching, and to minimize the network partition (Joshi
1 and Rege 2012). The selection of the nodes with better link
Defence Electronics Applications Laboratory, DRDO,
Dehradun, India capability and quality also assist in network performance
2 improvement. In the tactical ad hoc context, it is always
Indian Institute of Technology, Roorkee, India

13
Vol.:(0123456789)
T. K. Saini, S. C. Sharma

preferable that forwarding nodes are trustworthy to carry protocol parameters, and apply it to OLSR. The method is
the data in the network (Nosheen et al. 2019; Pawgasame automatic and makes use of the multi objective genetic
and Wipusitwarakun 2015). The mobility of the nodes in algorithm. In Ahn et al. (2016), a concentrated multipoint
mobile ad hoc networks significantly impacts the perfor- relay approach based on sharing MPRs has been proposed,
mance of the routing process (Boushaba et al. 2015; Saini in which reduction in MPRs has been utilized to reduce the
and Sharma 2020). Consideration of the mobility factor in control overhead and the MAC layer collisions. Karthikeyan
the routing mechanism will be useful in a more appropriate et al. (2020) suggest the secure approach for the routing and
routing decision. Our novelty lies in the flexible combination make use of the bio inspired techniques. Boushaba et al.
of suitable multi-parameters in the selection of the forward- (2015) proposed the optimization aiming for the reduction
ing nodes for efficient packet dissemination. We propose in the number of topology control messages. In Jain and
the suitable selection of multipoint relays that takes trust- Kashyap (2019), link defined OLSR (LD-OLSR) consid-
worthiness, battery level, link quality, and relative mobility ers the quality of the link in routing decisions. The authors
as a flexible combination in the selection criterion of the make use of the expected transmission (ETX) count met-
algorithm. We also consider willingness, reachability, and ric to estimate the link quality. In Ahn and Lee (2017), the
degree. The paper is organized as follows. We mention the authors proposed the variation in the MPR selection method
related work in Sect. 2. In Sect. 3, we present the mechanism in which additional MPRs have been selected. The proposal
of optimized link state routing protocol. In Sect. 4, we pro- assumes that some of the broadcast messages may be lost
pose our methodology and algorithm. In Sect. 5, we simulate due to the wireless nature of transmission, and redundancy
and compare the proposed algorithm and present the results. can be useful for robust broadcast in the network. Zhang
Finally, in Sect. 6, we conclude the paper. et al. (2019) used the quantum genetic strategy to optimize
the selection of MPR in quantum-genetic based OLSR
(QG-OLSR).
2 Related work

In this section, we present the existing work to improve the 3 Multipoint relay in proactive routing
performance of optimized link state routing. In Zhang et al. optimization
(2020), multi-path OLSR has been proposed to exploit the
multi-beam transmissions. Moussaoui et al. (2014) apply the The optimized link state routing (OLSR), OLSRv2 (Clausen
concept of stability and fidelity to elect the stable multipoint et al. 2014), and topology dissemination based on reverse-
relay (MPR) nodes and suggested two metrics, i.e., the sta- path forwarding (TBRPF) are the proactive routing protocols
bility of nodes (SND) and the fidelity of the nodes (FND) in the charter of the Internet engineering task force (IETF)
to improve the multipoint relay selection. Authors make use (Conti and Giordano 2014). Clausen and Jacquet (2003)
of the signal power as an indication of stability. Lim et al. presented the optimization in link state routing for large and
(2018) propose the concept of mutual node evaluation for dense networks by using the selected nodes referred to as
safe multipoint relay selection. In this approach, the evalu- multipoint relays (MPRs). In the suggested approach, only
ation of the node is done based on the packet forwarding MPR nodes generate the link state information, retransmit
capabilities. Joshi and Rege (2012) propose OLSRM based the broadcast messages, and only adequate link state infor-
on OLSR modifications with the focus on energy efficiency mation is distributed in the network. The 1-hop neighbors of
for better network lifetime. In Shenbagalakshmi and Revathi the nodes which are not MPRs do not forward the broadcast
(2020), MPR based connected dominated set construction packets. The optimization governed by MPRs in the link
has been proposed to improve the network life time. Anbao state routing is significant to reduce the control overhead
and Bin (2014) proposed the node localization concept to in the network while preserving the proactive nature of the
improve the MPR selection algorithm. An adaptive proposal protocol. Each node selects some of its neighbors with bi-
OLSR-AD by Son et al. (2015) introduced the routing metric directional links as MPRs in such a way that these can cover
based on the expected transmission count and mobility fac- all the nodes in 2-hop. The union of the neighbor sets of all
tor. A concept of locating the obstructing entities was sug- MPRs contains the 2-hop neighbor set. The selected MPRs
gested by Belhassen et al. (2018). It utilizes the signalling of periodically announce the information of their MPR selec-
cartography enhanced OLSR and integrates in the protocol. tors in the network. The information of the MPR selector set
The proposal in Alamsyah et al. (2009) uses the min–max is utilized by the nodes to calculate and update its route to
algorithm based on the quality of service in the selection the possible destinations in the network (Clausen and Jac-
of MPR nodes. Li and Wu (2017) proposed SMLR_OLSR quet 2003). Let N1h (S) and N2h (S) are the 1-hop and 2-hop
based on smooth mobility and link reliability. Harrag et al. neighbors of node S. If Mi is one of the multipoint relays of
(2019) have suggested the approach for selecting the routing S, and MPR(S) represents the multipoint relay set of node S,

