Energy-efficient QoS routing algorithm for mobile AD-HOC networks

Document Type : Research Paper


Department of Computer Science & Engineering, Vemana Institute of Technology, Bengaluru, Affiliated to Visvesvaraya Technological University, Belagavi, Karnataka, India


Recently Mobile Ad-hoc Networks(MANETs) are deployed extensively in many areas. To obtain the important information in difficult terrain the feature of the mobility of nodes is used. The effectiveness of information collected by these nodes may be improved by setting up communication among nodes. It is very much important to consider energy conservation among nodes since these mobile nodes operate on limited battery power. The reactive routing protocols are mostly used over proactive routing protocols due to the nodes mobility and limited energy. The reactive routing protocols update routing information based on demand but proactive routing protocols update routing information when there is a variation in the network. The reactive routing protocols collect a huge amount of data and to route these huge data, energy may drain out easily. So it is very much important for the QoS mechanism to be made more energy-efficient. In this paper, an energy-efficient routing mechanism is proposed to achieve this goal. The proposed mechanism achieves by selecting a suitable neighbour node in its routing path to route the information load with efficient energy conservation.


[1] A. Yaar, A. Perrig and D. Song StackPi: new packet marking and filtering mechanisms for DDoS and IP spoofing
defense, IEEE J. Sel. Areas Commun. 24(10) (2006) 1853–1863.
[2] S. Agarwal, R.H. Katz, S.V. Krishnamurthy and S.K. Dao, Distributed power control in ad-hoc wireless networks,
12th IEEE Int. Symp. Personal, Indoor and Mobile Radio Commun. 2001.
[3] K. Biswas and Md. Liakat Ali; Security Threats in Mobile Ad Hoc Network, Master Thesis Computer Science,
[4] Y. Chaba, Y. Singh and A. Preeti, Performance analysis of disable IP broadcast technique for prevention of
flooding-based DDoS attack in MANET, J. Networks 4(3) (2009) 178–183.[5] J. Chang and L. Tassiulas, Energy conserving routing in wireless ad-hoc networks, Proc. IEEE INFOCOM 2000,
Conf. Comput. Commun. Nineteenth Annual Joint Conf. IEEE Comput. Commun. Soc. 2000.
[6] S. Chen, Y. Tang and W. Du, Stateful DDoS attacks and targeted filtering, J. Netw. Comput. Appl. 30(3) (2007)
[7] X. Geng and A. Whinston, Defeating distributed denial of service attacks, IT Prof. 2(4) (2000) 36–42.
[8] Huang et al, A cooperative intrusion detection system for Ad Hoc networks, Proc. ACM Workshop Secur. Ad Hoc
Sensor Networks, Fairfax VA. (2003) 135–147.
[9] M. Just, E. Kranakis and T. Wan, Resisting malicious packet dropping in wireless Ad-Hoc networks, Proc. 2nd
Annual Conf. Adhoc Networks and Wireless (AD-HOCNOW’03), Montreal, Canada, 2003 pp. 151–163.
[10] V. Kawadia and P.R. Kumar, Power control and clustering in ad hoc networks, Twenty-second Annual Joint
Conf. IEEE Comput. Commun. Soc. (IEEE Cat. No.03CH37428), 2003.
[11] R. Kravets and P. Krishnan, Power management techniques for mobile communication, Int. Conf. Mobile Comput.
Network. USA, 1998, pp. 157–183.
[12] V. Krpijoki, Security in Ad Hoc networks, IFIP Int. Conf. Personal Wireless Commun. 2003, pp. 756–775.
[13] M. Kumar and N. Kumar, Study of attack prevention methods for DDOS attacks in manets, Int. J. Adv. Res.
Comput. Sci. Eng. Inf. Technol. 2(8) (2012) 224–228.
[14] S. Lim, Ch. Yu and R. Das, Random cast: An energy efficient communication scheme for mobile ad hoc networks,
IEEE Trans. Mobile Comput. 8(8) (2009) 1039–1051.
[15] P. Magula and M. Kotocova, Quality of service models for mobile Ad-hoc networks, Proc. 12th Int. Conf. Comput.
Syst. Technol., Vienna, Austria, 2011.
[16] S. Khan, K.-K. Loo, T. Naeem and M. Abrar Khan, Denial of service attacks and challenges in broadband wireless
networks, Int. J. Netw. Secur. 8(7) (2008) 1–6.
[17] S. Singh, M. Woo and C.S. Raghavendra, Power-aware routing in mobile Ad Hoc networks, Proc. 4th Annual
ACM/IEEE, Int. Conf. Mobile Comput. Network., USA, 1998, pp. 181–190.
[18] V.A. Siris and I Stavrakis, Provider-based deterministic packet marking against distributed DoS attacks, J. Netw.
Comput. Appl. 30(3) (2007) 858–876.
[19] S.M. Specht and R.B. Lee, Distributed denial of service: taxonomies of attacks, tools, and countermeasures, Proc.
17th Int. Conf. Paral. Distrib. Comput. Syst. 2004 Int. Workshop Secur. Paral. Distrib. Syst. 2004, pp. 543–550.
[20] K. Woo, Ch. Yu, D. Lee, H. Yong Youn and B. Lee, Non-blocking, localized routing algorithm for balanced energy
consumption in mobile ad hoc networks, Proc. Ninth Int. Symp. Model. Anal. Simul. Comput. Telecommun. Syst.
[21] B. Xiao, W. Chen and Y. He, A novel approach to detecting DDoS attacks at an early stage, J. Supercomput.
36(3) (2006) 235–248.
[22] Z. YaztiDemetrios, A Glance at Quality of Services in Mobile Ad-Hoc Networks, Technical Report. 2001.
[23] X. Zeng, R. Bagrodia, M. Gerla, Glomosim: A library for parallel simulation of large-scale wireless networks,
ACM SIGSIM Simul. Digest. 28(1) (1998) 154–161.
[24] X. Zhou, C.Z. Xu, Distributed denial-of-service and intrusion detection, J. Netw. Comput. Appl. 30(3) (2007)
Volume 12, Special Issue
December 2021
Pages 2153-2166
  • Receive Date: 01 October 2021
  • Revise Date: 11 November 2021
  • Accept Date: 08 December 2021