Escolar Documentos
Profissional Documentos
Cultura Documentos
CSVANET - Cuckoo Search for Efficient Optimal Path Selection with QoS
Usha.M #1, Dr.B. Ramakrishnan*2
Research Scholar, Manonmaniam Sundaranar University, Abishekapatti, Tirunelveli, Tamilnadu, India1
Associate Professor, ST Hindu College , Nagercoil2
Ushasathyam74@gmail.com
ramsthc@gmail.com
Abstract - VANETs are slowly growing into a large commercial application network. The major concern in a
VANET is the amount for security applied to the transmitted data when it is expected to travel the transmission
route. Data security may be compromised due to the presence of selfish or malicious nodes .Security is one of the
major components in deciding the QoS aspect of a network. Our proposed technique focuses on security and quality
of service based energy aware multipath routing in VANETs. The GSA-PSO algorithm is used to for selecting
efficient multi-path routes. Due to continuous usage the routes may gradually lose their link quality. This is
overcome by selecting an optimal path among the established routes. We have proposed a cuckoo search algorithm
which is patterned over the lifestyle of a cuckoo bird. The performance aspect of our proposed work is analyzed
against existing techniques to prove their efficiency. The simulation of the proposed methodology proves that the
CSVANET shows better performance in terms of energy and network quality. It also shows that our proposed work
is much more improved than that of the existing methods.
Keywords - VANET, optimal link state routing protocol, Gravitational Search Algorithm, Particle swarm
Optimization, and Cuckoo search (CS) algorithm.
1. Introduction
A VANET uses vehicles as its nodes in order to carry out the transmissions. The vehicles act as routers and
transmit data between each other. The vehicular nodes are highly mobile by nature. Road side units and On board
units facilitate communication among the vehicles. The nodes rely on each other to forward the messages. The
vehicles are equipped with communication units (DSRC (Direct Short Range Communication)) in order to make
transmission possible. Roadside units help facilitate the transmission further to the vehicular nodes. Several tailor
made algorithms have been proposed for finding the best route to the destination node. The channel is also utilized
effectively by using the spectrum opportunistically. Bandwidth needs to be used effectively with as much delay as
possible. The network density is directly dependent on the traffic density. The data is transmitted using multihops
among the vehicular nodes. VANETs are now widely used for several applications that enable information to travel
faster. Secure routing and faster delivery are the two major issues constantly focused on in order to achieve a good
throughput [1-3].
Cognitive radio technology can be used alongside spectrum sensing techniques in order to achieve efficient channel
utilization during transmission. Based on this technology the users of the spectrum are prioritized based on their
spectrum usage. This prioritization helps in identifying the next user who is supposed to utilize the spectrum.
Routing in VANETs is usually on a multi hop basis .All routing algorithms must take into account ,the high mobility
of the vehicular nodes [4-7].The data needs to be delivered correctly to the intended node regardless of its current
position. Routing and security still continues to be the two major challenges in a VANET. A VANET can be
modeled based on a MANET (Mobile Ad hoc NETwork).The only major change should be the facilitation of the
Inter-Vehicular Communication (IVC).The information is exchanged via IVC with the help of On Board Units
(OBUs) and the fixed Road Side Units (RSUs). These two units coordinate with each other to transmit information
between the vehicles. The RSU acts like an access point while the OBU in the vehicle acts as a router to forward
information [8][9].