13
Flexible multipoint relay selection for suitable route in mobile ad hoc networks

Table 1  Packet format MPRs for building the intra-forwarding database needed for
UDP Header Packet header Message header Message packet routing. On receiving TC message, nodes record and
maintain the topology entry in the topology table, having the
Port (698), (8 bytes) (4 bytes) (12 bytes) Variable information of the last hop connected pairs. The descending
order backtracking of this information is used for building
the routing table to route the packets in the network. Based
such that MPR(S) = {M1 , M2 ...Mk }∀Mi ∈ N1h (S) . The 1-hop on the flow of the control information in the network, each
neighbors of the multipoint relay node ( Mi ) cover the nodes node gathers some information and store in its database for
from N2h (S) , that is N1h (Mi ) ⊂ N2h (S) . The message sent by the protocol operation (Clausen and Jacquet 2003; Jacquet
node S is relayed by Mi ∈ MPR(S) and reaches the node et al. 2001). The major information repositories of the pro-
w ∈ N2h (S) , the relationship can be given by Eq. 1. tocol are shown in Fig. 1. The protocol keeps the next-hop
information to forward the packets towards destinations and
MPR(S) ⊂ N1h (S) ⎫ route the packets through MPR nodes. Table 3 reflects the

N1h (MPR(S)) = {N1h (M1 ) ∪ N1h (M2 )..... ∪ N1h (Mk )�{S} ∪ N1h (S)}⎪ radicals of the protocol activities.

N2h (S) = {w, s.t. u ∈ N1h (S)�w ∈ N1h (u)�{S} ∪ N1h (S)} ⎪ The routing objective of the protocol is achieved through
N2h (S) ⊆ N1h (MPR(S)) ⎪ four major functions, as shown in Fig. 2. The first is the

(1) neighbor sensing to detect the neighbor nodes and link sta-
tus. The second is the multipoint relay selection to optimize
HELLO and TC are the two primary periodic messages the flow of broadcast packets in the network (Alamsyah et al.
used by the protocol to achieve its functionality. It also 2009). The third function, topology discovery, is used to
makes use of the MID message for multiple interface decla- gather the information about multipoint relays of other nodes
ration. The packet format used by the protocol is shown in and is achieved through the MPR information declaration.
Table 1. The fields and the significance of the headers and Finally, the routing table is calculated to generate the next-
messages have been summarized in Table 2. On the basis hop information for the routing of the packets in the network
of the neighbors’ information up to 2-hop, nodes can select (Jacquet et al. 2001). The routing table contains the entries
the MPRs from its 1-hop bidirectional neighbor set and indi- like {destination address, next hop address, distance, and
cate the selected MPR nodes in the HELLO messages. The interface address} to route the packets.
MPR indication in HELLO message is used by the MPRs to The significant concept of the protocol that governs the
deduce their MPR selector table. The Topology control (TC) optimization is the MPR selection technique (Zhang et al.
messages are used to construct the network-wide topology 2019). The default MPR selection algorithm makes use
information. The TC messages contain the MPR selector of the willingness, reachability, and degree to select the
set and are periodically broadcasted in the network by the MPR set from its neighbors. The willingness represents

Table 2  Packet intrinsic and fields


Header/message Purpose Fields

Packet header Basic layout for packets Packet length, Packet sequence number
Message header Basic layout for messages Message type, V-time, Msg size, Originator address, Time to live, Hop count,
Message sequence number
HELLO message Neighbor detection, link sensing, H-Time, Willingness, Link code, Link message size, Neighbor interface address
MPR selection, and signaling
TC message Topology discovery Advertised neighbor sequence number, Advertised neighbor main addresses
MID message Declare multiple interfaces Interface addresses

Fig. 1  Messages and informa-


tion repositories
Link Set 2-hop MPR
Hello Topology TC
Neighbor Neighbor MPR Set Selector
Message Set Message
Set Set Set

Routing table

13
T. K. Saini, S. C. Sharma

Table 3  Protocol activities Contrivance Outcome

HELLO message One hop neighbors, link status


HELLO (1-hop neighbors) 2-hop neighbors
Info of one and two-hop neighbors Selection of MPRs (by MPR selection algorithm)
HELLO (link status- MPR) MPR selector table
TC (MPR selector set) Topology table (last hop-TC originator, destina-
tion-MPR selector)
Topology table (last hop connected pairs) Routing table (backtracking)
Routing table Routes to nodes in the network
   (Destination, next-hop, distance)

