IJCNIS Vol. 10, No. 6, 8 Jun. 2018
Cover page and Table of Contents: PDF (size: 612KB)
Full Text (PDF, 612KB), PP.16-26
Views: 0 Downloads: 0
P-nodes fuzzy multicasting, spanning tree, routing, fuzzy credibility distribution, inverse credibility distribution, m-minimum triangular fuzzy number, standard deviation
Mobile Ad-hoc Network (MANET) is mostly decentralized and self-adjustable network system. It is significant to optimize the overall network energy utilization and improve packet sending performance by reducing the errors, generated due to different real-life environmental effects. In this paper, considering atmospheric, environmental change and varying distance for topological change, we try to generate the routing cost. By introducing m-minimum (membership value as m) triangular fuzzy number at interval based cost and energy of the network, we try to handle the uncertain environment. Here we generate both fuzzy minimum spanning tree (FMST) for a given n- nodes network and p-node fuzzy multicast minimum spanning tree (pFMMST), in fuzzy interval based format. Applying the fuzzy credibility distribution we modify the network routing cost and energy utilization for both FMST and pFMMST. Comparing the routing cost and residual energy for FMST and pFMMST of MANET, it is concluded that, pFMMST is better FMST based packet routing approach, with minimum routing cost, optimized total energy utilization and best possible technique to reduce the error which is generated due to the deviation of interval of upper and lower limit data in route cost and residual energy.
Soham Bandyopadhyay, Sunil Karforma, "Improving the Performance of Fuzzy Minimum Spanning Tree based Routing Process through P-Node Fuzzy Multicasting Approach in MANET", International Journal of Computer Network and Information Security(IJCNIS), Vol.10, No.6, pp.16-26, 2018. DOI:10.5815/ijcnis.2018.06.02
[1]Chen, Y.S., Kao, T.C., Sheu, J.P. and Chiang, C.Y., A mobile scaffolding – aid - based bird watching learning system, Wireless and mobile technology in Education, 2002. Proceedings, IEEE International Workshop (IEEE WMTE 2002 ), Teleborg Campus, Sweden, August 29-30, p. 15-22.
[2]King, C.T., Lin, M.P. and Sun, M.T., Neighbor – aided multicast protocol for streaming transmission on MANETs, Proc. of International Conference on Grid and Pervasive Computing(GPC2006), May 2006.
[3]Ko, Y., Vaidya, N., Location - aided Routing (LAR) in mobile ad- hoc networks, Proceedings of the ACM /IEEE International Conference on Mobile Computing and Networking (MOBICOM), 25- 30 October, 1998, p.66-75.
[4]Jttner, A., Magi, D.,Tree based broadcast in ad- hoc networks, MONET Special Issue on WLAN Optimization at the MAC and Network Levels.
[5]Penttinen, A., Minimum cost multicast trees in ad hoc networks, Communications, 2006. ICC '06. IEEE International Conference, June, p.3676 – 3681.
[6]B.R., Reddy, A.K., L.C., Hiremath, P.S. and Sheshadri, R., K - nodes multicasting minimum cost spanning trees in wireless mobile ad-hoc network (MANET),International Journal of Computer Applications 1(4), February, p. 0975 –8887.
[7]Gupta, S., Bharti, P. K., Choudhary, V.,Fuzzy Logic Based Routing Algorithm for Mobile Ad Hoc network, In Lecture Notes in High Performance, Architecture and grid computing Springer-2011, p.574–579.
[8]Chen, Y.S., Lee, S. and Lin, T.H., PCAR: A power-aware chessboard-based adaptive routing protocol for wireless sensor networks , Journal of Internet Technology, Special Issue on Wireless AdHoc Network and sensor April 2005. (EI).
[9]Yu,H.,Chen,G.,Zhao,S,C.Y and Chin, Y.T., An efficient wireless recharging mechanism for achieveing perpetual lifetime of wireless sensor network, Sensor 2017,17(1).
[10]Zhou, J., Chen, L., Wang, K. and Yang, F., Fuzzy α- minimum spanning tree problem: definition and solutions, International Journal of General Systems, 45(3), p.311–335.
[11]Itoh, T. and Ishii, H., An approach based on necessity measure to the fuzzy tree Problems, Journal of the Operations Research, 39(2), June, p.247-257.
[12]Chang, P. T. and Lee, E., Fuzzy decision networks and deconvolution, Computers & Mathematics with Applications, 37(11), p.53–63.
[13]Almeida, T.A., Prado, F. M. S., Souza, V. N., Yamakami A. and Takahashi, M. T., A genetic algorithm to solve Minimum spanning tree problem with fuzzy parameters using possibility measure, Fuzzy Information Processing Society,2005.NAFIPS 2005 -2005 Annual Meeting of the North American Fuzzy Information Processing society.