2. RELATED WORKS
World Health Organization (WHO) has published a report which states that a lot of accidental casualties are caused
on a day to day basis due to a lot of factors .These factors may range from heavy population to not obeying the
traffic rules. The main reason stated was the lack of traffic information at all stages [1].Intelligent traffic information
would help avoid untoward road incidents. A VANET is an import aspect of advances adhoc networking
technology that helps supply this traffic information called Intelligent Transportation system(ITS) services .This
helps in providing road safety and comfort to the end users and also helps in reducing the congestion associated with
the traffic entities.[10]-[15]. The performance aspects of a VANET can be improved by combining other useful
technologies. Fuzzy related techniques can be combined alongside cognitive radio technology so as to achieve a
better level of security in identifying the users as either genuine or malicious. Routing in VANETs can be further
enhanced by using a static algorithm like OLSR(Optimized Link State Routing).This routing algorithm identifies
selector nodes which are made responsible for forwarding the packets .This OLSR technique is further made
stronger by using a minimal set of Multi Point Relays(MMPR).In order to achieve even better efficiency the MMPR
technique is further enhanced by Robust MPR(RMPR).This RMPR technique improvises on the MMPR technique
by reducing the number of two hop neighbor nodes in the relay selector node set[1-3][16].
Many algorithms have been proposed to facilitate multipath routing in VANETs. Liu and Yu [21] have proposed
an authentication based anonymous secure routing technique. This attempts to achieve better communication
metrics. Network assaults can be avoided by using a cluster based approach with focus towards efficient routing.
Key-encrypted onion routing is used in order to protect the transmitted message from the temporary nodes which
enter the network. A sensible hole detection algorithm proposed by Babu et al.[22].This technique further proposed
a very good feedback based security scheme that can analyse and distinguish the node activity within the network.
The technique focuses more on improving the QoS of the network. Power utilization is a common problem since
extended usage may drain the battery, herby losing out on node energy. Multicasting techniques focus on power
usage which helps in building an efficient network. An energy competent genetic algorithm was proposed by Lu
etal.[23] to establish a better QoS in the network by using the multicasting technique. The proposed work was a NP-
complete problem. The technique ensures that minimal energy is utilized in carrying out the network activities. Deep
and Bansal proposed a new mean PSO technique which is actually a refined version of the PSO technique. Two
terms of the velocity update equation of the PSO scheme was replaced with two newer terms that merged the linear
combination of pbest and gbest values [24-26]. The proposed work was analyzed using criterion based functions
and was analyzed against the SPSO technique. The proposed variant was found to be more effective than the
normal PSO in terms of its standard metrics. This was measured based on how reliable, effective and stable the
network was [27][28]. OLSR is a proactive routing protocol famous for its applicability on wireless networks. It
utilizes MPR selector nodes in order to find the best path for forwarding the data. These selector nodes ensure that
only the selected node relays are allowed to transmit. The OLSR technique achieves a certain level of security and
also ensures that the forwarding technique does not flood the network unnecessarily [29].Routing is a major
challenge in VANETs because of the mobile nature of the nodes [30][31]. The security aspect of the vehicular nodes
needs to be addressed in VANETs. Several techniques have been presented in order to improve the safety measures.
These measures focus on the safety of both the drivers as well as the vehicles. The vehicle to infrastructure is usually
adapted in VANETs.
3. CHALLENGES IN VANETS
VANETs face a lot of challenges in terms of transmission and delivery. Some of the challenges that need to be
addressed are
Frequent breaks in links and the mobile nature of the nodes pose a greater challenge in the multi-hop data
transmission.
Data collection regarding accidents, traffic conditions, safety regulations, entertainment etc.
Incurring minimal delay in terms of faster delivery, for which suitable vehicular nodes need to be selected.
To extract a good throughput form a VANET, these challenges need to be addressed and resolved.
Efficient algorithms are proposed almost on a daily basis in order to resolve the issues prevalent in
VANETs.
Multi-hop technique used data delivery is a major issue because of frequent link failures and high node
mobility.
4. PROPOSED MODEL
Figure.3: CSVANET
(1)
The forces of gravity acting from agent „j‟ on agent „i‟ is defined at time „t‟
(2)
Where
MAGj - active gravitational mass related to agent „j‟. This is used to estimate the strength of the gravitational field
based on an object.
MPGj - passive gravitational mass related to agent „i‟. This is used estimate the strength of the ability of an object
to communicate with the gravitational field.
