IMPROVING THE PERFORMANCE OF COUNTER-BASED BROADCAST SCHEME FOR MOBILE AD HOC NETWORKS

被引:0
作者
Mohammed, A. [1 ]
Ould-Khaoua, M. [1 ]
Mackenzie, L. M. [1 ]
Abdulai, J. [1 ]
机构
[1] Univ Glasgow, Dept Comp Sci, Glasgow G12 8QQ, Lanark, Scotland
来源
ICSPC: 2007 IEEE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATIONS, VOLS 1-3, PROCEEDINGS | 2007年
关键词
MANETs; Flooding; Broadcast storm problem; Saved rebroadcast; Reachability;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Flooding is the simplest and most commonly used mechanism for broadcasting in mobile ad hoc networks (MANETs), where each node retransmits every uniquely received message exactly once. Despite its simplicity, it can result in high redundancy, contention and collision, a phenomenon referred to as the broadcast storm problem. In this paper, we propose an enhanced counter-based scheme to mitigate this problem by incorporating probability concept into counter-based scheme. We evaluate the performance of our scheme by comparing it with flooding, fixed probability and counter-based scheme. The simulation results reveal that the new scheme achieves superior performance in terms of both saved rebroadcast and end to end delay, and reachability comparable to flooding in medium and dense networks.
引用
收藏
页码:1403 / 1406
页数:4
相关论文
共 50 条
[31]   Performance Evaluation of Switching between Routing Protocols in Mobile Ad Hoc Networks Performance Evaluation of Switching between Routing Protocols in Mobile Ad Hoc Networks [J].
Patil, Annapurna P. ;
Kanth, K. Rajani ;
Neel, Desai ;
Ganesh, N. ;
Amala, P. .
INFORMATICS ENGINEERING AND INFORMATION SCIENCE, PT IV, 2011, 254 :213-222
[32]   An efficient clustering scheme for large and dense mobile ad hoc networks (MANETs) [J].
Yu, Jane Yang ;
Chong, Peter Han Joo .
COMPUTER COMMUNICATIONS, 2006, 30 (01) :5-16
[33]   QASEC: A secured data communication scheme for mobile Ad-hoc networks [J].
Usman, Muhammad ;
Jan, Mian Ahmad ;
He, Xiangjian ;
Nanda, Priyadarsi .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 109 :604-610
[34]   Security in mobile ad hoc networks [J].
Carvalho, Marco .
IEEE SECURITY & PRIVACY, 2008, 6 (02) :72-75
[35]   JMS on Mobile Ad Hoc Networks [J].
Vollset, Einar ;
Ingham, Dave ;
Ezhilchelvan, Paul .
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2003, 2775 :40-52
[36]   JMS on mobile ad hoc networks [J].
Vollset, E ;
Ingham, D ;
Ezhilchelvan, P .
PERSONAL WIRELESS COMMUNICATIONS, PROCEEDINGS, 2003, 2775 :40-52
[37]   Direct trust-based security scheme for RREQ flooding attack in mobile ad hoc networks [J].
Kumar, Sunil ;
Dutta, Kamlesh .
INTERNATIONAL JOURNAL OF ELECTRONICS, 2017, 104 (06) :1034-1049
[38]   Triangle-based routing for mobile ad hoc networks [J].
Jiang, Qiangfeng ;
Manivannan, D. .
PERVASIVE AND MOBILE COMPUTING, 2016, 33 :108-126
[39]   Performance Analysis of Adjusted Probabilistic Broadcasting in Mobile Ad Hoc Networks [J].
Bani-Yassein, M. ;
Ould-Khaoua, M. ;
Mackenzie, L. ;
Papanastasiou, S. .
INTERNATIONAL JOURNAL OF WIRELESS INFORMATION NETWORKS, 2006, 13 (02) :127-140
[40]   Performance Analysis of Reactive Routing Protocols in Mobile Ad hoc Networks [J].
Papadopoulos, Michalis ;
Mavromoustakis, Constandinos X. ;
Skourletopoulos, Georgios ;
Mastorakis, George ;
Pallis, Evangelos .
2014 INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND MULTIMEDIA (TEMU), 2014, :104-110