Next Article in Journal
Training Vision Transformers in Federated Learning with Limited Edge-Device Resources
Previous Article in Journal
Recent Progresses and Perspectives of UV Laser Annealing Technologies for Advanced CMOS Devices
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Routing Protocol for MANET Based on QoS-Aware Service Composition with Dynamic Secured Broker Selection

1
Department of CST, Madanapalle Institute of Technology & Science, Madanapalle 512325, Andhra Pradesh, India
2
Department of Computer Science, Sri Manakula Vinayagar Engineerring College, Puducherry 605107, Puducherry, India
3
Department of Computer Science and Engineering, Women Insitute of Technology, Dehradun 248007, Uttarakhand, India
4
Department of Computer Science and Engineering, Graphic Era Deemed to be University, Dehradun 248007, Uttarakhand, India
5
Department of Electrical Engineering, College of Engineering, Princess Nourah bint Abdulrahman University, P.O. Box 84428, Riyadh 11671, Saudi Arabia
6
Uttaranchal Institute of Technology, Uttaranchal University, Dehradun 248001, Uttarakhand, India
7
Department of Project Management, Universidad Internacional Iberoamericana, Campeche 24560, Mexico
8
School of Computer Science and Engineering, Lovely Professional University, Phagwara 144411, Punjab, India
9
Higher Polytechnic School, Universidad Europea del Atlántico, C/Isabel Torres 21, 39011 Santander, Spain
*
Authors to whom correspondence should be addressed.
Electronics 2022, 11(17), 2637; https://doi.org/10.3390/electronics11172637
Submission received: 6 July 2022 / Revised: 9 August 2022 / Accepted: 18 August 2022 / Published: 23 August 2022
(This article belongs to the Section Computer Science & Engineering)

Abstract

:
MANET is a mobile ad hoc network with many mobile nodes communicating without a centralized module. Infrastructure-less networks make it desirable for many researchers to publish and bind multimedia services. Each node in this infrastructure-less network acts as self-organizing and re-configurable. It allows services to deploy and attain from another node over the ad hoc network. The service composition aims to provide a user’s requirement by combining different atomic services based on non-functional QoS parameters such as reliability, availability, scalability, etc. To provide service composition in MANET is challenging because of the node mobility, link failure, and topology changes, so a traditional protocol will be sufficient to obtain real-time services from mobile nodes. In this paper, the ad hoc on-demand distance vector protocol (AODV) is used and analyzed based on MANET’s QoS (Quality of Service) metrics. The QoS metrics for MANET depends on delay, bandwidth, memory capacity, network load, and packet drop. The requester node and provider node broker acts as a composer for this MANET network. The authors propose a QoS-based Dynamic Secured Broker Selection architecture (QoSDSBS) for service composition in MANET, which uses a dynamic broker and provides a secure path selection based on QoS metrics. The proposed algorithm is simulated using Network Simulator (NS2) with 53 intermediate nodes and 35 mobile nodes of area 1000 m × 1000 m. The comparative results show that the proposed architecture outperforms, with standards, the AODV protocol and affords higher scalability and a reduced network load.

1. Introduction

MANET consists of autonomous mobile nodes, which are capable of self-organizing and frequently reconfiguring due to the mobility in their nature. Therefore, the nodes are incapable of sharing services to other nodes available in the surrounding area [1,2]. Generally, web-service composition enables application-to-application interactions over networks by comprising functional and non-functional characteristics. Functional requirements are related to the conformance of web-service composition to the conditions of its functionality. In contrast, nonfunctional requirements are associated with the QoS, e.g., response time, availability, and cost [3]. It provides interoperability because a single service cannot satisfy user requirements. The system requires composite services to achieve interoperability, consisting of many existing atomic services. These services may be hardware, software, raw data, etc. For example, you can consider that a laptop, which has software to be exchanged, can act as a service. Service composition is the integration of any existing e-services communicated over the Internet through wired media [4]. Recently, the research [5,6,7,8,9,10,11] on service composition over infrastructure-less networks has evolved enormously. Most of the works in the literature deliberate that the services available on the wired network are easily accessible; whereas, the services offered by the wireless network can be accessed by matching service composition protocols with infrastructure-less protocols.
In addition, these services need brokers to exchange services among the requester and provider nodes in MANET. So, the research follows on providing service composition based on non-functional QOS parameters such as throughput, end-to-end delay, and packet-delivery ratio in MANET. A dynamic service composer is assigned based on QoS metrics among nodes, to compose various services for a wireless network based on user requirements. The various challenges in developing a dynamic service broker are due to node mobility, link failure, and topology changes in MANET, as discussed in [12]. The mobile nodes are grouped to form clusters, and each cluster is capable of assisting the scalability of the mobile nodes. A mobile node is selected to act as a cluster head based on the Multiple Cluster Head Gateway (MCHG) [13]. QoS is the term used to measure the objectives of both service provider and service requester; the QoS composition process will select the task based on metrics and aggregate the services that have obtained the maximum value by satisfying the user’s requirement. Selection of the protocol for routing based on the QoS metrics in MANET is required.
The research problem of embedding service composition in pervasive environments is divided into two approaches. The first approach is based on developing a language and workflow approaches such as BPEL4WS, DARPA, and Web Services Flow Language discussed in [14]. The second approach is based on constructing architecture for discovering and integrating composite services in an infrastructure-less environment. This paper deals with the second approach, since it is indeed important to consider QoS parameters for the pervasive environment.
The main contributions of this paper are presented below:
  • Initially, an efficient cluster formation mechanism, namely the MCHG algorithm, is introduced to balance the load in the network.
  • A dynamic broker selection based on the QoS metrics is formulated to select an active broker and routing path.
  • A secured communication link within the intra-cluster is designed based on symmetric encryption and key-exchange protocol to prevent intrusion in the network.
The rest of the paper are organized as follows. Section 2 discusses the various literature works. Section 3 illustrates the problem definition, and Section 4 deals with the overview of the QoSDSBS model. Further, a detailed discussion of the QoSDSBS model is presented in Section 5. Experimentation and result analysis are carried out in Section 6. Finally, Section 7 concludes the work with its outcomes.

