ALOE: autonomic locating of obstructing entities in MANETs

  • Mohamed Belhassen
  • Amine Dhraief
  • Abdelfettah Belghith
  • Hassan Mathkour
Original Research


The presence of communication obstructing entities severely degrades the routing efficiency in Mobile Ad hoc Networks (MANET). While several routing protocols have proposed ways to mitigate this degradation essentially by getting around and avoiding obstacles, the detection of obstacle locations and their contours driven by the very signaling of the underlying routing protocol has not been given that much attention. Yet, the integration of such a capability within the routing protocol presents an adequate leverage of the routing efficiency. In this paper, we first propose a distributed autonomic scheme to locate obstructing entities (coined ALOE) within a MANET using the basic signaling of the Cartography Enhanced Optimized Link State routing (CE-OLSR) protocol. Then, we propose ALOE-CE-OLSR the integration of ALOE within CE-OLSR, and show the resulting improvement in routing validity as compared to that of both CE-OLSR with and without a priori knowledge of the obstructing entities map. While the routing validity measures the pertinence of the routes computed by the underlying routing protocol, two new metrics, namely the coverage and the precision ratios, are defined to properly evaluate the efficiency and performance of our proposed detection scheme, in addition to the throughput as well as the end-to-end delay of received data packets. Simulation results show that our proposed CE-OLSR signaling-based obstacle detection scheme accurately localizes and detects the boundaries of the stationary obstructing obstacles. The integrated ALOE-CE-OLSR achieves the same route validity, throughput and delay as CE-OLSR with a priori precise knowledge of the obstacles map.