[14]Deng, Y., Chen, Y., Zhang, Y. and Mahadevan, S., Fuzzy Dijkstra algorithm for shortest path problem under uncertain environment, Applied Soft Computing, November, p.1231-1237.
[15]Xu, M., Liu, Y., Huang, Q., Zhang, Y. and Luan, G., An improved Dijkstra shortest path algorithm for sparse network, Applied Mathematics and Computation, 185(1), p.247–254.
[16]Lin, Y.W., Chen, Y.S. and Lee, S.L., Routing protocols In vehicular ad hoc networks: a survey and future perspectives, Journal of Information Science and Engineering, 26(3), May, p.913–932.
[17]Chuang, T.N. and Kung, J.Y., The fuzzy shortest path length and the corresponding shortest path in a network, Computers & Operations Research, 32(6), p.1409–1428.
[18]Sadiq, R. S. and Tesfamariam, S., Developing environmental indices using fuzzy numbers ordered weighted averaging (FN-OWA) operators, Stochastic Environmental Research and Risk Assessment, 22(5), p.495-505.
[19]Deng, Y., Shi, W.K., Du, F. and Liu, Q., A new similarity measure of generalized fuzzy numbers and its application to pattern recognition, Pattern Recognition Letters, 25(8), p.875–883.
[20]Maih?fer, C., A survey of geocast routing protocols, IEEE communications Surveys & Tutorials, 6(2), p.32–42.
[21]Gui, C. and Mohapatra, P., scalable multicasting in mobile ad hoc networks, IEEE INFOCOM 2004.
[22]B.R, A.K., Reddy, L.C., Rajan, C.C.A. and Hiremath P.S., Route failure tolerant multicast in mobile ad hoc networks using disjoint minimum spanning trees, The second IEEE ICCSIT 2009, August 8 - 11, Beijing,China.
[23]Haider, T. and Yusuf, M., A Fuzzy Approach to Energy Optimized Routing for Wireless Sensor Networks, The International Arab Journal of Information Technology, 6(2),April 2009, p.179-185.
[24]Madhurya, M., Krishna, B.A. and Subhashini, T., Implementation of Enhanced Security Algorithms in Mobile Ad hoc Networks, IJCNIS, 6(2), p.30-37, 2014. DOI: 10.5815/ijcnis.2014.02.05
[25]Xin ZHANG, Ying ZHANG, Raees ALTAF, Xin FENG, A Multi-agent System-based Method of Detecting DDoS Attacks, International Journal of Computer Network and Information Security (IJCNIS), 2018 10(2), p.53-64, DOI: 10.5815/ijcnis.2018.02.07.
[26]Sathiamoorthy,J.and Ramakrishnan,B.,CEAACK – A Reduced Acknowledgment for Better Data Transmission for MANETs, International Journal of Computer Network and Information Security (IJCNIS), 2016, 8(2), p.64-71, DOI: 10.5815/ijcnis.2016.02.08.
[27]Khare, A.K., Rana, J.L. and Jain, R. C., Detection of, Wormhole Blackhole and DDOS Attack in MANET using Trust Estimation under Fuzzy Logic Methodology,
International Journal of Computer Network and Information Security (IJCNIS), 2017,9(7), p.29-35, DOI: 10.5815/ijcnis.2017.07.04
[28]Sharma, V.K., Verma, L.P. and Kumar, M., A Fuzzy- Based Adaptive Energy Efficient Load Distribution Scheme in Ad-hoc Networks, International Journal of Intelligent Systems and Applications (IJISA), 2018 ,10(2), p.72-84, 2018. DOI: 10.5815/ijisa.2018.02.07.
[29]Sivaraj, C., Alphonse, P. J. A. and Janakiraman, T. N., Energy-efficient and load distributed clustering algorithm for dense wireless sensor networks, International Journal of Intelligent Systems and Applications (IJISA), May 2017. 9(5), pp. 34-42.
[30]Das,I., Lobiyal, D.K. and Katti, C.P., An Analysis of Link Disjoint and Node Disjoint Multipath Routing for Mobile Ad Hoc Network, International Journal of Computer Network and Information Security (IJCNIS), 2016. 8(3), p.52-57. DOI: 10.5815/ijcnis.2016.03.07.
[31]Periyasamy, P. and Karthikeyan, E., Performance Comparison and Evaluation of Different Multipath Routing Protocols Based on Various Scenario and Traffic Patterns for Mobile AD Hoc Networks, International Journal of Computer Network and Information Security 2013,5(1), p.24-32.DOI: 10.5815/ijcnis.2013.01.03.