Intelligent On-Demand Routing Protocol For Ad Hoc Network
Intelligent On-Demand Routing Protocol For Ad Hoc Network
Abstract
Ad hoc networks play an important role in mobile communications, and the performance of nodes has a
significant impact on the choice of communication links. To ensure efficient and secure data forwarding and
delivery, an intelligent routing protocol (IAODV) based on learning method is constructed. Five attributes of
node energy, rate, credit value, computing power and transmission distance are taken as the basis of
segmentation. By learning the selected samples and calculating the information gain of each attribute, the
decision tree of routing node is constructed, and the rules of routing node selection are determined. IAODV
algorithm realizes the adaptive evaluation and classification of network nodes, so as to determine the optimal
transmission path from the source node to the destination node. The simulation results verify the feasibility,
effectiveness and security of IAODV.
Keywords
Ad Hoc Network, Adaptive, Decision Tree, Intelligent Routing Protocol
1. Introduction
The information society expects the adaptability of the network to have higher performance. Ad Hoc
mobile network has the features of simple equipment, no infrastructure requirements, self-organization,
strong adaptability to the environment, and can be flexible and excellent in the difficult environment of
communication tasks [1-3]. However, due to the weak performance of the equipment, the use of wireless
channel communication and frequent node movement, the possibility of data intercepted by illegal users
is very high, which makes the routing security of the network face a major threat [4-6].
There are many routing protocols designed for the characteristics of Ad Hoc networks at home and
abroad. Routing protocols such as ad-hoc on-demand distance vector (AODV) [7], destination-sequenced
distance vector (DSDV) [8] and dynamic source routing (DSR) [9,10] are widely used. The common
feature of these routing protocols is to establish communication links between the two terminals as
quickly as possible to adapt to the mobility of ad hoc networks. When establishing routing, it is assumed
that the trust between nodes is strong enough and that nodes can always cooperate to complete data
forwarding. In these routing protocols, security issues are seldom considered, which provides an
※ This is an Open Access article distributed under the terms of the Creative Commons Attribution Non-Commercial License (http://creativecommons.org/licenses/by-nc/3.0/) which
permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited.
Manuscript received May 9, 2019; first revision November 4, 2019; accepted February 22, 2020.
Corresponding Author: Xinghua Sun ([email protected])
* School of Information Science and Engineering, Hebei North University, Zhangjiakou, China ([email protected], [email protected],
[email protected], [email protected])
** College of Environmental and Geographical Sciences, Shanghai Normal University, Shanghai, China ([email protected])
*** College of Economics and Management, Hebei North University, Zhangjiakou, China ([email protected])
opportunity for intruders. Many targeted attacks have appeared, such as flooding attacks, witch attacks,
wormhole attacks, and so on. So far, great progress has been made in improving the routing protocols of
ad hoc networks at home and abroad. At the same time, some research results on secure routing have
emerged. For example, Xiao and Shan [11] have analyzed and summarized the security problems of ad
hoc networks, and also analyzed media access control protocol (MAC) and the quality of service (QoS).
Some researchers have constructed safe routing protocols such as secure AODV (SAODV) and secure
routing protocol (SRP) [12]. Snazgiri et al. [13] once put forward using IPSec to avoid the routing safety
risk in mobile ad hoc networks. However, the feasibility is very poor for the energy- and storage-
constrained ad hoc networks due to the need to maintain more databases and carry out a great deal of
calculation in the mechanism.
Ad hoc network is strongly autonomous; so traditional network security technology cannot be applied
without modification. Previous research results have some security weakness. Therefore, it is necessary
to design a targeted security mechanism to make sure the network is in a normal state.
The routing protocols need to meet the expectations of stability, robustness, optimality, simplicity, low
overhead and strong adaptability in ad hoc networks. Each node in ad hoc network has data forwarding
function, so the routing algorithm needs to be integrated into the distributed algorithm and maintained by
all legal nodes. The transmission bandwidth of ad hoc network is limited, so the bandwidth occupied by
the designed routing protocol should be within the controllable range. The characteristics of the
changeable topology of ad hoc networks also require higher computing speed. For the sake of avoiding
the exhaustion of node resources, the computational complexity of routing algorithm should also be
limited. In addition, necessary security measures should be considered in the design of routing protocols
to prevent attacks.
