You are on page 1of 5

An Improved Reactive Routing Protocol over Mobile Ad-

hoc Networks
Khalid A. Darabkh and Mohammad S.E. Judeh
Department of Computer Engineering, The University of Jordan
Amman, 11942, Jordan
Corresponding Author Email: k.darabkeh@ju.edu.jo
Phone: +962-796969219 Fax: +962-65300813

Abstract— In this article, a new reactive routing protocol is depending on the applications themselves and the environment
proposed which is considered as a major extension of Ad- under consideration, pose unique challenges to be faced when
hoc On-demand Distance Vector (AODV) routing designing protocols and solutions for MANETs [51-52].
protocol, namely, Mobility Aware and Dual Phase Ad-hoc
On-demand Distance Vector with Adaptive Hello One of the most widely used and researched reactive protocols
Messages. It primarily concentrates on building routes over MANETs is the Ad hoc on demand Distance Vector
considering nodes’ speeds and direction of motion with (AODV) routing protocol [53]. It was designed as an
respect to source nodes, thereby establishing more stable enhancement to the Destination-Sequenced Distance-Vector
routes and reducing the route breakages. Moreover, we routing protocol in order to make it more applicable to the
proposed an adaptive control packet announcement dynamic MANETs. In this protocol, routing tables are built by
mechanism, which is directly connected to the periodic nodes on demand only. In other words, whenever a node
hello messages approach, with nodes’ speeds, yielding a wants to send data, it begins a route discovery process by
significant reduction in the amount of control overhead flooding a route request message through the network and
and congestion over the network. Our protocol is starts waiting for route reply message. In this way, all nodes
evaluated in terms of packet delivery ratio, control that receive and forward these two control messages build
overhead, end-to-end delay, and energy consumption. their routing tables. As soon as the source node receives the
reply message, it starts sending data packets to the proper next
Index Terms – wireless sensor networks; tracker node hop and similarly all intermediate nodes use their recently
selection; target tracking; clustering built routing tables to forward these packets to their
destinations. This protocol intends to build a shortest path
I. INTRODUCTION between any source and destination pair regardless of the
mobility status of the network. We propose, in this
Recent advances in the fields of electronics, mobile computing manuscript, an efficient reactive routing protocol, that is
and wireless communication have made it possible to considered a major extension of AODV, called Mobility
manufacture portable devices with high communicating and Aware and Dual Phase AODV Protocol with Adaptive Hello
processing capabilities than ever [1-12]. Actually, there are Messages (MA-DP-AODV-AHM) protocol.
two different architectures of wireless networks, namely,
infrastructure-based [13-19] and infrastructure-less networks The rest of this article is organized such as follows. In Section
[20-26]. In the infrastructure-based networks, there must be a II, we present a description of our proposed algorithm. Section
central point for managing and controlling the transfer III introduces the simulation results along with comparisons
between nodes while in the other type of networks, individual with prior relevant works. Finally, the article is concluded in
nodes cooperate altogether to provide the networking Section IV.
functionalities and direct the traffic over the network [27-33].
In infrastructure-less networks, whenever the nodes that form II. T HE PROPOSED P ROTOCOL
the network are mobile nodes, it is called a Mobile Ad hoc
Network (MANET) [34-40]. Particularly, MANETs are In our proposed protocol, we assume the following:
mainly used in the situations that require temporary network
existence and fast deployment [41-44]. Moreover, they are • All nodes are provided with GPS receivers
used in the cases where it is so difficult to build a network which are used by individual nodes to obtain
infrastructure [45-47]. Additionally, MANETs have many their positional coordinates and time required for
special characteristics that distinguish them from other types finding the speed of any node.
of networks such as dynamic topology, self-organization, • Nodes are located in an open flat environment so
energy limitation, bandwidth limitation, security and that the GPS receivers are able to get the spatial
scalability [48-50]. These characteristics, in addition to the position of the nodes accurately.
applications of MANETs that have varying requirements