Dij(t) - The Euclidean Distance between agents „i‟ and ‟j‟
e- a small constant value
G- the gravitational constant at an instant „t‟. G is calculated as shown in equation (3)
(3)
Where
G0 - initial value
c - Descending coefficient
iteration -current iteration
Max_iteration- the number of possible iterations
The total force working on agent „i‟ is estimated using equation (4)
(4)
Where
Rj - the random number in the [0,1] interval
The accelatration of agent „i‟ is calculated after estimating the total forces acting from agent „j‟ on agent „i‟. The
acceleration of agent „i‟ is proportional to the total force(Forcei(t)) and inversely proportional to the mass of agent
„i‟. tis is calculated by using equation(5).
(5)
Where
Mi(t) –mass of agent „i‟ at time‟t‟.
The gravitational force, total force and acceleration of candidate solution or agent is calculated using equations (2)
through (5). The best solution of the agent is updated. The fitness function of the agent is then used to calculate the
best solution (pbest) of the agent. The mass of each agent is taken as its fitness function. The remaining energy of
each agent is used to calculate the mass of every agent. The global best solution (gbest) is obtained by continuously
updating each agent‟s velocity. Velocity and agent position is updated by using the equations (6) and (7).
(6)
(7)
Where
X, c1 and c2 are the weight parameters
r1 and r2 –random number varying from 0 to 1
Vi(t) - velocity of agent „i‟ at time„t‟
Ai(t) - acceleration of agent „i‟ at time„t‟
The search space region is initialized with „M‟ number of solutions (nests). In order to select the optimal path, the
remainingl energy of the nodes must be effective. Additionally, the route between the source node and the
destination node must be a shortest route. The fitness function of the proposed Cuckoo Search Algorithm is defined
in Equation (8).
(8)
where,
Distance (n i , n i+1)- the distance between the nodes „n i‟ and „n i+1‟
i = 1- source node
m- destination node
Eresi - residual energy of each node
Once the fitness function is calculated, each solution is evaluated using the levy flight behavior as shown in equation
(9).
(9)
(10)
Where
a[0] - step size.
Some of the new solutions can be generated using the Levy walk using Equations (2) and (3).This will help in
speeding up the local search. If the calculated fitness value of the new solution (cuckoo‟s egg) is better than the
other solutions (host eggs within the nest), then that solution is replaced by the new solution. This process is
repeated until the optimum solution is obtained. By applying the cuckoo search algorithm between the source and
the destination in the search space, an optimal path can thus be selected. This procedure is demonstrated in the
following algorithms.
Algorithm: GSA-PSO for Multipath Identification
The procedure adopted in the cuckoo search algorithm is represented in the following flowchart (Fig.) .The general
procedure is outlined in order to understand the working principle of the algorithm. It explains how the new solution
replaces the previous solution if the fitness value is up to the optimum level so that it helps in selecting the optimal
path.
Simulation parameters
No. of Nodes 50, 75, 100, 125 and 150
Rate 50 kbps
References:
[1] M. Usha, B. Ramakrishnan. "An Enhanced MPR OLSR Protocol for Efficient Node Selection Process in Cognitive Radio
Based VANET”, Wireless Personal Communications, 2019
[2] M. Usha, B. Ramakrishnan. “A Robust Architecture of the OLSR Protocol for Channel Utilization and Optimized
Transmission Using Minimal Multi Point Relay Selection in VANET”, Wireless Personal Communications, Online: 14 May
2019.
[3] M. Usha, B. Ramakrishnan , J Sathiamoorthy “Performance analysis of spectrum sensing techniques in cognitive radio based
vehicular ad hoc networks (VANET)” 2nd International Conference on Computing and Communications Technologies (ICCCT)
, p.74-80, IEEE Xplore, Feb-2017
[4] Joe, M. Milton, and B. Ramakrishnan. "WVANET: Modeling a novel web based communication architecture for vehicular
network." Wireless personal communications 85.4 (2015): 1987-2001.
