Neuro Fuzzy Model Based Routing Protocol in Mobile Ad-Hoc Networks

Full Text (PDF, 968KB), PP.54-75

Views: 0 Downloads: 0


Siddesh G K 1,* Anu H. 2 Chaithanya S. 3 Sathish Shet K. 2

1. New Horizon College of Engineering, Bengalore-560103, India

2. JSS Academy of Technical Education, Bangalore-560060, India

3. RajaRajeswari College of Engineering, Bangalore-560074, India

* Corresponding author.


Received: 23 Apr. 2019 / Revised: 8 Oct. 2019 / Accepted: 27 Mar. 2022 / Published: 8 Dec. 2022

Index Terms

Route Finding, Protocol, MANET, Intelligent System, Soft Computing


Mobile Ad-Hoc Networks (MANETs for short) are gaining the importance in the field of wireless communication. The promising feature of MANET is that it can be deployed immediately in demanding situations as they do not require the infrastructure or any centralized structures as compared to traditional wired and wireless networks.An intelligent system has been designed to select an optimum route for various contexts.An efficient protocol is designed to overcome the limits of route finding and link formation in MANET’s. This can be done by making use of the application of soft-computing techniques such as artificial neural networks, fuzzy logic and genetic algorithms. Traditional techniques are based on statistical techniques such as regression models and probabilistic methods.It can be seen from the simulation outcomes that the route finding time using the HYPER-NF-NET simulator which use soft computingtechniques is 20% to the routing finding time using NS-2 simulator. It is also seen from the simulation results that the HYPER-NF-NET protocol performance is better compared to AODV, DSR and OLSR routing protocols for different node population and various degree of congestion. The simulation results showcase a superiority of HYPER-NF-NET simulator over NS-2 and associated HFNET protocol over other existing protocols.

Cite This Paper

Siddesh G. K., Anu H., Chaithanya S., Sathish Shet K., "Neuro Fuzzy Model Based Routing Protocol in Mobile Ad-Hoc Networks", International Journal of Computer Network and Information Security(IJCNIS), Vol.14, No.6, pp.54-75, 2022. DOI:10.5815/ijcnis.2022.06.05


