Open access peer-reviewed chapter

A Mobile Ad Hoc Network Routing Protocols: A Comparative Study

Written By

Alagan Ramasamy Rajeswari

Submitted: 18 March 2020 Reviewed: 14 April 2020 Published: 02 July 2020

DOI: 10.5772/intechopen.92550

From the Edited Volume

Recent Trends in Communication Networks

Edited by Pinaki Mitra

Chapter metrics overview

1,683 Chapter Downloads

View Full Metrics

Abstract

Mobile Ad hoc NETworks (MANET), are complex and distributed networks that are dynamic. Which are infrastructure less and multi-hop in nature. The communication of a node can be either direct or through intermediate nodes without a fixed and dedicated infrastructure. Hence it is necessary to design an efficient routing protocol for ad hoc network which can address the issues of MANET efficiently. In ad hoc, routing algorithms are classified into nine categories namely: source-initiated (reactive), table-driven (proactive), hybrid, hierarchical, multipath, multicast, location-aware, geographical-multicast and power-aware. This paper presents a survey and to review a comparative study about various routing protocols under each of these categories. Additionally, brief discussions about major routing issues are addressed. This survey paper focuses on the taxonomy related to ad hoc routing techniques and compares the features of routing protocols.

Keywords

  • ad hoc networks
  • routing protocols
  • survey
  • wireless network

1. Introduction

A wireless network can work under two modes namely infrastructure and infrastructureless. In the “ad hoc” topology, the user does not rely on fixed infrastructure where the nodes are self-configured and self-managed. On the other hand in “infrastructure “topology, the nodes are under the control of a centralized authority called base station. Wireless multi-hop networks, also known as ad hoc networks have been used in many applications like military, disaster relief communications and emergency. An ad hoc network is a self-organizing multi-hop wireless network, which is independent neither on fixed infrastructure nor on predetermined connectivity. It is a collection of nodes, which communicate with each other using radio transmissions. In ad hoc network, there is no base station to act as router. The intermediate nodes will act as a router; source node will use these nodes for routing their message. Thus, each and every of the node forwards packets on behalf of other nodes until the packet is received by the destination from its sender. Therefore, data should be forwarded from source to destination through multiple hops. Ad hoc networks rely on multi-hop transmissions among the nodes in the same channel. Nodes communicate with each other through the intermediate nodes. So, the efficient performance and availability of each node is important in ad hoc network environment. Hence an efficient routing protocol is required to enhance the communication in MANET.

Thus routing becomes a major challenging task in MANET. In this paper, a review about the technologies, characteristics, advantages and disadvantages of the routing protocols in ad hoc network are provided.

The paper continues as follows, Section 2 summarizes the issues involved in ad hoc routing protocols. In Section 3 the routing protocols are organized as follows.

  • Reactive (on-demand) (Section 3.1).

  • Proactive (table-driven) (Section 3.2).

  • Hybrid (Section 3.3).

  • Hierarchical (Section 3.4).

  • Multipath (Section 3.5).

  • Multicast (Section 3.6).

  • Geographical (location-aware) (Section 3.7)

  • Geographical multicast (Section 3.8).

  • Power-aware (Section 3.9).

Finally, Section 4 provides the conclusion for this paper.

Advertisement

2. Issues with ad hoc routing protocols

Due to the highly dynamic nature of mobile ad hoc network, it results in frequent and unpredictable changes in network topology and hence makes routing among the mobile nodes as a complex and difficult task. The challenges and complexities together with the importance of routing protocols make the routing process, as the most active and innovative research area in the MANET domain. The issues in routing techniques includes the large area of flooding, greedy forwarding, flat addressing and widely distributed information, large power consumption, interference and load balancing [1] (Table 1).

IssuesProtocolApproach
Large area of flooding—flooding is a routing technique used to forward packets from the source to destination during the route discovery phase or in a recovery phase.1. Distance routing effect algorithm for mobility (DREAM) [2]Flooding area is reduced by limiting number of neighbors that can forward a route request message.
2. Location aided routing (LAR) [3]Nodes location information is used for routing the packets. Limiting the flooding area into “request zone”.
3. Location based multicast (LBM) [4]Similar to LAR, limiting the flooding area into “forwarding zone”
4. Geographical distance routing (GEDIR) [5]Greedy forwarding approach is used.
5. Temporally-ordered routing algorithm (TORA) [6]DAG is constructed rooted at destination and ordered routing scheme is used
6. Geographical GRID (GeoGRID) [7]The process of portioning the geographical area of the network into smaller areas called grids.
7. Geographical TORA (GeoTORA) [8]Uses any-cast any group-cast forwarding approach
8. Zone routing protocol (ZRP) [9]Overlapped zone are created based on the separation distance between the mobile nodes. Peripheral nodes are selected to forward the control packets within the zone.
9. Mobile just-in-time multicasting (MOBICAST) [10]Routing area is divided into two parts namely: a delivery zone and forwarding zone.
Greedy forwarding—greedy forwarding (GF) is one the routing technique that relies on only single path from the source to its destination which is discovered. By using GF, the major challenges encounter is defined as ‘GF empty neighbor set problem’. The forwarding process reaches a dead end, when a node cannot find any neighbor which is closer to the destination then itself.1. FACE routing protocol [11]Unit graph approach is utilized: two nodes communicated with each other if the Euclidean distance between them is less than some fixed amount.
2. Geographical routing without location information (GRLI) [12]Extended ring search: this search process continues until a node closes to destination is identified else if not found, the search is extended until a predetermined a TTL
3. Bounded Voronoi greedy forwarding (BVGF) [13]Greedy routing decision is based on the location of the direct neighbors of each node.
4. Greedy distributed spanning tree routing (GDSTR) [14]Hull tree approach is used
5. Greedy perimeter stateless routing (GPSR) [15]Greedy forwarding and perimeter forwarding approach are used
Flat addressing and widely-distributed information—In a MANET, due to the distribution of mobile nodes over the network and the restriction in transmission range of each node’s may cause some nodes to have poor knowledge about the network.1. Grid location service (GLS) [16]Based on distributed location servers (DLS) avoids the congestion in the node.
2. Dynamic address routing (DART) [17]Utilizes dynamic address scheme that ensures the scalability
3. GPS ant-like routing algorithm (GPSAL) [18]Based on ant colony optimization.
A specifically defined node namely ant node is responsible for collecting and forwarding the location information around the network.
4. Augmented tree-based routing (ATR) [19]Based on the structured address space.
Large power consumption—in a MANET, routing techniques depends upon the battery power of the node. Thus more power consumption will increase the overhead in the transmission.1. Infra-structure AODV for infrastructure ad-hoc networks (ISAIAH) [20]1. Modified forwarding approach: selecting the routes that pass through power base stations (PBSs) instead of through mobile nodes. Thus the amount of power utilized by each node can be reduced.
2. Nodes are allowed to enter the power-saving mode for a fixed time period that will decrease the power consumed by the node.
2. Power-aware routing optimization protocol (PARO) [21]New forwarding node–redirectors are added on the routing path to reduce the transmission power of the intermediate nodes along the original path. The objective of PARO to increase the path length to reduce the total transmission power.
3. Dynamic source routing power-aware (DSRPA) [22]The routing metric battery freshness is considered in routing to achieve connectivity for the longest period of time.
4. Power-aware multi-access protocol with signaling ad hoc networks (PAMAS) [23]The battery usage is controlled based on the frequency of a node’s activities.
Inference and load balancing—Interference is a major problem factor that affects the performance of wireless networks. Routing in a wireless network is challenging due to the unpredictable nature of the wireless medium and due to the effect of interference on wireless link properties.1. Source Routing for Roofnet (SrcRR) [24]Expected transmission counts (ETX): is an interference-aware link-based routing metric that continuously measures the link loss rate in both directions between each node about its neighbors using periodic broadcasts. Link cost is estimated considering the number of retransmission attempts.
2. Link quality source routing (LQSR) [25]Weighted cumulative expected transmission time (WCETT).
WCETT is the sum all links costs (ETT) along the path and bottleneck channel which has the maximum sum of ETT.
3. Load-balancing routing for mesh networks (LBRMN) [26, 27]Metric of interference and channel-switching (MIC) and isotonic property.
4. Interference-aware load-balancing routing (IALBR) [28]Routing metric load value: defined as the load at node itself and its next hop node load.
5. Load-balancing curveball routing (LBCR) [29]Modified route metric based on greedy routing scheme.