Fig. 2  Protocol functions

Neighbor MPR Topology Routing


Detection selection Discovery Table

the readiness of the node to carry and forward traffic. The nodes can be useful to select the node which is less likely
protocol starts the MPR selection by the nodes which have to disjoint. The relative mobility ( Mr ) has been considered
higher willingness value. If multiple choices are available to capture the mobility factor. The measurements of these
for the MPRs, the nodes which have higher reachability to parameters require parametric inputs from the lower lay-
the 2-hop neighbors are preferred. If the reachability of two ers, which may be partially available or even may not be
nodes is equal, a node with a higher value of the degree is accessible in many situations. The algorithm design has
preferred for the multipoint relay (Clausen and Jacquet 2003; been made flexible to adjust in accordance with the avail-
Clausen et al. 2014). able inputs. Available parameters, along with the willingness
(W), reachability (R), and degree (D), are also used to decide
the multipoint relay nodes in the network. The presence of
4 Proposed methodology the multipoint relay nodes assists in relaying the desired
information for generating complete network topology while
We present the novel approach in proactive routing opti- reducing the unnecessary dissemination of the information
mization. The method proposes uniqueness in the flexible in the network. On the basis of 1-hop and 2-hop neighbors
selection of multipoint relay (MPR) nodes. The MPRs and other parametric information, the algorithm calculates
are the elected nodes from 1-hop neighbors ( ⊂ N1h ) of the the MPRs. The interface of the MPR selection mechanism
intended node, which govern the flow of the information has been depicted in Fig. 3. In the subsequent section, we
in the network. In this proposal, we consider the flexibility cover the details of the proposed method and the algorithm.
of the parameters, in which unavailable parameters can be
skipped, and if required, new parameters can be incorpo- 4.1 Flexible MPR selection
rated. We primarily aim the security concerns, residual bat-
tery capacity, link quality, and mobility. To handle these The proposed suitable MPR selection (SMS) algorithm
artifacts, we propose the trust parameter, battery parameter, selects the most appropriate neighbors for the MPR set
link quality parameter, and relative mobility, respectively. based on the best values of willingness, trustworthiness,
The trust parameter (Tl ) measures the trust level of the node residual battery capacity, link quality, mobility factor,
based on the parametric inputs of robustness, authentication, reachability, and degree. We start elaborating on the algo-
and integrity. It improves the suitability of the approach for rithm by elucidation of the algorithmic parameters, and
the tactical networks. The battery parameter ( Bl ) has been subsequently, we cover algorithmic details. In the tactical
considered for the remaining battery capacity and reflects networking scenario, the trustworthiness of the individ-
the lifetime of the node. The link quality parameter ( Lq ) ual node is important for maintaining the solidarity of the
represents the data-carrying capacity and quality of the wire- group (Cho 2015). We have categorized the participating
less link. The battery level and link quality parameters are nodes in two categories, i.e., routine ( Cr  ) and trusted ( Ct ).
momentous for network availability and quality provision- The trusted nodes comply with the security requirements
ing in the network. The information of the movement of the of the group, while routine nodes need to meet only the

13
Flexible multipoint relay selection for suitable route in mobile ad hoc networks

then the decisive selection is made using reciprocal of the


Trust level remaining battery capacity. The cost function based on the
Battery level
Link quality remaining battery capacity is given by Eq. 3.
Mobility factor
⎧ ∞, b = 0 ⎫
⎪ i
� ⎪
⎪ 1 + 1 bi , bi ≤ Bt ⎪
1-hop neighbors Suitable MPR C(bi ) = ⎨ ⎬ (3)
& Selection MPR Set ⎪ 1,�bi = Bt ⎪
2-hop neighbors Algorithm ⎪1 b ,b > B ⎪
⎩ i i t ⎭

Willingness We consider the link quality as the function of supported


Reachability data rate, stability (Moussaoui et al. 2014), and reliability
Degree (Yelemou and Dandjinou 2014) of the wireless link. If Dr , dl
are the reference data rate and actual data rate, and Ls , Lr are
Fig. 3  MPR selection mechanism the link stability and reliability factors respectively, then the
cost function for link quality is given by Eq. 4.
/ /
Table 4  Trust level
C(lq ) = Dr dl + 𝛼 Ls + 𝛽∕Lr (4)

Category Level Value We cogitate the mobility factor with respect to the nodes
participating in the MPR selection process. Nodes exchange
Routine ( Cr) Basic ( Tlb) 0
their mobility values with the neighbors in the periodic con-
Trusted ( Ct) Moderate ( Tlm) 1
trol messages. Based on the received mobility value of the
High ( Tlh) 2
neighbors and their own mobility, nodes calculate the rela-
tive mobility factor. In the MPR selection process, relatively
unwavering nodes are preferred. The cost function of the
basic communication requirements. Nodes may have dif- relative mobility ( Mr  ) is given by Eq. 5, where Ms is the
ferent parametric values for robustness p(r) , authenticity mobility of the selector and Mn is the mobility factor of its
p(a) , and integrity p(i) . If Tl (x) and Tk (x) represent the trust 1-hop neighbor node.
value and the intertwined trust component of the node,
respectively. The trust value for a node (x) can be given C(Mr ) = {𝛿|Ms − Mn |} (5)
by Eq. 2.
The willingness is the node’s readiness to forward the

