You are on page 1of 11

Engineering Science and Technology, an International Journal xxx (xxxx) xxx

Contents lists available at ScienceDirect

Engineering Science and Technology,


an International Journal
journal homepage: www.elsevier.com/locate/jestch

Full Length Article

Power optimization in MANET using topology management


B. Devika ⇑, P.N. Sudha
Kammavari Sangham Institute of Technology, India

a r t i c l e i n f o a b s t r a c t

Article history: Mobile ad-hoc network (MANET) is a wireless ad hoc network, which is quickly deployable and functions
Received 28 January 2019 without any infrastructure. This work proposes a hybrid optimization algorithm, named Chronological-
Revised 2 July 2019 Earth Worm optimization Algorithm (C-EWA), for performing effective clustering and adjusts power
Accepted 29 July 2019
and energy parameters using topology management. In this paper, initially a graph that is equivalent
Available online xxxx
to the network is constructed, and then, clustering of the graph is performed using the proposed
C-EWA to generate an optimal cluster head. C-EWA is developed by the integration of chronological
Keywords:
theory in EWA, with the use of the objective function. Here, the objective function considers several
MANET topology
Power
factors that involve power, connectivity, mobility, link lifetime, and distance. After choosing appropriate
Energy clusters, each of the nodes that belong to the cluster constructs a Gabriel graph within the corresponding
Gabriel graph cluster. Once the Gabriel graph is constructed, each node updates the list of neighbor and maintains the
Mobility graph connectivity and adjusts the power of transmission based on the connectivity. The performance of
Connectivity the proposed method shows superior performance in terms of remaining battery power, mobility,
throughput, delay and connectivity with values of 21.960 J, 0.729, 0.713, 0.295, and 5.256, respectively.
Ó 2019 Karabuk University. Publishing services by Elsevier B.V. This is an open access article under the CC
BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).

1. Introduction more and more attentions. The traditional methods employed for
conserving energy are the spotlights on controlling transmission
Mobile Ad-hoc Network (MANET) is an autonomous wireless ad power and the dynamic turning of active nodes in the network.
hoc network that contains mobile nodes, which initiate transmis- The reduction of energy utilization is controlled by transmission
sion without considering base stations [1]. Networking is essential power, which subsequently results in effective data transmission
for the strategic networks, which are not depended on other infras- and prolonging network lifetime [7]. Power plays a vital role in
tructures that involve disaster relief organizations and military [2]. MANET [8,9] and requires fewer infrastructures and communica-
Several challenges related to network protocols are presented in tion networks. The routing becomes challenging due to varying
MANET [3]. The protocols should offer distributed solutions when- topologies produced by the movement of the node, and thus, the
ever the centralized control and the access points are absent. The routing is a center of attraction among researchers. The existing
node mobility is inessential as compared to routing protocols [4], routing protocols, like Ad hoc On-Demand Distance Vector (AODV)
which can track the topology of the network [5]. The surplus of [10], Temporally Ordered Routing Algorithm (TORA), and Dynamic
routing protocols deployed for MANETs perform certain tasks for Source Routing (DSR), do not fulfill the requirements of real time
data transmission. The changing topologies, network division, applications. The application requires the communication network
bandwidth, larger error rates, interference, power constraints, to provide a guarantee regarding QoS parameters. The prolonged
and collision are the issues in the network control for designing battery life is important due to the mobile nodes. The power
larger level protocols that involve routing and executing applica- received is an important parameter for initiating the communica-
tions using the Quality of service (QoS) [6]. tion in MANET [11].
The MANET is adapted in several applications that range from The MANET nodes move freely from one place to another in a
the battlefield to the user’s living room. Due to the limited battery random manner. The topology of the network is changed unpre-
energy of mobile nodes, how to prolong the lifetime of nodes and dictably and rapidly. The nodes inside the transmission range can
network becomes the key challenge in MANET, and it has received directly exchange information with each other. The nodes that
reside outside the transmission range should communicate indi-
⇑ Corresponding author. rectly by adapting the multi-hop routing protocol. Each node is
E-mail address: devikabgowda@gmail.com (B. Devika).
responsible for the route discovery in a dynamic manner. Despite
Peer review under responsibility of Karabuk University.
several clustering schemes, the organization of MANET into a

https://doi.org/10.1016/j.jestch.2019.07.008
2215-0986/Ó 2019 Karabuk University. Publishing services by Elsevier B.V.
This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).

Please cite this article as: B. Devika and P. N. Sudha, Power optimization in MANET using topology management, Engineering Science and Technology, an
International Journal, https://doi.org/10.1016/j.jestch.2019.07.008
2 B. Devika, P.N. Sudha / Engineering Science and Technology, an International Journal xxx (xxxx) xxx