Table 1.

Comparison of various issues in routing protocols and solutions to handle the issues.

Advertisement

3. Routing protocols

In this section, the categories of routing protocols are elaborated in detail manner and the overall performance of the routing protocols in ad hoc network are evaluated for each protocol under various routing categories by considering the following parameters such as route metrics, time complexity, computation complexity and route structure. One of the main features of routing protocols in ad hoc network is the routing metric, which is used to select the best route for forwarding packets. Time complexity (TC) is defined as the time required for the number of steps to perform a protocol operation, communication complexity (CC) is defined as the number of messages exchanged in performing a protocol operation and finally, route structure defines whether the structure and address scheme are flat or hierarchical. Figure 1 depicts the categories of ad hoc routing protocols.

Figure 1.

Categories of ad hoc routing protocols.

3.1 Reactive (on-demand) routing protocol

In reactive routing protocols, a node initiates a route discovery, only when it wants to send packet to its destination. They do not maintain or constantly update their route tables with the latest route topology.

Therefore, the communication overhead is reduced but the delay is increased due the on-demand route establishment process.

Dynamic source routing (DSR): DSR is a primary on-demand routing protocol proposed by Johnson et al. [30] DSR is a most widely known protocol that relays on source routing mechanism. The network bandwidth overhead is reduced by transmitting the routing message on-demand and battery power is harvested on the nodes since each of the nodes has to transmit the control packets whenever needed.

Adhocon-demand distance vector (AODV): Perkins et al. [31] proposed AODV to provide loop- free routes even under the condition of repairing the failure routes. The Time to Live (TTL), prevents the unnecessary forwarding of packets by a node hence reduces control overhead. Since, the performance depends on the bandwidth and end-end delay, so the route cache mechanism is not implemented in this protocol.

Temporally ordered routing algorithm (TORA): Park and Corson developed TORA [6] an adaptive and scalable routing algorithm. TORA is based on “link reversal” algorithm. This protocol is proposed to operate in a highly dynamic mobile wireless network environment. A directed acyclic graph (DAG) rooted at a destination is constructed by using a height as a metric.

Associativity based routing (ABR): Tohn [32] developed the ABR a simple and width efficient distributed routing algorithm. ABR exploits route stability as the criteria in selecting a best route. ABR algorithm uses a mechanism called associativity ticks to determine and maintain a “degree of associativity”. The protocol is loop-free, no deadlock condition, no duplicate of packets.

Signal stability-based adaptive routing (SSBR): SSBR, by Dube et al. [33] is a distributed adaptive routing protocol designed for ad hoc network by considering the signal strength and location stability as the routing criteria. Thus, the final path from source to destination consists of only strong link. If multiple paths are available, then the destination selects one route among them.

The ant colony based routing algorithm (ARA): Gunes et al. [34] proposed an innovative mechanism for on-demand, multi hop ad hoc routing, based on swarm intelligence and the ant colony meta heuristic. ARA is designed with a primary objective to reduce the overhead without any direct link among the participants the complex optimization and collaboration problem are solved by this type of algorithm.

Labeled distance routing (LDR): Luna-Aceves et al. [35] presented an on-demand, loop free routing protocol. LDR utilizes distance labels to ensure loop free path in the network rather than using sequence number as other routing algorithms. LDR exploits a RouteRequest, RouteReply and RouteError packet as.

Dynamic backup routes routing protocol (DBR2P): DBR2P, an on-demand routing protocol by Wang and Chao [36]. The special unique feature about DBR2P is, it does not require any routing table as other routing protocols.

AdhocQoS on-demand routing (AQOR): AQOR, an on-demand routing protocol enabling QoS support in terms of bandwidth and end-end delay is developed by Xue and Ganz [37]. AQOR mechanism estimates the bandwidth and end-end delay requirements and exploits these metrics to determine accurate admission control and resource reservation decision. TTL, prevents the unnecessary forwarding of packets by a node hence reduces control overhead.

Distributed ant routing (DAR): DAR, a distributed algorithm developed by Rosati et al. [38] DAR is based on the ant behaviour in colonies. The goal of DAR is to reduce the computation complexity. Each node maintains a routing table. Forward ants are used to find new route. A node selects the next hop node based on weighted probabilities.

Routing on-demand a cyclic multipath (ROAM): Raju and Garcia-Luna-Aceves [39] proposed ROAM, based upon the directed acyclic graphs (DAG).

Gathering based routing protocol (GRP): GRP by Ahn [40] collects network information during route discovery process. The source node uses the network information collected during route discovery process to forward the packets even if the current route is failed. The source node computes the optimal path based on the collected network information. Then, through the optimal path data packets are forwarded.

Hint based probabilistic protocol: Beraldi et al. [41] in this protocol, the nodes of the network uses a set of meta-information defined as hints to discover a route to the destination. This protocol has lower control overheads.

Preemptive routing in ad hoc networks: Goffe et al. [42] developed a routing algorithm. The algorithm initiate the route discovery process to discovery an alternative route before the probable current route failure.

Labeled successor routing (LSR): Rangarajan and Garcia-Luna-Aceves [43] presented LSR. According, to authors view many on-demand protocols are built on top of AODV, by exploiting sequence number. Table 2 illustrates the comparative analysis of reactive routing protocols.

ProtocolRSBeaconsRoute metricsRoute repositoryRoute reconfiguration strategyCCTC
DSRFNoHop-countRCSN and new routeO(2n)O(2d)
AODVFYesHop-countRTSN and new routeO(2n)O(2d)
TORAFNoHop-countRTLink reversal and route repairO(2n)—during route discovery
O(2a)—during route maintenance
O(2d)
ABRFYesDegree of association stabilityRTLocal broad cast queryO(n + y)—during route discovery
O(x + y)—during route maintenance
O(d + z)—during route discovery
O(l + z)—during route maintenance
SSBRFYesStrong signal strengthRTSN and new routeO(n + y)—during route discovery
O(x + y)—during route maintenance
O(d + z)—during route discovery
O(l + z)—during route maintenance
GoFF et al.FYesSignal strengthRTNew path discovery before route failureO(2n)O(2d)
AQORFYesBandwidthRTInitiate from destinationO(2n)O(2d)
ARAFNoHop-countRTAlternate route or back track until new route is identifiedO(n + r)—during route discovery
O(n + a)—during route maintenance
O(d + p)
ROAMFNoHop-countRTErase route and start a new search to get new routeO(|e|)—during route discovery
O(6Ga)—during route maintenance
O(d)—during route discovery
O(x)—during route maintenance
DARFNoWeighted probabilitiesStochastic RTNew route by forward antO(2n)O(2d)
LSRFNoRelay sequence labelRTSN and new route/local repairO(2n)O(2d)
GRPFNoHop-countRCRoute backupO(2n)O(2d + 1)
LDRFNoHop-countRTSN and new route/local repairO(2n)O(2d)
DBR2PFNoHop-countNoneLocal repairO(2n)O(2d)
Beraldi et al.FYesHint valueRCLocal broadcast queryO(2n)O(2d)

Table 2.

Comparative analysis of reactive routing protocols.