2. Related Work

Service composition is an active research topic in a wired network environment; most research is on wired composition in a centralized architecture. First, a wired environment-based background work is discussed. At first, Zeng et al. proposed a service class that consists of many distinct services and used service class to differentiate from other services, which have the same functionality but differ in terms of their QoS metrics [14]. The process consists of selecting multiple QoS metrics for wired networks such as cost, time, security, reliability, and availability. The local selection is based on QoS metrics for various composite services and uses global selection to select the best provider. Many researchers have proposed frameworks for service composition based on ontology and QoS metrics. Aggarwal et al. proposed a framework called METEOR-S, that selects the services based on semantic values and groups those values into functional, non-functional, and execution data [15]. With this framework, they choose the best and unique service to fulfil the user requirements based on their SLA (Service Level Agreement). Many research works are done toward considering multiple QoSs for the composition to find the outstanding service. Xingzhi Feng et al. [16] have proposed an architecture for considering multiple QoS constraints for service composition and used both QoS-based functional and non-functional parameters. Their composition is highly critical because they need to select the best service from many specific services and provide QoS metrics, to satisfy the user’s requirements with maximum utility function, as constraints.
L. Zeng et al. [17] developed a standard QoS middleware that provides interoperability for service composition by integrating with integer programming search. The authors obtained better QoS performance with less complexity and combined global planning with local optimization [18]. Multiple QOS constraints are proposed into MANET to assist the network in its energy-saving method and effective data transfer process [19]. Peng Cheng Xiong et al. [20] developed a Petri net framework based on graph structure and algebraic property for considering multiple QoS attributes. This workflow will support functional requirements and also QoS parameters. It deals with a business process for sequencing and runtime execution. Message-forwarding applications such as traffic block notice have been addressed in an effective QOS-based metric analysis system. It also deals with the intelligent traffic-management system to determine the features and service area of coverage to maintain the data-transmission rate [21]. The multi-objective evolutionary algorithm, namely MOEQA, has been addressed to solve the multicast-routing problem in MANET. It also includes the greedy and family competition approach to maintain the convergence and diversity among the density coverage area [22]. However, this mechanism requires lot of information to process an efficient selection.
The second research work is based on wireless network composition. The research work by [23] developed a hierarchical task graph-based workflow for service composition in the infrastructure-less environment. The authors represented a graph with each composite service in a task graph with leaf nodes containing atomic services. The subtrees for the task graph can be computed in distributed networks. The services are combined based on demand or are dynamic. This architecture provides better resource utilization. The authors in [24] have considered both the requester node and composer node in a single module; however, this approach will decrease the system efficiency by increasing network load.
Therefore, an efficient cluster-head-selection mechanism can handle the network load as well as boost network efficiency. The research work in [6] proposed a Linked Cluster Algorithm that assigns an id to each cluster and selects the cluster head with highest id value. A node with higher mobility does not get a chance to act as the head. The authors in [25] proposed a mechanism for cluster formation based on QoS metrics for a wireless network. However, this approach is inefficient and stagnates in local issues, while there is an increase in scalability of the network. The authors in [26,27] proposed an extended ZRP (Zone Routing Protocol) for the clustering-based network that selects a single cluster head with overlapping zones. Various security issues in web services including DDOS [28] are solved. A detailed survey regarding various QoS metrics in web services is discussed in [29,30]. These algorithms selected a single header, resulting in a centralized cluster that might lead to single point of failure.
From the existing research, we observed that an efficient cluster-head election should possess the following eminences in MANET:
  • Maximum utilization of a resource such as battery power;
  • Header should be capable of withstanding any packet traffic;
  • Load balancing;
  • Lesser node mobility.
Therefore, our proposed work considers the above-mentioned eminences along with QoS metrics for dynamic secured broker selection mechanism. In addition, a secured communication path is established between the broker and CHs to eradicate the intrusion.

3. Problem Definition

Services provided in MANET are afforded by the broker available in the middle. Based on the cluster head algorithm, a single broker can be selected to transfer the benefits to the service requester and provider in a centralized system. As a result, it is more prone to a single point of failure. However, a multiple broker-selection mechanism converts the centralized system into a decentralized system that might eradicate the single point of failure. The service traffic will increase with respect to the link failure between the requester or provider and the broker. By using ZRP [27], a region can be formed and transfer services to different zones in a network. The zones in the architecture become overlapped, while the clusters will not become overlapped in the network. The ZRP requires more control messages to be transmitted for updating the routing table. So, we need cluster-based architecture and a dynamic broker based on QoS metrics to avoid and overcome link failure as well as balance the network load.
The cluster-based dynamic broker architecture is required to recover from link failure and provide reliability to the network. More than one dynamic broker is selected, which provides the decentralized model. When the link fails between brokers, it automatically redirects to another broker. The dynamic broker in our proposed architecture is selected based on the QoS metrics. We need a protocol based on the QoS metrics to choose the broker in a cluster architecture. The dynamic broker is determined based on the QoS metric’s value calculated by each mobile node, providing a secure transfer of services from one cluster to another cluster by the AODV protocol. The proposed system architecture using QoSDSBS consists of four modules:
  • Cluster formation of mobile nodes;
  • Routing protocol;
  • Dynamic broker selection;
  • Secure broker selection.
The working process of the proposed methodology with four modules is discussed in detail in Section 5.