hierarchy needs to be improved for increasing the efficiency of method failed to combine the OPC with a congestion control
routing. Clustering is a technique adapted for reconfiguring all algorithm.
nodes into small clusters according to the regional vicinity and Xin Ming Zhang et al. [17] designed a modified AODV routing
the cluster head, and the clusters are determined using the same protocol for improving the reliability to transmit the data from
rule. The cluster head is responsible for managing the cluster activ- one node to other node by consuming energy. The modified AODV
ities that involve handling cluster processes, routing table update, protocol reduces the average communication delay and routing
and route discovery. The nodes excluding the cluster head from the overhead by addressing the issue of link breakage caused by the
cluster are termed as ordinary nodes. The nodes with inter-cluster inadequate amount of energy.
links having the ability to communicate with one or more clusters Parisa Rahmani et al. [18] developed a learning automata-based
are known as gateway nodes. The ordinary nodes transmit packets topology control method within a cognitive method. This method
to the cluster head, if the destination is within the cluster; else, it is adds cognition to the whole network protocol stack-wide and
transmitted to the gateway node. Thus, the cluster heads and the network-wide performance. The cognitive network perspective
gateways participate in the propagation of route update or control for controlling the network topology has several benefits that
messages. The routing overhead is significantly reduced and solves involve self-aware, self-adaptive, and self-adjust topology control
scalability issues in dense networks [12]. Several optimization method, but the trade-off between energy efficiency and routing
algorithms [13–15] have been utilized for reactive power topologies is still an issue.
optimization. T. Santhi Sri et al. [19] developed a routing algorithm, named
The main objective of this paper is the initiation of clustering Position-based Opportunistic Routing (POR) algorithm, which han-
algorithm using a hybrid optimization algorithm, named dles a stateless property on an individual node, in which broadcast
Chronological-Earth Worm optimization Algorithm (C-EWA), for is performed using wireless communication in a time interval.
power optimization using topology management. The proposed Synchronization-based Efficient Energy (SEE) algorithm is used
method undergoes two main steps, namely graph construction with POR protocol for distributed and randomized calculation
and graph clustering. Initially, a graph is built with respect to the without changing the network capacity. However, the network
network, and then, the clustering of graphs is done to obtain an shows poor network performance while adapting cluster head in
optimal cluster head. Here, the clustering process is initiated using ad-hoc networks.
the proposed C-EWA algorithm based on the newly designed Hemalatha, S. and Mahesh, P.S [20] designed a protocol, named
objective function that contain several parameters, which include Directional Advanced Intruder Handling AODV protocol for routing
power, connectivity, mobility, link lifetime, and distance. Once packets by determining a new route whenever required. This
the optimal clusters are selected, a Gabriel Graph is built within method was adapted for identifying the blackhole attacker nodes
the corresponding cluster. After the formation of Gabriel graph, from the network. The algorithm utilizes directional antenna trans-
each of the nodes updates and lists out the nearby nodes and han- mission for optimizing the energy consumption in MANET.
dles the connectivity and adjusts the power transmission. Singh, T et al. [21] developed an energy-efficient secured rout-
The major contributions of the paper are: ing protocol, named Secure Optimized Link State Routing Protocol,
for providing security for both link and message without depend-
- Designing and developing an optimization algorithm, ing on the third party. The access control is used to provide secu-
Chronological-Earth Worm optimization Algorithm (C-EWA), rity and verifies the nodes for transmitting data packets. The
by the incorporation of Chronological concept in EWA for method failed to consider attack detection and mitigation methods
managing power and energy in an effective way. for addressing the external attacks.
- Designing a modified objective function, containing parameters Sridhar, S., et al. [22] developed a protocol, named Trust and
that involve power, connectivity, mobility, link lifetime, and Energy Supported Ad-hoc On-demand Distance Vector (TES-
squared distance, for selecting the optimal cluster head using AODV) routing protocol, which used trust, energy and security
the proposed C-EWA. management and the nodes chosen for routing are based on trust
and security values. The communications between nodes are
The organization of the paper is: Section 1 explains the intro- secured due to a message digest algorithm that builds a specific
duction related to MANET by considering power and energy identification for each node to provide reliable routing. But the
parameters. Section 2 discusses the literature review based on method was unable to maintain energy levels for next transmis-
eight existing techniques. Section 3 deals with the system model sion and thus, reduced the network lifetime.
and section 4 presents the proposed C-EWA for clustering graphs. Rao, M. and Singh, N [23] developed an algorithm, named hier-
Results and Discussions are explained in section 5, and section 6 archical K-means cluster formation Firefly cluster head selection
deals with the conclusion of the paper. based MAC (KF-MAC) routing protocol for mobile ad hoc networks.
The method decreases the attentiveness of QoS parameters while
transmitting data from one node to other. The method shows max-
2. Motivations imum delays, while using packet exchange protocols.

2.1. Literature survey 2.2. Challenges

This section elaborates eight existing techniques that contribute - In [24], a Lowest ID (LID) clustering algorithm is developed for
towards the topology management for performing effective allocating a unique identity (ID) address for an individual node
clustering. in the network and then, disseminates the ID to all surrounding
Rashmi Chaudhry and Shashikala Tapaswi [16] designed a nodes. But in this algorithm, the number of cluster heads
method based on scalable clustering topology, named Optimized becomes high in an undesirable manner.
Power Control (OPC), for determining the optimal transmission - In [25], a Distributed Mobility-Adaptive Clustering Algorithm
power of nodes using a modified Gabriel Graph (GG) algorithm. was built, in which weights are allocated to the nodes on the
The method is checked in terms of efficiency for several network basis of suitability to be a cluster head node. The method shows
metrics, like transmission power, network delay, and energy con- poor performance on quasi-static networks, where the nodes
sumption per node and has shown good performance. But, the are unable to move quickly.

Please cite this article as: B. Devika and P. N. Sudha, Power optimization in MANET using topology management, Engineering Science and Technology, an
International Journal, https://doi.org/10.1016/j.jestch.2019.07.008
B. Devika, P.N. Sudha / Engineering Science and Technology, an International Journal xxx (xxxx) xxx 3

