Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

  • Loading metrics

A multi-objective optimized OLSR routing protocol

  • Wenhong Wei ,

    Roles Funding acquisition, Methodology, Supervision, Writing – original draft

    weiwh@dgut.edu.cn

    Affiliation School of Computer Science and Technology, Dongguan University of Technology, Dongguan, China

  • Huijia Wu,

    Roles Formal analysis, Investigation, Writing – original draft

    Affiliation School of Computer Science and Technology, Dongguan University of Technology, Dongguan, China

  • Ying He,

    Roles Investigation, Software

    Affiliation School of Computer, Neusoft Institute Guangdong, Foshan, China

  • Qingxia Li

    Roles Methodology, Supervision, Writing – review & editing

    Affiliation School of Artificial Intelligence, Dongguan City University, Dongguan, China

Abstract

The rapid development of mobile communication devices has brought challenges to wireless networks, where data packets are able to organize and maintain local area networks more freely without the constraints of wired devices. Scholars have developed diverse network protocols on how to ensure data transmission while maintaining its self-organizational nature. However, it is difficult for traditional network protocols to meet the needs of increasingly complex networks. In order to solve the problem that the better node set may not be selected when selecting the node set responsible for forwarding in the traditional OLSR protocol, a multi-objective optimized OLSR algorithm is proposed in this paper, which incorporating a new MPR mechanism and an improved NSGA-II algorithm. In the process of route discovery, the intermediate nodes responsible for forwarding packets are determined by the new MPR mechanism, and then the main parameters in the OLSR protocol are provided by the multi-objective optimization algorithm. Matlab was used to build a self-organizing network in this study. In addition, the conventional OLSR protocol, NSGA-II algorithm and multi-objective simulated annealing algorithm are selected to compare with the proposed algorithm. Simulation results show that the proposed algorithm can effectively reduce packet loss and end-to-end delay while obtaining better results in HV and Spacing, two multi-objective optimization result evaluation metrics.

1 Introduction

Ad hoc network is an instant network that does not depend on a fixed infrastructure and network topology. The nodes in such networks are able to play the role of routers and participate in data transmission [1]. With the rapid development of communication technology, Ad hoc networks are widely used in the fields of surveillance, vehicle communication and agriculture [2, 3]. Due to the dynamic nature of Ad hoc networks [4], previous researchers have developed various routing protocols suitable for different network requirements. Among them, heuristic algorithms play an important role in providing reliable solutions to real network problems because of its advantages of global optimization, strong versatility and parallelism [5].

For different activation mechanism of routing update, on-demand routing protocol, table-driven routing protocol and hybrid routing protocol are proposed [6]. The nodes in on-demand routing protocols do not need to maintain the topology information in real time, and perform route discovery operations only when nodes need to send data packets [7]. Common on-demand routing protocols include AODV (Ad hoc On-Demand Distance Vector Routing) protocols, DSR(Dynamic Source Routing) protocols, etc., table-driven routing protocols are active routing protocols. Nodes in the network maintain the routing information table in real time by exchanging information periodically [8]. Common table-driven routing protocols include DSDV (Destination-Sequenced Distance Vector Routing) protocol, OLSR (Optimized Link State Routing) protocol, etc.

This paper studies on the improvement of OLSR protocol. We not only note that the working mechanism of the OLSR protocol can still be adapted, but also take into account the optimization of heuristic algorithm. In addition, QoS (Quality of Service) has been one of the main topics of networks, it represents the quality of data transmission in a network to evaluate its performance. Hence, this paper finds an optimal node selection strategy and combines a modified heuristic algorithm to optimize the OLSR protocol. This algorithm uses QoS metrics to evaluate its performance, which can better reflect its improvement of network efficiency and resource saving.

The rest of this paper is organized as follows: Section 2 represents a brief review of related works on the optimization of Ad hoc network. In section 3, we briefly introduce the OLSR protocol, MPR mechanism and its improved algorithm. Section 4 introduces NSGA-II and the optimized mutation operator. Section 5 shows the multi-objective optimization OLSR algorithm proposed in this study. Simulation experiments and data analysis are performed in Section 6. Section 7 concludes this study and discusses the future work.

2 Related works

In recent years, many advanced algorithms have been used to improve Ad hoc networks. Zhang et al. used an energy-balanced routing method FAF-EBRM based on forward-aware factor in the WSN (Wireless sensor network) [9], the experimental results showed that this method guaranteed high QoS of WSN. Liu proposed a novel network partition & distance based unequal clustering routing protocol for WSN, which efficiently reduced the energy consumption and prolonged the network lifetime [10]. Zhang et al. proposed a multi-strategy channel allocation algorithm for edge computing [11], which improved the network interference, transmission delay and network throughput for Wireless mesh networks (WMNs). Zhang et al. designed a low duty cycle asynchronous MAC protocol with adaptive update mechanism based on the predicted time for WSN [12], the experimental results showed that the improved protocol can save the network energy consumption and improve the ability of the network markedly. Zhang et al. proposed a new constructing approach for a weighted topology of WSNs based on local-world theory for the Internet of Things [13], experiment results showed that the topology had robustness and fault tolerance.

Chen et al. introduced an incentive approach of flow offset based on Q-learning algorithm for IoT (Internet of Things) user privacy protection [14]. Wang et al. proposed a new approach of ID mapping correlation for radio frequency identification technology anti-collision to solve the problem of low tag recognition efficiency in IoT [15]. Zhang et al. presented a new adaptive stratified sampling based edge computing architecture [16], this architecture performed well in the real-time data stream processing of IoT. Cui et al. introduced an evolutionary game algorithm based on reinforcement learning to solve the multiple IoT devices computation offloading problem in mobile edge computing [17], the experimental results showed that the average delay of IoT devices gain good performance in dynamic environment. Chen et al. designed a new method of the IoT user perceptual task offloading grounded on quantum behavior particle population optimization strategy [18], which reduced the time consumption and energy loss of the algorithm markedly.

