Invulnerability Improvement of Multipath Protocols in Different Scenarios
Keywords:AODV protocol, Multipath routing, Network Invulnerability, Opnent simulation
AbstractDevelopments in computer communications and networks enabled the deployment of exciting new areas. Meanwhile, Efficient network and communication technologies also promote the development of routing protocols. AODV(Ad hoc On-Demand Distance Vector Routing, AODV) routing protocol has invulnerability to different mobile attributes of agent nodes and network damage scenarios. However, this invulnerability performance can not meet the needs of mobile multi-agent cooperative communication. Therefore, this paper proposes an improved responsive multipath routing protocol MD_AODV(Multipath Destroy-resistance AODV, MD_AODV). This routing protocol is based on AODV routing protocol. It is mainly improved in three aspects: multichannel concurrency mechanism, node load balancing mechanism and shortest path maintenance mechanism. Firstly, in this research, an improved multipath routing protocol is modeled and implemented, which is based on OPNET Network simulation platform. Then, network models with different degrees of impairment are built. Combines the mobile attributes of mobile multi-agent task coordination to carry out invulnerability simulation experiments . These experiments study the invulnerability of the improved multipath routing protocol. Finally, this paper evaluates and compares the routing invulnerability of MD_AODV, AODV and AOMDV(Ad-hoc On-Demand Multipath Distance Vector, AOMDV). The evaluation results show that MD_AODV routing has better invulnerability when the network is severely damaged
Dorri A, Kanhere SS, Jurdak R. Multi-Agent Systems: A Survey. IEEE Access 2018;6:28573-93.
Wang J, Liu C, Li W, Li K. Heterogeneous multi-mode access in smart grid using BeiDou communication. Microprocess Microsyst 2016;47:244-9.
Moudni, Houda, et al. Performance analysis of AODV routing protocol in MANET under the influence of routing attacks. 2016 International Conference on Electrical and Information Technologies (ICEIT). IEEE, 2016.
Fu X, Fortino G, Pace P, Aloi G, Li W. Environment-fusion multipath routing protocol for wireless sensor networks. Inf Fusion 2020;53:4-19.
Zhang, Wanbin, et al. An improved AODV routing protocol based on social relationship mining for VANET. Proceedings of the 4th International Conference on Communication and Information Processing. 2018.
Alebeed, Hani. A Spectrum Decision Scheme for Cognitive Radio Ad Hoc Networks. MS thesis. Eastern Mediterranean University (EMU)-Doğu Akdeniz Üniversitesi (DAÜ), 2016.
Lee, S. J., and M. Gerla. AODV-BR: Backup routing in Ad Hoc networks, 2000. Proceedings of IEEE WCNC.
Zhang F, Yang G. A Stable Backup Routing Protocol for Wireless Ad Hoc Networks. Sensors 2020 ;20:6743.
Matre, Versha, and Reena Karandikar. Multipath routing protocol for mobile adhoc networks. 2016 Symposium on Colossal Data Analysis and Networking (CDAN). IEEE, 2016.
Yang, Wenjing, et al. Improving Route Stability in Mobile Ad hoc Networks Based on Link Lifetime. J. Commun. 6.3 (2011): 205-214.
Yuanyuan, An, et al. Network Equilibrium Optimization of AODV Protocol in Ad Hoc Network. 2014 Fourth International Conference on Instrumentation and Measurement, Computer, Communication and Control. IEEE, 2014.
Qadori, Huthiafa Q., et al. Multi-mobile agent itinerary planning algorithms for data gathering in wireless sensor networks: A review paper. International Journal of Distributed Sensor Networks 13.1 (2017): 1550147716684841.
Liu, Qiang, et al. A Multi-UAVs communication network simulation platform using OPNET modeler. ICC 2020-2020 IEEE International Conference on Communications (ICC). IEEE, 2020.
Chen, Bo, Harry H. Cheng, and Joe Palen. Integrating mobile agent technology with multi-agent systems for distributed traffic detection and management systems. Transportation Research Part C: Emerging Technologies 17.1 (2009): 1-10.
Mehta, Rishabh, et al. Studying the Open System Interconnection Model and Proposing the Concept of Layer Zero [J]. Indian Journal of Science & Technology 9.21 (2016).
Hu, Chun Chao, et al. Modeling and Simulation for Quantitative Assessment of Process Level Networks in Substation Based on OPNET. Advanced Materials Research. Vol. 805. Trans Tech Publications Ltd, 2013.
Venkatasubramanian, S., A. Suhasini, and C. Vennila. An energy efficient clustering algorithm in mobile Adhoc network using ticket Id based clustering manager. International Journal of Computer Science & Network Security 21.7 (2021): 341-349.
Zhang, Zeyu, et al. A survey on fault diagnosis in wireless sensor networks. IEEE Access 6 (2018): 11349-11364.
Zhang, Zhenyu, et al. Analyzing the coevolution of mobile application diffusion and social network: a multi-agent model. Entropy 23.5 (2021): 521.
Abu Zant, Mahmoud, and Adwan Yasin. Avoiding and isolating flooding attack by enhancing AODV MANET protocol (AIF_AODV). Security and Communication Networks 2019 (2019).
Basak, Surajit, and Tamaghna Acharya. Route selection for interference minimization to primary users in cognitive radio ad hoc networks: A cross layer approach. Physical Communication 19 (2016): 118-132.
Li, Peng, Lu Guo, and Fang Wang. A multipath routing protocol with load balancing and energy constraining based on AOMDV in ad hoc network. Mobile Networks and Applications (2019): 1-10.
Abdelgader, Abdeldime Mohamed Salih, Lenan Wu, and Mohammed Mohsen Mohammed Nasr. A simplified mobile ad hoc network structure for helicopter communication. International Journal of Aerospace Engineering 2016 (2016).
Yang, Songtao, and Zongli Zhang. "Entropy weight method for evaluation of invulnerability in instant messaging network. 2009 Fourth International Conference on Internet Computing for Science and Engineering. IEEE, 2009.
Copyright (c) 2023 Quan Hai Wang, Shao-Feng Lan, Dian Zhang, Yi-Qun Wang, Qun-Xi Zhu, Wen-Bai Chen
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
ONLINE OPEN ACCES: Acces to full text of each article and each issue are allowed for free in respect of Attribution-NonCommercial 4.0 International (CC BY-NC 4.0.
You are free to:
-Share: copy and redistribute the material in any medium or format;
-Adapt: remix, transform, and build upon the material.
The licensor cannot revoke these freedoms as long as you follow the license terms.
DISCLAIMER: The author(s) of each article appearing in International Journal of Computers Communications & Control is/are solely responsible for the content thereof; the publication of an article shall not constitute or be deemed to constitute any representation by the Editors or Agora University Press that the data presented therein are original, correct or sufficient to support the conclusions reached or that the experiment design or methodology is adequate.