Therefore, it is necessary to make a comprehensive analysis of the structure of ad hoc network, take
every factor into consideration, and construct a more secure and reasonable routing protocol.
or the location of nodes changing, the network topology will change. At this time, the affected network
nodes need to update their routing protocol tables in time and transmit relevant message to involved nodes
to maintain consistency, real-time and safety. DSDV routing protocol is suitable for bidirectional link
communication, and maintains local routing data table in real time. It solves the problem of high
frequency infinite computation, and avoids the generation of loops in data transmission in network.
DSDV routing protocol is suitable for small and medium-sized ad hoc networks. It can show its
advantages when the network topology is stable and the nodes joining or leaving the network is not
frequent. DSDV routing protocol can quickly generate routing for nodes, ensure delivering real-time
messages, and meet the time-limited needs of the network. Based on the characteristics of DSDV routing
protocol itself, this routing algorithm is not suitable for networks with frequent topological changes.
Otherwise, it will cause problems such as high computing cost, high processing overhead and large
bandwidth occupancy, which will seriously affect the network, thus reducing the availability of the
network.
system paralysis.
Each node has the functions of both host and router, and is responsible for setting up routing and
transmitting data in ad hoc network. When the network is intruded, malicious nodes will attack the routing
algorithm and destroy the establishment of routing. Common routing attacks include forgery, tampering,
selfish behavior, routing table overflow and black hole attack. Here are some typical attack types.
effective routing between nodes is the fundamental guarantee for the safe transmitting of messages such
as datagram in the network.
Adapting to the self-organizing characteristics of ad hoc wireless networks, AODV protocol is
improved. A more secure and adaptive intelligent on-demand routing algorithm is designed, which
actively, quickly and optimally establishes the path between nodes, and realizes the purpose of resisting
illegal attacks against such routing protocols. Several technical points mainly guarantee security in this
routing algorithm: key information hiding; the use of mathematically difficult functions; authorized users
to obtain routing information. This routing protocol uses ID3 algorithm to test five attributes such as
energy, computing power, speed, transmission distance, and data forwarding ability, so as to determine
the best routing from the source to the destination. The private key of system is used to authenticate the
network nodes identity in a distributed way, which gives a higher level of security.
Rectangular box - decision node, if the decision is made up of multiple levels, there will be many
intermediate decision nodes, but the root node is the final decision scheme. Each decision node is the best
result of one decision.
Circle - state node represents the expected value of each scheme. By comparing the economic effects
of each state node, the best scheme can be selected according to the predetermined decision criteria.
Line - probability branch, the number of branches from the state node indicates the quantity of possible
states, while the number labeled on the branches is the probability of corresponding states.
Triangle - Result Node, the profit and loss value of each scheme in various situations is marked on the
right side of Result Node.
The decision tree can intuitively reflect the characteristics of data, which is intelligent and easy to
operate. So it is suitable for the construction of data transmission path between nodes in ad hoc network.
This algorithm will use the idea of decision tree to realize the on-demand routing protocol reasonably
and quickly.
H= − ∑ଶୀଵ
ଶ (1)
In the formula, is the probability that attribute produces positive examples, and 1 − is the
probability that attribute produces negative examples. If the entropy value is 0, then the sampling data
is completely pure, and the attribute of the node can be used as the basis of division, without further
segmentation; if the entropy value is not 0, it means that the sampling data is not pure and needs further
segmentation.
In order to determine the node attribute that should be first partitioned, the maximum information gain
is introduced. The information gain can represent the correlation between the attributes of nodes. The
range of values is [0,1]. The calculation is based on formula (2):
|ೡ |
, =H
∑∈
ೕ ||
(2)
In the formula, V is a subset of the values of node attributes , | | is the length of the subset, || is
the sample length, and is the purity of the values of the attributes of node .
Using formulas (1) and (2) synthetically, according to ID3 algorithm, the information gains of each
node are calculated, and the branches with large information gains are selected to cycle back and forth
until the end of the leaf. An intelligent decision tree is constructed to determine whether a network node
has routing capability when creating a communication link, as shown in Fig. 1.
P
P>50% P≤50%
R N
R≤100kbp R>100kbp
N T
T≤0.7 T>0.7
N C
C≤200 C>200
N D
D≤10 D>10
N Y
tenance, when the source node S is transmitting message to the destination node D.