In [1922], some reliable self-adaptive routing protocols based on heuristic multi-objective algorithms were presented, these methods achieved good performance. In [23], a dynamic task offloading scheme based on deep reinforcement learning was proposed, the simulation results showed that this algorithm had better performance on delay and energy consumption. In [24], a content distribution method of IOV (Internet of Vehicles) based on edge cache and immune cloning strategy was proposed to better reduce the delay of content distribution and the communication cost. Chen and Mao used a cooperative communication strategy to increase the capacity of vehicular networks [25]. In [26], a non-dominated sorting genetic strategy was proposed to solve the constrained multi-objective optimization problem for IoV in 5G, the experimental results showed that the proposed strategy can make optimal decision in actual applications. In [27], a vehicle cooperative communication method based on fuzzy logic and signal game was proposed to improve the performance of average power consumption, task success rate and invalid packet quantity for VANET. In [28], an edge caching approach based on multi-agent deep reinforcement learning was introduced to solve the problem of excessive response delay in IoV. In [29], a novel approach based on V2I direct transmission and V2V auxiliary transmission was proposed for IoV, which showed better performance in transmission delay and packet delivery rate. In [30], a passive multi-hop clustering algorithm was introduced to improve the stability and reliability of clustering algorithm for VANET (Vehicular ad hoc network). In [31], two decision algorithms were proposed to address the issue of message consistency caused by malicious vehicles that would tamper the content of disseminated messages, and the simulation results verified the effectiveness of the algorithms. In [32], a complete dataset with real traffic data was applied in a traffic simulator and was used for dynamic routing algorithms. This work provided a visualization sample of dynamic routing algorithms for Computer Science education. In [33], a new shared-bike demand forecasting model based on dynamic convolutional neural networks was proposed to predict the demand of shared bike, which achieved a high prediction accuracy within a relatively short period of time. In [34], a prefix-projection-based trajectory prediction algorithm called PrefixTP was designed to overcome the difficulty of predicting short-term partial trajectories. The experimental results showed that PrefixTP outperformed other algorithms in predicting trajectories.

Zhang et al. presented a new algorithm of clustering AODV based on edge computing strategy in IOV [35]. Experiments showed that this algorithm can reduce end-to-end delay and improve the packet delivery rate in different environments. Liu et al. proposed an adaptive repair algorithm for Temporally Ordered Routing Algorithms (TORA) routing protocol based on flood control strategy [36], which made the improved TORA more adaptable to the data transmission of the disaster relief network. Zhang et al. introduced an Ad hoc on-demand multi-path distance vector (AOMDV) routing protocol based on link lifetime and energy consumption prediction for mobile edge computing [37]. The experimental results proved that this algorithm can improve the network lifetime, reduce the node’s energy consumption and the average end-to-end delay. In [38], a network anomaly detection model using the deep learning method was proposed. By combining 1-D CNN architecture and SMOTE over-sampling method, the proposed method achieved higher accuracy rate in classifying minority classes of attacks. Zhang et al. proposed a new greedy forwarding improvement routing method for mobile ad hoc network [39]. Comparing with other existing methods, the proposed algorithm effectively reduced the network delay and prolonged the network lifetime. Liu et al. proposed an estimation formula to provide a general framework or studying the shortest path of MANET [40], which could describe the changes in actual scenes more accurately. Zhang et al. proposed an improved path finding algorithm based on genetic algorithm and bacterial foraging algorithm [41], which could improve the routing selection algorithm and convergence without change the complexity of DSR.

In [42], a new quantum-genetic based OLSR protocol was proposed. It used a new augmented Q-Learning algorithm to optimize the selection of MPR (multi-point relay) nodes that responsible for forwarding data. Harrag et al. used a multi-objective genetic algorithm to automate the selection process of the routing protocol parameters [43]. Experiments showed that it improved the QoS prominently. Yang et al. propose a multi-objective particle swarm optimization (MOPSO) framework to enhance the performance of OLSR in VANETs [44]. Gunasekar and Hinduja proposed Intelligent Water Drops algorithm to optimize the parameter setting in OLSR protocol, which improved the packet delivery ratio and reduce the communication cost in VANET [45]. Gautami et al. introduced the idea of combining Genetic Algorithm and Simulated Annealing to optimize the QoS of OLSR protocol to apply to VANET [46]. Joshua et al. proposed an optimization framework for routing protocols in VANETs based on a multi-objective firefly algorithm approach which depends on the use of network resources to further reflect the current system condition and adjust the arrangement between continuous network topology changes and the QoS needs [47].

2.1 Discussion

From the above studies, it can be seen that many heuristic algorithms were used to optimize the network protocols. The researchers have also changed the operators such as encoding, crossover and mutation to further optimize the initial algorithms. Other researchers have focused on the improvement of routing mechanisms to enable those routing protocols to cope with more complex environment changes and task requirements. However, there are still relatively few studies on integrated optimization from these two perspectives, indicating considerable room for improvement. This paper is an attempt at such an integrated approach, and the experiments prove that the proposed integrated algorithm also performs significantly.

3 OLSR protocol and MPR

3.1 OLSR protocol

The widespread adoption of Ad Hoc network has created more diverse network requirements, and the OLSR protocol is one of the solutions to these requirements [48]. The OLSR protocol works in the following steps:

  1. Neighboring node discovery: A node discovers nodes directly adjacent to itself by broadcasting Hello messages, and maintains a list of neighboring nodes.
  2. MPR selection: MPR nodes are elected in the network according to specific election rules.
  3. Topology building: After the MPR nodes are selected, each MPR node establishes a table of MPR Selectors. This table indicates the nodes from which the MPR nodes are to forward the TC messages when the topology is built
  4. Routing establishment and maintenance: The information in OLSR is updated periodically. If a node is found to be lost, the neighbor information is updated first, and then updated by TC grouping according to the above process. A new topology is created in the network immediately.