- In [26], a Hybrid Cluster Routing (HCR) algorithm was designed, sends data packets to the target nodeZ. Here, the set of cluster head
where each node contains a specific cluster head priority for is represented as P ¼ fp1 ; p2 ; . . . ; ph ; . . . ; pr g, whererdenotes the
selecting a cluster head. But this algorithm causes two cluster total cluster heads such that 1 6 h 6 r. The cluster heads are
heads come within same transmission range and thus, reduces selected utilizing the node weight and the individual nodes weight
the functionality of cluster head. is calculated with the help of node degree, which is defined as the
- The existing methods used only a single metric for performing links used for connecting the neighboring nodes. Each node
clustering and thus, the clustered topology shows better perfor- requires high power to transmit data among nodes. The optimiza-
mance with a particular metric. The MANET is not suitable to tion of transmitted power for each node within the cluster is per-
reflect the situation due to the consideration of a single metric, formed by constructing a Gabriel graph. The Gabriel graph is
and thus, it is a complicated and dynamic system [27]. adapted for initiating communication with an optimal power level.
- In [28], a Weighted Clustering Algorithm (WCA) is devised The selection of routes is presented on the basis of handling con-
using a clustering technique based on weights to get a single- nectivity with less power consumption. Thus, the nodes having
hop cluster. In WCA, a node having minimum radio distance, maximum power are selected for the transmission. While trans-
and mobility is selected as a cluster head. This process takes mitting data from source node to target node, the distance param-
longer time and bandwidth and delays the cluster formation. eter is considered as an important paradigm. The links used for the
Also, limiting the cluster dimension decreases the scalability data transmission handle the connectivity and are used for deter-
while dealing with huge networks. mining the link lifetime. The mobility of nodes occurs due to vary-
ing network topologies. Thus, it is important to build a model
considering power, connectivity, link lifetime, mobility, and
3. System model of MANET
squared distance.
The MANET system model is depicted in Fig. 1, which elaborates
the transmission of data from one node to target node. The model 4. Proposed C-EWA algorithm using multi-objective parameters
computes an optimized power to preserve the connectivity of the for secure routing
network even if the nodes move randomly. Assume a graph
G ¼ fU; Vg in a MANET, where U ¼ fu1 ; u2 ; . . . ; ug ; . . . ; uf g; This section describes the technique of topology management
1 6 g 6 f denotes normal node set, where f denotes the total num- using the proposed C-EWA with multi-objective functions for
ber of normal nodes and V ¼ fv 1 ; v 2 ; . . . ; v e g denotes the link set, power optimization. Fig. 2 illustrates the block diagram of the pro-
where e denotes the total number of links used for connecting posed topology management system. Here, the proposed method is
two nodes ug and uh : The multi-objective functions, like power, designed considering power and energy parameters for yielding
connectivity, link lifetime, mobility and squared distance, are con- effective clustering. The parameters, like power, connectivity, and
sidered for designing the MANET. Assume T as a source node that link lifetime should be greater, and squared distance and mobility

Fig. 1. System model of MANET.

Please cite this article as: B. Devika and P. N. Sudha, Power optimization in MANET using topology management, Engineering Science and Technology, an
International Journal, https://doi.org/10.1016/j.jestch.2019.07.008
4 B. Devika, P.N. Sudha / Engineering Science and Technology, an International Journal xxx (xxxx) xxx

Fig. 2. Block diagram of the proposed C-EWA based power optimization technique using topology management.

must be minimized for determining the optimal cluster head. among which the proposed C-EWA along with the newly designed
Therefore, the proposed C-EWA algorithm adopts a newly designed fitness function determines moptimal clusters. Hence, the
fitness function for selecting the optimal cluster head. The pro- solution can be represented as a vector of dimension m as,
posed method computes an optimized power level for attaining O ¼ fp1 ; p2 ; . . . ; pn ; . . . ; pm g; 1 < n 6 m. Here, the optimal cluster
secured network connectivity while nodes move in a random man- head is selected considering large power, increased connectivity,
ner. For attaining a secured network, the network adapts a graph, and maximum link lifetime and minimum mobility and less
which is categorized into clusters using the proposed C-EWA. distance.
The cluster head of each cluster is selected using the fitness func-
tion that is computed based on remaining battery power, mobility, 4.3. Formulation of the fitness function
connectivity, link lifetime and squared distance with respect to the
neighboring nodes. The clustering of nodes is performed using The fitness function is computed for determining the optimal
Gabriel graph to maintain optimal power and energy level. The solution from a solution set. The fitness computed for proposed
proposed C-EWA based power optimization technique is organized C-EWA uses five factors that involve power, connectivity, link life-
under three phases, which includes initialization, clustering and time, squared distance, and mobility. Here, the fitness is consid-
Gabriel graph construction phases, as described in the below ered as a maximization function, and thus, the solution yielding
subsection, the maximum value of fitness is used for clustering to select the
optimal cluster head. The fitness of the proposed C-EWA is given
4.1. Initialization as,

X
r     
The primary step in the proposed technique is the initialization 1 Mh Bh Rh
S¼ þ K h þ Nh þ 1  þ 1 ð1Þ
of the graph, where each node ph , 1 6 h 6 r is initiated with the 5 YF YF YF
h
value for several parameters that include remaining battery power,
connectivity, mobility, squared distance, and link lifetime for where, r represents a total number of cluster heads, indicates
th
selecting the optimal cluster heads at time d. Here, the remaining power at h node, Y F expresses the normalization factor, K h repre-
battery power, connectivity and link lifetime are fixed maximum sents connectivity, N h represents link lifetime, Bh denotes mobility,
initially, whereas mobility and squared distance are kept and Rh represents the squared distance.
minimum.
4.3.1. Power
4.2. Solution encoding The power [16] is considered as an important parameter for
selecting the optimal cluster head. Due to large transmission, the
The solution encoding determines the optimal cluster heads power of nodes is drained out, which degrades the behavior of
and is explained in Fig. 3. The representation of solution encoding the node and finally, becomes a dead node. Hence, the node having
must take less time for computation, selecting the optimal cluster high power is taken for the clustering. Thus, the minimum power
head. Assume a MANET with total rnumber of cluster head nodes, level for transmitting packets from the nodeh for attaining mini-
mum received power is formulated as,
" #
Xf
M min
Mh ¼ Mmax  ð2Þ
g¼1
Mg
Fig. 3. Solution encoding for selecting optimal cluster head.