During the above operation, each intermediate node forwarding RREQ message needs to maintain and
store the reverse route to the source node.
In the process of routing response, a time threshold RREQ_RETRIES of routing response needs to be
preset, and the timeout will be regarded as no response. Therefore, the next hop node needs to be re-
selected by the upper node.
The routing response process is as follows:
(1) After receiving RREQ, target node D examines the authenticity of the packet according to the
principle of digital signature. If the message is validated, node D adds a new entry in its routing
table to record the node information that sends the routing request message to it. It is assumed that
node C and E are the last jump neighbors belonging to node D, and then node D conveys the RREP
packet to the last hop neighbors C and E.
(2) Nodes C and E continue to send RREP to the node that forwarded the RREQ message to itself.
The forward routing from itself to target node D is written down in the home routing table.
(3) Execute in turn until the routing reply message is forwarded to node S. The routing between the
routing table. When there is message transmission, it intelligently establishes the path between the
source and the target node on demand.
(2) When the quantity of mobile nodes in the network does not match up 40%, AODV routing protocol
is still used to send Hello message frames to one hop neighbor node periodically to monitor its
activity. In the process of monitoring, if the node does not get the response message frame of the
neighboring node in the specified ALLOWED_HELLO_LOSS* HELLO_INTERVAL millisecond
time, it is considered that there is no path between the node and the neighboring node, and the path
is deleted from the routing table directly and broadcast the message in the network. If it is found
that the two attribute values of some nodes have reached the critical value, the broadcast node IP
and the routing error frame RREP in the network will be deleted, and if there is a data transmission
task in the future, the routing between the nodes will need to be re-established. If all the nodes on
the path are in good condition and can continue to be competent for the transmission task, no
updates will be needed, when the transmission is received, continue to use this path for data
transfer tasks.
experimental results evidently tell that the routing overhead of IAODV routing protocol is less than that
of AODV routing protocol. This is mainly because IAODV routing protocol no longer consumes energy
to maintain the network, but intelligently establishes communication links between nodes using on-
demand strategy when the nodes in the network move too fast and the rigid topology changes frequently.
Compared with AODV routing protocol, it significantly reduces unnecessary routing message sending,
so the routing overhead is significantly lower than AODV routing protocol. Based on the above results,
IAODV routing protocol is more applicable for dynamic Ad Hoc wireless networks.
5. Conclusion
There are many studies on routing protocols in Ad Hoc networks, but most of them are based on the
assumption that there is a very friendly relationship between nodes, and every node will readily forward
messages. Faced with the complex network environment, this assumption does not exist; and there are
various targeted routing attacks, such as flooding attacks, witch attacks, which pose a great threat to the
security of routing protocols.
Nodes in ad hoc networks have many characteristics, such as random movement, limited energy, self-
protection and limited transmission capacity, which have a significant impact on the construction of
communication links in the network. To solve the above problems, a decision tree is introduced to
optimize routing nodes.
Based on AODV algorithm, an intelligent decision-making routing strategy (IAODV) is proposed. In
the algorithm, the five attributes of node energy, computing power, speed, transmission distance, and
reliability are taken as the basis of segmentation, and the information gain of each attribute is calculated.
The attributes with the greatest information gain are selected as decision nodes in turn, and the decision
tree of the routing node is constructed to determine the rules of the selection of the routing node. In the
process of routing discovery, the idea of decision tree is integrated. After paying some extra storage space
and computing time, the reliability, security and availability of routing are guaranteed, and the robustness
of network is greatly improved, which avoids the disadvantage of using a single short path to select the
best route. In the simulation experiment, three evaluation indexes, packet loss rate, packet delivery rate
and routing overhead are selected to compare IAODV with AODV algorithm. The experimental results
show that IAODV has better performance and better adaptability in ad hoc network with frequent node
mobility.
Acknowledgement
This paper is supported by Hebei Population Health Information Engineering Technology Research
Center.
References
[1] B. Xu, S. Hischke, and B. Walke, “The role of ad hoc networking in future wireless communications,” in
Proceedings of International Conference on Communication Technology Proceedings (ICCT), Beijing,
China, 2003, pp. 1353-1358.
[2] J. Wang, C. Wang, Q. Wu, and Y. Gong, Ad Hoc Mobile Wireless Network. Beijing, China: National Defense
Industry Press, 2004.