978-1-5386-2070-0/18/$31.00 ©2018 IEEE 707


• All nodes use omnidirectional antenna to node, then that destination or intermediate will not
transmit either data packets or control packets. immediately prepare and send back the RREP packet, but
This means that any single transmission of a rather another kind of speed and direction testing is applied. If
packet is by default a broadcast transmission and the node is the destination, it will prepare and send back the
only the destination address in the IP header of a RREP packet only if the previous hop, from which it received
packet determines whether the packet is a unicast the RREQ packet, is moving with a speed that is less than the
or broadcast type for further processing by average speed of all the neighbors of that destination node in
recipient nodes. addition that this previous hop is not diverging from the
• Unless mentioned otherwise, all the default destination node, ensuring an establishment of a more stable
values and sub-procedures of the AODV routing route despite of not being the shortest one.
protocol are used in the MA-DP-AODV-AHM
protocol. As the speed and direction parameters have been verified in
• IEEE 802.11b is the adopted medium access both the RREQ and RREP initiation procedures and to ensure
control protocol in which the carrier sense further that there is no drop for any RREP packet occurs in the
multiple access with collision avoidance media reverse direction from the destination to the source node, the
access method is used to control the media RREP packet reception and forwarding procedure in the
access and avoid collisions and interferences intermediate nodes is left unchanged and remains similar to
between different simultaneous transmissions by that in the normal AODV protocol.
different nodes.
III. S IMULATION RESULTS
In the MA-DP-AODV-AHM protocol, the route discovery
procedure is based on the involvement of speed and direction To evaluate the performance of MA-DP-AODV-AHM
of the nodes. To make this possible, two new fields are protocol, simulations have been run using the QualNet 7.1
appended to the hello message structure, which was originally simulator, which is a commercial version of GloMoSim
proposed by AODV: the location of the node and its current developed by Scalable Network Technologies. Additionally,
speed. Hence, the routing tables when considering MA-DP- the simulations have been carried out on a computer with an
AODV-AHM protocol contain mainly the following Intel Core i5 CPU working at 2.6 GHz with a 4GB RAM and
information: destination node address, destination sequence runs windows 7 Enterprise edition (32bits). The simulated
number, next hop, route cost (hop counts), route life time, version of AODV protocol is developed according to the draft
speed of the neighbor node, and a direction flag. 9 released by the IETF MANET group. The simulation
parameters are summarized in Table 1.
The route discovery procedure in MA-DP-AODV-AHM
protocol is initiated by a node that basically has no entry, in its Table I. Simulation parameters
routing table, belongs to the destination node. Therefore, it Parameter Value
broadcasts a RREQ packet. Interestingly, any neighbor node, Simulator QualNet 7.1
receives this packet, verifies its existence (i.e., being a Simulated protocols MA-DP-AODV-AHM vs. AODV
duplicate copy of a same route request) in its Seen table. If it
Simulated network area 2000 X 2000 meters,
is not there, then it will run a kind of speed and direction tests
Simulation time 300 sec.
before rebroadcasting it. In few words, this is performed as
Node placement Randomly
follows. It checks whether its speed is less than a predefined
Number of nodes 40, 50, 60, 70, 80 nodes
threshold. If so, then this intermediate node is highly likely of
not leaving the transmission range of its neighbor node when Packet rate 4, 8, 12, 16, 20 packet/sec
the RREP packet arrives later, and hence, the route is expected Traffic type CBR
to be more stable, thereby having lower probability of route Number of connections 20, 25, 30, 35, 40
loss and reconstruction process. Data packet size 512 Byte
Mobility model Random Waypoint
Interestingly, it checks further whether the two nodes are not Pause time 0 sec.
diverging from each other since if that is the case and even Minimum speed 0 m/s
worse if they are also moving with high speed, then there is a Maximum speed 20 m/s
high probability of having either an unsuccessful route Default HELLO interval 1 sec.
establishment process or a short router lifetime. Attractively, Interface queue length 150 000 Bytes per priority
if both conditions are met (i.e., the speed is lower than a Radio range 339.322m for 802.11b
threshold and both nodes are not diverging), then the RREQ Threshold value of speed 70 m/s
packet will be flooded to neighbors safely. Otherwise, it will Radio propagation model Two-ray ground reflection
be dropped. Channel Data Rate 2.0 Mbps