Please cite this article as: B. Devika and P. N. Sudha, Power optimization in MANET using topology management, Engineering Science and Technology, an
International Journal, https://doi.org/10.1016/j.jestch.2019.07.008
B. Devika, P.N. Sudha / Engineering Science and Technology, an International Journal xxx (xxxx) xxx 5

where, g denotes g th normal node, f represents total normal nodes, affected while the movement of the node is fast, whereas it is
Mmax indicates maximum power, M min expresses the minimum improved if the movement of the node is slow as it becomes simple
received power, and M g represents the received power at g th normal for managing nearby nodes. The mobility factor is represented as,
node. 1 X
Bh ¼ Bg ð12Þ
jph j g¼P
4.3.2. Connectivity h

The connectivity [16] is computed based on the bi-directional where, jph j represents a set of neighbors at node h, Bg indicates rel-
links used for linking two nodes and the connectivity is formulated ative mobility, and it is given by,
as,
" # 1X z

1 X Kg
f BIg ¼ T g ðiÞ ð13Þ
Kh ¼  ð3Þ z i¼1
f g¼1 e
where, z represents the number of times the node received hello
where, K g denotes connectivity of g th node, and e represents total packets at time interval I;T g expresses relative mobility. Here, the
connections. relative mobility of a node is described using two factors, mobility
speed and movement direction. Consider t g ðiÞ and hg ðiÞ represent
4.3.3. Link lifetime the mobility speed, and movement direction at an instantiis given
The link lifetime [29] is used for connecting two nodes for by,
transmitting the information. The links are used for transmitting qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
the messages in the network. The breakage of links is the major T g ðiÞ ¼ t 2g ðiÞ þ t2h ðiÞ þ ½2t g ðiÞt h ðiÞCosðhg ðiÞ  hh ðiÞ ð14Þ
problem that occurs in MANET due to dynamic topologies. Thus,
where, t g ðiÞ and hg ðiÞ represent mobility characteristics of the
the link lifetime is evaluated in advance to avoid the network fail-
nodeg:
ure. The link lifetime is computed using the energy model and is
represented as,
" # 4.3.5. Distance
1 X
f
The distance is measured using the links, which are used for
Nh ¼ Dg  ð4Þ
f g¼1 connecting two nodes, by calculating the distance between g th
th
node and h cluster head and it is given by,
where, Dg denotes energy dissipation of g th node. When the normal
node sends q bytes of data, then the energy dissipation of the nor-
X
f
Rh ¼ ðug ; ph Þ ð15Þ
mal node is given by, g¼1
g2h
Dðug Þ ¼ DC  q þ Db  q  jjug  ph jj; if jjug  ph jj P no ð5Þ

Dðug Þ ¼ DC  q þ Da  q  jjug  ph jj2 ; if jjug  ph jj < no ð6Þ 4.4. Algorithm of proposed C-EWA for clustering

sffiffiffiffiffiffi The proposed C-EWA is developed by integrating the chrono-


Da logical idea into EWA for the clustering. The proposed C-EWA con-
mno ¼ ð7Þ
Db siders power, connectivity, mobility, link lifetime, distance as the
parameters for selecting the optimal cluster head for offering secu-
where,DC denotes electronic energy, and it is formulated as,
rity in transmission. EWA technique can determine the better func-
DC ¼ DW þ DX ð8Þ tion values on different benchmark problems and solves the real-
world problem effectively. EWA [30] is a meta-heuristic algorithm
where, DW represents transmitter energy and DX indicates data
inspired from the reproduction behavior of earthworms in generat-
aggregation energy, Da is the free space energy, Db denotes energy
ing the offspring. EWA is well known for providing a trade-off
parameter related to the power amplifier in the transmitter, and
between exploration and exploitation in metaheuristic algorithms.
jjug  ph jj denotes the distance between the normal node and the
EWA can execute a global search and local search and is more
cluster head.
appropriate for parallel computation and provides a balance
The energy dissipated by the receiver is formulated as,
between diversification and intensification. The local optima prob-
Dðph Þ ¼ DC þ q ð9Þ lem is solved by adapting the Cauchy method and to improve the
searchability. The Chronological concept is used for updating the
The updated energy after data transmission for the normal node
solution based on the past events that had occurred. The chrono-
is given by,
logical concept is used for analysis purpose for defining, listing
Dlþ1 ðug Þ ¼ Dl ðug Þ  Dðug Þ ð10Þ and describing the events occurred with respect to the time. Hence,
the incorporation of Chronological concept into EWA is made for
where, Dl ðug Þ represents energy of current time of normal node and
finding the cluster head effectively.
Dðug Þ represents the dissipated energy of the normal node.
The steps involved in C-EWA are elaborated in the given steps,
Similarly, the updated energy after data transmission for cluster
head is given by,
I) Initialization
Dlþ1 ðph Þ ¼ Dl ðph Þ  Dðph Þ ð11Þ
Initially, the proposed C-EWA initializes the solution space for
where, Dl ðph Þ represents energy of current time of cluster head node
determining the optimal solution. The solution space in proposed
and Dðph Þ represents the dissipated energy of the cluster head node.
C-EWA is expressed as,

4.3.4. Mobility A ¼ fA1 ; A2 ; . . . ; Ao g ð16Þ


The mobility [16] of nodes in MANET is discovered individually
th
according to their responsibilities. The node selection process is where,Ao indicates o population of C-EWA.

Please cite this article as: B. Devika and P. N. Sudha, Power optimization in MANET using topology management, Engineering Science and Technology, an
International Journal, https://doi.org/10.1016/j.jestch.2019.07.008
6 B. Devika, P.N. Sudha / Engineering Science and Technology, an International Journal xxx (xxxx) xxx

II) Calculation of fitness Table 1


Pseudocode for proposed C-EWA.