RS = routing structure; H = hierarchical; F = flat routing repository; RC = route cache; RT = route table; RM = route metric; SP = shortest path; CC = communication complexity; TC = time complexity; n = number of nodes in the network, d = diameter of the network, |e| = number of edges on the network, g = maximum degree of the router, z = diameter of the directed path where the REPLY packet transits, l = diameter of the affected network segment, y = total number of nodes forming the directed path where the Reply packet transmits, p = diameter of direct path of the reply, x = number of clusters.

3.2 Proactive (table driven) routing protocol

In proactive routing, each node has one or more tables that contain the latest information of the routes to any node in the network.

Destination sequenced distance vector routing (DSDV): DSDV, based on BellmanFord routing mechanism is a table-driven routing protocol was developed by Perkins and Bhagwat [44].

Optimized link state routing (OLSR): Clausen et al. [45] proposed the OLSR, a proactive routing protocol based on the link state routing.

OLSR with quality of service (QOLSR): QOLSR, proposed by Munaretto and Fonseca [46] is based on the traditional OLSR.

Hierarchical proactive routing mechanism for mobile ad hoc networks (HOLSR): Villasensor-Gonzalez et al. [47] proposed HOLSR protocol, which was developed based on OLSR by organizing node in a hierarchical structure to overcome the inefficiency faced by the flat routing protocol in exploiting the nodes with higher source like bandwidth, transmission range etc.

Wireless routing protocol (WRP): WRP protocol by Murthy and Garcia-Luna Aceres [48] uses the properties of the distributed Bellman-Ford algorithm. Route is chosen by selecting a neighbor node that would minimize the path cost.

Source tree adaptive routing protocol (STAR): STAR proposed by Garcia-Luna Aceves and Spohn [49]. Using a source tree structure each node defines and store the preferred route to all possible destinations. ORA and LORA are two distinct approaches proposed under STAR protocol. ORA approach is preferred to obtain the optimal path with respect to metric (i.e.) number of hops. With ORA it is possible to obtain feasible paths with fewer packets overhead, but with LORA route do not guarantees to be optimal.

Cluster head gateway switch routing protocols (CGSR): CGSR employs a hierarchical network topology, proposed by Chiag et al. [50] CGSR is based on a distributed algorithm namely least cluster change (LCC). Cluster head is elected by using LCC. LCC algorithm is considered to be stable algorithm for cluster head election. Clustering enables an effective way for channel allocation.

Table 3 describes the comparative analysis of proactive routing protocols.

ProtocolRSRouting tablesNo. of tablesHMUpdate frequencyCritical nodeRMCCTC
DSDVFYes2YesPeriodicNoHop-countO(n)O(d)
R-DSDVFYes2YesProbalasticNOHop-countO(n)O(d)
OLSRFYes3YesPeriodicNoHop-countO(n)O(d)
HOLSRHYes3YesPeriodicYes, cluster headHop-countO(n)O(d)
CGSRHYes2NoPeriodicYes, cluster headHop-countO(n)O(d)
QOLSRHYes3YesPeriodicNoDelay, bandwidth, hop-countO(n)O(d)
WRPFYes4YesPeriodicNoHop-countO(n)O(d)
GSRFYes3NoPeriodic with neighborNoHop-countO(n)O(d)
STARHYes1NoOnly at specific eventsNoHop-countO(n)O(d)

Table 3.

Comparative analysis of proactive routing protocols.

RS = routing structure; H = hierarchical; F = flat; CC = communication complexity; TC = time complexity; n = number of nodes in the network; d = diameter of the network.

3.3 Hybrid routing protocols

Hybrid routing protocols are designed with the route discovery mechanism and the table maintenance mechanism features of reactive and proactive respectively. Hybrid protocol is suitable for ad hoc network where large numbers of nodes are present. The protocols discussed in this section overcome the drawbacks of both proactive and reactive routing protocols such as latency and overhead problems in the network.

Zone routing protocol (ZRP): ZRP proposed by Samer et al. [51] is a hybrid routing protocol. This protocol has features of both proactive and reactive mechanism. In ZRP two different routing approaches are exploited: intrazone routing protocol (IARP) and interzone routing protocol (IERP).

Zone based hierarchical link state routing protocol (ZHLS): ZHLS by Joa-Ng and Lu [52] developed network which is divided into non-overlapping zones based on geographical information.

Landmark ad hoc routing (LANMAR): LANMAR by Pei et al. [53] is a novel routing protocol. LANMAR have combined features of both FSR and Landmark routing. A subnet, set of nodes are grouped together as a single unit are likely to move as a group.

Relative distance micro-discovery ad hoc routing (RDMAR): RDMAR proposed by Aggelous and Tafazoli [54] is loop-free highly adaptive, efficient and scalable protocol. RDMAR consists of two main algorithms: the route discovery algorithm and route maintenance algorithm.

Distributed spanning tree (DST) routing: DST by Radhakrishnan et al. [55] proposed a routing algorithm based on the distributed spanning trees. DST proposes two different routing strategies to determine a route between a source and a destination pair namely: (1) Hybrid tree flooding (HFT) and (2) Distributed spanning tree (DST) shuttling.

Distributed dynamic routing (DDR) algorithm: DDR by Nikaein et al. [56] is a tree based routing protocol. In DDR the trees do not require a root node. In this algorithm the tree are constructed by exchanging the periodic beacon messages among neighbors’ nodes.

Fisheye state routing (FSR): FSR based on link state routing algorithm, designed by Pei et al. [57]. FSR maintains the accurate distance and path quality information about the immediate neighboring nodes. FSR are more scalable to large networks.

Hybrid ant colony optimization (HOPNET): Wang et al. [58] proposed a hybrid ant colony optimization (HOPNET) based on nature–inspired algorithm such as ant colony based optimization (ACO) and zone routing.

Fisheye zone routing protocol (FZRP): FZRP presented by Yang and Treng [59] inherits the idea of fisheye state routing in ZRP.

Link reliability based hybrid routing (LRHR): Xiaochuan et al. [60] proposed a novel hybrid routing protocol namely, LRHR. LRHR achieves the dynamic switching between table driven and on demand routing strategies due to the frequent topology changes in the network.

Mobility aware protocol synthesis for efficient routing: Bamis et al. [61] proposed a new stability metric to determine the mobility level of nodes in a network. Based upon this metric the nodes can be classified into different mobility classes in turn determines the most suitable routing techniques for a particular source to destination pair. Table 4 illustrates the comparative analysis of hybrid routing protocols.

ProtocolRSMultiple routesBeaconsRMRoute repositoryRoute rebuildingCritical nodeCCTC
ZRPFNoYesThrough put, end-end delay, packet loss percentageIntrazone and interzone RTRoute repair at failure pointYesIntra-O(ZN)
Inter-O(N + V)
Intra-O(I)
Inter-O(2D)
FSRFNoNoScope rangeRTSNNoO(N)O(D)
LANMARHNoYesHop countRT at landmark nodeSNYesO(N)O(D)
RDMARFNoNoHop countRTSN and new routeNoO(N)O(D)
SLURPHYesNoPower consumedlocation CacheSNYesDuring route discovery
Intra-O(2ZD)
Inter-O(2D)b
During route maintenance
Intra-O(2N/M)
Inter-O(2Y)
Intra-O(2 N/M)
Inter-O(2Y)
ZHLSHYesNoEnd-end delay, packet loss percentageIntrazone and interzone RTLocation request sentYesDuring route discovery
Intra-O(N/M)
Inter-O(N + V)
During route maintenance
Intra-O(N/M)a
Inter-O(N + V)
Intra-O(I)
Inter-O(D)
DSTHYesNoPower consumed, hop countRTHolding time or shuttlingYesIntra-O(ZN)
Inter-O(N)
Intra-O(ZD)
Inter-O(D)
DDRHYesYesStable routingIntrazone and interzone RTSNYesIntra-O(ZN)
Inter-O(N + V)
Intra-O(I)
Inter-O(2D)
HOPNETHNoNoHop-countIntrazone and interzone RTRoute repair at failure pointYesO(n)O(D)
LRHRFYesYesEdge weightRC,RTNew route discoveryNoO(n)O(D)
FZRPHNoYesHop-countIntrazone and interzone RTRoute repair at failure pointYesO(n)O(D)

Table 4.

