Abstract
This paper investigates into the routing protocols in ad hoc wireless networks. Performance, quality-of-service, security, and power management failure cause the packet losses, delay variation and illegal authorization in ad hoc wireless networks. To handle these issues, different protocols have been proposed such as: battery-aware routing protocol, cooperative anomaly detection protocols, and a list of available protocol proficient to detect and trim down congestions.
Key words: routing protocols, security, power management, QoS
Introduction
Ad hoc wireless network is very sensitive network as it has no fixed infrastructure; there fore vulnerable possessions routing protocols must be evaluated escalating the number of nodes in network. Nodes are free to move independently and this movement should be settled down quickly. Routing is the processes of moving information in the form of packets across a network from a node-to-node. Routing protocols use metrics to evaluate the best promising path for the packet to reach on destination. Routers are the devices that route the packet on the network. They also maintain route information that helps in influencing the best path to various destinations. They are responsible to change information and to find a feasible path to destination with the help of hop length, power required (minimum or maximum), life time of wireless link, and utilize bandwidth type of information. Routing protocols must be durable to terrorization and vulnerabilities such as; resource consumption, denial-of-service, delay, packet delivery ratio and similar attacks possible against an ad hoc wireless network. Performance, security, quality-of-service, power management, reliability, and scalability are the major areas to provide good service. This paper discusses to widen curiosity in getting new concepts of routing protocols in ad hoc wireless networks. It is categorized in four classes with issues and their approaches: performance and methodologies, security and quality-of-service, and power management.
Issues and Problems
Routing protocol should be able to provide a certain level of quality-of-service in ad hoc wireless network as demanded by the nodes such as the parameters of quality-of-service can be throughput, packet delivery ratio, jitter, and supporting differentiated class of service. Node mobility, multicasting consumes high energy [1, 2]; large synchronization and multi-path forwarding increases the probability of duplication of messages [5] at large-scale replication.
Resource consumption, denial-of-service, information discloser, buffer overflow, interference and lake of central co-ordination make wireless network more vulnerable. Due to no central infrastructure, attackers attempt to break security and get authentication /authorization. Security can be weakened from lopsided target detection. Irregularity and non-secure protocols that based on On-demand Distance vector over IP V6 in wireless network cause the overcrowding and increase malicious nodes, attackers achieve their target.
Real time applications require a high energy to maintain performance where source and destination keep changing at every time. Major issues are power management, packet losses, security attacks and similarities in applications that decrease the performance. By the interruption of some selfish nodes, the establishment of a routing process to sends packets from source to destination, and during communication in ad hoc wireless network multicasting of addresses decreases total packet delivery.
Power management can be controlled significantly by utilizing the intelligent devices. Management designed routing protocol should be energy-efficient having good comprehension of network topologies. Some or all of the mobile nodes operate on batteries, for transmission communication applications need high energy [16]. Irregularity of message sequence of high density, like “hello packets”, consumes high energy due to short life of nodes. Forwarding of query based message end-to-end delay also consumes high energy in ad hoc wireless networks.
Approaches and Methodologies
Different routing protocols are active in wireless network pasture with intelligence properties. These abilities make network protected against attackers. As discussed above each application has different requirements to negotiate between host and network. It’s important to maintain quality-of-service on a per node level, per link, per flow of data in network, thus it is essential to have better coordination between source and destination to achieve quality-of-service. A Local Broad Clustering (LBC) and Call Hash Table routing protocol reduce the high-energy consumption from nodes and increase the communication range of nodes, also enhance the network life [4]. In other routing protocols, Multi-cost, Multiple description mechanism, Quality-of-service aware and Quality-of-service framework is active to achieve quality-of-service in ad hoc wireless networks.
Wireless network has been continued source of security breaches/flaws due to the nature of radio frequency transmission where everyone can receive the broadcast message. Protocols have been proven to be inadequate to today’s security. In proposed protocols, Random walk-based On-demand routing protocol handles the issues of distributed authentication.