4. QoSDSBS System Model

Our system model, QoSDSBS, consists of an environment where mobile nodes use services to publish and bind with another node. Each mobile node provides services and acts as a service provider, and the service requester communicates using MANET protocols. Each node will have specific services, power, and battery life. Service composition is a process to integrating all the services, according to the user requirement from multiple mobile nodes. In our proposed system architecture, the QoSDSBS broker acts as a service, which can incorporate these composite services from numerous mobile nodes, as depicted in Figure 1.
Each N mobile node from N1 to N7 will have specific or the same services, with different QoS metrics for each service. Consider the nodes N2 and N6 in Figure 1, which provide the same service S2 as the other QoS metrics. In Figure 1, seven nodes offer six different and standard services. In Figure 2, the broker will group the mobile nodes based on their services. The services offered by each node are depicted, and the broker that acts as a composer will combine and integrate these services based on the user’s requirements.
Different nodes offer the same services. In this process, the broker utilizes QoS metrics such as such as delay, bandwidth, throughput, etc., to select the best service from the distinct nodes. The service registration takes place at the broker, whenever the mobile nodes within the cluster initiate a service. So, a broker’s responsibility is to find adequate services by applying the QoS metrics. The broker will match the service and lists the node offering atomic services inside the cluster. According to Figure 1 and Figure 2, we list the nodes services as follows.
  • N1 = [Service 1, Service 2]
  • N2 = [Service 2, Service 3]
  • N3 = [Service 1, Service 4]
  • N4 = [Service 4, Service 5]
  • N5 = [Service 2, Service 3]
  • N6 = [Service 2, Service 4, Service 6]
  • N7 = [Service 5, Service 6]
Figure 3 describes the overall architecture of QoSDSBS for service composition in MANET, with nodes functions in different layers of service. The service-composition layer can cope with other protocols; the communication layer provides wireless connectivity with nodes in their region. The connectivity for such a network includes ad hoc 802.11 standards, Bluetooth, etc. The communication with other networks is done with the help of IEEE 802.11. In the network layer, it provides general routing between the mobile nodes. For MANET, many traditional routing protocols are available such as the AODV [30], DSDV (Destination-Sequenced Distance Vector) [31], etc. For the proposed QoSDSBS architecture, the AODV acts as a routing protocol because it outperforms with the QoS metrics for mobile nodes. The service-discovery layer provides the protocol to discover the services available in the mobile nodes.
The protocol used for service discovery is GSD (Group-based Service Discovery) and any cluster-based broker selection for service discovery [32,33]. In the service composition layer, broker-based integration of services based on the QoS metrics from the QoS management is used. This protocol is used to discover the service with different QoS metrics and integrate those services that provide a composite service to the requester node, with the help of a broker node. In the application layer, it gives a different platform for service composition. The services offered include either real-time service or non-real-time service.

5. Proposed System

Our proposed QoSDSBS architecture model consists of MANET service composition, which uses a broker to integrate services. The broker will use the QoS as a metric to acquire distinct services from different nodes. For the routing services in the proposed architecture, the authors have considered a dynamic broker selection based on the QoS metrics. The QoS metrics include bandwidth, delay, throughput, load balancing, and node mobility. The entire node architecture is grouped into clusters based on its coverage area. Each cluster consists of one or two brokers that are dynamically selected. In the literature, the authors have considered one broker to avoid link failure. However, the centralized broker might be prone to aa single point of failure. In this work, we introduced the multiple broker concept using a dynamic broker-selection approach, which might eradicate the above-mentioned issue. This dynamic approach selects a broker based on the QoS metrics that provides reliability and scalability even if there is an increase in the number of nodes in the future. As depicted in Figure 4, the architecture consists of many mobile nodes and the cluster with a broker encircled is formed based on the coverage area.
The communication between the inter-cluster and intra-cluster takes place with the help of traditional routing protocol, namely the AODV. If a requester node in Cluster 1 requires a service from Cluster 4, then it broadcasts a request to the rest of the other nodes present in cluster1 to act as a broker. Then, the requester node will select the nearest broker and further process the reply message to the responding node as the broker. Next, the dynamic broker will provide the details of the available service providers in Cluster 4. Each broker will have the address of the service provider through which a requester node can get the service. The brokers are responsible to find the shortest path between cluster1 and Cluster 4 through the intermediate Cluster 3, using the AODV protocol. The dynamic broker is automatically selected in each cluster based on the QoS metrics.
Our proposed architecture consists of four different modules. We will discuss each module precisely.

5.1. Cluster Formation of Mobile Nodes

Clusters are formed based on the node’s range and bandwidth. It provides a hierarchical formation that divides mobile nodes into groups to avoid transfer rates and provide scalability. Clusters can be formed by the MCHG algorithm; here, each cluster will have more than one cluster head to act as a broker for our architecture. Multiple brokers based on their neighbor cluster are inherited to avoid a single point of failure. In Figure 4, there are five clusters and the brokers are encircled; in cluster1, two brokers are selected and used for interconnection between Cluster 2 and Cluster 3. In Cluster 4, a single broker helps to serve the services. According to number of services, selection of brokers will increase and that will withstand for more scalability and ease of data transfer. If cluster1 wants to transfer its services to Cluster 5 and Cluster 3, it can use the nearest brokers to process the request; thus, our proposed architecture provides load balancing and an increased data delivery rate.