Comparative analysis of hybrid routing protocols.

3.4 Hierarchical routing protocols

Hierarchical routing protocols apply clustering techniques to build a hierarchy of nodes. Nodes are organized into groups called zones (or) clusters. Each cluster consists of one or more clusters and gateways. Hierarchical routing protocols are developed with an ability to address scalability issues in ad hoc network environment and to minimize excessive overhead. This on the other side increases the tediousness of the routing techniques used by these protocols.

Core-extraction distributed ad hoc routing (CEDAR): Sivakumar et al. [62] introduced CEDAR, an QoS routing algorithm. In CEDAR a subset of nodes are grouped as the core of the network.

Hierarchical state routing (HSR): HSR is a dynamic, distributed multilevel cluster based hierarchical protocol, proposed by Iwata et al. [63] In HSR clustering schema play a vital role. The primary objective of clustering is to have the efficient utilization of radio channel resource and the reduction of routing overhead, Thus the network performance can be enhanced.

Dynamic address approach: Eriksson et al. [64] introduced a dynamic addressing scheme that can enhance scalability in ad hoc network. Under this scheme a geographical location based dynamic address is added to the nodes permanent identifier.

Hierarchical landmark routing (H-LANMAR): H-LANMAR [65] uses, backbone network mechanism, improve the scalability of the network. In H-LANMAR, nodes in the network are grouped into dynamic multihop clusters. Cluster head is referred as backbone node (BN). In case of backbone failure LANMAR schema is used for packet transmission.

Table 5 illustrates the comparative analysis of hierarchical routing protocols.

ProtocolRouting tablesNo. of routing tablesUpdate frequencyHello messageCritical node
HSRYes2Periodic, within each subsetYesYes, cluster head
CEDARYes1On demandNoYes
Eriksson et al.Yes2PeriodicNoNo
H-LANMARYes2PeriodicNoYes

Table 5.

Comparative analysis of hierarchical routing protocols.

3.5 Multipath routing protocols

The multipath routing protocols are designed with primary objectives to provide reliable communication and to ensure load balancing as well as to improve quality of service (QoS) of ad hoc environment. Multipath routing protocols address issues such as multiple paths discovery and maintaining these paths.

Caching and multipath routing protocol (CHAMP): CHAMP protocol, proposed by Valera et al. [66] exploits data caching and shortest multipath routing. The main design goal is to minimize the packet drops that occur due to the frequent route breakages.

Secure multipath routing (secMR): SecMR, secure an on-demand multipath routing protocol is designed by Mavropodi et al. [67]. Many security enhancement techniques are imposed in this protocol to present security attacks of collaborating malicious nodes. A centralized Certifying Authority (CA) issues a certificate to the secret keys.

Energy and mobility aware geographical multipath routing protocols (EM-GMR): Liang and Ren [68] developed energy and mobility aware geographical multipath routing protocol, a fuzzy logic mechanism based multipath routing protocol. According to EM-GMR, while choosing the next hop, a mobile node should consider the following constraints namely: the remaining battery capacity, mobility and distance between that next hop to the destination. A fuzzy logic system is developed and applied to the next hop selection mechanism. Thus the authors developed 27 rules for the fuzzy logic set to select the next hop node.

Braided multipath routing (BMR): Ganesan et al. [69] proposed braided multipath routing protocol. In BMR protocol each node discovers alternate best paths from a source to a destination during the route discovery process.

Truth multipath routing protocol (TMRP): Wang et al. [70] proposed TMRP that can be suitable for network with non-cooperative nodes referred as selfish nodes depending upon the resource availability at each node, the cost of forwarding a packet is measured.

Ad hoc on-demand multipath distance vector routing (AOMDV): AOMDV based on traditional AODV was proposed by Marina and Das [71]. The main objective of this protocol is to establish a multiple loop free and link-disjoint paths. The proposed metric namely “advertise hop count “is used in this protocol. The advertised hop count for a node is defined as the maximum acceptable hop count for any path recorded at the node.

Disjoint multipath routing using colored trees: Ramasubramanian et al. [72] developed a loopfree multipath routing protocol using a pair of trees that are red and blue in colors. Thus, a pair of colored trees is constructed by this process.

Scalable multipath on-demand routing (SMORT): SMORT was developed by Reddy and Raghavan [73]. The major objective of this protocol is to minimize the routing overhead occurred during route break recovery and to increase the scalability.

Split multipath routing (SMR): Lee et al., [74] proposed SMR protocol that forms and uses multiple routes of maximally disjoint paths. The overhead caused by route recovery process is minimized by establishing a multiple path from source to destination. Table 6 illustrates the comparative analysis of multipath routing protocols.

ProtocolProactive/reactiveLoopsRoute metricsRoute cache
CHAMPReactiveYesShortest pathYes
AOMDVReactiveNoAdvertised hop countNo
SMRReactiveNoLeast delayNo
TMRPReactiveNoAuction winnerNo
SMORTReactiveNoShortest pathYes
Ramasubramanian et al.ProactiveNoPreferred neighborRoute table

Table 6.

Comparative analysis of multipath routing protocols.

3.6 Multicast routing protocols

In multicasting routing, the data are transmitted from one source to multiple destinations. Multicast protocols can be categorized into two types, namely tree-based multicast and mesh based multicast. The tree based multicast routing protocols utilize the network resource in efficient manner. Mesh based protocols are robust due to formation of many redundant paths between the nodes and in high packet delivery ratio.

Ad hoc multicast routing protocol (AMRoute): Xie et al. [75] developed AMRoute, with main design objective are: scalability and robustness. In ad hoc network with highly dynamic mobile nodes, the control packets overhead are high due to maintenance of multi cast tree.

Adaptive demand-driver multicast routing (ADMR): ADMR, on-demand multicast routing algorithm, developed by Jetchera and Johnson [76]. This protocol does not support any non on-demand components. ADMR, uses a source based forwarding trees and monitors the traffic pattern and rate of the source. ADMR navigates back to the normal mode, when the mobility of the node is reduced.

Differential destination multicast (DDM): Ji and Corson [77] proposed the DDM algorithm. DDM has two important characteristics features: 1. the sender node will have full control over the members of group nodes. 2. Source node, encodes the address within each data packets header on an in-band fashion.

Dynamic core based multicast routing (DCMP): Das et al. [78] proposed DCMP source initiated multicast protocol with an objective to increase the scalability and efficiency as well as to decrease the overhead. In this protocol the source as been classified into active, core active and passive. A core active source can support up to maximum of MaxPassSize passive resource and the hop distance between them is limited by the MaxHop parameter.

Adhoc QoS multicasting (AQM): AQM protocols developed by Bur and Ersoy [79]. In this protocol QoS of the neighboring node monitored and maintained as well as used for efficient multicast routing. Node announces the QoS status during the session initiation phase to join a session, the nodes executes request-reply–reverse procedure, ensures the QoS information is updated and a possible route is chosen session is initiated by a session initiator node.

Content based multicast (CBM): CBM developed by Zhou and Singh [80]. In CBM the nodes collect information about threats and resource at a time period t and distance d away from the location of the node.

Energy efficient multicast routing: Li et al. [81] proposed an energy efficient multicast routing protocol. The authors constructed a weighted network graph by considering the transmission power of each node as a weight between edges. Each node has only information regarding their neighbors. The objective of minimum energy multicast (MEM), problem is to develop the multicast tree with a minimum total energy cost. In this approach, multicast tree is formed by nodes within the highest energy efficiency.