As soon as the RREQ packet arrives at the destination or any


intermediate node that has a valid route to the destination

708
To evaluate the efficiency of our proposed protocol, the Figure 1 show the results of PDR, routing overhead, end-to-
following performance metrics have been adopted: end delay, and energy consumed versus node density at a
maximum speed of 20 m/s. The performance metrics are
• Packet Delivery Ratio (PDR), described on subplots (a, b, c, and d) in the sequence they are
• End-to-End Delay, introduced, respectively. It is notices from all of these subplots
• Routing Overhead, that the MA-DP-AODV-AHM achieves significant results and
• Consumed Energy. hence outperforms AODV.

60 600000

Routing Overhead (Packets)


50 500000
40 400000
PDR (%)

AODV
30 AODV 300000
20 200000 MA-DP-
MA-DP- AODV-AHM
10 AODV-AHM 100000
0 0
40 50 60 70 80 40 50 60 70 80
No. of Nodes No. of Nodes

(a) (b)

9 1200
End-to-End Delay (Seconds)

Consumed Energy (mWh)

8 1000
7
6 800
AODV
5 AODV
600
4
3 MA-DP- 400 MA-DP-
AODV-AHM AODV-AHM
2
1 200
0 0
40 50 60 70 80 40 50 60 70 80
No. of Nodes No. of Nodes

(c) (d)
Figure 1. Density-based simulation results at maximum speed of 20 m/s (20 CBR connections, 4 packets/second)

performance superiority of the proposed protocol over AODV


IV. CONCLUDING REMARKS protocol.
REFERENCES
In this paper, we propose a new reactive routing protocol,
namely, Mobility Aware and Dual Phase AODV Protocol with [1] Khalid A. Darabkh, Abeer M. Awad, and Ala’ F. Khalifeh, “New
Adaptive Hello Messages (MA-DP-AODV-AHM) which is Video Discarding Policies for Improving UDP Performance over
considered as a major extension of AODV protocol. One of Wired/Wireless Networks,” International Journal of Network
the major findings of our protocol is the efficient Management, vol. 25, no. 3, pp. 181–202, May/June 2015.
[2] Khalid A. Darabkh, Iyad F. Jafar, Raed T. Al-Zubi, and
incorporation of nodes’ speeds and nodes’ directions (with Mohammed Hawa, “A New Image Steganographic Approach for
respect to each other) into the route discovery procedure Secure Communication Based on LSB Replacement Method,”
which interestingly results in establishing more stable routes, Information Technology and Control, vol. 44, no. 3, pp. 315–328,
among those intermediate nodes located in the path of source September 2015.
and destination nodes, than those in AODV protocol. [3] Khalid A. Darabkh, Ahlam K. Al-Dhamari, and Iyad F. Jafar,
Interestingly, the simulation results have proved the “A New Steganographic Algorithm Based on Multi Directional