The fitness is computed for each solution depending on multi- Proposed C-EWA
objective fitness parameters, such as power, connectivity, link life- 1 Input: Solution setA
time, squared distance, and mobility. The fitness of the solution is 2 Output: Best Solution
evaluated based on Eq. (1). 3 Begin
4 Initialize the solution
5 while ði < imax Þ
III) Update positions using the Chronological concept in EWA
6 for each solution
7 Update Q , L
Here, the EWA is used to solve the meta-heuristic problems for 8 Calculate the fitness using Eq. (1)
improving the equations using a solution update of EWA. Thus, the 9 Update the position using Eq. (23)
10 Generate a new set of solutions
update solution of EWA is formulated using the equation given
11 Compute the fitness for all the solutions in the new population
below, 12 Choose the solution having maximum fitness as the best solution
13 i¼iþ1
Ax;y ði þ 1Þ ¼ Ax;y ðiÞ þ Q y  L ð17Þ 14 end while
15 Return the best solution
where, Ax;y ðiÞ represents current solution, Q y denotes a weight vec- 16 Terminate

tor and L indicates a random number generated from Cauchy


distribution.
The chronological concept is used to provide the brief 4.5. Gabriel graph
description of the algorithm for generating effective solutions.
The past events are used for evaluation, and hence, the chrono- Gabriel graph [31] is considered as a vertices’ set in the plane, in
logical concept is used in the EWA and the equation obtained is which the edge between two nodes exists if other nodes do not
given as, coincide the edges between the two nodes. Each node constructs
the Gabriel graph in the cluster for mitigating the transmission
Ax;y ðiÞ ¼ Ax;y ði  1Þ þ Q y  L ð18Þ power. The Gabriel graph guarantees network connectivity with
less transmission of the packetand and thus, the cost of energy is
where,Ax;y ði  1Þ represents previous solution. reduced.
Substitute Eq. (18) in Eq. (17), The node in each cluster forms a Gabriel graph for mitigating
the transmission power to assure the network connectivity with
Ax;y ði þ 1Þ ¼ Ax;y ði  1Þ þ Q y  L þ Q y  L ð19Þ less control packet transmission and thus, the energy is minimized.
Here, the links are selected to form a reduced graph. Thus, the
Ax;y ði þ 1Þ ¼ Ax;y ði  1Þ þ 2ðQ y  LÞ ð20Þ graph is formed by considering shorter link in place of larger links
for reducing the transmission power of nodes. This process
th
The solution for ði þ 1Þ iteration is given based on the chrono- removes multiple links, which result in a disconnected graph and
logical concept as, this connectivity is attained by Gabriel graph for each cluster.
The graph is considered as t spanner, if t denotes the spanning ratio
Ax;y ði þ 1Þ þ Ax;y ði þ 1Þ and it is formulated as,
Ax;y ði þ 1Þ ¼ ð21Þ
2
C ug ;uh
Thus, the update solution of proposed C-EWA after substituting t ¼ max ð25Þ
ug ;uh Rug ;uh
equation (17) in equation (21) is given by,
where, C ug ;uh indicates the length of the shortest path between
Ax;y ðiÞ þ Q y  L þ Ax;y ði  1Þ þ 2ðQ y  LÞ
Ax;y ði þ 1Þ ¼ ð22Þ two nodes ug and uh : and Rug ;uh indicates Euclidean’s distance.
2 The Gabriel graph is a planar graph, which is computed for each
The final update solution is used to update the position of the cluster to reduce the transmission power and thus, the energy
earthworm, based on which the suitable cluster heads are deter- spanning graph is constructed. Thus, the power computation for
mined in the network. each graph is computed and is formulated as follows.

Ax;y ðiÞ þ Ax;y ði  1Þ þ 3ðQ y  LÞ a) Power computation for each path


Ax;y ði þ 1Þ ¼ ð23Þ
2
where, The power needed to send packets from source to destination
depends on the distance between them and the path loss models.
Po
x¼1 Ax;y
For transmitting the packet from source node T to destination node
Qy ¼ ð24Þ Z at certain distance R, the power is given by,
o
Here, o indicates population size, L represents a random number MT;Z ¼ RT;Z :xT;Z ð26Þ
from a Cauchy distribution with z ¼ 1:
where, x denotes channel loss component.
IV) Termination

The process is continued until the optimal cluster heads are 5. Results and discussion
detected for effective topology management. The algorithm is ter-
minated after reaching the maximum iterationimax or when no fit- The results obtained by the proposed C-EWA based topology
test solution is obtained. management are described in this section. The proposed C-EWA
The pseudo code of the proposed C-EWA for selecting optimal is analysed based on the performance using five measures, which
cluster heads is given below in Table 1. include connectivity, power, mobility, throughput and delay.

Please cite this article as: B. Devika and P. N. Sudha, Power optimization in MANET using topology management, Engineering Science and Technology, an
International Journal, https://doi.org/10.1016/j.jestch.2019.07.008
B. Devika, P.N. Sudha / Engineering Science and Technology, an International Journal xxx (xxxx) xxx 7

5.1. Experimental setup is depicted in Fig. 4(b). For the number of rounds 40, the power val-
ues measured by existing OPC, LTRT, and DISPOW and proposed C-
The simulation of the proposed model requires the NS2 simula- EWA is 25.943 J, 27.390 J, 27.398 J, 28.677 J.
tor and the PC with certain system configurations. The entire sim-
ulation of the proposed C-EWA is done in a PC with the 4 GB RAM,
5.4.2. Analysis based on delay
Windows 10 OS, and the Intel I3 processor.
The analysis based on delay using 50 nodes and 100 nodes is
shown in Fig. 5. The analysis in terms of delay using 50 nodes is
5.2. Evaluation metrics
depicted in Fig. 5(a). For the number of rounds 30, the delay values
computed by existing OPC, LTRT, and DISPOW and proposed
The evaluation metrics considered for analyzing the perfor-
C-EWA are 0.158, 0.145, 0.137, and 0.131 respectively. The analysis
mance of existing and proposed methods are described in this
in terms of delay using 100 nodes is depicted in Fig. 5(b). For the
section.
number of rounds 10, the delay values computed by existing
OPC, LTRT, and DISPOW and proposed C-EWA are 0.089, 0.0809,
a) Throughput
0.074, and 0.065 respectively. Similarly, at 50th round, the delay
values measured by existing OPC, LTRT, and DISPOW and proposed
The maximum rate in which a total data packet received per
C-EWA are 0.328, 0.321, 0.315, and 0.305 respectively.
unit time in a communication channel is called throughput.