5.2. Routing Protocol

All the required QoS metrics are exchanged among the nodes using hello messages. Each node should maintain a table that consists of node identification, service provider name, services available, and the QoS metrics for each service. Table 1 shows the structure of the fields required to acquire the service description. The traditional protocol AODV is used to find the shortest path between the service provider and the dynamic broker; the broker will find the best service by acquiring hello messages from different nodes and computing the QoS metrics based on Table 1. Table 1 contains the list of service providers available for a particular service, with their specifications. Service provider SP1 will provide services (S1, S4, and S6). They will calculate the QoS metrics for their services and exchange the table with other mobile nodes using the routing protocol AODV.

5.3. Dynamic Broker Selection

The QoS requirement for selecting the dynamic broker is based on the QoS metrics. Here, we will discuss what needs to be considered when selecting a dynamic broker and routing path. Algorithm 1 will describe the selection of the broker based on the QoS metrics. Some of the QoS metrics are described as follows.
Algorithm 1 Broker Formation
1.  Input: Consider n nodes,
Calculate the QoS metrics and compute W t
2.  For every node n in N
3.  If  W t   > W i where i   ϵ   ŋ n           // ŋ n is the neighbor set of
nodes n
4.  Then
5.  Broker = n
6.  For every weight factor W   ϵ   N j         // N j is the set of uncovered
nodes
7.  If distance (Broker, z) <= Broker transmission-range
8.  Then
9.  Broker Z = Broker
10.  End for
11.  End for
  • Availability
Availability is the occurrence of services to a node; it is the absence of service downtime and is associated with time to repair, which is the time it takes to repair the failed services. It is the probability of assessing the services for a particular node. The availability of services can be represented as
A v a i l a b i l i t y   A = N o .   o f   s e r v i c e s   r e s p o n d e d T o t a l   n o .   o f   s e r v i c e s
  • Data Packet Delivery Rate
The data packet delivery rate is calculated by dividing the total number of services received by the service provider by the total number of benefits that originated in the network. The data packet delivery rate can be expressed as
D a t a   D e l i v e r y   D D = N o . o f   s e r v i c e s   r e c e i v e d T o t a l   n o . o f   s e r v i c e s   o r i g i n a t e d
  • Data Packet Loss Rate
The data packet loss rate is calculated by dividing the total number of services transmitted by the service requester by the total number of services received by the service provider in a network. The data packet loss ratio can be calculated as
D a t a   L o s s   D L = s e r v i c e s   t r a n s m i t t e d   b y   r e q u e s t e r s e r v i c e s   r e c e i v e d   b y   p r o v i d e r
  • Comparative Mobility
Comparative mobility can be calculated by the node that exists in the network for a longer time and remains static with its own neighbor node. The node with lesser node mobility is considered to act as a broker. The mobility of the particular node n at time t is given by
M n   t = N t N t 1
where N is the neighbor set of nodes for ‘n’, Nt is the neighbor set of node n at time t − 1, and Nt−1 is the neighbor set of node n at time t but not in time t − 1. The comparative mobility for ‘s’ time is given as
C n t = 1 s   k = t n t M n t
  • Energy
Energy can be calculated by the physical battery life of a node to hold the services.
  • Network Load Balancing
The network load balancing can be calculated by dividing the total number of service messages transmitted for routing by the total number of services received by the node. Network load balancing is expressed as
L o a d   B a l a n c i n g   L B = t o t a l   n u m b e r   o f   s e r v i c e   m e s s a g e s   t r a n s m i t t e d     t o t a l   n u m b e r   o f   s e r v i c e   m e s s a g e s   r e c e i v e d
  • Delay
Delay is when the service travels from the service-requester node to the service-provider node across the prescribed channel. Delay can be calculated by
d e l a y d = d p r o p a g a t i o n + d t r a n s m i s s i o n + d p r o c e s s i n g .
  • Throughput
Troughput is defined as the number of service requests served successfully for a given amount of time period over the prescribed channel. Throughput can be calculated by
T h r o u g h p u t   T = N o . o f   s e r v i c e   r e q u e s t   C o m m u n i c a t i o n   C h a n n e l
  • Node Memory Capacity
Node memory capacity indicates the amount of data storage available for a node to store service descriptions.
The overall total weight of a node can be calculated by
W t = W 1     A + W 2     D D + W 3     D L + W 4     M + W 5     L B + W 6     d + W 7     T + W 8     E n e r g y + W 9     P o w e r + W 10     M e m o r y   .  
where W1,2…10 is the weight factor for each node, with their metrics.