In summary, OLSR protocol is able to reduce the size of control packets by proactively providing paths immediately when needed and by using only selected multi-point relay nodes to forward messages [49]. Therefore, the protocol can significantly reduce network flooding and retransmissions in broadcasts. At the same time, the OLSR protocol retains the routes of all destination nodes to cope with large-scale node exchanges, making it suitable for large and dense networks [50]. The control messages of this protocol do not rely on reliable transmission, but on periodic delivery by nodes, so it can cope with a loss of some packets occasionally [51, 52].

3.2 MPR selection

MPR(multi-point relay) mechanism is the core of OLSR protocol. Based on this mechanism, all nodes in the network can receive messages, however, only a few selected nodes have the permission to disseminate packets. These selected nodes are called MPR nodes. The selection of MPR nodes is related to the broadcast of link state information, and is also an important step in optimizing network resource allocation. This technique can significantly reduce the number of retransmissions required to send messages to all nodes in the network [53]. The selection process of MPR nodes is as follows:

  1. Choose the source node, find the set of one-hop nodes adjacent to the source node and the set of strict two-hop nodes connected to the one-hop nodes.
  2. Find all the isolated two-hop neighbor nodes, set the one-hop nodes connected with them as MPR nodes, and then move the MPR nodes and all their connected two-hop nodes out of the respective sets.
  3. The MPR nodes are gradually selected in descending order according to the number of connected two-hop nodes until all the two-hop nodes can be covered.

As shown in Fig 1, the star symbol represents the source node, the solid symbol represents the one-hop node, and the hollow symbol represents strict two-hop nodes. According to the above selection mechanism, the MPR set may be obtained as {a, f, b, c}, {a, f, b, e}, {a, f, d, c} or {a, f, d, e}. Each set contains four nodes.

The selection of MPR sets can speeding up the response to topology changes by reducing the maximum time interval for periodic control message transmissions, thereby improving network quality of service. The larger and denser the network, the better the optimization effect of the MPR mechanism.

3.3 Improved MPR scheme

However, in some cases, the MPR set selected by the traditional OLSR protocol is not the optimal set, which will lead to unnecessary packet forwarding and waste of network resources [54]. Based on previous research, Dong and Zhang [55] proposed a reverse MPR set selection scheme, which can optimize resource allocation, and improve data transmission efficiency through loop and set operations. The process of the mechanism is as follows:

  1. (1). Find the one-hop neighbor set F and the two-hop neighbor set S in the topology, and initialize the MPR set.
  2. (2). Map each one-hop neighbor to its connected strict two-hop neighbor one by one.
  3. (3). Sort the set F from largest to smallest according to the number of two-hop neighbors that each one-hop neighbor can connect. If the numbers are the same, then sort the nodes alphabetically.
  4. (4). Find the isolated two-hop node in set S, put the corresponding one-hop node into the MPR set, and mark these two nodes. If there is no such one-hop node, delete the lowest-ranked node in the sorted set F, and perform a union operation on all two-hop nodes that connected to each node in the set F. Compare whether the union is consistent with the set of unmarked nodes in the set S. If so, it can be confirmed to be deleted. Otherwise, it is added to the MPR set, and its connected two-hop node is marked.
  5. (5). Repeat step (4). The union is performed every time a one-hop node moves to the MPR set until the elements in the MPR set can completely cover the set S.

Applying this scheme to Fig 1 again, the new MPR set can be obtained is {a, d, e}, which has one node less than the original MPR set.

4 Genetic algorithm and its improvement

4.1 MOGA

Genetic Algorithm (GA) is a computational model that simulates the natural selection and genetic mechanism of Darwin’s theory of biological evolution [56]. The model adopts a probabilistic optimization method, which can automatically obtain and guide the optimized search space without certain rules, and adjust the search direction adaptively. This algorithm takes all the individuals in the population as objects and uses randomization techniques to perform an efficient search of a parameter space that is encoded [57]. The genetic operation includes selection, crossover, and mutation.

Multi-objective optimization means that when multiple objectives need to be reached in a given scenario [58], the optimization of one objective is at the expense of the deterioration of the others due to the tendency to have inherent conflicts between the objectives. In this case, it is difficult to emerge a unique optimal solution, and instead, coordination and compromises are made among them so that the overall objective is as optimal as possible [59]. The result of optimization is a set of optimal solutions obtained on the Pareto front.

Multi-objective evolutionary algorithm is suitable for solving complex multi-objective optimization problems and has been widely used. This algorithm uses one-dimensional string data to represent variables, also known as genotyped individuals. A certain number of individuals form a population, which will undergo genetic recombination -> mutation -> evaluation and selection to produce new individuals [60]. Individuals with better fitness will be remained in the next generation, that is, the non-dominant solution.

This study adopts the framework of the non-dominated sorting genetic algorithm with elite strategy (NSGA-II), which introduces fast non-dominated sorting and crowding distance comparison operator. Individuals can judge the superiority of each other by comparing the rank and crowding distance, which has the advantages of simple and efficient computation.

4.2 Precision control mutation operator

Zhang et al. [61] proposed an adaptive precision control mutation operator to explore and exploit the decision space. Let x = [x1, x2, …, xN]T represents one individual, xi represents the ith decision variable of individual x. Eqs (1)–(6) are used to explore the local region near x and the region far away from x (1) (2) where, (3) (4) (5) where, (6)

Eqs (1) and (2) represent the increase or decrease of xi by Δα, Δα is calculated by Eq (3). The function Random(p) is used to generate a pseudo-random number between 1 and p. is used to control the required local search accuracy, Random(9) produces a random coefficient ranging from 1 to 9. These two equation are used to perform local exploitation. If a local search accuracy of 0.0001 is desired, the parameter p should be set to 4. Eqs (4) and (5) represent the increase or decrease of xi by Δβ, Δβ is calculated by Eq (6). The function Random(q) is used to generate a pseudo-random number between 1 and q. is used to control the required global search accuracy. These two equation are used to perform global exploration.