To provide and maintain a high performance, different architecture and protocols have been implemented. The proposed architecture of swarm intelligent multi-path routing protocol reduces congestion and increases performance by taking action against packet loss, transmission delay, delay variation, and different intrusions [11]. Best route discovery and data transmission can be achieved with COMMIT protocol, which is based on the Visualization tool for Compiler Graph (VCG) and can, read a textual and readable specification of a graph and visualize the graph. It is the best protocol for the rout discovery. Other protocols, namely Periodic Hello Protocol (PHP), Adaptive Hello Protocol (AHP) and Reactive Protocol (RP) reduce congestion in network to increase performance in ad hoc wireless network.
Each node in wireless network participates in two kinds of activities, sending and receiving messages. Especially, hello messages consumes large amount of power. Requests can be set on priorities by using Prioritized Battery Aware routing protocol, allowing some routing connections having high priority and assigning power according to their rations. Another max-min routing protocol also performs same functions by reducing the irregularity of message sequence. It uses the distributed sensors to monitors large geographical areas as grid of computation. The most commonly used batteries in wireless devices are nickel-cadmium and lithium-ion batteries, which are widely used in laptops, cellular phones, PDAs, tablet PCs and other portable computing and communication devices. In the figure a complete processes of battery usage have been illustrated [16]. In figure (a) battery is showing a full charged state as well as the load increasing or node moving from source to destination battery starting to discharge (b).Battery voltage drops, it starts recovery (c). After recovering it gets stable again (d). In final session (e), (f) stage of battery dies with discharging loss and battery dies without discharging loss are shown. Other routing protocols such as: energy aware, ad hoc On-demand Distance Vector (AODV), Directional Local Recovery (DLR), and Dynamic Power Management (DPM) are also able to diminish power consumption.
Future work
As a future work security related factors and fragile scenarios will be considered and tested on the subject of the system effectiveness. A resource-efficient detection model will be investigated to improve performance in ad hoc wireless network.
Conclusion
In ad hoc wireless networks, quality of service, security, performance and power management are achieved by routing protocols. Actually, it is very sensitive service. That’s way it is difficult to maintain routing protocols. Outlay of data is more then a billons there fore, it need more sanctuary and solitude. Security attacks form intruders who try to attempt authentication, authorization, and damage the data which leads to poor quality of service, pitiable performance, and extra utilization of power management. Routing protocols provides best solutions by using efficient routing mechanism.
References
- 2. Energy-Aware Routing in Wireless Ad-Hoc Networks
Found in: Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks (WoWMoM'05), By Panagiotis C. Kokkinos, Christos A. Papageorgiou , Emmanouel A. Varvarigos. Issue Date: June 2005, pp. 306-311
- 11. A swarm intelligent multi-path routing for multimedia traffic over mobile ad hoc networks Found in: Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks (Q2SWinet '05), By Saida Ziane , Abdelhamid Melouk, Issue Date: October 2005, pp. 620-626
- 12. COMMIT: A Sender-Centric Truthful and Energy-Efficient Routing Protocol for Ad Hoc Networks with Selfish Nodes Found in: 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 12, By Stephan Eidenbenz , Giovanni Resta , Paolo Santi Issue Date: April 2005, pp. 239b
- A QoS Multicast Routing Protocol for Mobile Ad-Hoc Networks
Found in: International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II, By Li Layuan , Li Chunlin, Issue Date: April 2005, pp. 609-614
- Energy Aware Routing Protocol for Mobile and Wireless Ad hoc Networks
Found in: 28th Annual IEEE International Conference on Local Computer Networks (LCN'03), By Azzedine Boukerche, Harold Owens II, Issue Date: October 2003 pp. 768
- 19. Power Management in Wireless Ad Hoc Networks Using AODV
Found in: Sixth International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing and First ACIS International Workshop on Self-Assembling Wireless Networks (SNPD/SAWN'05), By Liang Cheng , Anu G. Bourgeois , Bo Hyun Yu, Issue Date: May 2005, pp. 436-443