QoS multicast routing protocols for clustering mobile ad hoc networks (QMRPCAH): QMRPCAH, QoS aware multicast routing protocol for clustered ad hoc network was developed by Layuan and Chunlin [82]. It enhances scalability and flexibility.

Epidemic-based reliable and adaptive multicast for mobile ad hoc networks (Eramobile): Eramobile, highly reliable and an adaptive multicast protocol proposed by Ozkasap et al. [83]. In this protocol bio-inspired epidemic methods are utilized in multicast operation in order to support dynamic and topology changes due the unpredictable mobility of the nodes in the network. Table 7 illustrates the comparative analysis of multicast routing protocol.

ProtocolRSCore/broadcastRoute metricsForwarding strategyRoute repositoryCritical node
DCMPFCoreNew routeSource routingRTNo
ADMRHNeitherLink breaksFlooding/tree basedRTYes
AMRouteHCoreUnicast operationShared treeBased upon algorithmYes
Li et al.FNeitherMinimum energySource routingRCNo
QMRPCAHHBroadcastQoSBordercastRTYes
AQMFCoreQoSSource routingRTNo
CBMFCoreThreat arrivalLimited broadcastRCYes
DDMFNeitherSPSource routingNoneNo
EraMobileFNeitherRandomly selectedLocal broadcastNoneYes

Table 7.

Comparative analysis of multicast routing protocols.

RS = routing structure; H = hierarchical; F = flat routing repository; RC = route cache; RT = route table.

3.7 Location-aware routing protocols

The geographical information about a node is collected by another node by using GPS mechanism. Location-aware routing protocols are efficiently supports to improve the scalability of the ad hoc network.

Location aided routing (LAR): Ko and Vaidya [3] presented the LAR protocol, is based on directed flooding strategies. Two different LAR schemes are proposed to determine whether a node is within the request zone.

Distance routing effect algorithm (DREAM): DREAM proposed by Basagni et al. [2] utilizes location information measured using GPS system and speed information of data packet for routing. The working principal of this protocol is a part proactive and reactive in nature.

Greedy perimeter stateless routing (GPSR): GPSR algorithm by Karp and Kung [15] supports scalability and mobility. The protocol exploits greedy forwarding strategies, a node forward the packet to neighbors that is closer to the destination than itself until the destination is reached.

Dynamic route maintenance (DRM) for geographical forwarding: Chou et al. [84] developed a dynamic beacon based geographical routing algorithm. Improvements to location-aided routing through directional count restrictions: Colagross et al. [85] defined a scheme using the count threshold value that keeps track of number of duplicate broadcast packet received by a node. The main objective is to minimize the control packets overhead by decreasing duplicate route discovery packets.

Adaptive location aided mobile ad hoc network routing (ALARM): ALARM algorithm proposed by Boleng and Camp [86], exploits link duration as mobility feedback for adaptation and for evaluating the performance improvement, location informed are used.

A region based routing protocol for wireless mobile ad hoc networks (REGR): REGR by Liu et al. [87] proposed dynamically established a pre-routing region between source-destination pair. The two main features about this protocol are: REGR route creation and REGR route update.

Maximum expectation within transmission range (MER): Kwin and Shroff [88] presented the MER, a location- aware protocol. Each node in the location aware routing use location monitoring tool namely GPS.

SOLAR: Ghosh et al. [89] proposed a framework called ORBIT to achieve the macro-level mobility. ORBIT is defined as an orbital movement pattern of mobile users along specific places called hubs.

Geographical landmark routing (GLR): Kim [90] described GLR algorithm, GLR gives solutions to two major routing issues namely blind detouring problem and the triangular routing problem.

Secure position based routing protocol: Song et al. [91] described a highly secure geographical forwarding (SGF) algorithm. SGF provides source authentication message authentication and message integrity.

On-demand geographical path routing (OGRP): OGRP is an efficient, stateless and scalable routing protocols by Giruka and Singhal [92]. OGRP exploits the features of greedy forwarding, reactive route discovery and source routing.

Location aided knowledge extraction routing for mobile ad hoc networks (LAKER): LAKER protocol proposed by Li and Mohapatra [93]. This protocol combines the features of caching strategy and limited flooding area to decrease the network overhead. Table 8 describes the comparative analysis of location-aware routing protocols.

ProtocolForwarding mechanismLoopRoute metricScalabilityRobustness
LARDirectional floodingNoHop countNoNo
DREAMFloodingNoHop countNoNo
GPSRGreedy floodingYesSPYesNo
Colargrosso et al.Directional floodingNoHop countNoNo
ALARMDirectional floodingYesHops and mobilityYesNo
REGRDirectional floodingYesSPYesNo
LAKERDirectional floodingNoHop countNoNo
OGPRSource routingYesSPYesYes
SOLARGreedy geographic forwardingNoSPNoNo
GLRSource routingYesSPYesNo
MERGreedy geographic forwardingNoMaximum expectationNoYes

Table 8.

Comparative analysis of location-aware routing protocols.

Route Metric SP = shortest path; LSP = local shortest path; WDG = weighted distance gain; CC = communication complexity; H = high; M = medium; L = low.

3.8 Geographical multicast (Geocast) routing protocols

Geocast routing protocols have the combined features of both geographical and multicast routing protocols. The major advantage of Geocast routing protocols are performance improvement and minimizing the control overhead.

Geocasting in mobile ad hoc networks (GeoTORA): Ko and Vaidya [8] proposed the GeoTORA protocol, is based upon the unicast TORA routing protocol.

Geocast protocol for mobile ad hoc network based on GRID (GEOGRID): GeoGRID routing protocol was developed by Liao et al. [7] GeoGrid extends on the unicasting routing protocol GRID. GeoGRID exploit location information in route discovery to define the forwarding zone or geographical area.

Direction guided routing (DGR): An and Papavassilliou [94] designed DGR algorithm based on clustering mechanism. In DGR, the nodes in the network are grouped into clusters and the cluster head is elected using the techniques such a mobile clustering algorithm (MCA).

Geocast adaptive mesh environment for routing (GAMER): GAMER protocol developed by Camp and Liu [95] is based on the mobility nature of nodes. This protocol exploits the mesh creation approach. Table 9 illustrates the Geocast routing protocols comparative analysis.

ProtocolRSCore/broadcastRoute metricsForwarding strategyRoute repositoryCritical node
DGRHCoreSPLimited floodingRCYes
GAMERFCoreSPSource routingRCNo
GeoGridHCoreHop countFlooding or ticket basedNoneNo
GeoToraHBroadcastSPLimited floodingRTYes

Table 9.

Geocast routing protocol comparison.

RS = routing structure; H = hierarchical; F = flat; SP = shortest path; RC = route cache; RT = route table.

3.9 Power-aware routing protocols

In ad hoc network, performance and lifetime of the nodes depends upon the power consumed by them. Thus energy efficiency is an important and challenging issue in designing power-aware routing protocols.

Device and energy aware routing (DEAR): DEAR, a power-aware protocol for heterogeneous network is proposed by Arun Avudainayagam et al. [96] The protocol is designed for heterogeneous network that consist of two different categories of nodes namely: battery powered nodes and externally powered nodes.

Routing and channel assignment for low power transmission in PCS: Scott and Bombos [97] gave a proposal for reducing the transmission power in PCS network. The author’s goal is to increase the network lifetime of the individual nodes.

Energy conserving routing in wireless ad hoc networks: Chang et al. [98] states that shortest route is the routes with the least energy cost. This leads to a conclusion, more energy will be consumed by the nodes along the shortest paths, whereas the battery power of the other nodes in the network remains unused.

CLUSTERPOW and MINPOW: Kawadia and Kumar [99] developed three different power-aware algorithms namely: CLUSTERPOW, tunneled CLUSTERPOW and MINPOW. A route chosen by this protocol guarantees that each hop in the route has a maximum transmit power capacity.