5 Multi-objective optimized OLSR protocol

5.1 Network model

OLSR performs basic functions through different types of control message. Among them, each node must detect its neighbor nodes with direct and bidirectional links. In order to ensure the validity of the links, each node periodically sends Hello messages to its neighbors [62]. In this process, the neighbor list in the Hello message may be partial, so it is stipulated that all neighbor nodes are referenced at least once during a predefined refresh cycle. Topology Control (TC) messages are sent periodically by each node in the network to announce its MPR node set [63], thus building an internal forwarding database. The address list in each TC message may also be incomplete, but must be resolved within a certain refresh period. Refresh interval refers to the period in which a node must refer to each link and each neighbor [64]. This value is also used to determine the neighbor maintenance time.

According to [43], Hello interval, Topology control (TC) interval and Refresh interval are taken as three variables of the multi-objective optimization algorithm in this study. In accordance with RFC 3626, these three variables are real numbers ranging from 1 to 30 and will be used as objects for selection, crossover and mutation operations during the optimization process.

5.2 Objective function

In this study, packet loss rate and end-to-end delay are taken as two objectives of optimization [43], both of which are important indicators for network quality evaluation [65]. The packet loss rate refers to the ratio of the number of lost packets to the sent packets during the transmission process. The end-to-end delay refers to the total delay of sending a packet from the source host to the destination host.

5.3 The improved OLSR

The brief workflow of the improved OLSR is as follows: First, build the network and initialize the population. Use the modified MPR mechanism to determine the routing path. Then, the objective values of the initial population is obtained by simulation experiments. Start the population iteration until the end of loop condition is met. The flow chart is shown in Fig 2.

5.4 Pseudo code

Improved OLSR protocol Based on new MPR Mechanism Combined with Optimized NSGA-II Algorithm

1. Build the topology, set the parameters of the network and the multi-objective optimization algorithm

2. Initialize the population, set the population size pop_size and number of iterations

3. Calculate the two objective values of each individual through network simulation, and sort each individual

4. Screening of parental individuals

5. Crossover between parent individuals to obtain offspring

6. Select individuals from the parents for mutation to obtain offspring using the mutation method in Section 4.2.

7. Merge the offspring and the original population

8. Perform a non-dominated sorting on the merged population and select a new generation of the population

9. Loop step 3 to 8 until the iteration is completed and evaluate the final results

5.5 Complexity analysis

The time complexity of OLSR protocol depends on the size and connectivity of the network, as well as on the implementation and optimization algorithm. Overall, the complexity of the OLSR protocol is low because it uses a multi-point relay-based routing calculation method, which can efficiently calculate the routing path of packets, and the protocol itself does not have much redundant information. Specifically, the time complexity of the OLSR protocol can reach O(m3) in the worst case, where m is the number of nodes in the network. However, in most cases, the time complexity of the OLSR protocol can be optimized to O(m3) or lower.

The improved OLSR protocol contains two main computational components. One is the selection of the MPR set, because the improved MPR mechanism requires needs to compute the shortest path from each node to other nodes, and for each node, it needs to find the smallest set of all its neighboring nodes, which requires n iterations and each iteration needs to compare the number of neighboring nodes. Therefore, the total time complexity is O(n2). The other is the multi-objective optimization algorithm. In this part, the computational complexity of this algorithm is related to the number of objectives M and the number of individuals N. The sorting process of selecting an individual in each round takes O(N) and has to compare M objectives, so the complexity here is O(MN2). To summarize, the total complexity of the improved OLSR protocol is O(MN2)+O(n2).

5.6 Discussion

Compared with the previous studies cited in Section 2, this paper also makes some improvements to the relevant strategies and algorithms for specific network environments, and uses simulation experiments to verify the effectiveness and practicality of the improved algorithms. In addition, the network quality measures such as packet loss rate and delay are also used to reflect the optimization effect on the network. In previous studies, researchers have made in-depth analysis of the research background, contributed extensively to various types of network, and their results have been quite convincing. In this paper, we choose the OLSR protocol as the research object and use the Pareto solution to deal with the multi-objective problem, and add data analysis to enhance the persuasiveness of the results.

6 Simulation and analysis

Unlike traditional optimization ideas, the proposed algorithm optimizes the OLSR protocol in terms of both multi-objective optimization and routing mechanism. In this study, Matlab is used as a network simulation and multi-objective optimization algorithm implementation tool. The traditional OLSR protocol, the traditional NSGA-II optimized OLSR protocol and the multi-objective simulated annealing algorithm [66] optimized OLSR protocol are selected for comparison experiments. With the same network topology, the same number of packets are sent in each experiment to calculate the average packet loss rate and the average end-to-end delay.

6.1 Evaluation indicators

6.1.1 HyperVolume(HV).

The HV evaluation index represents the volume of the hypercube enclosed by the non-dominated individuals in the solution set and the reference point in the target space [67]. This index evaluates both the convergence and distributivity of the solution set at the same time [68]. The accuracy of HV metric depends on the choice of reference point, and different reference points for the same solution set will give different results [69]. Let X denote the non-dominated solution set and P be the corresponding reference point. The calculation formula (7) of HV is as follows (7)

x is an individual in the solution set X, i.e., xX. v(x, P) denotes the volume of the space enclosed by x and P. U is the mathematical symbol of union set. This formula represents the union of all volumes. The larger the value, the closer the solution set is to the real Pareto front, and the better the algorithm performance.