Multiple obstructing entities Contour detection MANETs Routing improvement 


  1. Abid MA, Belghith A (2011) Stability routing with constrained path length for improved routability in dynamic manets. Pers Ubiquitous Comput 15(8):799–810 (Springer)CrossRefGoogle Scholar
  2. Arboleda C, Pena-Mora F, Liu L, Tsai M (2008) A preliminary design of disaster-survivable building blackbox system for urban disaster response. J Inf Technol Constr 13:179–192Google Scholar
  3. Belghith A, Abid MA (2009) Autonomic self tunable proactive routing in mobile ad hoc networks. In: IEEE international conference on wireless and mobile computing, networking and communications, WIMOB’09, IEEE, pp 276–281Google Scholar
  4. Belghith A, Belhassen M (2012) Ce-olsr: a cartography and stability enhanced olsr for dynamic manets. Trans Internet Inf Syst KSII 6(1):290–306Google Scholar
  5. Belghith A, Belhassen M, Dhraief A, Dougui NE, Mathkour H (2015) Autonomic obstacle detection and avoidance in manets driven by cartography enhanced olsr. Mobile Inf Syst 2015. CrossRefGoogle Scholar
  6. Belhassen M, Belghith A, Abid MA (2011) Performance evaluation of a cartography enhanced olsr for mobile multi hop ad hoc networks. In: Wireless advanced (WiAd11), pp 149–155.
  7. Bonin-Font F, Ortiz A, Oliver G (2008) Visual navigation for mobile robots: a survey. J Intell Robot Syst 53:263–296. CrossRefGoogle Scholar
  8. Bose P, Morin P, Stojmenovi I, Urrutia J (2001) Routing with guaranteed delivery in ad hoc wireless networks. In: WIRELESS NETWORKS, pp 609–616Google Scholar
  9. Camp T, Boleng J, Davies V (2002) A survey of mobility models for ad hoc network research. Wirel Commun Mobile Comput 2:483–502 (Special Issue on Mobile ad hoc networking: research, trends and applications)CrossRefGoogle Scholar
  10. Chang C, Chang Y, Chen Y, Lee S (2010) Active route-guiding protocols for resisting obstacles in wireless sensor networks. Veh Technol IEEE Trans 59(9):4425–4442. CrossRefGoogle Scholar
  11. Chu W, Ssu K (2012) Decentralized boundary detection without location information in wireless sensor networks. In: Wireless communications and networking conference (WCNC), 2012 IEEE, pp 1720–1724,
  12. Clausen T, Jacquet P (2003) Optimized link state routing protocol (olsr). In: EXPERIMENTAL RFC 3626Google Scholar
  13. Cormen TH, Leiserson CE, Rivest RL, Stein C (2001) Introduction to algorithms, 2nd edn. MIT Press, McGraw-Hill (dijkstra’s algorithm: pages 595601)zbMATHGoogle Scholar
  14. Das S, Banerjee I, Samanta T (2013) Sensor localization and obstacle boundary detection algorithm in wsn. In: Advances in computing and communications (ICACC), 2013 third international conference on, pp 412–415,
  15. Dong D, Liu Y, Liao X (2009) Fine-grained boundary recognition in wireless ad hoc and sensor networks by topological methods. In: Proceedings of the tenth ACM international symposium on mobile ad hoc networking and computing, ACM, New York, NY, USA, MobiHoc ’09, pp 135–144.
  16. Fang Q, Gao J, Guibas L (2006) Locating and bypassing holes in sensor networks. Mobile Netw Appl 11(2):187–200. CrossRefGoogle Scholar
  17. Funke S, Klein C (2006) Hole detection or: “how much geometry hides in connectivity?”. In: Proceedings of the twenty-second annual symposium on computational geometry, ACM, New York, NY, USA, SCG ’06, pp 377–385.
  18. Ho Y, Ho A, Hua K (2008) Routing protocols for inter-vehicular networks: a comparative study in high-mobility and large obstacles environments. Comput Commun 31(12):2767–2780. CrossRefGoogle Scholar
  19. Jarvis RA (1973) On the identification of the convex hull of a finite set of points in the plane. Inf Process Lett 2(1):18–21. CrossRefzbMATHGoogle Scholar
  20. Karp B, Kung H (2000) GPSR: Greedy perimeter stateless routing for wireless networks. In: Proceedings of the sixth annual ACM/IEEE international conference on mobile computing and networking (MobiCom’00), Boston, Massachusetts, pp 243–254Google Scholar
  21. Na J, Kim C (2006) Glr: a novel geographic routing scheme for large wireless ad hoc networks. Comput Netw 50(17):3434–3448. CrossRefzbMATHGoogle Scholar
  22. Ohya A, Kosaka A, Kak A (1998) Vision-based navigation by a mobile robot with obstacle avoidance using single-camera vision and ultrasonic sensing. Robot Autom IEEE Trans 14(6):969–978. CrossRefGoogle Scholar
  23. Pandey A, Thalore R (2017) Performance comparison of AODV and DYMO routing protocols for boundary detection in 3D wireless sensor networks. Int J Adv Res Ideas Innov Technol 3(3):429–436Google Scholar
  24. Park JS, Oh SJ (2013) A new concave hull algorithm and concaveness measure for n-dimensional datasets. J Inf Sci Eng 29(2):379–392MathSciNetGoogle Scholar
  25. Qian Z, Liu H, Zuo D, Yang X (2013) Grid: a geographic routing with identified void in ad hoc and sensor networks. J Inf Comput Sci 10(14):4367–4376CrossRefGoogle Scholar
  26. Rajabhushanam DC, Kathirvel DA (2011) Survey of wireless manet application in battlefield operations. Int J Adv Comput Sci Appl 2(1):50–58. CrossRefGoogle Scholar
  27. Saukh O, Sauter R, Gauger M, Marrón PJ (2010) On boundary recognition without location information in wireless sensor networks. ACM Trans Sens Netw 6(3):20:1–20:35. CrossRefGoogle Scholar
  28. Singh S, Agrawal S (2014) Vanet routing protocols: issues and challenges. In: 2014 recent advances in Engineering and computational sciences (RAECS),, pp 1–5.
  29. Wang W, Wang J, Wang M, Wang B, Zhang W (2017) A realistic mobility model with irregular obstacle constraints for mobile ad hoc networks. Wirel Netw.
  30. Yu Q, Arajo H, Wang H (2005) A stereovision method for obstacle detection and tracking in non-flat urban environments. Auton Robots 19(2):141–157. CrossRefGoogle Scholar

Copyright information

© Springer-Verlag GmbH Germany, part of Springer Nature 2018

Authors and Affiliations

  1. 1.HANA Research laboratoryUniversity of ManoubaManoubaTunisia
  2. 2.College of Computer and Information SciencesKind Saud UniversityRiyadhSaudi Arabia

Personalised recommendations