{"title":"A survey: Optimal node routing strategies in MANET","authors":"Renisha P. Salim, R. Rajesh","doi":"10.1109/SAPIENCE.2016.7684111","DOIUrl":null,"url":null,"abstract":"MANET, a self-organizing network of various devices responsible for seamless communication. Routing protocols involved in the communication adopts new strategies to assure energy, security, traffic minimization, overhead. Dynamic nature of the MANET requires the modification in routing protocols for performance improvement. This paper presents the detailed survey of strategies involved in the implementation of routing protocols in the MANET. The survey categorized into four phases namely, routing protocols, neighborhood discovery, centralized / distributed hash tables, and bloom filter involved in MANET routing applications. First, the categorization of routing protocols on the basis of various traffic models presents the MANET structure. Second, a neighborhood discovery mechanism conveys the improvement in the routing configurations. Third, application of hash table mechanisms (centralized / distributed) to MANET to improve the matching efficiencies and computational speed. Finally, the application of bloom filter concept to improve service discovery rate and reduce the fake identities. Traditionally, the uncertainty occurs during the prediction of optimal node routing due to the dynamic nature of the MANET. Moreover, the presence of removed malicious node in another cluster degraded the link stability. This survey conveys the difficulties namely, storage overhead, mobility nature, malicious nodes and false positive rates in the traditional methods. The detailed survey leads to the stone of integration of Distributed Hash Table (DHT) with a bloom filter to overcome the difficulties in traditional research works.","PeriodicalId":340137,"journal":{"name":"2016 International Conference on Data Mining and Advanced Computing (SAPIENCE)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 International Conference on Data Mining and Advanced Computing (SAPIENCE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SAPIENCE.2016.7684111","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 6
Abstract
MANET, a self-organizing network of various devices responsible for seamless communication. Routing protocols involved in the communication adopts new strategies to assure energy, security, traffic minimization, overhead. Dynamic nature of the MANET requires the modification in routing protocols for performance improvement. This paper presents the detailed survey of strategies involved in the implementation of routing protocols in the MANET. The survey categorized into four phases namely, routing protocols, neighborhood discovery, centralized / distributed hash tables, and bloom filter involved in MANET routing applications. First, the categorization of routing protocols on the basis of various traffic models presents the MANET structure. Second, a neighborhood discovery mechanism conveys the improvement in the routing configurations. Third, application of hash table mechanisms (centralized / distributed) to MANET to improve the matching efficiencies and computational speed. Finally, the application of bloom filter concept to improve service discovery rate and reduce the fake identities. Traditionally, the uncertainty occurs during the prediction of optimal node routing due to the dynamic nature of the MANET. Moreover, the presence of removed malicious node in another cluster degraded the link stability. This survey conveys the difficulties namely, storage overhead, mobility nature, malicious nodes and false positive rates in the traditional methods. The detailed survey leads to the stone of integration of Distributed Hash Table (DHT) with a bloom filter to overcome the difficulties in traditional research works.