6.1.2 Spacing(SP).

The SP index is used to assess the uniformity of the approximate Pareto solution over the target space [70]. Assuming that the solution set obtained by the multi-objective algorithm is P, the calculation formula (8) of SP is shown below (8)

is the average of the distance between all individuals and their nearest individual, di is the current individual. This formula measures the standard deviation of the minimum distance from each individual to the other individuals. The smaller the Spacing value is, the more even the solution set is. If the value of SP is 0, it means that the Pareto solution is uniformly distributed on the target space.

6.2 Experiment setting

The network parameters and optimization algorithm parameters are shown in Table 1. The network topology is shown in Fig 3.

6.3 Simulation experiment results

Table 2 shows the collection of the solution set evaluation metrics obtained from all the experiments of multi-objective optimized OLSR protocol and run time for each algorithm for each run. Table 3 shows the collection of the network quality metrics obtained from all experiments of the multi-objective optimized OLSR protocol and the original OLSR protocol, where the number of packets sent in each simulation is 200, and the average packet loss rate and end-to-end delay are counted in each algorithm. Figs 4 and 5 show the data in Table 2 as bar graphs. Figs 6 and 7 show the data in Table 2 as boxplots. Fig 8 shows the data in Table 2 as scatter plot. Figs 9 and 10 show the data in Table 3 as bar graphs. Figs 11 and 12 show the data in Table 3 as boxplots. Fig 13 shows the data in Table 3 as scatter plot.

thumbnail
Fig 13. Scatter plot of packet loss rate and end to end delay.

https://doi.org/10.1371/journal.pone.0301842.g013

thumbnail
Table 2. Evaluation index of multi-objective optimization algorithm.

https://doi.org/10.1371/journal.pone.0301842.t002

As can be seen from Table 2 and Fig 4, most HV values of the improved OLSR optimization algorithm are larger than NSGA-II and significantly better than MOSA. This indicates that the non-dominated solution of the proposed algorithm is closer to the real Pareto front. Fig 6 shows the discrete distribution of HV values for the three algorithms, and it can be observed that the data of the proposed algorithm is generally distributed on the upper position. From Table 2 and Fig 5, most SP values of the improved OLSR optimization algorithm are better than MOSA, and significantly better than NSGA-II. This indicates that the distribution of the solutions of the proposed algorithm is more even. Fig 7 shows that the proposed algorithm can obtain lower SP values. By observing the two indicators simultaneously in Fig 8, it can be seen that the improved algorithm distributes more points in the lower right corner of the coordinate axis, which indicates that the algorithm takes more cases of two better indexes at the same time. Both the HV and SP values of the proposed algorithm outperform the other two multi-objective optimization algorithms in the 1st, 5th, 9th, 11th, 12th, 17th and 20th simulation experiments, showing the advantages of the proposed algorithm.

Comparing the run time of these three algorithms, it can be counted that the improved algorithm has the shortest run time in 11 experiments, NSGA-II OLSR has the shortest running time in 9 experiments, while AMOSA OLSR has the longest run time in each experiment. According to the analysis in Section 5.5, the proposed algorithm differs from NSGA-II OLSR in the selection of MPR and the mutation process, while these two do not have a significant difference in computing time consumption. However, AMOSA OLSR differs from the other two algorithms in the Optimization mechanism, and runs for a relatively longer time.

From Table 3 and Fig 9, it can be seen that most of the packet loss rates of the improved OLSR optimization algorithm are lower than those of NSGA-II OLSR. And, in all experiments, lower than MOSA OLSR and the original OLSR, which indicates that the proposed algorithm can effectively reduce the packet loss rate and ensure the transmission efficiency. Fig 11 shows that the packet loss rate of the proposed algorithm is generally lower than that of the other three algorithms. As can be seen from Table 3 and Fig 10, the end-to-end delay of the improved OLSR optimization algorithm is lower than that of NSGA-II OLSR in most of the experiments and lower than the other two algorithms in all experiments, which indicates that the proposed algorithm can effectively reduce the end-to-end delay. Fig 12 shows that both the quartile and median positions of the end-to-end delay values of the proposed algorithm are lower than those of the other algorithms, which further proves its superiority. In Fig 13, packet loss rate the end-to-end delay of all algorithms are scattered in the coordinate axis at the same time, and it can be seen that the proposed algorithm is mainly concentrated in the lower left corner, which indicates that it is more common for this algorithm to achieve lower packet loss rate and end-to-end delay simultaneously, and the performance of this algorithm is better. In the 1st, 4th, 6th, 8th, 10th, 11th, 12th, 13th, 15th, 16th and 20th set of experiments, both packet loss rate and end-to-end delay of the proposed algorithm are optimal, which proves that it can effectively improve network service quality.

6.4 Statistical analysis

In this section, Wilcoxon test and Friedman test are used to compare the above algorithms. Tables 4 and 5 show the results of Wilcoxon test between this algorithm and the two comparison algorithms. Table 4 compares the HV value, and Table 5 compares the SP value. The Wilcoxon test is used to test the null hypothesis and is able to rank the observed distribution [71]. In these four sets of comparison data, it is evident by the three metrics R+, R- and p-value that the proposed algorithm has a larger rank sum than the other two algorithms. This illustrates that the improved OLSR algorithm is significantly different from the other two algorithms in terms of HV and SP indexes.