Interference aware cooperative routing: Mahmood and Comanicics [100] proposed two algorithms, with a goal to maximize the throughput and minimize energy consumption. The algorithms are designed specifically to CDMA based ad hoc sensor network.

Minimum energy hierarchical dynamic source routing (MEHDSR): Tarique and Tepa [101] developed two energy-aware protocols namely MEDSR and HMEDSR based on DSR, the traditional source initiated routing protocols.

Power conserving routing with entropy-constrained algorithm: Karayiannis and Nadella [102] present a routing algorithm with an objective to reduce the overhead involved with route discovery. The authors applied the concept of entropy to develop the power-aware routing algorithm. Thus, two specific implementations are discussed.

  1. Single performance metrics: optimizing the route with link cost metrics.

  2. Multiple performance metrics: optimizing the route with link cost and link reliability.

This algorithm proves that the entropy constrained algorithms can improve the network lifetime.

Table 10 illustrates the comparative analysis of power aware routing protocol comparison.

ProtocolRTTypePath strategyRouting metricsScalabilityRobustnessCritical node
DEARYesGlobalSingle-pathBased upon ‘device type’NoYesNo
Scott and BombosNoCentralizedSingle-pathMultiple constrained SPYesNoNo
CLUSTERPOWYesClusteredSingle-pathTotal consumed powerYesYesYes
Mahmood and ComaniciuNoDistributedSingle-pathEnergy and interferenceNoNoNo
MEHDSRNoGlobalSingle-pathSP or next available linkYesNoNo
Karayiannis and NadellaNoDistributedSingle-pathLink cost and link reliabilityYesNoNo

Table 10.

Comparison of power aware routing protocols.

Routing metrics: SP = shortest path.

Advertisement

4. Conclusion

In this paper, a survey is performed on various routing algorithms including the traditional routing algorithms namely table-driven and source-initiated routing algorithms. Thus the ad hoc routing algorithm is divided into nine categories: (1) source-initiated (reactive or on-demand), (2) table-driven (proactive), (3) hybrid, (4) hierarchical, (5) multipath, (6) multicast, (7) location aware, (8) geographical multicast, (9) power-aware. Even though each protocol classes have different operational mechanism their all come under one roof by having common aim to minimize packet overhead, maximize throughput and minimize end-end delay. In this survey, the major routing issues faced by the routing protocols are discussed and effective study about the various categories of routing algorithm along with a comparative study is performed.