[1]T. Larsson and N. Hedman, "Routing Protocols in Wireless Ad-hoc Networks--A Simulation Study," master's thesis at Lulea University of Technology, Stockholm, 1998. Available online.
[2]International Conference on Simulation Tools and Techniques for Commuications, Networks and Systems & Workshops. Proceedings of the 1st international conference on Simulation tools and techniques for communications, networks and systems & workshops Marseille, France .Article No.: 36, Year of Publication: 2008 .ISBN:978-963-9799-20-2. Elmar Schoch, Michael Feiri, Frank Kargl, Michael Weber. Ulm University, Ulm, Germany
[3]L. A. Zadeh, "Fuzzy logic, neural networks, and soft computing," Communications of the ACM, vol. 37, no. 3, 1994, pp. 77–84.
[4]Distributed Fuzzy Score-Based Clustering Algorithm for Mobile Ad Hoc Networks December 09-December 12 ISBN: 978-0-7695-3473-2 : Sahar Adabi ,Sam Jabbehdari ,Ali Rezaee, Sepideh Adabi
[5]B. Seet, B. Lee, and C. Lau, “Optimisation of route discovery for dynamic source routing in mobile Ad hoc networks,” IET Journals, Electronics Letters, vol. 39, issue 22 , pp. 1606–1607, 2003.
[6]C. K. Toh, H. Cobb, and D. A. Scout, “Performance evaluation of battery-life aware routing schemes for wireless Ad hoc networks,” IEEE International Conference on Communication , ICC 2001, vol. 9, pp. 2824–2829, 2001.
[7]D. Kim, J. J. Garcia-Luna-Aceves, K. Obraczka, J. Cano, and P. Manzoni, “Routing mechanisms for mobile Ad hoc networks based on the energy drain rate,” IEEE Transactions on Mobile Computing, vol. 2, no. 2, pp.161–173, 2003.
[8](E-book) W. Fritz, “Intelligent systems and their societies,” 1997, [online], available on:, [accessed on Feb. 24, 2010].
[9]D. B. Johnson, D. A. Maltz, and Y. Hu, “The Dynamic Source Routing protocol (DSR) for mobile Ad-Hoc networks for IPv4”, IETF RFC 4728, 2007.
[10]C. E. Perkins, E. M. Royer, S. R. Das, and M. K. Marina, “Performance comparison of two On Demand routing protocols for Ad-Hoc networks, IEEE Personal Communications, vol. 8, no. 1, 2001,pp. 16–28.
[11]T. Clausen and P. Jacquet, “Optimised Link State Routing protocol (OLSR),” Project Hipercom, INRIA, IFTF RFC 3626, 2003.
[12]Z. Guo and B. Malakooti, “Delay prediction for intelligent routing in wireless networks using neural networks,” Proceedings of the 2006 IEEE International Conference on Networking, Sensing and Control, ICNSC '06, pp. 625–630, 2006.
[13]L. Layuan, L. Chunlin, and Y. Peiyan, “Performance evaluation and simulations of routing protocols in Ad hoc networks,” Computer Communications, vol. 30, issue 8, pp. 1890–1898, 2007.
[14]S. Jiang, Y. Liu, Y. Jiang, and Q. Yin, “Provisioning of adaptability to variable topologies for routing schemes in MANETs,” IEEE Journal on Selected Areas in Communications, vol. 22, issue 7, pp. 1347–1356, 2004.
[15]A. N. Al-Khwildi and H. S. Al-Raweshidy, “A proficient path selection for wireless Ad hoc routing protocol,” The 8th International Conference on Advanced Communication Technology, ICACT 2006, vol. 1, pp. 599–604, 2006.
[16]T. Mukherjee, S. K. S. Gupta, and G. Varsamopoulos “Energy optimisation for proactive unicast route maintenance in MANETs under end-to-end reliability requirements,” Performance Evaluation, vol. 66, pp. 141–157, 2009.
[17]A. Mukhija and R. Bose, "RRP - A bandwidth-efficient routing protocol for mobile Ad hoc networks," Proceedings of the 2nd International Information and Telecommunication Technologies Symposium (I2TS 2003), Florianopolis, Brazil, 2003.
[18]Y. Lu, W. Wang, Y. Zhong, and B. Bhargava, “Study of distance vector routing protocols for mobile Ad hoc networks,” Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, PerCom 2003, pp.187–194, 2003.
[19]M. R. Pearlman and Z. J. Haas, “Determining the optimal configuration for the zone routing protocol,” IEEE Journal on Selected Areas in Communications, vol. 17, issue 8, pp. 1395–1414, 1999.
[20]I. Ajbar and D. Perkins, “Evaluating mobile Ad hoc networks: A performance index and statistical model,” IEEE Proceedings Conferences of 16th International Conference on Computer Communications and Networks, ICCCN 2007, pp. 284–290, 2007.
[21]A. Jindal, and K. Psounis, “Contention-aware performance analysis of mobility-assisted routing,” IEEE Transactions on Mobile Computing, vol. 8, no. 2,2009, pp.145–161.
[22]A. Nogueira, P. Salvador, and R. Valadas, “Joint modeling of MANET characteristics for QoS prediction,” The 12th IEEE Symposium on Computers and Communications, ISCC 2007, 2007, pp. 429–435.
[23] B. Zhou, A. Marshall, J. Wu, T. H. Lee, and J. Liu, “A cross-layer route discovery framework for mobile Ad-Hoc networks,” EURASIP Journal on Wireless Communications and Networking, issue 5, 2005, pp. 645–660.
[24]A. Malatras, G. Pavlou, and S. Sivavakeesar, “A programmable framework for the deployment of services and protocols in mobile Ad hoc networks,” IEEE Transactions on Network and Service Management,vol. 4 , issue 3, pp.12–24, 2007.
[25]“Programmable Ad hoc Network (PAN) project,” EPSRC, Grant Reference: GR/S02129/01,[Online], available on:, [accessed on Sep. 19, 2010].
[26]H. Martinez-Alfaro and M. A. Hernandez-Vazquez, “DSR protocol scalability optimisation in mobile Ad-Hoc networks with ANFIS,” IEEE International Conference on Systems, Man and Cybernetics,vol. 4, 2003,pp. 3414–3419.
[27]F. Dai and J. Wu, “Proactive route maintenance in wireless Ad hoc networks,” IEEE International Conference on Communications, ICC 2005, vol. 2, pp. 1236–1240, 2005.
[28]T. Shih, “Particle Swarm Optimisation algorithm for energy-efficient cluster-based sensor networks,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E89–A, no. 7,2006, pp. 1950–1958.
[29]S. Rajagopalan and C. Shen, “ANSI: A swarm intelligence-based unicast routing protocol for hybrid ad hoc networks,” Journal of Systems Architecture, vol. 52, issue 8, pp. 485–504, 2006.
[30]I. Bar-David, “Communication under the Poisson regime,” IEEE Transaction of Information Theory, vol. 15, 1969,pp. 31–37.
[31]T. Camp, J. Boleng, and V. Davies, “A survey of mobility models for Ad-Hoc network research,” Wireless Communication and Mobile Computing, WCMC, Special issue on Mobile Ad-Hoc Networking: Research, Trends and Applications, vol. 2, no. 5, 2002pp. 483–502.
[32]H. Freudenthal, “The concept and the role of the model in mathematics and natural and social sciences,” pp. 8-9, D. Reidel Publishing Company, Netherlands, 1961.
[33]L. K. Hansen and P. Salamon, ”Neural network ensembles,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 12, no. 10, 1990,pp. 993–1001.
[34]S. Sesay, Z. Yang, and J. He, “A survey on mobile Ad-Hoc wireless network,” Information Technology Journal, vol. 3, no. 2, 2004,pp. 168–175.
[35]“SWIM (Seamless Wireless Mesh network) project,” Nanjing University, [Online], available on:, [accessed on Aug. 11, 2010].
[36]X. Wang, “Security Mechanisms in Wireless Mesh Networks (WMNs),” Iowa State University, [Online], available on:, [accessed on Aug. 11, 2010].
[37]“Defense Advanced Research Projects Agency,” DARPA, [Online], available on: [accessed Sep. 20, 2010].
[38]David A. Beyer, “Accomplishments of the DARPA SURAN Program”, Military Communication Conference, MILCOM’90, IEEE Conference Record, ’A New Era,’ vol. 2,1990, pp. 855–862.