b) Connectivity 5.4.3. Analysis based on connectivity


The analysis based on connectivity using 50 nodes and 100
The link between two nodes to send data packets from one node nodes is depicted in Fig. 6. The analysis in terms of the connectivity
to another is called connectivity. parameter for 50 nodes is shown in Fig. 6(a). At 10th round, the
connectivity values measured by existing OPC, LTRT, and DISPOW
c) Power and proposed C-EWA are 7.710, 8.099, 7.695, and 8.477 respec-
tively. Similarly, for the number of rounds 50, the connectivity
The power is defined as the data transmitted in MANET when values computed by existing OPC, LTRT, and DISPOW and proposed
the nodes use a limited power. C-EWA are 3.139, 3.770, 3.314, and 4.447. The analysis in terms of
the connectivity parameter for 100 nodes is shown in Fig. 6 (b). For
d) Delay the number of rounds 30, the connectivity values computed by
existing OPC, LTRT, and DISPOW and proposed C-EWA are 6.442,
The delay is computed on the basis of number of nodes. If the 7.399, 7.315, and 7.925. Similarly, at 40th round, the connectivity
number of nodes increases, then the delay is high. Hence, the delay values measured by existing OPC, LTRT, and DISPOW and proposed
parameter should be less. The delay is computed from the time C-EWA are 5.397, 6.086, 6.660, and 6.442 respectively.
taken by application request or information to give a response.
5.4.4. Analysis based on mobility
e) Mobility
Fig. 7 shows the analysis based on mobility using 50 nodes and
100 nodes. The analysis in terms of the mobility parameter for 50
The mobility is computed based on the ability of nodes to move
nodes is shown in Fig. 7(a). For 10 rounds, the mobility measured
freely in MANET.
by existing OPC, LTRT, and DISPOW and proposed C-EWA are
0.243, 0.216, 0.198, and 0.172, respectively. Similarly, for the num-
5.3. Comparative techniques
ber of rounds 50, the mobility values computed by existing OPC,
LTRT, and DISPOW and proposed C-EWA are 0.784, 0.767, 0.750,
The comparative techniques utilized for analyzing the perfor-
and 0.729 respectively. The analysis in terms of the mobility
mance of proposed C-EWA are Optimized Power Control (OPC)
parameter for 100 nodes is shown in Fig. 7(b). For the number of
[16], Local Tree based Reliable Topology (LTRT) [32], and dis-
rounds 40, the mobility values computed by existing OPC, LTRT,
tributed power management (DISPOW) [33].
and DISPOW and proposed C-EWA are 0.730, 0.714, 0.662, and
0.636, respectively.
5.4. Comparative analysis of the proposed C-EWA

The analysis of the proposed C-EWA with existing OPC, LTRT, 5.4.5. Analysis based on throughput
and DISPOW is carried out using 50 and 100 nodes with different Fig. 8 shows the analysis based on throughput using 50 nodes
number of rounds. The fitness function is used for evaluating the and 100 nodes. The analysis in terms of the throughput parameter
best Cluster Head for secure routing. The performance analysis is for 50 nodes is shown in Fig. 8(a). For the number of rounds 40, the
carried out using five metrics, such as connectivity, power, mobil- throughput values computed by existing OPC, LTRT, and DISPOW
ity, throughput, and delay by varying the rounds. and proposed C-EWA are 0.673, 0.692, 0.692, and 0.713. The anal-
ysis in terms of the throughput parameter for 100 nodes is shown
5.4.1. Analysis based on power in Fig. 8(b). At 30th round, the connectivity values measured by
The analysis based on power using 50 nodes and 100 nodes is existing OPC, LTRT, and DISPOW and proposed C-EWA are 0.740,
depicted in Fig. 4. Fig. 4(a) depicts the analysis using 50 nodes by 0.772, 0.799, and 0.806 respectively. Similarly, for the number of
varying rounds from 0 to 50. For iteration round 50, the power rounds 50, the throughput values computed by existing OPC, LTRT,
attained by existing OPC, LTRT, and DISPOW and proposed and DISPOW and proposed C-EWA are 0.653, 0.659, 0.699, and
C-EWA is 19.137 J, 19.998 J, 20.049 J, and 21.006 J. Similarly, for 0.713.
the number of rounds 40, the values of power computed by exist- From the analysis, it can be shown that the proposed C-EWA
ing OPC, LTRT, and DISPOW and proposed C-EWA are 25.346 J, provides superior performance as compared to the existing meth-
26.611 J, 27.631 J, and 27.864 J, respectively. The analysis using ods in terms of power, throughput, delay, connectivity and mobil-
100 nodes for a varying number of rounds ranging from 0 to 50 ity for varying number of rounds.

Please cite this article as: B. Devika and P. N. Sudha, Power optimization in MANET using topology management, Engineering Science and Technology, an
International Journal, https://doi.org/10.1016/j.jestch.2019.07.008
8 B. Devika, P.N. Sudha / Engineering Science and Technology, an International Journal xxx (xxxx) xxx

Fig. 4. Analysis based on Power (a) 50 nodes and (b) 100 nodes.

Fig. 5. Analysis based on delay (a) 50 nodes and (b) 100 nodes.

5.4.6. Analysis based on varying the number of nodes 200. Fig. 9(d) shows the throughput of the comparative methods
This section presents the analysis based on alive nodes, end-to- when the numbers of nodes is 200. The throughput of the proposed
end delay, remaining battery power, and throughput by varying C-EWA is 0.816 for the number of nodes 200. On the other hand,
the number of nodes. Fig. 9(a) shows the number of alive nodes the existing methods, such as OPC, LTRT, and DISPOW have the
when the numbers of nodes are 50, 100, 150, and 200. For 200 throughput of 0.7586, 0.7698, and 0.774, when the number of
nodes, the number of alive nodes in the proposed C-EWA is 89, nodes is 200. From the analysis, it can be shown that the proposed
while the number of alive nodes in OPC, LTRT, and DISPOW is 79, C-EWA has the maximum number of alive nodes, minimum end-
84, and 87, respectively. Fig. 9(b) shows the end-to-end delay of to-end-delay, maximum remaining battery power, and maximum
the comparative methods when the numbers of nodes are 50, throughput than the existing methods.
100, 150, and 200. For 200 nodes, the end-to-end delay of the com-
parative methods, such as OPC, LTRT, DISPOW, and proposed 5.5. Discussion
C-EWA is 0.307, 0.26, 0.24, and 0.219, respectively. Fig. 9(c) shows
the remaining battery power when the numbers of nodes are 50, The comparative analysis of various techniques in terms of
100, 150, and 200. The remaining battery power in the comparative power, mobility, throughput, delay, and connectivity is explained
methods, such as OPC, LTRT, DISPOW, and proposed C-EWA is in this section. The maximum performance of the existing tech-
14.932, 15.683, 17.87, and 18.54, when the number of nodes is niques, such as OPC, LTRT, and DISPOW and proposed C-EWA is