[5] Joe, M. Milton, & B. Ramakrishnan, (2015)“Review of vehicular ad hoc network communication models including
WVANET (Web VANET) model and WVANET future research directions” Wireless networks 22 (7), 2369-2386
[6] Sathiamoorthy, J., B. Ramakrishnan, & M. Usha. (2015), “Design of a competent broadcast algorithm for reliable
transmission in CEAACK MANETs." Journal of Network Communications and Emerging Technologies 5.1, 144-151.
[7] Sathiamoorthy, J., B. Ramakrishnan, & M. Usha. (2018), “A Three Layered Peer-to-Peer Energy Efficient Protocol for
Reliable and Secure Data Transmission in EAACK MANETs” Wireless personal communications, Volume 102, Issue 1, pp 201-
227.
[8] Sathiamoorthy, J., B. Ramakrishnan, & M. Usha. (2018), “A Trusted Waterfall Framework Based Peer to Peer Protocol for
Reliable and Energy Efficient Data Transmission in MANETs” Wireless personal communications, Volume 102, Issue 1, pp 95-
124.
[9] S. Al-Sultan, M.M. Al-Doori, A.H. Al-Bayatti, H. Zedan, A comprehensive survey on vehicular ad hoc network, J. Netw.
Comput. Appl. 37 (2014) 380–392, doi: 10.1016 /j.jnca.2013.02.036.
[10] WHO, Fact-sheet for road traffic injuries. http://www.who.int/news-room/factsheets/ detail/road-traffic-
injuries/, 2017 (accessed May 2017)
[11] F. Cuomo, I. Rubin, A. Baiocchi, P. Salvo, Enhanced VANET broadcast throughput capacity via a dynamic backbone
architecture, Ad Hoc Netw. 21 (2014) 42–59, doi: 10.1016/j.adhoc.2014.04.008.
[12] X. Ma, J. Zhang, X. Yin, K.S. Trivedi, Design and analysis of a robust broadcast scheme for VANET safety-related services,
IEEE Trans. Veh. Technol. 61 (1) (2012) 46–61, doi:10.1109/TVT.2011.2177675.
[13] H. Omar, W. Zhuang, L. Li, Ve-MAC: A TDMA-based MAC protocol for reliable broadcast in VANETs, IEEE Trans. Mob.
Comput. 12 (9) (2013) 1724–1736, doi:10.1109 /TMC.2012.142.
[14] I. Rubin, Y.-Y. Lin, A. Baiocchi, F. Cuomo, P. Salvo, Micro base station aided vehicular ad hoc networking, in: Proceedings
of International Conference on Computing Network and Communication (ICNC), 2014, pp. 231–235, doi:10.1109/ICCNC.2014.
6785337.
[15] Y.-Y. Lin, I. Rubin, Vehicular and messaging throughput tradeoffs in autonomous highway systems, in: Proceedings of the
IEEE Global Communication Conference (GLOBECOM), 2015, pp. 1–6, doi: 10.1109/GLOCOM.2015.7417014.
[16] Sathiamoorthy, J., B. Ramakrishnan, and M. Usha. "Design of a competent broadcast algorithm for reliable transmission in
CEAACK MANETs." Journal of Network Communications and Emerging Technologies 5.1 (2015): 144-151.
[17] J.Sathiamoorthy, Dr.B. Ramakrishnan “Energy and delay efficient dynamic cluster formation using hybrid AGA with FACO
in EAACK “Wireless Networks, pp 1-15, December (2015)
[18] J.Sathiamoorthy, Dr.B. Ramakrishnan “Energy and Delay Efficient Dynamic Cluster Formation Using Improved Ant
Colony Optimization Algorithm in EAACK MANETs“ Wireless Personal Communication, pp 1-122, November (2016).