Friedman test can detect the significance of differences between more than two samples [72]. Tables 6 and 7 show the results of Friedman test for the proposed algorithm and the two comparison algorithms. Figs 14 and 15 show the Friedman test chart of the two evaluation metrics. In the figures, the horizontal axis is the average rank value, the vertical axis represents each algorithm. The vertical coordinate 1 represents the proposed algorithm, group 2 represents NSGA-II, and the group 3 represents MOSA. For each algorithm, the dot is used to indicate the average ranking value of that algorithm. Table 6 and Fig 14 compare the HV values, and Table 7 and Fig 15 compare the SP values. It can be seen that the proposed algorithm ranks first in HV, and its mean column rank is significantly different from that of the MOSA. The proposed algorithm performs best in SP, and the mean column rank of the proposed algorithm is obviously different from that of the NSGA-II.

thumbnail
Fig 15. Friedman test figure of the spacing metric values.

https://doi.org/10.1371/journal.pone.0301842.g015

6.5 Discussion

Compared to the improvement algorithm proposed in [41] for the OLSR protocol, the above simulation additionally chooses two multi-objective optimization algorithms for comparison, and further increases the persuasiveness by evaluating the quality of the solution set through two metrics, HV and SP, in addition to the metrics used for evaluating the QoS. Compared with the improved algorithm of [42], this simulation adds end-to-end delay to the packet loss rate to compare the improvement effect of the routing protocol, and also proves the reliability of the experimental results by two kinds of non-parametric test.

7 Conclusion

This work has worked to provide an effective improvement to OLSR protocol, which integrated an improved mutation operator into NSGA-II framework and combined with the new MPR set selection mechanism. Through simulation and comparison experiments, it can be concluded that the proposed algorithm can effectively reduce the packet loss rate and end-to-end delay. At the same time, this algorithm outperforms other multi-objective optimization algorithms in terms of Pareto solution set evaluation metrics, and the data analysis results also show the superiority of the proposed algorithm. In future work, the multi-objective optimization algorithm will be further optimized in population selection and crossover. Moreover, the algorithm will be applied to more network simulation scenarios to verify its effectiveness.

Supporting information

S1 File. The packet format of OLSR protocol.

https://doi.org/10.1371/journal.pone.0301842.s001

(PDF)