References

  1. 1. Alotaibi E, Mukherjee B. A survey on routing algorithms for wireless ad-hoc and mesh networks. Computer Networks. 2012:944-955
  2. 2. Basagni S, Chlamtac I, Syrotiuk VR, Woodward BA. A distance routing effect algorithm for mobility (DREAM). In: Proceedings of the Fourth Annual ACM International Conference on Mobile Computing and Networking (MobiCom’98). 1998. pp. 76-84
  3. 3. Ko Y-B, Vaidya NH. Location-aided routing in mobile ad-hoc networks. In: Proceedings of the Annual ACM International Conference on Mobile Computing and Networking (MobiCom’98). October 1998. pp. 66-75
  4. 4. Ko Y, Vaidya NH. Geo-casting in mobile ad-hoc networks: Location-based multicast algorithms. In: Proceedings of the Second IEEE Workshop in Mobile Computing Systems and Applications (WMCSA’99); Vols. 25–26. February 1999. pp. 101-110
  5. 5. Stojmenovic X. Lin, loop-free hybrid single-path/flooding routing algorithms with guaranteed delivery for wireless networks. IEEE Transactions on Parallel and Distributed Systems. 2001;12(10):1023-1032
  6. 6. Park V, Corson S. A highly adaptive distributed routing algorithm for mobile wireless networks. In: Proceedings of the Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM’97); Vol. 3. 1997. pp. 1405-1413
  7. 7. Liao W-H, Tseng Y-C, Lo K-L, Sheu J-P. GeoGrid: A geocasting protocol for mobile ad hoc networks based on grid. Journal of Internet Technology. 2000;1(2):23-32
  8. 8. Ko Y, Vaidya NH. GeoTORA: A protocol for geo-casting in mobile ad-hoc networks. In: Proceedings of the IEEE International Conference on Network Protocols. 2000. p. 240
  9. 9. Haas ZJ, Pearlman M. The zone routing protocol (ZRP) for ad-hoc networks. IETF Internet Draft. July 2002. Available from: draft-ietf-manet-zone-zrp-04.txt
  10. 10. Huang Q, Lu C, Roman G-C. Mobicast: Just-in-time multicast for sensor networks under spatiotemporal constraints. Lecture Notes in Computer Science. 2003;2634:442-457
  11. 11. Eppstein D. Spanning trees and spanners. Tech. Report No. ICS-TR-96-16. Irvine: University of California; 1996
  12. 12. Rao A, Ratnasamy S, Papadimitriou C, Shenker S, Stoica I. Geographic routing without location information. In: Proceedings of the Annual ACM International Conference on Mobile Computing and Networking (MobiCom’03); September. 2003. pp. 96-108
  13. 13. Xing G, Lu C, Pless R, Huang Q. On greedy geographic routing algorithms in sensing-covered networks. In: Proceedings of the Fifth ACM Annual International Symposium on Mobile Ad-Hoc Networking and Computing, ACM Special Interest Group on Mobility of Systems, Users, Data, and Computing (SIGMOBILE’04). 2004. pp. 31-42
  14. 14. Leong B, Liskov B, Morris R. Geographic routing without planarization. In: USENIX Symposium on Networked Systems Design and Implementation. 2006
  15. 15. Karp B, Kung H. GPSR: Greedy perimeter stateless routing for wireless networks. In: Proceedings of the Sixth Annual ACM International Conference on Mobile Computing and Networking (MobiCom’00). 2000. pp. 243-254
  16. 16. Li J, Janotti J, De Coutu DSJ, Karger DR, Morris R. A scalable location service for geographic ad-hoc routing. In: Proceedings of the Sixth ACM Annual International Conference on Mobile Computing and Networking, ACM Special Interest Group on Mobility of Systems, Users, Data, and Computing (SIGMOBILE’00). 2000. pp. 120-130
  17. 17. Eriksson J, Faloutsos M, Krishnamurthy S. Scalable ad-hoc routing: The case for dynamic addressing. In: Proceedings of the Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM’04). 2004
  18. 18. Camara D, Loureiro A. A novel routing algorithm for ad-hoc networks. In: Proceedings of the Thirty-third Hawaii International Conference on System Sciences. 2000
  19. 19. Caleffi M, Ferraiuolo G, Paura L. Augmented tree-based routing protocol for scalable ad-hoc networks. In: Proceedings of the Third IEEE International Workshop on Heterogeneous Multi-Hop Wireless and Mobile Networks (MHWMN’07). 2007
  20. 20. Lindgren A, Schelen O. Infrastructured ad-hoc networks. In: Proceedings of theInternational Conference on Parallel Processing (International Workshop on Ad-Hoc Networking (IWAHN 2002)). 2002. pp. 64-70
  21. 21. Gomez J, Campbell AT, Naghshineh M, Bisdikian C. PARO: Supporting dynamic power-controlled routing in wireless ad-hoc networks. Proceedings of the Wireless Networks. 2003;9(5):443-460
  22. 22. Djenouri D, Badache N. Dynamic source routing power-aware. International Journal of Ad-Hoc and Ubiquitous Computing (IJAHUC’06). 2006;1(3):126-136
  23. 23. Singh S, Raghavendra C. PAMAS and PAMAS-power aware multi access protocol with signaling ad-hoc networks. ACM Computer Communication Review. 1998;28(3):526
  24. 24. Aguayo D, Bicket J, Morris R. SrcRR: A high-throughput routing protocol for 802.11 mesh networks. 2003. Available from: http://pdos.csail.mit.edu/rtm/srcrr-draft.pdf
  25. 25. Draves R, Padhye J, Zill B. The architecture of the link quality source routing protocol. In: Technical Report MSR-TR-2004-57; Microsoft Research. 2004
  26. 26. Yang Y, Wang J, Kravets R. Load-balanced routing for mesh networks. ACM Mobile Computing and Communications (SIGMOBILE’06). 2006;10(4):3-5
  27. 27. Yang Y, Wang J, Kravets R. Interference-Aware Load Balancing for Multihop Wireless Networks, Technical Report UIUCDCS-R-2005-2526. Department of Computer Science, University of Illinois at Urbana-Champaign; 2005
  28. 28. Feng J, Xia R, Zhou H. Interference-aware load balanced routing in wireless mesh networks. In: Proceedings of the International Conference Wireless Communications, Networking and Mobile Computing (WiCom’07); September. 2007. pp. 1730-1734
  29. 29. Popa L, Rostamizadeh A, Karp RM, Papadimitriou C, Stoica I. Balancing traffic load in wireless networks with curveball routing. In: Proceedings of the Eighth ACM International Symposium on Mobile and ad-hoc Networking & Computing (MobiHOC’07). 2007. pp. 170-179
  30. 30. Johnson DB, Maltz DA, Broch J. DSR: The dynamic source routing protocol for multi-hop wireless ad hoc networks. In: Perkins CE, editor. Ad Hoc Networking. Addison-Wesley; 2001. pp. 139-172. (Chapter 5)
  31. 31. Perkins C, Royer E. Ad hoc on-demand distance vector routing. In: Proceedings of the Second IEEE Workshop on Mobile Computing Systems and Applications. 1999. pp. 99-100
  32. 32. Toh C-K. Associativity-based routing for ad-hoc mobile networks. Wireless Personal Communications Journal. 1997;4(2 Special Issue on Mobile Networking and Computing Systems):103-139
  33. 33. Dube R, Rais CD, Wang KY, Tripathi SK. Signal stability-based adaptive routing (SSA) for ad hoc mobile networks. IEEE Personal Communications Magazine. 1997:36-45
  34. 34. Gunes M, Sorges U, Bouazizi I. Ara-the ant-colony based routing algorithms for manets. In: Proceedings of IEEE ICPP Workshop on Ad Hoc Networks (IWAHN); August. 2002. pp. 1599-1615
  35. 35. Garcia-Luna-Aceves J, Mosko M, Perkins C. A new approach to on demand loop-free routing in networks using sequence numbers. Computer Networks. 2006;50(10):1599-1615
  36. 36. Wang Y-H, Chao C-F. Dynamic backup routes routing protocol for mobile ad hoc networks. Information Sciences. 2006;176(2):161-185
  37. 37. Xue Q, Ganz A. Ad hoc QoS on-demand routing (AQOR) in mobile ad hoc networks. Journal of Parallel Distributed Computing. 2003;63(2):154-165
  38. 38. Rosati L, Berioli M, Reali G. On ant routing algorithms in ad hoc networks with critical connectivity. Ad Hoc Networks. 2008;6(6):827-859
  39. 39. Raju J, Garcia-Luna-Aceves J. A new approach to on-demand loop free multipath routing. In: Proceedings of the Eight IEEE International Conference on Computer Communications and Networks (IC3N); April. 1999. pp. 522-527
  40. 40. Ahn C. Gathering-based routing protocol in mobile ad hoc networks. Computer Communications. 2006;30(1):202-206
  41. 41. Beraldi R, Querzoni L, Baldoni R. A hint-based probabilistic protocol for unicast communications in MANETs. Ad Hoc Networks. 2006;4(5):547-566
  42. 42. Goff T, Abu-Ghazaleh NB, Phatak DS, Kahvecioglu R. Preemptive routing in ad hoc networks. Journal of Parallel Distributed Computing. 2003;63(2):123-140
  43. 43. Rangarajan H, Garcia-Luna-Aceves J. Efficient use of route requests for loop-free on-demand routing in ad hoc networks. Computer Networks. 2007;51(6):1515-1529
  44. 44. Perkins C, Bhagwat P. Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. In: ACM SIGCOMM; August–September. 1994. pp. 234-244
  45. 45. Clausen T, Jacquet P, Laouiti A, Muhlethaler P, Qayyum A, Viennot L. Optimized link state routing protocol for ad hoc networks. In: Proceedings of IEEE INMIC; December. 2001. pp. 62-68
  46. 46. Villasenor-Gonzalez L, Ge Y, Lamont L. HOLSR: A hierarchical proactive routing mechanism for mobile ad hoc networks. IEEE Communications Magazine. 2005;43(7):118-125
  47. 47. Munaretto A, Fonseca M. Routing and quality of service support for mobile ad hoc networks. Computer Networks. 2007;51(11):3142-3156