[3] J. N. Turner and C. S. Boyer, Ad Hoc Networks: New Research. New York, NY: Nova Science Publishers,
2009.
[4] X. Zhu, “Mobile ad hoc network security research,” M.S. Thesis, Xi’an University of Electronic Science and
Technology, Xi’an, China, 2004.
[5] S. Wang and H. Yang, “Research and analysis of mobile ad hoc network routing protocol,” Computer Age,
vol. 3, pp. 14-16, 2006.
[6] Q. Zhang and M. Luo, “Mobile ad hoc network security strategy,” Telecommunication Switching, vol. 1, pp.
29-33, 2006.
[7] C. E. Perkins and E. M. Royer, “Ad-hoc on-demand distance vector routing,” in Proceedings of the 2nd IEEE
Workshop on Mobile Computing Systems and Applications (WMCSA), New Orleans, LA, 1999, pp. 90-100.
[8] C. E. Perkins and P. Bhagwat, “Highly dynamic destination-sequenced distance-vector routing (DSDV) for
mobile computers,” in Proceedings of the Conference on Communications Architectures, Protocols and
Applications, London, UK, 1994, pp. 234-244.
[9] D. B. Johnson and D. A. Maltz, “Dynamic source routing in ad hoc wireless networks,” in Mobile Computing.
Boston, MA: Springer, 1996, pp. 153-181.
[10] D. B. Johnson, D. A. Maltz, and Y. C. Hu, “The dynamic source routing protocol for mobile ad hoc networks
(DSR),” 2004 [Online]. Available: https://tools.ietf.org/html/draft-ietf-manet-dsr-10.
[11] Y. Xiao and X. Shan, “Wireless Ad-hoc network and its research challenges,” Telecommunications Science,
vol 6, pp. 12-14, 2002.
[12] Y. C. Hu, A. Perrig, and D. B. Johnson, “Ariadne: a secure on-demand routing protocol for ad hoc networks,”
Wireless Networks, vol. 11, no. 1-2, pp. 21-38, 2005.
[13] K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, “A secure routing protocol for ad
hoc networks,” in Proceedings of the 10th IEEE International Conference on Network Protocols, Paris,
France, 2002, pp. 78-87.
[14] B. Dahill, B. N. Levine, E. M. Royer, and C. Shields, “A secure routing protocol for ad hoc networks,”
University of Massachusetts, Amherst, MA, Technical Report UM-CS-2001-037, 2001.
[15] H. Jiang, Y. Meng, Y. He, and S. Cheng, “An energy-efficient multicast routing protocol for mobile ad hoc
networks,” Journal of Circuits and Systems, vol. 7, no. 2, pp. 115-118, 2002.
[16] C. Ying and M. L. Shi, “QoS Routing in ad-hoc network,” Chinese Journal Computers, vol. 24, no. 10, pp.
1026-1033, 2001.
[17] M. G. Zapata and N. Asokan, “Securing ad hoc routing protocols,” in Proceedings of the 1st ACM Workshop
on Wireless Security, Atlanta, GA, 2002, pp. 1-10.
[18] L. Venkatraman and D. P. Agrawal, “Strategies for enhancing routing security in protocols for mobile ad hoc
networks,” Journal of Parallel and Distributed Computing, vol. 63, no. 2, pp. 214-227, 2003.
[19] M. Akhlaq, M. N. Jafri, M. A. Khan, and B. Aslam, “Integrated mechanism of routing and key exchange in
AODV,” WSEAS Transactions on Communications, vol. 6, no. 4, pp. 565-572, 2007.
[20] J. R. Douceur, “The Sybil attack,” in Peer-to-Peer Systems. Heidelberg, Germany: Springer, 2002, pp. 251-
260.
[21] A. Shamir, “How to share a secret,” Communications of the ACM, vol. 24, no. 11, pp. 612-613, 1979.
[22] L. Zhou and Z. J. Haas, “Securing ad hoc networks,” IEEE Network, vol. 13, no. 6, pp. 24-30, 1999.
[23] J. R. Quinlan, “Induction of decision trees,” Machine Learning, vol. 1, no. 1, pp. 81-106, 1986.
Yongfei Ye https://orcid.org/0000-0002-1027-0501
Jing Mi https://orcid.org/0000-0002-8768-1675