References

  1. 1. Ramphull D, Mungur A, Armoogum S, et al. A review of mobile ad hoc network (MANET) Protocols and their Applications. 2021 5th international conference on intelligent computing and control systems (ICICCS). IEEE, 2021: 204–211.
  2. 2. Wei N, Walteros J L, Worden M K R, et al. A resiliency analysis of information distribution policies over mobile ad hoc networks. Optimization Letters, 2021, 15(4): 1081–1103.2.
  3. 3. Wang J X, Zhang J. New Method of Fuzzy Mutli-criteria Routing in Vehicle Ad-Hoc Network. IEEE Transactions on Computational Social Systems, 2022, 6:1–15.
  4. 4. Younis Z A, Abdulazeez A M, Zeebaree S R M, et al. Mobile Ad Hoc Network in Disaster Area Network Scenario: A Review on Routing Protocols. International Journal of Online & Biomedical Engineering, 2021, 17(3).
  5. 5. Zhang D G, Dong W M, Zhang T, et al. New computing tasks offloading method for MEC based on prospect theory framework. IEEE Transactions on Computational Social Systems, 2022, 12:1–13.
  6. 6. Thiagarajan R, Babu M R, Moorthi M. Quality of Service based Ad hoc On-demand Multipath Distance Vector Routing protocol in mobile ad hoc network. Journal of Ambient Intelligence and Humanized Computing, 2021, 12(5): 4957–4965.
  7. 7. Shantaf A M, Kurnaz S, Mohammed A H. Performance evaluation of three mobile ad-hoc network routing protocols in different environments. 2020 International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA). IEEE, 2020: 1–6.
  8. 8. Kumar A, Swaroop A. A Brief Study of Routing Protocols for Finding Efficient Path in MANETS. International Journal of Computer Science and Mobile Computing, 2020, 9(10): 117–120.
  9. 9. Zhang D G, Li G, Zheng K. An energy-balanced routing method based on forward-aware factor for Wireless Sensor Network. IEEE Transactions on Industrial Informatics, 2013,10(1):766–773.
  10. 10. Zhang D, Liu S, Zhang T, et al. Novel unequal clustering routing protocol considering energy balancing based on network partition & distance for mobile education. Journal of Network and Computer Applications, 2017, 88: 1–9.
  11. 11. Zhang D, Piao M, Zhang T, et al. New algorithm of multi-strategy channel allocation for edge computing. AEU-International Journal of Electronics and Communications, 2020, 126(11):1–15.
  12. 12. Zhang D, Zhou S, Tang Y. A low duty cycle efficient MAC protocol based on self-adaption and predictive strategy. Mobile Networks and Applications, 2018, 23: 828–839.
  13. 13. Zhang D, Zhu Y, Zhao C, et al. A new constructing approach for a weighted topology of wireless sensor networks based on local-world theory for the Internet of Things (IOT). Computers & Mathematics with Applications, 2012, 64(5): 1044–1055.
  14. 14. Chen L, Zhang D, Zhang J, et al. An approach of flow compensation incentive based on Q-learning strategy for IoT user privacy protection. AEU-International Journal of Electronics and Communications, 2022, 148: 154172.
  15. 15. Zhang D, Wang X, Song X, et al. A novel approach to mapped correlation of ID for RFID anti-collision. IEEE Transactions on Services Computing, 2014, 7(4): 741–748.
  16. 16. Zhang D, Ni C, Zhang J, et al. A novel edge computing architecture based on adaptive stratified sampling. Computer Communications, 2022, 183: 121–135.
  17. 17. Cui Y, Zhang D, Zhang T, et al. Novel method of mobile edge computation offloading based on evolutionary game strategy for IoT devices. AEU-International Journal of Electronics and Communications, 2020, 118: 153134.
  18. 18. Chen L, Zhang D G, Zhang J, et al. A novel offloading approach of IoT user perception task based on quantum behavior particle swarm optimization. Future Generation Computer Systems, 2023, 141: 577–594.
  19. 19. Zhang D, Zhang T, Liu X. Novel self-adaptive routing service algorithm for application in VANET. Applied Intelligence, 2019, 49: 1866–1879.
  20. 20. Rajeesh Kumar N V, Jaya Lakshmi N, Mallala B, et al. Secure trust aware multi-objective routing protocol based on battle competitive swarm optimization in IoT. Artificial Intelligence Review, 2023, 56: 1685–1709.
  21. 21. Arebi P. Improving AODV routing protocol using a multi-objective mechanism based on repairing broken links on the MANET networks. International Journal of Mobile Network Design and Innovation, 2024, 11(1): 27–38.
  22. 22. Bourebia N E H, Li C. A novel raccoon optimization algorithm with multi-objective clustering strategy based routing protocol for WSNs. Source: Peer-to-Peer Networking and Applications, 2023, 16(4): 1624–1640.
  23. 23. Zhang D, Cao L, Zhu H, et al. Task offloading method of edge computing in internet of vehicles based on deep reinforcement learning. Cluster Computing, 2022, 25(2): 1175–1187.
  24. 24. Degan Z, Shuo W, Jie Z, et al. A content distribution method of internet of vehicles based on edge cache and immune cloning strategy. Ad Hoc Networks, 2023, 138: 103012.
  25. 25. Chen J, Mao G, Li C, et al. Capacity of cooperative vehicular networks with infrastructure support: Multiuser case. IEEE Transactions on Vehicular Technology, 2017, 67(2): 1546–1560.
  26. 26. Zhang J, Piao M, Zhang D, et al. An approach of multi-objective computing task offloading scheduling based NSGS for IOV in 5G. Cluster Computing, 2022, 25(6): 4203–4219.
  27. 27. Zhang D G, Ni C H, Zhang J, et al. New method of vehicle cooperative communication based on fuzzy logic and signaling game strategy. Future Generation Computer Systems, 2023, 142(2023): 131–149.
  28. 28. Zhang D, Wang W, Zhang J, et al. Novel Edge Caching Approach Based on Multi-Agent Deep Reinforcement Learning for Internet of Vehicles. IEEE Transactions on Intelligent Transportation Systems, 2023, 24(6): 1–16.
  29. 29. Zhang D, Wang X, Zhang J, et al. Novel data return approach for internet of vehicles based on edge computing. Ad Hoc Networks, 2023, 138(2023): 1–12.
  30. 30. Zhang D, Ge H, Zhang T, et al. New multi-hop clustering algorithm for vehicular ad hoc networks. IEEE Transactions on Intelligent Transportation Systems, 2018, 20(4): 1517–1530.
  31. 31. Chen J, Mao G, Li C, et al. A topological approach to secure message dissemination in vehicular networks. IEEE Transactions on Intelligent Transportation Systems, 2019, 21(1): 135–148.
  32. 32. Zhang Z, De Luca G, Archambault B, et al. Traffic Dataset and Dynamic Routing Algorithm in Traffic Simulation. Journal of Artificial Intelligence and Technology, 2022, 2(3): 111–122.
  33. 33. Qiao S, Han N, Huang J, et al. A dynamic convolutional neural network based shared-bike demand forecasting model. ACM Transactions on Intelligent Systems and Technology (TIST), 2021, 12(6): 1–24.
  34. 34. Qiao S, Han N, Wang J, et al. Predicting long-term trajectories of connected vehicles via the prefix-projection technique. IEEE Transactions on Intelligent Transportation Systems, 2017, 19(7): 2305–2315.
  35. 35. Zhang D, Gong C, Zhang T, et al. A new algorithm of clustering AODV based on edge computing strategy in IOV. Wireless Networks, 2021, 27(4): 2891–2908.