5.4. Secure Broker Selection

Our cluster broker architecture uses a secured link between the broker and the nodes in a cluster. Inside a cluster, the broker acts as a Certification Authority (CA), which provides a secured communication link within the intra-cluster by using symmetric encryption and a key-exchange protocol to prevent intrusion, based on Algorithm 2. The stenography method offers a secure connection from one cluster to another (intra-cluster) for communication. Each broker sends its address and security methods over a hidden channel, by maintaining a neighbor node and routing table based on Algorithm 3. The security methods travel through a hello message to another cluster; the broker will provide secure communication for the cluster-to-cluster architecture.
Algorithm 2 Intra-Cluster Security
1.  Input: Select Prime Number “p”, an element g which is the prime root of “p”, and consider two nodes A and B
2.  For any “n” node in the cluster
3.  “A” select random integer X.A. < p
4.  Compute
5.  YA = g X A   mod   p
6.  Set
7.  Private KeyA = XA
8.  “B” select random integer X.B. < p
9.  Compute
10.  YB = g X B   mod   p
11.  Set
12.  Private KeyB = XB
13.  Broadcast “Y”
14.  “A” compute
15.  K = Y B X A   mod   p
16.  “B” compute
17.  K =   Y A X B   mod   p
18.  End for
Algorithm 3 Inter-Cluster Security
1.  For any “n” node
2.  If (broker-node + Wn) exceeds then
   //Wn is the Net Weight of a particular node
3.  Listen (Address, Channel)
4.  If (Listen + Wn) exceeds then
5.  Update (Routing Table)
6.  End if
7.  End if
8.  If (Listen) then
9.  Stegnomsg (Listen)
   //Compute steganography for listen hello message
10.  Find (Channel, Address)
11.  End if
12.  If (Update)
13.  Update Routing table
14.  End if
15.  End for

6. Simulation and Results Discussion

6.1. Simulation Setup

To simulate our routing protocol for MANET with secured dynamic broker selection, to provide composite services for a particular user according to their requirement, we used NS2 [34]. The required simulation parameters and their values are provided in Table 2. The proposed system is implemented in Network Simulator version 2.35 (NS2) under the Ubuntu 11.10 Linux operating system with 4 GB of RAM. We simulated 53 intermediate nodes and 35 mobile nodes moving into an area of 1000 m × 1000 m according to the random-mobility model [35]. We have considered 12 brokers at the data rate of 1 Mbps with a transmission range of 250 m and bandwidth of 1000 kHz, and nodes are scattered in the simulation area randomly throughout 450 s at each simulation. The traffic follows the Constant Bit Rate (CBR) model, and the authors have used 25,600 bits for the buffer size. Our model with dynamic broker and cluster formation is described in Figure 5.
The performance evaluation metrics such as throughput, end-to-end delay, delivery ratio, average path lifetime, and routing control overhead are used to measure the performance of the algorithms. The results of the proposed QoSDSBS algorithm are compared with existing algorithms such as the energy efficient routing based on the hierarchical routing algorithm (EE-OHRA) [36], energy efficient demand routing protocol (EE-DRP) [37], and novel energy efficient trust aware routing (NETAR) [38].

6.2. Results and Discussion

6.2.1. Bandwidth vs. End-to-End Delay

It refers to the data bandwidth and end-to-end delay; it measures the amount of data transferred in the link by the service provider, which is not yet received by the service requester. Our model QoSDSBS shows that the overall delay is reduced to 25 Mbps/s. Figure 6 shows the bandwidth and end-to-end delay for both the securities-enabled QoSDSBS and other existing algorithms. In this case, our proposed work reduces the number of data lost to the desired level, as depicted in Table 3. The outcome of the proposed algorithm deliberates better performance in providing minimal end-to-end delay compared to other existing algorithms.

6.2.2. Throughput vs. Delivery Ratio

It measures the average rate of successful data delivery over the communication channel. The throughput value rises gradually with the number of nodes, and the packet-delivery ratio rises along with the throughput. Figure 7 depicts the throughput and delivery ratio for both the securities-enabled dynamic secure broker (DSB) system and other existing algorithms. Our model, QoSDSBS, outperforms with an increase in the delivery ratio for increased throughput with DSB, as shown in Table 4. The proposed algorithm attains better results than the compared algorithms, EE-OHRA, EA-DRP, and NETAR. However, the NETAR algorithm competes with the proposed algorithm, but it fails to attain the maximal delivery ratio.

6.2.3. Lifetime with Routing Control Overhead

The average path lifetime is the minimum time in which the maximum number of mobile nodes is desired to shut down. The routing control overhead is the number of control packets required to send each data packet in a network. We have used the channel-access AODV protocol. Figure 8 shows the lifetime and routing control overhead with the secured DSB and other existing algorithms. Our proposed model, QoSDSBS, with the desired channel-access AODV protocol is depicted in Table 5. Table 5 deliberates that the proposed QoSDSBS algorithm attains minimal routing overhead compared to the other existing algorithms. However, the proposed algorithm stagnates in a lifetime of 4 ms. Although, in a later case, it improves nearly 20% in a lifetime of 12 ms, due to the efficient broker-selection process.

6.2.4. Throughput vs. Delay

It measures the success rate of packet delivery during the communication with less data loss due to the reduced delay. The throughput will increase with the number of mobile nodes at the range of bits per second, and the delay is measured in milliseconds. Our proposed model, QoSDSBS, provides a decline in packet loss, a reduced delay, and an increase in throughput, as shown in Table 6. Figure 9 shows the throughput and delay with the securities-enabled DSB and other existing techniques. The above experimental results show that the proposed QoSDSBS model provides the desired level with increased QoS parameters compared to EE-OHRA, EA-DRP, and NETAR.

7. Conclusions

This paper presents the cluster formation and dynamic broker selection, which provides security. The services are transferred among nodes in a secure environment, with the aid of a broker that is selected based on the QoS metrics among the mobile nodes. We have analyzed the performance of the AODV routing protocol in MANET with secured and unsecured conditions, with the effects of the QoS metrics. Our proposed model provides a better QoS and scalability with the help of the cluster formation and a number of brokers to avoid congestion. By the results shown, it is proven that bandwidth, end-to-end delay, throughput, delivery ratio, routing-control overhead, and network lifetime outperform better with our proposed model. Finally, our simulation results show better performance with the AODV routing protocol in the dynamic secured environment. The delay and packet-drop ratio scales down in the proposed secured model. Thus, the proposed architecture reduces the network load for the single mobile node and achieves more scalability. In the future, the optimization algorithm can be incorporated into our current proposed architecture to select the optimal broker node to improve the efficacy in a large mobile area network. In addition, the same can be evaluated with different QoS metrics for a large mobile area network.