Tl (x) = 𝛼k Tk (x), ∀ I = {p(r), p(a), p(i)} traffic (Suhaimi et al. 2009). The value of willingness can be
(2)
k∈I ( 0 ≤ W ≤ 7 ), where 0 specifies that the node is not willing to
be elected as MPR, the value of 3 represents the default will-
All the nodes are required to exchange their trust levels
ingness, while 7 is the maximum value of willingness. The
( Tl ) with their neighbors. The values of the trust level and
nodes that express willingness, i.e., ( W > 0 ) can be selected
their categories are given in Table 4. The precedence of
as MPRs. The reachability is the influencing parameter of
the trust level is specified as Tlb < Tlm < Tlh.
the algorithm and can be defined as the number of nodes in
The packet transmission through a node consumes bat-
the 2-hop neighborhood ( N2h ) of nodes (s) which are not yet
tery, and the remaining battery capacity derives the life
covered by the current MPR set but are reachable through 1
of the node (Toh 2001). If the transmissions are routed
hop neighbor (z) for which reachability is desired (Clausen
through the node with the low battery, then the battery will
and Jacquet 2003). If 2-hop neighbors of the node (s) cov-
exhaust soon, and the node will die. We propose that nodes
ered by current MPRs are N2h (MPR) , then 2-hop neighbors
having battery below a certain threshold are given less
not yet covered are N2h (s) − N2h (MPR) . The reachability can
precedence in MPR selection. Let bi is the remaining bat-
be given by Eq. 6, where N(z) is the reachable neighbors of
tery capacity of the node i and Bt is the threshold value of
z.
the battery. If (bi ≤ Bt ) , node is reluctant to be MPR, pro-
vided it is not the only node for 2-hop reachability. If the R(z) = {N(z) ∈ (N2h (s) − N2h (MPR))} (6)
reaming battery is more than the threshold (bi > Bt ) then
node participates for MPR selection. The default value of The degree D(z) of a node (z) can be calculated from its
the threshold is taken as 30%, and the battery level meas- symmetric neighbors Ns (z) . If z is the 1-hop neighbor of the
urement granularity is considered one on the scale of 10. node (s) that performs the computation, i.e., z ∈ {N1h } then
If all other criteria give more than one MPR candidates, it excludes the neighbors of z belonging to { N1h } and also

13
T. K. Saini, S. C. Sharma

excludes the node (s) performing the computation. The value Algorithm1 ∶ SmartMPRSelection(SMS)
of the degree can be given by Eq. 7. FindMPR(Ns , N1h , N2h )
D(z) = Ns (z) − N1h (z) − 1 (7) in ∶ Ns ; neighbor set N1h , N2h
out ∶ Multi point relays Smpr
All these parameters are used in the MPR selection pro-
1 ∶ Smpr ← 𝜙;St ← 0
cedure, which in turn drives the overall optimization of the
network. 2 ∶ for all n ∈ N1h do
3 ∶ if (OnlyReachable(n, N2h ) = TRUE) then
4.2 Realization procedure 4 ∶ Smpr ← Smpr ∪ n
5 ∶ N1h ← N1h �n
The proposed algorithm starts by taking all the nodes in the
1-hop neighborhood ( N1h ) for the consideration of MPR. It 6 ∶ N2h ← N2h �N1h (n)
checks the willingness (W) of the neighbors and calculates 7 ∶ end if
the degree (D) of the nodes. In the selection process, the algo- 8 ∶ end for
rithm selects the nodes, which are the only nodes to provide 9 ∶ while ( |N2h | > 0) do
2-hop reachability. We have considered two classes of will-
10 ∶ W ← 0;T ← 0;B ← 0;L ← 0;Mr ← 0;R ← 0;D ← 0
ingness that are either unwilling or willing with the default
11 ∶ for all n ∈ N1h do
value of willingness. If nodes are willing, the algorithm finds
the neighbors which have high trust level Tl (max) and reli- 12 ∶ if(Wi > W) then
ability. If trustworthiness is the same, it finds the nodes with 13 ∶ T ← Ti ;B ← Bi ;L ← Li ;Mri ← 0;R ← Ri ;D ← Di ;St ← n
remaining battery capacity Bl (rem) more than the threshold 14 ∶ endif
value ( Bt ). If the trustworthiness of the nodes is the same and 15 ∶ St ← n
nodes have battery capacity higher than the threshold, then the
16 ∶ if(Ti > T) then
algorithm finds a neighbor with high link quality Lq (max) . If
willingness and battery meet the criteria, trustworthiness and 17 ∶ T ← Ti
quality factors are equal, then the algorithm finds the neighbor 18 ∶ else if (Ti = T) then
with the least relative mobility Mr (min) . If relative mobility is 19 ∶ if ((Bi > B) and (Bi > BT )) then
the same, then most reachability R(max) is the consideration. 20 ∶ B ← Bi
If reachability also results in the same subset, the algorithm
21 ∶ if((Bi > BT ) and (Li > L)) then
selects the neighbor with the most degree D(max) . SMS algo-
22 ∶ L ← Li
rithm makes use of the logic as given by Algorithm1. The
notations used in the algorithm are given in Table 5. To realize 23 ∶ else if ((Li = L) and (Mri > Mr )) then
the concept, we have made modifications in data structures 24 ∶ Mr ← Mri
of the control packets so that additional information of the 25 ∶ else if ((Mri = Mr ) and (Ri > R)) then
participating nodes could be exchanged with the neighbors. 26 ∶ R ← Ri
27 ∶ else if (Di > D) then
Table 5  Notation used in the algorithm 28 ∶ D ← Di
Notation Definition 29 ∶ else St ← 0
Ns Node performing the computation 30 ∶ end if
N1h 1-hop neighbors of S 31 ∶ end if
N2h 2-hop neighbors of S 32 ∶ else St ← 0
N1h (n) One hop neighbors of n 33 ∶ end if
Smpr Set of MPRs
34 ∶ end for
Wi Willingness of node i
Ti Trust level of node i
35 ∶ Smpr ← Smpr ∪ {St }
Bi Battery level of node i 36 ∶ update N1h ;N2h
Bt Battery threshold 37 ∶ end while
Li Link quality of node i 38 ∶ return Smpr
Mri Relative mobility of node i
Ri Reachability of node i
Di Degree of node i

