TBOR: Tree Based Opportunistic Routing for Mobile Ad Hoc Networks

A mobile ad hoc network (MANET) is a wireless communication network where nodes that are not within direct transmission range establish their communication via the help of other nodes to forward data. Routing protocols in MANETs are usually categorized as proactive. Tree Based Opportunistic Routing (TBOR) finds a multipath link based on maximum probability of the throughput. The simulation results show that the presented method is performed very well compared to the existing methods in terms of throughput, delay and routing overhead.




References:
[1] M. Al-Rabayah and R. Malaney, “A new scalable hybrid routing protocol for VANETs,” IEEE Trans. Veh. Technol., vol. 61, no. 6, pp. 2625–2635, Jul. 2012.
[2] Harold Robinson, Y., & Rajaram, M. (2015). “Trustworthy link failure recovery algorithm for highly dynamic mobile adhoc networks”, World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering, vol.9, no.2, 233–236.
[3] S. Nithya, G. Arul Kumar and P. Adhavan, “Destination-Sequenced Distance Vector Routing (DSDV) using Clustering Approach in Mobile Adhoc Network”. 2012 International Conference on Radar, Communication and Computing (ICRCC).
[4] J. Xie, R. R. Talpade, A. McAuley, and M. Liu, AMRoute: ad hoc multicast routing protocol, Mobile Networks and Applications, vol. 7, no. 6, pp. 429–439, 2002.
[5] L. K. Law, S. V. Krishnamurthy, and M. Faloutsos, A novel adaptive protocol for lightweight efficient multicasting in ad hoc networks, Computer Networks, vol.51, no. 3, pp. 823–834, 2007.
[6] Sanjit Biswas, Robert Morris, “ExOR: opportunistic multi-hop routing for wireless networks”, Proceedings of conference on Applications, technologies, architectures, and protocols for computercommunications, Pages 133-144, 2005.
[7] A. Trivino-Cabrera, S. Canadas-Hurtado, “Survey on Opportunistic Routing in Multihop Wireless Networks”, International Journal of Communication Networks and Information Security (IJCNIS), Vol. 3, No. 2, August 2011.
[8] Harold Robinson, Y., & Rajaram, M. (2016), “A memory aided broadcast mechanism with fuzzy classification on a device-to-device mobile Ad Hoc network”, Wireless Personal Communications, 1–23, doi:10.1007/s11277-016-3213-0.
[9] C.-C. Hu, E. H.-K. Wu, and G.-H. Chen, ―OGHAM: ondemand global hosts for mobile ad-hocmulticast services, Ad Hoc Networks, vol. 4, no. 6, pp. 709–723, 2006.
[10] Stepanov, D. Herrscher, K. Rothermel, “On the impact of radio propagation models on MANET simulation results”, Proceedings of 7th International Conference on Mobile and Wireless Communications Networks (MWCN 2005), Marrakech, Morocco, September 2005.
[11] Harold Robinson, Y., & Rajaram, M. (2015),“Energy-aware multipath routing scheme based on particle swarm optimization in mobile ad hoc networks”, The Scientific World Journal, 1–9. doi:10.1155/2015/284276.
[12] Harold Robinson, Y., & Rajaram, M. (2015), “Establishing pairwise keys using key Predistribution schemes for sensor networks”, World Academy of Science, Engineering and Technology International Journal of Computer, Electrical, Automation, Control and Information Engineering, 9(2), 608–612.