Author Contributions

Conceptualization, R.R., R.M. and A.D.; methodology, D.P.S., H.G.M. and R.S.; validation, R.S.; formal analysis, D.A. and I.D.N.; investigation, R.S. and R.R.; writing—original draft preparation, R.R., R.M. and A.D.; writing—review and editing, D.P.S., H.G.M. and R.S.; supervision, D.A. and I.D.N.; project administration, D.A. All authors have read and agreed to the published version of the manuscript.

Funding

Princess Nourah bint Abdulrahman University Researchers Supporting Project number (PNURSP2022TR140), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia.

Acknowledgments

Princess Nourah bint Abdulrahman University Researchers Supporting Project number (PNURSP2022TR140), Princess Nourah bint Abdulrahman University, Riyadh, Saudi Arabia.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Wang, N.-C.; Chen, J.-S.; Huang, Y.-F.; Su, Y.-L. A power-aware multicast routing protocol for mobile ad hoc networks with mobility prediction. Wirel. Pers. Commun. 2005, 43, 1479–1497. [Google Scholar] [CrossRef]
  2. Vazifehdan, J.; Prasad, R.V.; Onur, E.; Niemegeers, I. Energy-aware routing algorithms for wireless ad hoc networks with heterogeneous power supplies. Comput. Netw. 2011, 55, 3256–3274. [Google Scholar] [CrossRef]
  3. Chen, M.; Tan, T.H.; Sun, J.; Liu, Y.; Pang, J.; Li, X. Verification of functional and non-functional requirements of web service composition. In International Conference on Formal Engineering Methods; Springer: Berlin/Heidelberg, Germany, 2013; pp. 313–328. [Google Scholar]
  4. Karunamurthy, R.; Khendek, F.; Glitho, R.H. A novel architecture for Web service composition. J. Netw. Comput. Appl. 2012, 35, 787–802. [Google Scholar] [CrossRef]
  5. Duarte Filho, N.F.; Barbosa, E.F. A contribution to the establishment of reference architectures for mobile learning environments. IEEE Rev. Iberoam. Tecnol. Del Aprendiz. 2015, 10, 234–241. [Google Scholar]
  6. Romero, O.J. Cognitively-inspired agent-based service composition for mobile and pervasive computing. In International Conference on AI and Mobile Services; Springer: Cham, Switzerland, 2019; pp. 101–117. [Google Scholar]
  7. Saghian, M.; Ravanmehr, R. Efficient QoS-Aware Middleware for Resource Discovery in Mobile Ad Hoc Networks. Adhoc Sens. Wirel. Netw. 2019, 43, 283–312. [Google Scholar]
  8. Veeresh, P.; Sam, R.P.; Bin, C.S. Reliable fault tolerance system for service composition in mobile Ad Hoc network. Int. J. Electr. Comput. Eng. (2088–8708) 2019, 9, 2523–2533. [Google Scholar]
  9. Manoranjan, G.; Rathnamma, M.V.; Ramana, V.V.; Anil, G.R. Service Composition in Mobile Ad Hoc Networks (MANET’s) with the Help of Optimal QoS Constraints. In International Conference on Computational and Bio Engineering; Springer: Cham, Switzerland, 2019; pp. 375–390. [Google Scholar]
  10. Kaur, M. Quality of Service Maintenance in MANET with Improved QASEC Technique. In Proceedings of the 2022 6th International Conference on Trends in Electronics and Informatics (ICOEI), Tirunelveli, India, 28–30 April 2022; pp. 690–696. [Google Scholar]
  11. Thirunavukkarasu, V.; Kumar, A.S.; Prakasam, P. Cluster and angular based energy proficient trusted routing protocol for mobile ad-hoc network. Peer-to-Peer Netw. Appl. 2022, 1–13. [Google Scholar] [CrossRef]
  12. Kaisar, S.; Kamruzzaman, J.; Karmakar, G.; Rashid, M. Decentralized content sharing in mobile ad-hoc networks: A survey. Digit. Commun. Netw. 2022, in press. [Google Scholar] [CrossRef]
  13. Jain, A.; Thakur, D.S.; Malviya, V. A novel approach for gateway node election method for clustering in wireless mobile ad hoc networks. In International Conference on Advanced Computing Networking and Informatics; Springer: Singapore, 2019; pp. 205–214. [Google Scholar]
  14. Zeng, L.; Benatallah, B.; Dumas, M.; Kalagnanam, J.; Sheng, Q.Z. Quality driven web services composition. In Proceedings of the 12th International Conference on World Wide Web, Budapest, Hungary, 20–24 May 2003; pp. 411–421. [Google Scholar] [CrossRef]
  15. Aggarwal, R.; Verma, K.; Miller, J.; Milnor, W. Constraint driven web service composition in METEOR-S. In Proceedings of the IEEE International Conference on Services Computing, 2004. (SCC 2004), Shanghai, China, 15–18 September 2004; pp. 23–30. [Google Scholar] [CrossRef]
  16. Feng, X.; Ren, Y.; Hu, J.; Wu, Q.; Jia, Y. A model for service composition with multiple QoS constraints. In Proceedings of the 2007 International Conference on Computing: Theory and Applications (ICCTA’07), Kolkata, India, 5–7 March 2007; pp. 208–213. [Google Scholar] [CrossRef]