13
Flexible multipoint relay selection for suitable route in mobile ad hoc networks

4.3 Computational analysis Table 6  Simulation parameters


Parameter Value
In the proposed algorithm, while selecting the multipoint
relays, nodes require to compute and compare the param- Deployment area 10 km × 10 km
eters like trust level, battery level, mobility factor, and link Transmission range 1100 m
quality, etc. in addition to the willingness, reachability and Node data rate 11 Mbps & 1 Mbps
degree. Therefore the computational complexity at the node Transmit power 5 mw
slightly increases as compare to the OLSR. Algorithm com- Packet reception threshold  – 95 dBm
putation involves the following steps. Step1: Select those
nodes from one hop { N1h } which are the only reachable
nodes to 2-hop { N2h }. Step 2: Algorithm picks the best Table 7  Protocol parameters Parameter Value
neighbor in each iteration, puts it in the MPR set { Smpr  },
and updates the strict 2-hop neighborhood. Step3: If nodes Willingness 3
exist in 2-hop neighbors to be covered, the algorithm con- Hello interval 2 s
tinues, else it ends. First, we deduce the average number TC interval 5 s
of neighbors selected as MPR. Let {K1 , K2 , K3 ....Kk } is the Neighbor hold time 20 s
set of 1-hop neighbors of the node N. In the ith step, Ki is Topology hold time 30 s
selected as MPR, if it better satisfies the quality and cover-
age of 2-hop neighbors than any previous node Kj , ∀ (j < i) .
If 𝜌 nodes are already selected as MPR, the probability of a 5.1 Algorithm analysis and comparison
new node to be selected as MPR is 2−𝜌 . Hence, if number of
nodes in one hop neighborhood is k, and nodes to be selected In this scenario, nodes { ns , n1 , n2 .....n10 , nD } have been
as MPR are equal to m, then m = 2−m × k . Thus, nodes to deployed in the simulation area of 10 km × 10 km, each
be selected as MPR = O(log k) . The optimal MPR selection having the transmission range of approximately 1100 m.
is an NP-complete problem (Ahn and Lee 2017), thus for The deployment has been depicted in Fig. 4. The source
MPR computation, heuristic has been presented. Let, the node ( ns ) generates traffic towards the destination ( nD ). All
algorithm starts with the set S0 , P be the nodes selected in the nodes have IPv4 addressing and execute the proactive
step-1 and Sk be the solution. This implies that P ⊆ Sk and routing protocol in three configurations, i.e., OLSR, LD-
|S0 − P| ≤ log n|Sk − P| , where n is the number of nodes OLSR, and the OLSR-SMS algorithm. The traffic charac-
in the network. This infers that the solution is within the teristics and the values of extended parameters for the SMS
factor log(n) from the optimal, similar to OLSR. Due to the algorithm are given in Table 8 and Table 9, respectively. In
additional parameters, the number of computations increases this scenario, the flexibility of the algorithm has been used
by the constant factor O(1) , considering c parameters, addi- to intimate unknown relative mobility. Parameters given in
tional computation equals to cO(1) . Thus the complexity of Table 9 represent the value of trust level, battery level, and
the algorithm results in at most O(log n) times the optimal link quality (Tl , Bl , Lq ) of the nodes.
solution. By applying these parameters, we analyze the compara-
tive performance of the SMS algorithm with OLDR and
LD-OLSR. In the network, some of the nodes have high-
5 Network deployment, analysis, and results quality links (H), while others have low-quality links (L) in
terms of maximum data-carrying capacity. In this scenario,
In this section, we discuss the deployment scenarios, proto- we have done the analysis in two cases. In the first analysis
col configuration, and parameters to analyze the algorithm. (case1), traffic generation at the source ( nS ) is 2 Mbps, while
The proposed SMS algorithm has been simulated in the in the second situation (case2), the source generates the traf-
OPNET simulator, and results have been compared with fic at 1 Mbps towards the destination ( nD ). The performance
the OLSR and the LD-OLSR (Jain and Kashyap 2019). metrics for the protocol are traffic received measured in bits
The behavior of the algorithm has also been analyzed per second by the destination node and the end to end (ETE)
under various conditions. We conduct many simulations to delay between the creation of the packet at the source and
evaluate the performance of the proposed method in multi- its reception at the destination. The measured statistics are
ple scenarios. The simulation parameters and the baseline given in Fig. 5 and Fig. 6 for case 1 and case 2, respectively.
parameters of the protocol are given in Table 6 and Table 7, The results educate that the SMS algorithm gives relatively
respectively. better performance in both cases due to the high-quality
MPR selection.