709
PVD and Modified LSB,” Information Technology and Control, Network Management, vol. 21, no. 5, pp. 432–454, September
vol. 46, no. 1, March 2017. 2011.
[4] K. A. Darabkh and W.D. Pan, "Queueing Simulation for Fano [18] Ala F. Khalifeh, Abdel-Karim Al-Tamimi, and Khalid A.
Decoders with Finite Buffer Capacity," Proceedings of the 9th Darabkh, “Perceptual Evaluation of Audio Quality Under Lossy
Communications and Networking Simulation Symposium Networks,” Proceedings of 2017 International Conference on
Conference (CNSS'06), Huntsville, Alabama, April 2006. Wireless Communications, Signal Processing and Networking
[5] K. A. Darabkh, B. Abu-Jaradeh, and I. Jafar, “Incorporating (WiSPNET 2017), Chennai, India, March 2017.
Automatic Repeat Request and Thresholds with Variable [19] K. A. Darabkh and W.D. Pan, "Stationary Queue-Size
Complexity Decoding Algorithms over Wireless Networks: Distribution for Variable Complexity Sequential Decoders with
Queuing Analysis,” IET Communications, vol. 5, no. 10, pp. Large Timeout," Proceedings of the 44th ACM Southeast
1377–1393, July 2011. Conference, Melbourne, Florida, pp. 331-336, March 2006.
[6] K. A. Darabkh, “Evaluation of Channel Adaptive Access Point [20] Mu'awiah M. Hlayel, Ali M. Hayajneh, Mamoun F. Al-Mistarihi,
System with Fano Decoding,” International Journal of Computer Mohammad Shurman, and Khalid A. Darabkh, “Closed-form
Mathematics, vol. 88, no. 5, pp. 916–937, March 2011. Expression of Bit Error Rate in Dual-Hop Dual-Branch Mixed
[7] K. A. Darabkh, “Queuing Analysis and Simulation of Wireless Relaying Cooperative Networks with Best-Path Selection
Access and End Point Systems using Fano Decoding,” Journal of over Rayleigh Fading Channels,” Proceedings of the 2014 IEEE
Communications, vol. 5, no. 7, pp. 551-561, July 2010. International Multi-Conference on Systems, Signals & Devices,
[8] Khalid A. Darabkh, Huda Ibeid, Iyad F. Jafar, and Raed T. Al- Conference on Communication & Signal Processing,
Zubi, “A generic buffer occupancy expression for stop-and-wait Castelldefels-Barcelona, Spain, pp. 1-4, February 2014.
hybrid automatic repeat request protocol over unstable channels,” [21] K. A. Darabkh, A. Khalifeh, M. Naser, and E. Al-Qaralleh,
Telecommunication Systems, vol. 63, no. 2, pp. 205-221, October “New Arriving Process for Convolutional Codes with Adaptive
2016. Behavior,” Proceedings of the 9th IEEE Multi-conference on
[9] Khalid A. Darabkh, “Fast and Upper Bounded Fano Decoding Systems, Signals, and Devices (SSD’12), Chemnitz, Germany, pp.
Algorithm: Queuing Analysis,” Transactions on Emerging 1-6, March 2012.
Telecommunications Technologies, vol. 28, no. 1, pp. 1-12, [22] K. A. Darabkh and B. Abu-Jaradeh, “Bounded Fano Decoders
January 2017. over Intermediate Hops Excluding Packet Retransmission,”
[10] K. A. Darabkh and R. S. Aygün, “TCP Traffic Control Proceedings of IEEE 24th International Conference on Advanced
Evaluation and Reduction over Wireless Networks Using Parallel Information Networking and Applications (AINA 2010), Perth,
Sequential Decoding Mechanism,” EURASIP Journal on Australia, pp. 299-303, April 2010.
Wireless Communications and Networking, vol. 2007, Article ID [23] K. A. Darabkh and B. Abu-Jaradeh, “Buffering Study over
52492, pp.1-16, November 2007. Intermediate Hops including Packet Retransmission,”
[11] Mamoun F. Al-Mistarihi, Rami Mohaisen, Ashraf Sharaqa, Proceedings of IEEE International Conference on Multimedia