  17. Zeng, L.; Benatallah, B.; Ngu, A.; Dumas, M.; Kalagnanam, J.; Chang, H. QoS-aware middleware for web services composition. IEEE Trans. Softw. Eng. 2004, 30, 311–327. [Google Scholar] [CrossRef]
  18. Amudhavel, J.; Padmapriya, S.; Nandhini, R.; Kavipriya, G.; Dhavachelvan, P.; Venkatachalapathy, V.S.K. Recursive ant colony optimization routing in wireless mesh network. In Proceedings of the Second International Conference on Computer and Communication Technologies; Springer: New Delhi, India, 2016; pp. 341–351. [Google Scholar] [CrossRef]
  19. Pushpalatha, M.; Srinivasan, M.; Ramadevi, P. A QoS Multicast Protocol Optimization for MANET in Wireless Communications. Mater. Today Proc. 2021, in press. [Google Scholar] [CrossRef]
  20. Xiong, P.; Fan, Y.; Zhou, M. Web service configuration under multiple quality-of-service attributes. IEEE Trans. Autom. Sci. Eng. 2009, 6, 311–321. [Google Scholar] [CrossRef]
  21. Singh, S.; Pise, A.; Alfarraj, O.; Tolba, A.; Yoon, B. A cryptographic approach to prevent network incursion for enhancement of QoS in sustainable smart city using MANET. Sustain. Cities Soc. 2021, 79, 103483. [Google Scholar] [CrossRef]
  22. Velusamy, B.; Karunanithy, K.; Sauveron, D.; Akram, R.; Cho, J. Multi-objective function-based node-disjoint multipath routing for mobile ad hoc networks. Electronics 2021, 10, 1781. [Google Scholar] [CrossRef]
  23. Basu, P.; Ke, W.; Little, T. A novel approach for execution of distributed tasks on mobile ad hoc networks. In Proceedings of the 2002 IEEE Wireless Communications and Networking Conference Record. WCNC 2002 (Cat. No. 02TH8609), Orlando, FL, USA, 17–21 March 2002; Volume 2, pp. 579–585. [Google Scholar] [CrossRef]
  24. Baker, D.; Ephremides, A. The architectural organization of a mobile radio network via a distributed algorithm. IEEE Trans. Commun. 1981, 29, 1694–1701. [Google Scholar] [CrossRef]
  25. Rajakumar, R.; Dinesh, K.; Vengattaraman, T. An energy-efficient cluster formation in wireless sensor network using grey wolf optimisation. Int. J. Appl. Manag. Sci. 2021, 13, 124–140. [Google Scholar] [CrossRef]
  26. Nurlan, Z.; Zhukabayeva, T.; Othman, M. EZ-SEP: Extended Z-SEP routing protocol with hierarchical clustering approach for wireless heterogeneous sensor network. Sensors 2021, 21, 1021. [Google Scholar] [CrossRef]
  27. Yang, X.; Chen, Q.; Chen, C.; Zhao, J. Improved ZRP routing protocol based on clustering. Procedia Comput. Sci. 2018, 131, 992–1000. [Google Scholar] [CrossRef]
  28. Thenmozhi, R.; Karthikeyan, P.; Vijayakumar, V.; Keerthana, M.; Amudhavel, J. Backtracking performance analysis of Internet protocol for DDoS flooding detection. In Proceedings of the 2015 International Conference on Circuits, Power and Computing Technologies [ICCPCT-2015], Nagercoil, India, 19–20 March 2015; pp. 1–4. [Google Scholar] [CrossRef]
  29. Rajeswari, M.; Sambasivam, G.; Balaji, N.; Basha, M.S.; Vengattaraman, T.; Dhavachelvan, P. Appraisal and analysis on various web service composition approaches based on QoS factors. J. King Saud Univ.—Comput. Inf. Sci. 2014, 26, 143–152. [Google Scholar] [CrossRef]
  30. Perkins, C.; Belding-Royer, E.; Das, S. RFC3561: Ad Hoc On-Demand Distance Vector (AODV) Routing. 2003. Available online: https://www.rfc-editor.org/rfc/rfc3561.html (accessed on 5 July 2022).
  31. Perkins, C.E.; Bhagwat, P. Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. ACM SIGCOMM Comput. Commun. Rev. 1994, 24, 234–244. [Google Scholar] [CrossRef]
  32. Chakraborty, D.; Joshi, A.; Yesha, Y.; Finin, T. GSD: A novel group-based service discovery protocol for MANETS. In Proceedings of the 4th International Workshop on Mobile and Wireless Communications Network, Stockholm, Sweden, 9–11 September 2002; pp. 140–144. [Google Scholar]
  33. Gao, Z.; Wang, L.; Yang, X.; Wen, D. PCPGSD: An enhanced GSD service discovery protocol for MANETs. Comput. Commun. 2006, 29, 2433–2445. [Google Scholar] [CrossRef]
  34. NS-2 Simulator. Available online: https://www.isi.edu/nsnam/ns/ (accessed on 5 July 2022).
  35. Broch, J.; Maltz, D.A.; Johnson, D.B.; Hu, Y.-C.; Jetcheva, J. A performance comparison of multi-hop wireless ad hoc network routing protocols. In Proceedings of the 4th Annual ACM/IEEE International Conference on Mobile Computing and Networking, Dallas, TX, USA, 25–30 October 1998; pp. 85–97. [Google Scholar]
