IJRCS – Volume 5 Issue 3 Paper 3


Author’s Name : P Sajitha | R Sujitha

Volume 05 Issue 03  Year 2018  ISSN No:  2349-3828  Page no:  13-18



The energy consumption in MANET is optimized by applying the Fitness Function technique in Ad Hoc On Demand Multipath Distance Vector (AOMDV) routing protocol. The proposed protocol is called Ad Hoc On Demand Multipath Distance Vector with the Fitness Function (FF- AOMDV). The fitness function is used to find the optimal path from the source to the destination to reduce the energy consumption in multipath routing. The performance of the proposed FFAOMDV protocol was evaluated by using Network Simulator Version 2 (NS-2), where the performance was compared with AOMDV and Ad Hoc On Demand Multipath Routing with Life Maximization (AOMRLM) protocols, the two most popular protocols proposed in this area. Mobile Ad hoc Networks (MANETs) consists of a set of wireless mobile nodes communicating to each other without any centralized control or fixed network infrastructure and can be deployed quickly. The potential applications include emergency disaster relief, battlefield situations, mine site operations, and wireless classrooms or meeting rooms in which participants wish to share information or to acquire data. Anycast is an important way of communication for replicated service applications in terms of resources, robustness and efficiency, when mobility and link disconnections are frequent. Any cast allows a source node to transmit packets to a single destination node out of set of several destination nodes.


Fitness Function, Multipath Routing, Wireless Mobile Nodes, Efficiency


  1. P. S. Kiran, “Protocol architecture for mobile ad hoc networks,” 2009 IEEE International Advance Computing Conference (IACC 2009), 2009.
  2. A. Chandra, “Ontology for manet security threats,” PROC. NCON, Krishnankoil, Tamil Nadu, pp. 171–17, 2005.
  3. A. K. Rai, R. R. Tewari,and S. K. Upadhyay, “Different types of attacks on integrated manet-internet communication,” International Journal of Computer Science and Security, vol. 4, no. 3, pp. 265–274, 2010.
  4. D. Smith, J.Wetherall, S. Woodhead, and A. Adekunle, “A cluster- based approach to consensus based distributed task allocation,” in Parallel, Distributed and Network-Based Processing (PDP), 2014 22nd Euromicro International Conference on. IEEE, 2014, pp. 428–431.
  5. I. D. Chakeres and E. M.Belding-Royer, “Aodv routing protocol implementation design,” in Distributed Computing Systems Workshops, 2004. Proceedings. 24th International Conference on. IEEE, 2004, pp. 698–703.
  6. T. Clausen, P. Jacquet, C. Adjih, A. Laouiti, P. Minet, P. Muhlethaler, A. Qayyum, L. Viennot et al., “Optimized link state routing protocol (olsr),” 2003.
  7. M. Hyland, B. E. Mullins, R. O. Baldwin, and M. A. Temple, “Simulation-based performance evaluation of mobile ad hoc routing protocols in a swarm of unmanned aerial vehicles,” in Advanced Information Networking and Applications Workshops, 2007, AINAW’07. 21st International Conference on, vol. 2. IEEE, 2007, pp. 249–256.
  8. J. Pojda, A. Wolff, M. Sbeiti, and C. Wietfeld, “Performance analysis of mesh routing protocols for uav swarming applications,” in Wireless Communication Systems (ISWCS), 2011 8th International Symposium on. IEEE, 2011, pp.317–321.
  9. H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, “Security in mobile ad hoc networks: challenges and solutions,” Wireless Communications, IEEE, vol. 11, no. 1, pp. 38–47, 2004.
  10. N. Garg and R. Mahapatra, “Manet security issues,” IJCSNS, vol. 9, no. 8, p. 241, 2009.
  11. W. Ivancic, D. Stewart, D. Sullivan, and P. Finch, “An evaluation of protocols for uav science applications,” 2011.