13
T. K. Saini, S. C. Sharma

Fig. 4  Node deployment sce-


nario-1

7 4
1

5
8 S 2 D
10

3 6
9

Table 8  Traffic parameters 5.2 Flexible parameter analysis


Parameter Value
In this scenario, nodes { ns , n1 , n2 , n3 , n4 , nD1 , nD2  } have
Traffic (bps) 2,000,000 & 1,000,000 bps been deployed, as shown in Fig. 7. To analyze the effect of
Traffic (packets/sec) 200 & 100 packets per seconds parameter configuration and availability, we apply various
Traffic flow node S to node D combinations of algorithm parameters. The source node ( ns )
Traffic start time 30 s generates traffic towards two destinations { nD1 , nD2 }. The
Type of traffic IP participating nodes can have different values for the protocol
Type of service Best effort parameters, i.e., trust level ( Tl ), battery level ( Bl ), link qual-
ity ( Lq ) and mobility ( Mr ). The legacy algorithm does not

Table 9  Extended SMS node-S node1 node2 node3 node4 node5 node6 node7 node8 node9 node10 node-D
parameters
(1,9,H) (1,8,L) (1,8,L) (1,9,H) (1,7,H) (1,7,L) (1,9,H) (1,9,H) (1,8,L) (1,9,H) (1,9,L) (1,9,H)

Fig. 5  Traffic and ETE delay measurement – case1

13
Flexible multipoint relay selection for suitable route in mobile ad hoc networks

Fig. 6  Traffic and ETE delay measurement – case2

Fig. 7  Node deployment sce-


nario-2

3 1

D2 S D1

2
4

get influenced by these parameters, but the SMS algorithm adequate battery above the threshold. The link quality of
calculates the MPR considering these parameters. It also nodes n2 and n3 has been configured better than the quality
takes into consideration the reachability and the degree of of n1 &n4 . The selected MPRs by the SMS algorithm are
the nodes. We analyze the impact of these parameters on the { n2 , n3 }. The performance comparison of the SMS algorithm
MPR selection, and on the performance of the algorithm, as with the OLSR and LD-OLSR is given in Fig. 8.
depicted in the following four cases.
5.2.2 Trust level and link quality
5.2.1 Link quality analysis
In this configuration, we analyze the performance of the
In the scenario given in Fig. 7, we first simulate the protocol proposed algorithm for two different destinations. The par-
in the condition when all the nods are trustworthy and have ametric configuration has been depicted in Fig. 9. In the

13
T. K. Saini, S. C. Sharma

Fig. 8  Traffic received at destination by SMS algorithm and OLSR

T = 1, B = 5, Q = L path towards destination nD1 , the SMS algorithm selects n2


T = 0, B = 7, Q = H
as MPR because it is the high-quality node as compared to
3 1 the node n1 . While in the path towards destination nD2 , the
node n4 is selected as MPR in spite of its low-quality link,
because n3 is not the trusted node. As shown in Fig. 10,
D2 S D1 when there is an upsurge in the traffic towards the destina-
tion, a drop in the received traffic is observed due to the
poor link condition of n4.
2
4
5.2.3 Trust and battery level
T = 1, B = 7, Q = L T = 1, B = 7, Q = H
We further analyze the effect of trust level and different
Fig. 9  Configuration for trust level and link quality battery levels on the MPR selection. In the configuration,

Fig. 10  Throughput performance of SMS Algorithm from source (S) to D1 & D2

13
Flexible multipoint relay selection for suitable route in mobile ad hoc networks

as shown in Fig. 11a, we found that the protocol consid- 5.2.4 Battery level and link quality
ers trust at higher precedence and prefer to choose MPR
accordingly. If the trust level is the same, then battery value We also analyze the effect of battery level and link quality in
is the deciding criterion in MPR selection. In this case the MPR selection of the algorithm. The parameter configu-
nodes { n2 , n4 } are preferred for MPRs in comparison to ration is shown in Fig. 11b. Simulation results evident that
{ n1 , n3}. node having battery capacity below the threshold is not cho-
sen for MPR. The debug-output of the simulator reflecting

T = 1, B = 2, Q = H T = 0, B = 7, Q = H T = 1, B = 5, Q = L T = 1, B = 8, Q = H

3 1 3 1

D2 S D1 D2 S D1

2 2
4 4
T = 1, B = 5, Q = L T = 1, B = 4, Q = L T = 1, B = 2, Q = H T = 1, B = 9, Q = L

(a) Trust and battery level (b) Battery level and link quality

Fig. 11  Parametric configuration of the nodes

Fig. 12  Simulator output for MPR selection

Table 10  MPR selection Node Node-1 Node-2 Node-3 Node-4 Selected MPR for node-S
summary
Parameter (Tl , Bl , Lq) (Tl , Bl , Lq) (Tl , Bl , Lq) (Tl , Bl , Lq)

Case 1 1, 8, L 1, 8, H 1, 8, H 1, 8, L node-2, node-3


Case 2 1, 5, L 1, 7, H 0, 7, H 1, 7, L node-2, node-4
Case 3 1, 8, H 1, 9, L 1, 5, L 1, 2, H node-1, node-3
Case 4 0, 7, H 1, 4, L 1, 2, H 1, 5, L node-2, node-4

13
T. K. Saini, S. C. Sharma

MPR selection for this case is shown in Fig. 12. The choice 1 Mbps of CBR traffic towards the destination, the traffic
of the MPRs by the SMS algorithm for the source node (S) received at the destination and end to end delay has been
has been summarized in Table 10. It exhibits different com- measured for the SMS, OLSR, and LD-OLSR. The outcome
binations of trust, battery level, link quality, and the cor- has been presented in Fig. 13. The results illustrate that con-
responding MPR selection. sideration of mobility slightly improves the performance of
the proposed method.