  36. Kumar, S.V.; Anuratha, V. Energy Efficient Routing for Manet Using Optimized Hierarchical Routing Algorithm (Eeohra). Int. J. Sci. Technol. Res. 2020, 9, 2. [Google Scholar]
  37. Rajendra Prasad, P.S. Efficient Performance Analysis of Energy Aware on Demand Routing Protocol in Mobile Ad-Hoc Network. Eng. Rep. 2 2020, 3, e12116. [Google Scholar]
  38. Usha, M.S.; Ravishankar, K.C. Implementation of trust-based novel approach for security enhancements in MANETs. SN Comput. Sci. 2021, 2, 1–7. [Google Scholar] [CrossRef]
Figure 1. Composite services of mobile nodes.
Figure 1. Composite services of mobile nodes.
Electronics 11 02637 g001
Figure 2. Selection of broker based on its services.
Figure 2. Selection of broker based on its services.
Electronics 11 02637 g002
Figure 3. Layered architecture of QoSDSBS.
Figure 3. Layered architecture of QoSDSBS.
Electronics 11 02637 g003
Figure 4. Cluster-based dynamic broker-selection process.
Figure 4. Cluster-based dynamic broker-selection process.
Electronics 11 02637 g004
Figure 5. Dynamic broker and cluster formation.
Figure 5. Dynamic broker and cluster formation.
Electronics 11 02637 g005
Figure 6. Bandwidth vs. end-to-end delay.
Figure 6. Bandwidth vs. end-to-end delay.
Electronics 11 02637 g006
Figure 7. Throughput vs. delivery ratio.
Figure 7. Throughput vs. delivery ratio.
Electronics 11 02637 g007
Figure 8. Average path lifetime vs. routing control overload.
Figure 8. Average path lifetime vs. routing control overload.
Electronics 11 02637 g008
Figure 9. Throughput vs. delay.
Figure 9. Throughput vs. delay.
Electronics 11 02637 g009
Table 1. Service description in hello packet.
Table 1. Service description in hello packet.
P. NameNode IDServicesQoS Metrics
S1S2S3S4S5S6CostAT(s)
SP110.10.1.1 2450.900.5
SP210.10.12.2 7540.870.9
SP310.10.32.5 4380.701.4
SP410.10.3.28 7830.960.67
P. Name represents the provider name; A means availability of the node; and T(s) represents response time in seconds.
Table 2. Simulation parameters.
Table 2. Simulation parameters.
S. No.ParameterValue
1.Number of nodes53
2.Number of mobile nodes35
3.Number of brokers12
4.Number of packets8
5.Area size1000 × 1000 (m2)
6.Mobility0–15 m/s
7.Data rate1 Mbps
8.Transmission range250 m
9.Routing protocolAODV
10.Speed10 m/s
11.Buffer size25,600 Bits
12.Bandwidth1000 KHz
13.Simulation time450 s
Table 3. Results of bandwidth vs. end-to-end delay.
Table 3. Results of bandwidth vs. end-to-end delay.
Bandwidth (Mbps)End-to-End Delay
EE-OHRAEA-DRPNETARQoSDSBS
1049.102347.7545.1543.141
1547.245144.7342.5739.5123
2034.69131.6927.9124.4581
2524.74222.1619.1315.762
Table 4. Results of throughput vs. delivery ratio.
Table 4. Results of throughput vs. delivery ratio.
Throughput (Mbps)Delivery Ratio (%)
EE-OHRAEA-DRPNETARQoSDSBS
542.7547.1353.4569.51
2552.8759.9465.8478.63
4565.7871.4879.5185.91
6574.8479.7684.1789.42
8583.7588.4593.7596.74
Table 5. Results of average path lifetime vs. routing control overload.
Table 5. Results of average path lifetime vs. routing control overload.
Lifetime (ms)Routing Overhead (104 Packets)
EE-OHRAEA-DRPNETARQoSDSBS
23.91783.58792.84512.4456
33.11282.84212.5072.207
42.74232.61242.3872.014
52.47122.31562.1451.8098
61.90231.86121.74511.5256
81.4371.3721.2781.0162
121.2541.1971.13450.9489
Table 6. Results of throughput vs. delay.
Table 6. Results of throughput vs. delay.
Throughput (Mbps)Delay (ms)
EE-OHRAEA-DRPNETARQoSDSBS
517.017815.78912.8428.518
2519.811217.45913.74111.314
4526.471223.54120.84515.8256
6529.471227.842325.84223.0362
8538.002335.712131.874529.9489
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Ramalingam, R.; Muniyan, R.; Dumka, A.; Singh, D.P.; Mohamed, H.G.; Singh, R.; Anand, D.; Noya, I.D. Routing Protocol for MANET Based on QoS-Aware Service Composition with Dynamic Secured Broker Selection. Electronics 2022, 11, 2637. https://doi.org/10.3390/electronics11172637

AMA Style

Ramalingam R, Muniyan R, Dumka A, Singh DP, Mohamed HG, Singh R, Anand D, Noya ID. Routing Protocol for MANET Based on QoS-Aware Service Composition with Dynamic Secured Broker Selection. Electronics. 2022; 11(17):2637. https://doi.org/10.3390/electronics11172637

Chicago/Turabian Style

Ramalingam, Rajakumar, Rajeswari Muniyan, Ankur Dumka, Devesh Pratap Singh, Heba G. Mohamed, Rajesh Singh, Divya Anand, and Irene Delgado Noya. 2022. "Routing Protocol for MANET Based on QoS-Aware Service Composition with Dynamic Secured Broker Selection" Electronics 11, no. 17: 2637. https://doi.org/10.3390/electronics11172637

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop