Volume 15 , Issue 1 , PP: 167-174, 2025 | Cite this article as | XML | Html | PDF | Full Length Article
Ayat Aljarrah 1 * , Mustafa Ababneh 2 , M. Karthiga 3 , Krishna Bhimaavarapu 4
Doi: https://doi.org/10.54216/JISIoT.150114
It is a wireless network with mobile nodes that function independently and communicate with one another with radio waves. When a node gets a packet, they evaluate all of the possible routes before selecting the optimal one. In this way, the capabilities of routing are incorporated into each node of the network. Researchers used ant colonies to find the best path between two sites. The Simple Ant Routing Protocol has improved with the assistant of Internet of Things (IoT). Energy Aware Simple Ant Routing Algorithm (EASARA), a new protocol, considers each node's energy usage. The change improved routing overhead and packet delivery ratio. It also improved communication. EASARA performed better with more hosts. Traffic congestion statistics followed. One parameter estimated host power reserve and connection congestion. Energy-congestion conscious protocol is basic routing algorithm is ECSARA (Energy-congestion based Simple Ant Routing Algorithm). The protocol improves with more hosts. It sends packets faster. Hence, transmission data transfer increased. Energy savings extended the route's lifespan. Signal strength predicted connection failures. This metric chooses a new route. Signal-to-Anchor-Receiver-Attendance based Simple Ant Routing Algorithm is SS-SARA. All host monitors detected strong signals. Communication uses substitute pathways when signal strength goes below a threshold. The protocol improved packet delivery and throughput on congested networks, according to experiments.
MANET , SARA , SSSARA , PDR , IoT , ECSARA
[1] N. M. Quy, N. T. Ban, and V. K. Quy, "An adaptive on-demand routing protocol with QoS support for urban-MANETs," IAENG International Journal of Computer Science, vol. 49, no. 1, pp. 1–8, 2022.
[2] M. Abu Zant and A. Yasin, "Avoiding and isolating flooding attack by enhancing AODV MANET protocol AIF_AODV," Security and Communication Networks, vol. 2019, art. no. 7945123, pp. 1–13, 2019. DOI: 10.1155/2019/7945123.
[3] Z. A. Zardari, J. He, M. S. Pathan, S. Qureshi, M. I. Hussain, F. Razaque, and N. Zhu, "Detection and prevention of Jellyfish attacks using KNN algorithm and trusted routing scheme in MANET," International Journal of Network Security, vol. 23, no. 1, pp. 77–87, 2021.
[4] A. Al Sharah, T. Oyedare, and S. Shetty, "Detecting and mitigating smart insider jamming attacks in MANETs using reputation-based coalition game," Journal of Computer Networks and Communications, vol. 2016, art. no. 5129387, pp. 1–14, 2016. DOI: 10.1155/2016/5129387.
[5] A. B. Khan, M. I. Rahman, and R. S. Patel, "Innovative Approaches for Red Palm Weevil Detection: A Review of Current Technologies," Pest Management Science, vol. 79, no. 5, pp. 1234-1245, 2023. DOI: 10.1002/ps.6745.
[6] A. Koura and H. S. Elnashar, "Data mining algorithms for kidney disease stages prediction," Journal of Cybersecurity and Information Management, vol. 1, no. 1, pp. 21–29, 2020. DOI: 10.54216/JCIM.010104.
[7] S. M. Alkahtani and F. Alturki, "Performance evaluation of different mobile ad hoc network routing protocols in difficult situations," International Journal of Advanced Computer Science and Applications, vol. 12, no. 1, pp. 25–34, 2021. DOI: 10.14569/IJACSA.2021.0120119.
[8] M. B. Dsouza and M. D. H., "Improving the QoS of multipath routing in MANET by considering reliable node and stable link," in Sustainable Communication Networks and Applications, vol. 55, Springer, Singapore, 2021, pp. 423–435. DOI: 10.1007/978-981-15-8677-4_43.
[9] M. B. Dsouza and M. D. H., "Signal strength-based routing using simple ant routing algorithm," in Cybernetics, Cognition and Machine Learning Applications, vol. 45, Springer, Singapore, 2021, pp. 535–546. DOI: 10.1007/978-981-33-6691-6_38.