Mohammad M. Shurman, and Khalid A. Darabkh, “Performance Computing and Information Technology (MCIT-2010), Sharjah,
Evaluation of Multiuser Diversity in Multiuser Two-Hop U.A.E, pp. 45-48, March 2010.
Cooperative Multi-Relay Wireless Networks using MRC over [24] K. A. Darabkh and R. S. Aygun, "Quality of Service and
Rayleigh Fading Channels,” International Journal of Performance Evaluation of Congestion Control for Multimedia
Communication Systems, vol. 28, no. 1, pp. 71-90, January 2015. Networking", Proceedings of 2006 International Conference on
[12] Raed Al-Zubi, Mohammed Hawa, Ghazi Al-Sukkar, and Khalid Internet Computing (ICOMP'06), Las Vegas, Nevada, pp. 217-
A. Darabkh, “Markov-Based Distributed Approach For 223, June 2006.
Mitigating Self-Coexistence Problem in IEEE 802.22 WRANs,” [25] K. A. Darabkh and R. S. Aygun, "Quality of Service Evaluation
The Computer Journal, vol. 57, no. 12, pp. 1765-1775, December of Error Control for TCP/IP-Based Systems in Packet Switching
2014. ATM Networks", Proceedings of 2006 International Conference
[13] K. A. Darabkh, I. Jafar, G. Al Sukkar, G. Abandah, and R. Al- on Internet Computing (ICOMP'06), Las Vegas, Nevada, pp.
Zubi, “An Improved Queuing Model for Packet Retransmission 243-248, June 2006.
Policy and Variable Latency Decoders,” IET Communications, [26] Ahlam K. Al-Dhamari and Khalid A. Darabkh, “Block-Based
vol. 6, no. 18, pp. 3315–3328, December 2012. Steganographic Algorithm Using Modulus Function and Pixel-
[14] A. Khalifeh, K. A. Darabkh, and A. Kamel, “Performance Value Differencing,” Journal of Software Engineering and
Evaluation of Voice-Controlled Online Systems,” Proceedings of Applications, vol.10, no.1, January 2017.
the 9th IEEE/ Multi-conference on Systems, Signals, and Devices [27] Mohammed Hawa, Khalid A. Darabkh, Raed Al-Zubi, and Ghazi
(SSD’12), Chemnitz, Germany, pp. 1-6, March 2012. Al-Sukkar, “A Self-Learning MAC Protocol for Energy
[15] Khalid A. Darabkh, Abeer M. Awad, and Ala’ F. Khalifeh, Harvesting and Spectrum Access in Cognitive Radio Sensor
“Efficient PFD-Based Networking and Buffering Models for Networks,” Journal of Sensors, vol. 2016, Article ID 9604526,
Improving Video Quality over Congested Links,” Wireless pp. 1-18 pages, March 2016.
Personal Communications, vol. 79, no. 1, pp. 293-320, [28] Mohammad Shurman, Noor Awad, Mamoun F. Al-Mistarihi, and
November 2014. Khalid A. Darabkh, “LEACH Enhancements for Wireless Sensor
[16] K. A. Darabkh and R. S. Aygun, "Performance Evaluation of Networks Based on Energy Model,” Proceedings of the 2014
Sequential Decoding System for UDP-Based Systems for IEEE International Multi-Conference on Systems, Signals &
Wireless Multimedia Networks", Proceedings of 2006 Devices, Conference on Communication & Signal Processing,
International Conference on Wireless Networks (ICWN'06), Las Castelldefels-Barcelona, Spain, pp. 1-4, February 2014.
Vegas, Nevada, pp. 365-371, June 2006. [29] Khalid A. Darabkh, Wala’a S. Al-Rawashdeh, Raed T. Al-Zubi,
[17] K. A. Darabkh and R. Aygun, “Improving UDP Performance and Sharhabeel H. Alnabelsi, “A New Cluster Head Replacement
Using Intermediate QoD-aware Hop System for Wired/Wireless Protocol for Wireless Sensor Networks, Proceedings of 2017
Multimedia Communication Systems,” International Journal of IEEE European Conference on Electrical Engineering &
Computer Science, Bern, Switzerland, November 2017.