5.3 Mobility analysis 5.4 Comparative analysis

We create a dynamic scenario in which participating nodes For the comparative analysis, we have taken three scenarios
move randomly in the deployment area. Nodes randomly with increasing order of node density, i.e., the number of
pick the mobility value from a set, defined as {0, 5, 10, 20} nodes in the network (N) = {20, 40, 60} . In the simulation,
m/sec. The algorithm has been configured to consider rela- the network area is 3000 M × 3000 M, and the transmission
tive mobility. The algorithm parameters {Ti , Bi , Lq , Mr } have range of the nodes is 500 M. In the network, it is considered
been configured such that {Ti , Bi , Lq } are uniform for all the that all the nodes are trustworthy and willing to participate.
nodes, while relative mobility {Mr } has been considered by The participating nodes can move arbitrarily in the net-
the algorithm in the computation. The source node generates work, and possess the different capability in terms of battery

Fig. 13  Traffic received and ETE delay statistics

Fig. 14  Node deployment with increasing node density

13
Flexible multipoint relay selection for suitable route in mobile ad hoc networks

Fig. 15  Performance compari- SMS OLSR LD-OLSR


son with different node density
700000
600000

Throughput bps
500000
400000
300000
200000
100000
0
20 40 60
No of Nodes

capacity, speed, and link quality. The CBR traffic generation also observed some limitations of the algorithm that may
has been considered to generate the application data at the restrain the scope of the work. The dependency on the physi-
rate of 200 packets per second, and each packet of 512 bytes. cal layer, unavailability of the information on selected nodes,
The deployment of the nodes in three scenarios with increas- and the possibility to masquerade the trust parameters may
ing node density is shown in Fig. 14. The results have been limit the performance of the algorithm in real deployments.
presented in Fig. 15. We consider these observations as an input for the future
When the number of nodes in the network is less, all three expansion of the work.
algorithms perform almost similar. In this case, throughput
is poor because of the scarcity of the connectivity. In the
rest of the two cases, there is a significant improvement in Compliance with ethical standards 
the performance of the algorithms. The proposed algorithm
performs better than the compared algorithms. The proposed Conflicts of interest None.
method helps to choose the suitable multipoint relays. The
selection of the appropriate MPR nodes influences the net-
work performance. The results also indicate that the through-
put increases as the number of nodes increases. This is due References
to the improved connectivity with increasing node density.
Ahn J, Lee TJ (2017) Multipoint relay selection for robust broad-
cast in ad hoc networks. Ad Hoc Netw 17:82–97. https​://doi.
org/10.1016/j.adhoc​.2014.01.007
6 Conclusion Ahn J, Park J, Cha W, Kim ST, Mah P, Lee TJ (2016) MAC-aware
concentrated multi-point relay selection algorithm in ad hoc net-
works. Wirel Pers Commun 86:423–433. https​://doi.org/10.1007/
In this paper, we propose the flexible MPR selection s1127​7-015-2937-6
approach for selecting trustworthy, quality-oriented, reliable Alamsyah A, Purnama IKE, Setijadi E, Purnomo MH (2009) MPR
relay nodes for the controlled flooding of the information in selection to the OLSR quality of service in MANET using min-
max algorithm. Int J Electr Comput Eng 9(1):417–425. https​://
the mobile ad hoc network. The flexibility of the parameters
doi.org/10.11591​/ijece​.v9i1.pp417​-425
has been considered by the proposed algorithm. The algo- Anbao W, Bin Z (2014) Improving MPR selection algorithm in OLSR
rithm considers the willingness, trustworthiness, residual protocol based on node localization technology. J Networks
battery capacity, link quality, relative mobility, reachabil- 9(7):1674–1681. https​://doi.org/10.4304/jnw.9.7.1674-1681
Belhassen M, Dhraief A, Belghith A, Mathkour H (2018) ALOE: auto-
ity, and degree of the participating nodes in the selection
nomic locating of obstructing entities in MANETs. J Ambient
process. The proposed work offers the extension to the MPR Intell Hum Comput 9:1955–1974. https​://doi.org/10.1007/s1265​
selection mechanism of the OLSR and improves the perfor- 2-018-0742-2
mance of the algorithm. The realization has been achieved Boushaba A, Benabbou A, Benabbou R, Zahi A, Oumsis M (2015)
Multi-point relay selection strategies to reduce topology control
by including the desired fields in the control packet struc-
traffic for OLSR protocol in MANETs. J Netw Comput Appl
tures to hold the added information, and the logic has been 53:91–102. https​://doi.org/10.1016/j.jnca.2015.03.008
formulated to incorporate the available information in deci- Cho J (2015) Tradeoffs between trust and survivability for mission
sion making. The simulation results indicate the improved effectiveness in tactical networks. IEEE Trans Cybern 45(4):754–
766. https​://doi.org/10.1109/TCYB.2014.23357​44
performance and suitability of the algorithm in the mobile
ad hoc networks. During the simulation analysis, we have