Please cite this article as: B. Devika and P. N. Sudha, Power optimization in MANET using topology management, Engineering Science and Technology, an
International Journal, https://doi.org/10.1016/j.jestch.2019.07.008
B. Devika, P.N. Sudha / Engineering Science and Technology, an International Journal xxx (xxxx) xxx 9

Fig. 6. Analysis based on connectivity (a) 50 nodes and (b) 100 nodes.

Fig. 7. Analysis based on mobility (a) 50 nodes and (b) 100 nodes.

depicted in Table 2 by comparing the performance attained for 50 can determine the better function values on different benchmark
and 100 nodes. The table illustrates that the proposed C-EWA problems and solves the real-world problem effectively. EWA can
shows superior results than the existing techniques. The proposed execute a global search and local search and is more appropriate
C-EWA technique attains a value 21.960 J, 0.729, 0.713, 0.295, and for parallel computation and provides a balance between diversifi-
5.256 for power, mobility, throughput, delay, and connectivity. The cation and intensification. The local optima problem is solved by
power remaining in case of the proposed C-EWA is 10.74%, 7.29%, adapting the Cauchy method and to improve the searchability.
and 5.56% higher than the power remaining in the existing meth- The Chronological concept is used for updating the solution based
ods, such as OPC, LTRT, and DISPOW. Hence, the proposed on the past events that had occurred. The chronological concept is
C-EWA method has maximum power, connectivity, and through- used for analysis purpose for defining, listing and describing the
put, and minimum mobility, delay and can be utilized for data events occurred with respect to the time. An advantage of chrono-
transmission to transmit data from one to another node. The rea- logical concept is that it shows how things happen over time. It
sons for the performance improvement of the proposed method unravels a riddle by assembling the facts into a coherent whole
are described below: on a timeline. Hence, the incorporation of Chronological concept
The proposed C-EWA technique takes the advantages of both into EWA is made for finding the cluster head effectively. The
EWA technique and the chronological concept. EWA technique proposed C-EWA considers power, connectivity, mobility, link

Please cite this article as: B. Devika and P. N. Sudha, Power optimization in MANET using topology management, Engineering Science and Technology, an
International Journal, https://doi.org/10.1016/j.jestch.2019.07.008
10 B. Devika, P.N. Sudha / Engineering Science and Technology, an International Journal xxx (xxxx) xxx

Fig. 8. Analysis based on throughput (a) 50 nodes and (b) 100 nodes.

Fig. 9. Analysis by varying the number of nodes.

Please cite this article as: B. Devika and P. N. Sudha, Power optimization in MANET using topology management, Engineering Science and Technology, an
International Journal, https://doi.org/10.1016/j.jestch.2019.07.008
B. Devika, P.N. Sudha / Engineering Science and Technology, an International Journal xxx (xxxx) xxx 11

Table 2
Comparative analysis for varying number of nodes.

Metrics OPC DISPOW WTRT Proposed C-EWA


Power (J) 19.602 20.357 20.739 21.960
Connectivity 3.319 3.452 4.529 5.256
Mobility 0.784 0.767 0.750 0.729
Delay 0.320 0.313 0.304 0.295
Throughput 0.653 0.665 0.699 0.713