710
[30] Khalid A. Darabkh and Mohammad Z. El-Yabroudi, “A Reliable conference on Systems, Signals, and Devices (SSD’18),
Relaying Protocol in Wireless Sensor Networks,” Proceedings of Hammamet, Tunisia, March 2018.
2017 IEEE European Conference on Electrical Engineering & [43] Hamzah A. Yaseen, Mohammad Alsalamin, Abdallah Jarwan,
Computer Science, Bern, Switzerland, November 2017. Mamoun F. Al-Mistarihi, and Khalid A. Darabkh, “A Secure
[31] Khalid A. Darabkh, Noor J. Al-Maaitah, Iyad F. Jafar, and Ala’ Energy-Aware Adaptive Watermarking System for Wireless
F. Khalifeh, “EA-CRP: A Novel Energy-aware Clustering and Image Sensor Networks,” Proceedings of the 15th IEEE Multi-
Routing Protocol in Wireless Sensor Networks, Computers and conference on Systems, Signals, and Devices (SSD’18),
Electrical Engineering, Hammamet, Tunisia, March 2018.
https://doi.org/10.1016/j.compeleceng.2017.11.017, 2017. [44] Khalid A. Darabkh and Nareman R. Alsaraireh, “A Yet Efficient
[32] Khalid A. Darabkh, Wala’a S. Al-Rawashdeh, Mohammed Target Tracking Algorithm in Wireless Sensor Networks,”
Hawa, and Ramzi Saifan, “MT-CHR: A Modified Threshold- Proceedings of the 15th IEEE Multi-conference on Systems,
based Cluster Head Replacement Protocol for Wireless Sensor Signals, and Devices (SSD’18), Hammamet, Tunisia, March
Networks,” Computers and Electrical Engineering, 2018.
https://doi.org/10.1016/j.compeleceng.2018.01.032, 2018. [45] Khalid A. Darabkh and Laith Al-Jdayeh, “A New Fixed
[33] Ala F. Khalifeh, Mahmoud AlQudah, and Khalid A. Darabkh, Clustering Based Algorithm for Wireless Sensor Networks,”
“Optimizing the Beacon and SuperFrame Orders in IEEE Proceedings of the 14th International Wireless Communications
802.15.4 for Real-time Notification in Wireless Sensor and Mobile Computing Conference (IWCMC 2018), Limassol,
Networks,” Proceedings of 2017 International Conference on Cyprus, June 2018.
Wireless Communications, Signal Processing and Networking [46] Khalid A. Darabkh and Jumana N. Zomot, “An Improved
(WiSPNET 2017), Chennai, India, March 2017. Cluster Head Selection Algorithm for Wireless Sensor
[34] Khalid Darabkh, Noor Al-Maaitah, Iyad Jafar, and Ala Khalifeh, Networks,” Proceedings of the 14th International Wireless
“Energy Efficient Clustering Algorithm for Wireless Sensor Communications and Mobile Computing Conference (IWCMC
Networks,” Proceedings of 2017 International Conference on 2018), Limassol, Cyprus, June 2018.
Wireless Communications, Signal Processing and Networking [47] Khalid A. Darabkh, Saja M. Odetallah, Zouhair Al-qudah, and
(WiSPNET 2017), Chennai, India, March 2017. Ala’ F. Khalifeh, “A New Density-Based Relaying Protocol for
[35] K. Darabkh, S. Ismail, M. Al-Shurman, I. Jafar, E. Alkhader, and Wireless Sensor Networks,” Proceedings of the 14th International
M. Al-Mistarihi, “Performance evaluation of selective and Wireless Communications and Mobile Computing Conference
adaptive heads clustering algorithms over wireless sensor (IWCMC 2018), Limassol, Cyprus, June 2018.
networks,” Journal of Network and Computer Applications, vol. [48] Raed Al-Zubi, Marwan Krunz, Ghazi Al-Sukkar, Mohammed
35, no. 6, pp. 2068–2080, 2012. Hawa, and Khalid A. Darabkh, “Packet Recycling and Delayed