13
T. K. Saini, S. C. Sharma

Clausen T, Dearlove C, Jacquet P, Herberg U (2014) The optimized Pawgasame W, Wipusitwarakun K (2015) Tactical wireless networks:
link state routing protocol version 2. RFC 7181. https​://doi. A survey for issues and challenges. In:Asian conference on
org/10.17487​/RFC71​81 defence technology (ACDT), Hua Hin, pp 97–102. https​://doi.
Clausen T, Jacquet P (2003) Optimized link state routing protocol org/10.1109/ACDT.2015.71115​92
(OLSR). RFC 3626.https​://doi.org/10.17487​/RFC36​26 Saini TK, Sharma SC, Saini A (2020) Routing considerations, simu-
Conti M, Giordano S (2014) Mobile ad hoc networking: milestones, lation analysis, and dynamic learning and awareness protocol
challenges, and new research directions. IEEE Commun Mag for mobile ad hoc networks. Int J Future Gener Commun Netw
52(1):85–96. https​://doi.org/10.1109/MCOM.2014.67100​69 13(1):1471–1483. https​://sersc​.org/journ​als/index​.php/IJFGC​N/
Harrag N, Refoufi A, Harrag A (2019) New NSGA-II-based OLSR artic​le/view/10269​/5556
self-organized routing protocol for mobile ad hoc networks. Saini TK, Sharma SC (2020) Recent advancements, review analy-
J Ambient Intell Hum Comput 10:1339–1359. https​: //doi. sis, and extensions of the AODV with the illustration of the
org/10.1007/s1265​2-018-0947-4 applied concept. Ad Hoc Netw. https​://doi.org/10.1016/j.adhoc​
Jacquet P, Muhlethaler P, Clausen T, Laouiti A, Qayyum A, Viennot .2020.10214​8
L (2001) Optimized link state routing protocol for ad hoc net- Shenbagalakshmi G, Revathi T (2020) Enhanced route discovery using
works. In: IEEE international multi topic conference, pp 62–68. connected dominating set and 2-hop repair in wireless ad hoc
https​://doi.org/10.1109/INMIC​.2001.99531​5 networks. J Ambient Intell Hum Comput. https:​ //doi.org/10.1007/
Jain R (2019) Kashyap I (2019) An QoS aware link defined OLSR s1265​2-020-01799​-1
(LD-OLSR) routing protocol for MANETS. Wirel Pers Com- Son TT, Minh HL, Sexton G, Aslam N (2015) Self-adaptive proac-
mun 108:1745–1758. https​: //doi.org/10.1007/s1127​7 -019- tive routing scheme for mobile ad-hoc networks. IET Networks
06494​-9 4(2):128–136. https​://doi.org/10.1049/iet-net.2014.0022
Joshi RD, Rege PP (2012) Implementation and analytical modelling Suhaimi S, Mamat K, Wong KD (2009) Enhancing the willingness
of modified optimised link state routing protocol for network life- on the OLSR protocol: methodology on experimenting the real
time improvement. IET Commun 6(10):1270–1277. https​://doi. testbed. In: International conference on wireless communications,
org/10.1049/iet-com.2011.0257 networking and mobile computing, Beijing, pp 1–4. https​://doi.
Karthikeyan K, Ramesh S, Kirubakaran N, Maheswari PU, Prasath org/10.1109/WICOM​.2009.53022​34
RA, Muthukumar M (2020) Advanced resilient data consigning Toh CK (2001) Maximum battery life routing to support ubiquitous
mechanism for mobile adhoc networks. J Ambient Intell Hum mobile computing in wireless ad hoc networks. IEEE Commun
Comput. https​://doi.org/10.1007/s1265​2-020-01820​-7 Mag 39(6):138–147. https​://doi.org/10.1109/35.92568​2
Lim JH, Lim KW, Ko YB (2018) Reliable mutual node evaluation for Yelemou T, Dandjinou TM (2014) Taking into account link quality in
trust-based OLSR in tactical MANETs. In: International confer- OLSR protocol core areas. In: IEEE international conference on
ence on heterogeneous networking for quality, reliability, security adaptive science & technology (ICAST), Ota, pp 1–4. https​://doi.
and robustness, pp 114–119. https​://doi.org/10.1007/978-3-319- org/10.1109/ICAST​ECH.2014.70680​71
78078​-8_12 Zhang D, Cui Y, Zhang T (2019) New quantum-genetic based OLSR
Li Z, Wu Y (2017) Smooth mobility and link reliability-based opti- protocol (QG-OLSR) for mobile ad hoc network. Appl Soft Com-
mized link state routing scheme for MANETs. IEEE Commun Lett put 80:285–296. https​://doi.org/10.1016/j.asoc.2019.03.053
21(7):1529–1532. https​://doi.org/10.1109/LCOMM​.2017.26544​ Zhang L, Hu L, Hu F, Ye Z, Li X, Kumar S (2020) Enhanced OLSR
39 routing for airborne networks with multi-beam directional anten-
Moussaoui A, Semchedine F, Boukerrama A (2014) A link-state QoS nas. Ad Hoc Netw. https​://doi.org/10.1016/j.adhoc​.2020.10211​6
routing protocol based on link stability for mobile ad hoc net-
works. J Netw Comp Appl 39:117–125. https​://doi.org/10.1016/j. Publisher’s Note Springer Nature remains neutral with regard to
jnca.2013.05.014 jurisdictional claims in published maps and institutional affiliations.
Murthy SR, Manoj BS (2013) Ad hoc wireless network architectures
and protocols. Pearson Education Inc, 22nd Impression
Nosheen I, Khan SA, Ali U (2019) A cross-layer design for a multi-hop,
self-healing, and self-forming tactical network. Wirel Commun
Mob Comput 2019:1–16. https​://doi.org/10.1155/2019/15239​06

13

You might also like