  48. 48. Murthy S, Garcia-Luna-Aceves JJ. An efficient routing protocol forwireless networks. MONET. 1996;1(2):273-282
  49. 49. Garcia-Luna-Aceves JJ, Spohn M. Source-tree routing in wireless networks. In: Proceedings of IEEE ICNP; October–November. 1999. pp. 273-282
  50. 50. Chiang WLC, Wu H, Gerla M. Routing in clustered multihop, mobile wireless networks. In: Proceedings of IEEE SICON; April. 1997. pp. 197-211
  51. 51. Samar P, Pearlman M, Haas S. Independent zone routing: An adaptive hybrid routing framework for ad hoc wireless networks. IEEE/ACM Transactions on Networking. 2004;12(4):595-608
  52. 52. Joa-Ng M, Lu I-T. A peer-to-peer zone-based two-level link state routing for mobile ad hoc network. IEEE Journal on Selected Areas in Communications. 1999;17(8):1415-1425
  53. 53. Pei G, Gerla M, Hong X. LANMAR: Landmark routing for large scale wireless ad hoc networks with group mobility. In: Proceedings of ACM MobiHoc; August. 2000. pp. 11-18
  54. 54. Aggelou GN, Tafazolli R. RDMAR: A bandwidth-efficient routing protocol for mobile ad hoc networks. In: Proceedings of ACM WOWMOM; August. 1999. pp. 26-33
  55. 55. Radhakrishnan S, Rao N, Racherla G, Sekharan C, Batsell S. DST—A routing protocol for ad hoc networks using distributed spanning trees. In: Proceedings of IEEE WCNC; September. 1999. pp. 100-104
  56. 56. Nikaein N, Labiod H, Bonnet C. DDR: Distributed dynamic routing algorithm for mobile ad hoc networks. In: Proceedings of ACM MobiHoc; August. 2000. pp. 19-27
  57. 57. Pei G, Gerla M, Chen T-W. Fisheye state routing in mobile ad hoc networks. In: Proceedings of IEEE ICDCS Workshop on Wireless Networks and Mobile Computing, April. 2000. pp. D71-D78
  58. 58. Wang J, Osagie E, Thulasiraman P, Thulasiram R. Hopnet: A hybrid ant colony optimization routing algorithm for mobile ad hoc network. Ad Hoc Networks. 2009;7(4):690-705
  59. 59. Yang C-C, Tseng L-P. Fisheye zone routing protocol: A multi-level zone routing protocol for mobile ad hoc networks. Computer Communications. 2007;30(2):261-268
  60. 60. Xiaochuan X, Gang W, Keping W, Gang W, Shilou J. Link reliability based hybrid routing for tactical mobile ad hoc network. Journal of Systems Engineering and Electronics. 2008;19(2):259-267
  61. 61. Bamis A, Boukerche A, Chatzigiannakis I, Nikoletseas S. A mobility aware protocol synthesis for efficient routing in ad hoc mobile networks. Computer Networks. 2008;52(1):130-154
  62. 62. Sivakumar R, Sinha P, Bharghavan V. CEDAR: A core-extraction distributed ad hoc routing algorithm. IEEE Journal on Selected Areas in Communications. 1999;17(8):1454-1465
  63. 63. Iwata A, Chiang C, Pei G, Gerla M, Chen T. Scalable routing strategies for ad hoc wireless networks. IEEE Journal on Selected Areas in Communications. 1999;17(8):1369-1379
  64. 64. Eriksson J, Faloutsos M, Krishnamurthy SV. Scalable ad hoc routing: The case for dynamic addressing. Proceedings of IEEE INFOCOM. 2004;2:1108-1119
  65. 65. Xu K, Hong X, Gerla M. Landmark routing in ad hoc networks with mobile backbones. Journal of Parallel and Distributed Computing. 2003;63(2):110-122
  66. 66. Valera A, Seah WKG, Rao SV. Cooperative packet caching and shortest multipath routing in mobile ad hoc networks. Proceedings of IEEE INFOCOM. 2003;1:260-269
  67. 67. Mavropodi R, Kotzanikolaou P, Douligeris C. SecMR—A secure multipath routing protocol for ad hoc networks. Ad Hoc Networks. 2007;5(1):87-99
  68. 68. Liang Q, Ren Q. Energy and mobility aware geographical multipath routing for wireless sensor networks. In: Proceedings of the IEEE Wireless Communications and Networking Conference, Vol. 3; March. 2005. pp. 1867-1871
  69. 69. Ganesan D, Govindan R, Shenker S, Estrin D. Highly-resilient, energy-efficient multipath routing in wireless sensor networks. ACM SIGMOBILE Mobile Computing and Communications Review. 2001;5(4):11-25
  70. 70. Wang Y, Giruka V, Singhal M. Truthful multipath routing for ad hoc networks with selfish nodes. Journal of Parallel and Distributed Computing. 2008;68(6):778-789
  71. 71. Marina MK, Das S. On-demand multi path distance vector routing in ad hoc networks. In: Proceedings of IEEE ICNP. 2001. pp. 14-23
  72. 72. Ramasubramanian S, Krishnamoorthy H, Krunz M. Disjoint multipath routing using colored trees. Computer Networks. 2007;51(8):2163-2180
  73. 73. Reddy LR, Raghavan S. SMORT: Scalable multipath on-demand routing for mobile ad hoc networks. Ad Hoc Networks. 2007;5(2):162-188
  74. 74. Lee S, Gerla M. Split multipath routing with maximally disjoint paths in ad hoc networks. In: Proceedings of the IEEE ICC. 2001. pp. 3201-3205
  75. 75. Xie J, Talpade RR, McAuley A, Liu M. Amroute: Ad hoc multicast routing protocol. MONET. 2002;7(6):429-439
  76. 76. Jetcheva J, Johnson D. Adaptive demand-driven multicast routing in multi-hop wireless ad hoc networks. In: Proceedings of ACM MobiHoc. October 2001. pp. 33-44
  77. 77. Ji L, Corson M. Differential destination multicast-a manet multicast routing protocol for small groups. Proceedings of IEEE INFOCOM. 2001;2:1192-1201
  78. 78. Das SK, Manoj BS, Murthy CSR. A dynamic core based multicast routing protocol for ad hoc wireless networks. In: Proceedings of ACM MobiHoc. June 2002. pp. 24-35
  79. 79. Bür K, Ersoy C. Ad hoc quality of service multicast routing. Computer Communications. 2005;29(1):136-148
  80. 80. Zhou H, Singh S. Content based multicast (CBM) in ad hoc networks. In: Proceedings of ACM MobiHoc. August 2000. pp. 51-60
  81. 81. Li D, Liu Q, Hu X, Jia X. Energy efficient multicast routing in ad hoc wireless networks. Computer Communications. 2007;30(18):3746-3756
  82. 82. Layuan L, Chunlin L. A QoS multicast routing protocol for clustering mobile ad hoc networks. Computer Communications. 2007;30(7):1641-1654
  83. 83. Ozkasap O, Genc Z, Atsan E. Epidemic-based reliable and adaptive multicast for mobile ad hoc networks. Computer Networks. 2009;53(9):1409-1430
  84. 84. Chou C-H, Ssu K-F, Jiau H. Dynamic route maintenance for geographic forwarding in mobile ad hoc networks. Computer Networks. 2008;52(2):418-431
  85. 85. Colagrosso M, Enochs N, Camp T. Improvements to location-aided routing through directional count restrictions. In: Proceedings of International Conference on Wireless Networks (ICWN). June 2004. pp. 924-929
  86. 86. Boleng J, Camp T. Adaptive location aided mobile ad hoc network routing. In: Proceedings of IEEE International Performance, Computing, and Communications Conference (IPCCC). April 2004. pp. 423-432
  87. 87. Liu Y, Hu X, Lee M, Saadawi T. A region-based routing protocol for wireless mobile ad hoc networks. IEEE Network. 2004;18(4):12-17
  88. 88. Kwon S, Shroff N. Geographic routing in the presence of location errors. Computer Networks. 2006;50(15):2902-2917
  89. 89. Ghosh J, Philip S, Qiao C. Sociological orbit aware location approximation and routing (solar) in manet. Ad Hoc Networks. 2007;5(2):189-209
  90. 90. Na J, Kim C-K. Glr: A novel geographic routing scheme for large wireless ad hoc networks. Computer Networks. 2006;50(17):3434-3448
  91. 91. Song J-H, Wong V, Leung V. Secure position-based routing protocol for mobile ad hoc networks. Ad Hoc Networks. 2007;5(1):76-86
  92. 92. Giruka V, Singhal M. A self-healing on-demand geographic path routing protocol for mobile ad-hoc networks. Ad Hoc Networks. 2007;5(7):1113-1128
  93. 93. Li J, Mohapatra P. LAKER: Location aided knowledge extraction routing for mobile ad hoc networks. In: Proceedings of IEEE WCNC; March. 2003. pp. 1180-1184
  94. 94. An B, Papavassiliou S. Geomulticast: Architectures and protocols for mobile ad hoc wireless networks. Journal of Parallel Distributed Computing. 2003;63(2):182-195
  95. 95. Camp T, Liu Y. An adaptive mesh-based protocol for geocast routing. Journal of Parallel Distributed Computing. 2003;63(2):196-213
  96. 96. Avudainayagam A, Lou W, Fang Y. Dear: A device and energy aware routing protocol for heterogeneous ad hoc networks. Journal of Parallel Distributed Computing. 2003;63(2):228-236
  97. 97. Scott K, Bombos N. Routing and channel assignment for low power transmission in PCS. In: Proceedings of IEEE ICUPC, September–October. 1996. pp. 498-502
  98. 98. Chang J-H, Tassiulas L. Energy conserving routing in wireless adhoc networks. Proceedings of IEEE INFOCOM. 2000:22-31
  99. 99. Kawadia V, Kumar P. Power control and clustering in ad hoc networks. Proceedings of IEEE INFOCOM. 2003;1:459-469
  100. 100. Mahmood H, Comaniciu C. Interference aware cooperative routing for wireless ad hoc networks. Ad Hoc Networks. 2009;7(1):248-263
  101. 101. Tarique M, Tepe K. Minimum energy hierarchical dynamic source routing for mobile ad hoc networks. Ad Hoc Networks. 2009;7(6):1125-1135
  102. 102. Karayiannis N, Nadella S. Power-conserving routing of ad hoc mobile wireless networks based on entropy-constrained algorithms. Ad Hoc Networks. 2006;4(1):24-35

Written By

Alagan Ramasamy Rajeswari

Submitted: 18 March 2020 Reviewed: 14 April 2020 Published: 02 July 2020