[36] Khalid A. Darabkh, Wijdan Y. Albtoush, and Iyad F. Jafar, ACK for Improving the Performance of TCP over MANETs,”
“Improved Clustering Algorithms for Target Tracking in Wireless Personal Communications, vol. 75, no. 1, pp. 943-963,
Wireless Sensor Networks,” Journal of Supercomputing, vol. 73, March 2014.
no. 5, pp 1952–1977, May 2017. [49] Mohammed Hawa, Khalid A. Darabkh, Loay D. Khalaf, and
[37] S. S. Ismail, A. I. Al Khader, and K. A. Darabkh,” Static Jamal S. Rahhal, “Dynamic Resource Allocation Using Load
Clustering for Target Tracking in Wireless Sensor Networks,” Estimation in Distributed Cognitive Radio Systems,” AEÜ -
Global Journal on Technology (Selected Paper of COMENG- International Journal of Electronics and Communications, vol.
2014), vol. 8, pp. 167-173, 2015. 69, no. 12, , pp. 1833–1846, December 2015.
[38] M. Shurman, M. Al-Mistarihi, A. Mohammad, K. Darabkh, and [50] M. Shurman, M. Al-Mistarihi, and K. Darabkh, “Merging
A. Ababnah,“Hierarchical Clustering Using Genetic Algorithm in Dynamic Address Autoconfiguration and Security Key Protocols
Wireless Sensor Networks,” Proceedings of 36th IEEE in Mobile Ad Hoc Networks,” Proceedings of 36th IEEE
International Convention on Information and Communication International Convention on Information and Communication
Technology, Electronics and Microelectronics (MIPRO 2013), Technology, Electronics and Microelectronics (MIPRO 2013),
Opatija, Croatia, pp. 479-483, May 2013. Opatija, Croatia, pp. 441-445, May 2013.
[39] K. A. Darabkh, Wala’a S. Al-Rawashdeh, Raed T. Al-Zubi, and [51] Khalid A. Darabkh and Ola Alsukour, “Novel Protocols for
Sharhabeel H. Alnabelsi, “C-DTB-CHR: Centralized Density- Improving the Performance of ODMRP and EODMRP over
and Threshold-based Cluster Head Replacement Protocols for Mobile Ad hoc Networks,” International Journal of Distributed
Wireless Sensor Networks,” Journal of Supercomputing, vol. 73, Sensor Networks, vol. 2015, Article ID 348967, pp.1-18, October
no. 12, pp. 5332–5353, December 2017. 2015.
[40] Khalid A. Darabkh, Wala’a S. Al-Rawashdeh, Mohammed [52] Mohammad M. Shurman, Mamoun F. Al-Mistarihi, and Khalid
Hawa, Ramzi Saifan, and Ala’ F. Khalifeh, “A Novel Clustering A. Darabkh, ”Dynamic Distribution of Security Keys and IP
Protocol for Wireless Sensor Networks,” Proceedings of 2017 Addresses Coalition Protocol for Mobile Ad Hoc Networks,”
International Conference on Wireless Communications, Signal Automatika ‒ Journal for Control, Measurement, Electronics,
Processing and Networking (WiSPNET 2017), Chennai, India, Computing and Communications, vol. 57, no. 4, pp. 1020–1034,
March 2017. December 2016.
[41] Khalid A. Darabkh and Riham Z. Muqat, “An Efficient Protocol [53] S. R. Das, E. M. Belding-Royer, and C. E. Perkins, “Ad hoc on-
for Minimizing Long-distance Communications over Wireless demand distance vector (AODV) routing protocol,” RFC 3561,
Sensor Networks,” Proceedings of the 15th IEEE Multi- 2003.
conference on Systems, Signals, and Devices (SSD’18),
Hammamet, Tunisia, March 2018.
[42] Raed T. Al-Zubi, Noor Abedsalam, Ahmad Atieh, and Khalid A.
Darabkh, “Lifetime-Improvement Routing Protocol for Wireless
Sensor Networks,” Proceedings of the 15th IEEE Multi-

711

You might also like