[19]J.Sathiamoorthy, B.Ramakrishnan,"CEAACK – A Reduced Acknowledgment for Better Data Transmission for MANETs",
International Journal of Computer Network and Information Security (IJCNIS), Vol.8, No.2, pp.64-71, 2016.DOI:
10.5815/ijcnis.2016.02.08
[20] J.Sathiamoorthy, Dr.B. Ramakrishnan “A competent three-tier fuzzy cluster algorithm for enhanced data transmission in
cluster EAACK MANETs “Springer Soft Computing, 11 July 2017(Online)
[21]Liu, W., & Yu, M. (2014). AASR: Authenticated anonymous secure routing for MANETs in adversarial environments. IEEE
Transactions on Vehicular Technology, 63(9), 4585–4593.
[22] Babu, M., Dian, S., Chelladurai, S., & Palaniappan, M. (2015). Proactive alleviation procedure to handle black hole attack
and its version. The Scientific World Journal, 2015, 1–11.
[23]Lu, T., & Zhu, J. (2013). Genetic algorithm for energy-efficient QoS multicast routing. IEEE Communications Letters, 17(1),
31–34.
[24]Deep K, Bansal JC. Mean particle swarm optimization for function optimization. Int J Comput Intell Stud. 2009;1:72–92
[25]Singh N, Singh SB. A modified approach of standard particle swarm optimization algorithm. Int J Appl Math.
2013;28:1115–1125.
[26] Harish G. A hybrid PSO-GA algorithm for constrained optimization problems. Appl Math Comput. 2016;274:292–305.
[27]Rashedi E, Nezamabadi-Pour H. GSA: a gravitational search algorithm. Inform Sciences. 2009;179:2232–2248.
[28] Singh N. Mean gbest particle swarm optimization algorithm. J Adv Comput. Under Review, 2017.
[29]Ramakrishnan, B., M. Milton Joe, and R. Bhagavath Nishanth. "Modeling and simulation of efficient cluster based
Manhattan Mobility model for Vehicular communication." Journal of emerging technologies in web intelligence 6.2 (2014): 253-
261.
[30] Sardar MuhammadBilal, Carlos Jesus Bernardos, Carmen Guerrero , “Position-based routing in vehicular networks: A
survey”, Journal of Network and Computer Applications 36 (2013) 685–697.
[31] M. Usha, B. Ramakrishnan , J Sathiamoorthy “Architectural Analysis of Vehicle to Vehicle, Cluster and Cognitive Radio
Cooperative Sensing based Vehicular Ad Hoc Network” TEC- Elsevier International Conference on Electrical, Communication
and Computing, 2017.
[32] Pattabiram Thulasingam Kasthuribai, Murugaiyan Sundararajan. "Secured and QoS Based Energy-Aware Multipath Routing
in MANET”, Wireless Personal Communications, https://doi.org/10.1007/s11277-018-5820-4, 15 May 2018.
Authors:
Usha .M is a research Scholar, currently pursuing her Ph.D from M.S.University, Tirunelveli, under the
guidance of Dr.B. Ramakrishnan. She has completed M.C.A. and M.Phil in Computer Science from
Bharathidasan University, Trichy. She has also done her M.Tech (CIT) from Manonmaniam Sundaranar
University, Tirunelveli. She is currently working as an Assistant Professor in MEASI Institute of
Information Technology, Chennai. She has 12 years of teaching experience and she has published papers in
Network Security in National and International journals and has presented in International Conferences and
Seminars. Her current area of interest is Operating Systems, Algorithms and ad-hoc networks especially
MANET and VANET.
Dr B.Ramakrishnan is currently working as an Associate professor in the Department of Computer
Science and Research Centre, S.T.Hindu College, Nagercoil. He has got his post graduate Degree from
M.K. University and M.Phil Computer science from Alagappa University, Karaikudi. He has to his credit
30+ years of service in teaching IT related subjects. He has published a number of articles in leading
national and international journals. He has participated and presented a number of national and
international conference and seminars. His area of interest in the field of research includes network
technology, mobile communication, mobile ad-hoc network and vehicular network. He is a Chief Editor of
International journal of Computer Network and Application(IJCNA)