  36. 36. Liu S, Zhang D, Liu X, et al. Adaptive repair algorithm for TORA routing protocol based on flood control strategy. Computer Communications, 2020, 151: 437–448.
  37. 37. Zhang D G, Chen L, Zhang J, et al. A multi-path routing protocol based on link lifetime and energy consumption prediction for mobile edge computing. IEEE Access, 2020, 8: 69058–69071.
  38. 38. Hooshmand M K, Hosahalli D. Network anomaly detection using deep learning techniques. CAAI Transactions on Intelligence Technology, 2022, 7(2): 228–243.
  39. 39. Zhang D G, Zhao P Z, Cui Y, et al. A new method of mobile ad hoc network routing based on greed forwarding improvement strategy. IEEE Access, 2019, 7: 158514–158524.
  40. 40. Liu S, Zhang D G, Liu X H, et al. Dynamic analysis for the average shortest path length of mobile ad hoc networks under random failure scenarios. IEEE Access, 2019, 7: 21343–21358.
  41. 41. Zhang D, Liu S, Liu X, et al. Novel dynamic source routing protocol (DSR) based on genetic algorithm‐bacterial foraging optimization (GA‐BFO). International Journal of Communication Systems, 2018, 31(18): e3824.
  42. 42. Zhang D, Cui Y, Zhang T. New quantum-genetic based OLSR protocol (QG-OLSR) for mobile ad hoc network. Applied Soft Computing, 2019, 80: 285–296.
  43. 43. Harrag N, Refoufi A, Harrag A. New NSGA-II-based OLSR self-organized routing protocol for mobile ad hoc networks. Journal of Ambient Intelligence and Humanized Computing, 2019, 10(4): 1339–1359.
  44. 44. Yang H, Pu C, Wu J, et al. Enhancing OLSR protocol in VANETs with multi-objective particle swarm optimization. Physica A: Statistical Mechanics and its Applications, 2023, 614: 128570.
  45. 45. Gunasekar M, Hinduja S J. Automatic tuning Of OLSR routing protocol using IWD in VANET. International Journal of Innovative Research in Computer and Communication Engineering, 2014, 2(1): 3455–3461.
  46. 46. Gautami R, Sedamkar R R, Patil H. Application of hybrid meta heuristic algorithm for OLSR protocol optimization in VANET. Int J Curr Eng Technol, 2016, 6(3): 755–759.
  47. 47. Joshua C J, Varadarajan V. An optimization framework for routing protocols in VANETs: a multi-objective firefly algorithm approach. Wireless Networks, 2021, 27(8): 5567–5576.
  48. 48. Wheeb A H, Al-Jamali N A S. Performance analysis of OLSR protocol in mobile ad hoc networks. iJIM, 2022, 16(01): 107.
  49. 49. Barki O, Guennoun Z, Addaim A. Improving the selection of MPRs in OLSR protocol: a survey of methods and techniques. International Journal of Electrical & Computer Engineering (2088–8708), 2020, 10(1).
  50. 50. Shihab M S M, Ibrahim A A, Shantaf A M. Evaluate the DSR and OLSR Routing Protocols in different scenarios under NS3 and SUMO Using the NETEDITOR in VANETs. 2020 4th International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT). IEEE, 2020: 1–5.
  51. 51. Gaikwad K S, Waykar S B. Detection and removal of node isolation attack in OLSR protocol using imaginary nodes with neighbour response in MANET[. 2017 International conference on computing, communication, control and automation (ICCUBEA). IEEE, 2017: 1–5.
  52. 52. Jain R, Kashyap I. An QoS aware link defined OLSR (LD-OLSR) routing protocol for MANETs. Wireless Personal Communications, 2019, 108(3): 1745–1758.
  53. 53. Usha M, Ramakrishnan B. Robust MPR: a novel algorithm for secure and efficient data transmission in VANET. Wireless Personal Communications, 2020, 110(1): 355–380.
  54. 54. Purnama I K E, Setijadi E, Purnomo M H. Minmax Algorithm for MPR Selection in Improving the Performance of OLSR Protocol on MANET. 2018 International Conference on Intelligent Autonomous Systems (ICoIAS). IEEE, 2018: 136–140.
  55. 55. Dong S, Zhang H. An MPR Set Selection Algorithm Based on Set Operation. 2021 IEEE 5th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC). IEEE, 2021, 5: 5–8.
  56. 56. Katoch S, Chauhan S S, Kumar V. A review on genetic algorithm: past, present, and future. Multimedia Tools and Applications, 2021, 80(5): 8091–8126. pmid:33162782
  57. 57. Malhotra R, Singh N, Singh Y. Genetic algorithms: Concepts, design for optimization of process controllers. Computer and information science, 2011, 4(2): 39.
  58. 58. Gunantara N. A review of multi-objective optimization: Methods and its applications. Cogent Engineering, 2018, 5(1): 1502242.Javed M A, Younis MS, Latif S. Community Detection in Networks: A Multidisciplinary Review. Computer Application. 2018, 108, 87–111.
  59. 59. Chen F, Dou R, Li M, et al. A flexible QoS-aware Web service composition method by multi-objective optimization in cloud manufacturing. Computers & Industrial Engineering, 2016, 99: 423–431.
  60. 60. Vikhar P A. Evolutionary algorithms: A critical review and its future prospects. 2016 International conference on global trends in signal processing, information computing and communication (ICGTSPICC). IEEE, 2016: 261–265.
  61. 61. Zhang K, Shen C, Liu X, et al. Multi-Objective Evolution Strategy for Dynamic Multi-objective Optimization. IEEE Transactions on Evolutionary Computation, 2020, PP(99):1–1.
  62. 62. Hiyama M, Sakamoto S, Kulla E, et al. Experimental results of a MANET testbed for different settings of HELLO packets of OLSR protocol. Journal of Mobile Multimedia, 2013: 027–038–027–038.
  63. 63. Chauhan R, Goyal N, Kumar R. A review on tuning of OLSR routing protocol in VANET. International Journal of Advanced Research and Innovative Ideas in Education, 2016, 2(2): 508–512.
  64. 64. Arora D, Millman E, Neville S W. Analyzing non-equilibrium statistical behaviors within the OLSR MANET routing protocol. 2013 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM). IEEE, 2013: 282–287.
  65. 65. Budiman E, Wicaksono O. Measuring quality of service for mobile internet services. 2016 2nd International Conference on Science in Information Technology (ICSITech). IEEE, 2016: 300–305.
  66. 66. Wu H, Wei W, Li Q. Improved AODV Routing Protocol Based on Multi-objective Simulated Annealing Algorithm. International Conference on Bio-Inspired Computing: Theories and Applications. Springer, Singapore, 2021: 28–42.
  67. 67. Guerreiro A P, Fonseca C M, Paquete L. The hypervolume indicator: Problems and algorithms. arXiv preprint arXiv:2005.00515, 2020.
  68. 68. Shang K, Ishibuchi H, He L, et al. A survey on the hypervolume indicator in evolutionary multiobjective optimization. IEEE Transactions on Evolutionary Computation, 2020, 25(1): 1–20.
  69. 69. Ishibuchi H, Imada R, Setoguchi Y, et al. How to specify a reference point in hypervolume calculation for fair performance comparison. Evolutionary computation, 2018, 26(3): 411–440. pmid:29786458
  70. 70. Audet C, Bigeon J, Cartier D, et al. Performance indicators in multiobjective optimization. European journal of operational research, 2021, 292(2): 397–422.
  71. 71. Oyeka I C A, Ebuh G U. Modified Wilcoxon signed-rank test. Open Journal of Statistics, 2012, 2(2): 172–176.
  72. 72. Picek S, Golub M, Jakobovic D. Evaluation of crossover operator performance in genetic algorithms with binary representation. International Conference on Intelligent Computing. Springer, Berlin, Heidelberg, 2011: 223–230.