lifetime, distance as the parameters for selecting the optimal clus- [10] B. Devika, P.N. Sudha, Literature survey on optimization of power in ad hoc
networks, Int. J. Adv. Res. Comput. Sci. Eng. (IJARCSSE) 5 (8) (2015).
ter head. Hence, it offers more security in transmission for high
[11] N.M. Lutimath, L. Suresh, C. Naikodi, Efficient power aware multipath routing
load networks, with minimum delay. protocol for MANETs, International Conference on Circuits, Controls,
Communications and Computing (I4C), 2017.
[12] W. Bednarczyk, P. Gajewski, An enhanced algorithm for manet clustering
6. Conclusion based on weighted parameters, Universal J. Commun. Network 1 (3) (2013)
88–94.
[13] N.P. Karlekar, N. Gomathi, Kronecker product and bat algorithm-based
This paper illustrates a technique for power minimized trans- coefficient generation for privacy protection on cloud, Int. J. Model., Simul.,
mission using topology management by proposing an algorithm, Sci. Comput. 8 (3) (2017).
named C-EWA. Here, the clustering of graphs is performed and [14] R. Thomas, M.J.S. Rangachar, Integrating GWTM and BAT algorithm for face
recognition in low-resolution images, Imaging Sci. J. 64 (8) (2016) 441–452.
the optimal cluster heads are selected using the proposed C-EWA [15] D. Menaga, S. Revathi, Least lion optimisation algorithm (LLOA) based secret
algorithm for data transmission. Once the optimal cluster heads key generation for privacy preserving association rule hiding, IET Inf. Secur. 12
are selected, then the Gabriel graph is constructed for minimizing (4) (2018) 332–340.
[16] R. Chaudhry, S. Tapaswi, Optimized power control and efficient energy
the transmission power of the nodes and thereby, maintaining the conservation for topology management of MANET with an adaptive Gabriel
power and energy in the MANET. The fitness function is computed graph, Comput. Electr. Eng. (2018).
for finding the optimal cluster heads on the basis of connectivity, [17] X.M. Zhang, Y. Zhang, F. Yan, A.V. Vasilakos, Interference-based topology
control algorithm for delay-constrained mobile ad hoc networks, IEEE
mobility, link lifetime, power, and distance. The nodes providing Students Conference on Electrical, Electronics and Computer Science
maximum value for connectivity, power, link lifetime and mini- (SCEECS), 2016.
mum value for mobility and distance, are selected as the cluster [18] P. Rahmani, H.H.S. Javadi, H. Bakhshi, M. Hosseinzadeh, TCLAB: a new topology
control protocol in cognitive MANETs based on learning automata, J. Netw.
heads. Thus, the proposed C-EWA is adapted for transmitting the
Syst. Manage. 26 (2) (2018) 426–462.
data effectively from the cluster heads to the destination. The [19] T.S. Sri, J.R. Prasad, R.K. Kumar, SEE: synchronized efficient energy calculation
experimentation with the proposed C-EWA is carried out with 50 for topology maintenance & power saving in ad hoc networks, Arab. J. Sci. Eng.
43 (8) (2018) 4353–4363.
and 100 nodes. The proposed C-EWA technique attains a value
[20] S. Hemalatha, P.S. Mahesh, Energy Optimization in Directional Advanced
21.960 J, 0.729, 0.713, 0.295, and 5.256 for remaining battery Intruder Handling AODV Protocol in MANET, 2018.
power, mobility, throughput, delay, and connectivity. [21] T. Singh, J. Singh, S. Sharma, Energy efficient secured routing protocol for
MANETs, Wireless Netw. 23 (4) (2017) 1001–1009.
[22] S. Sridhar, R. Baskaran, R. Anitha, R. Sankar, Proficient and secured routing in
References MANET based on trust and energy supported AODV, Proc. Int. J. Appl. Math. Inf.
Sci. 11 (3) (2017) 807–817.
[23] M. Rao, N. Singh, Energy efficient QoS aware hierarchical KF-MAC routing
[1] A. Bakar, R. Ismail, A.A.R. Hmad, J.L. Manan, Ensuring data privacy and security
protocol in manet, Wireless Pers. Commun. 101 (2) (2018) 635–648.
in MANET: case in emergency rescue mission, in: Proceedings of the
[24] C.R. Lin, M. Gerla, Adaptive clustering for mobile wireless networks, IEEE J. Sel.
International Conference on Information and Knowledge Management, 2012,
Areas Commun. (1997) 1265–1275.
p. 2426.
[25] D.J. Barker, A. Ephremides, The architectural organization of a mobile radio
[2] S. Samanta, S. Ray, S.S. Gupta, M. Naskar, A novel algorithm for managing
network via a distributed algorithm, IEEE Trans. Commun., COM-29 (1981).
network configuration, Asian International Mobile Computing Conference
[26] X. Niu, Z. Tao, G. Wu, Hybrid cluster routing: an efficient routing protocol for
(2006) 04–07.
mobile ad hoc networks, IEEE International Conference on Communications,
[3] K. Kim, Y. Cai, W. Tavanapong, Sharing location dependent experiences in
2006.
MANET, Mobile Data Management, 7th International Conference on, IEEE,
[27] J.Y. Yu, P.H.J. Chong, An efficient clustering scheme for large and dense mobile
2006. 69–69.
ad hoc networks (MANETs), Comput. Commun. 30 (2006) 5–16.
[4] D.K. Shende, S. Nikhil, IoT based geographic multicast routing protocol with
[28] M. Chatterjee, S.K. Das, WCA: a weighted clustering algorithm for mobile ad
DPA through WSN, Int. J. Creative Rese. Thoughts 6 (2) (2018) 578–584.
hoc networks, Journal of Cluster Computing 5 (2002) 193–204.
[5] J. Liu, D. Sacchetti, F. Sailhan, V. Issarny, Group management for mobile ad hoc
[29] R. Kumar, D. Kumar, Multi-objective fractional artificial bee colony algorithm
networks: design, implementation and experiment, in: Proceedings of the 6th
to energy aware routing protocol in wireless sensor network, Wireless Netw.
international conference on Mobile data management, ACM, 2005, pp. 192–
(2015).
199.
[30] G.G. Wang, S. Deb, L.D.S. Coelho, Earthworm optimisation algorithm: a bio-
[6] A. Pramanik, B. Choudhury, T.S. Choudhury, W. Arif, J. Mehedi, Decentralized
inspired metaheuristic algorithm for global optimisation problems, Int. J. Bio-
Topology Management on Mobile Ad hoc Networks, Global Conference on
Inspired Comput. 12 (1) (2018) 1–22.
Communication Technologies (GCCT), 2015.
[31] K.R. Gabriel, R.R. Sokal, A new statistical approach to geographic variation
[7] Y. Wang, Study on Energy Conservation in MANET, J. Networks 5 (6) (2010).
analysis, J. Systematic Zool. 18 (3) (1969) 259–278.
[8] B. Devika, P.N. Sudha, Execution of PA Fish Eye State Protocol to amend power,
[32] K. Miyao, H. Nakayama, N. Ansari, N. Kato, LTRT: an efficient and reliable
in: International Conference on Electrical, Electronics, and Optimization
topology control algorithm for ad-hoc networks, IEEE Trans. Wireless
Techniques (ICEEOT), 2016, pp. 2680–2684.
Commun. 8 (12) (2009) 6050–6058.
[9] B. Devika, P.N. Sudha, Fisheye state protocol in correlation with power
[33] N.L. Pradhan, T. Saadawi, Power control algorithms for mobile ad hoc
consumption in ad-hoc networks, Int. J. Appl. Eng. Res. (IJAER) 13 (17) (2018)
networks, J. Adv. Res. 2 (3) (2011) 199–206.
13335–13339.

Please cite this article as: B. Devika and P. N. Sudha, Power optimization in MANET using topology management, Engineering Science and Technology, an
International Journal, https://doi.org/10.1016/j.jestch.2019.07.008

You might also like