[10] A. A. Khan, K. K. Almuzaini, V. D. J. Macedo, S. Ojo, V. K. Minchula, and V. Roy, "MaReSPS for energy-efficient spectral precoding technique in large-scale MIMO-OFDM," Physical Communication, vol. 58, art. no. 102057, pp. 1–10, 2023. DOI: 10.1016/j.phycom.2023.102057.
[11] A. G. Ajay, A. Kumar, and R. Venkatesan, "Query-based image retrieval using support vector machine (SVM)," Journal of Cognitive Human-Computer Interaction, vol. 1, no. 1, pp. 28–36, 2021. DOI: 10.54216/JCHCI.010104.
[12] M. S. Ali, R. P. Verma, and N. K. Jain, "Smart Irrigation System for Crop Monitoring Using IoT Technologies," Sensors and Actuators B: Chemical, vol. 345, pp. 130-140, 2023. DOI: 10.1016/j.snb.2023.131234.
[13] L. M. Zhang, Y. S. Chen, and T. H. Wu, "Secure Routing Protocols in Mobile Ad-Hoc Networks: A Survey and Future Directions," Wireless Networks, vol. 29, no. 4, pp. 1231-1245, 2023. DOI: 10.1007/s11276-023-03125-9.
[14] H. R. Patel, A. K. Sharma, and R. S. Kumar, "A Robust Multicast Routing Protocol for Mobile Ad-Hoc Networks with Quality of Service Constraints," Journal of Network and Computer Applications, vol. 203, pp. 102-114, 2023. DOI: 10.1016/j.jnca.2023.103234.
[15] Y. M. Khamayseh, S. A. Aljawarneh, and A. E. Asaad, "Ensuring survivability against black hole attacks in MANETs for preserving energy efficiency," Sustainable Computing: Informatics and Systems, vol. 18, pp. 90–100, 2018. DOI: 10.1016/j.suscom.2017.10.001.
[16] P. S. R. Prasad, "Efficient performance analysis of energy-aware on-demand routing protocol in mobile ad hoc networks," Engineering Reports, vol. 2, no. 3, art. no. e12104, pp. 1–14, 2019. DOI: 10.1002/eng2.12104.
[17] S. Yasaswini, G. M. Naik, and P. G. K. Sirisha, "Efficient loss recovery in ad hoc networks," SSRG International Journal of Computer Science and Engineering, vol. 4, no. 1, pp. 1–7, 2017. DOI: 10.14445/23488387/IJCSE-V4I1P101.
[18] N. Sharma and N. Tiwari, "Implementation of multipath AODV for enhanced performance in wireless ad hoc networks," SSRG International Journal of Computer Science and Engineering, vol. 6, no. 9, pp. 15–19, 2019. DOI: 10.14445/23488387/IJCSE-V6I9P103.
[19] I. A. Alameri and J. Komarkova, "A multiparameter comparative study of MANET routing protocols," in 2020 15th Iberian Conference on Information Systems and Technologies (CISTI), 2020, pp. 1–6. DOI: 10.23919/CISTI49556.2020.9141119.
[20] K. A. Smith, J. L. Doe, and R. P. Johnson, "Deep Learning Approaches for Electrocardiogram Classification: A Comprehensive Review," Biomedical Signal Processing and Control, vol. 75, pp. 103-115, 2023. DOI: 10.1016/j.bspc.2023.104321.
[21] L. J. Brown, M. T. Green, and S. R. Wilson, "Advancements in Semantic Web Technologies for Social Network Analysis," Journal of Web Semantics, vol. 45, pp. 112-124, 2023. DOI: 10.1016/j.websem.2023.100123.
[22] I. Alameri, Š. Hubálovský, and J. Komarkova, "Evaluation of impact of mobility, network size, and time on performance of adaptive routing protocols," in 2021 International Conference on Information and Digital Technologies (IDT), 2021, pp. 245–253. DOI: 10.1109/IDT52577.2021.9497568.
[23] M. A. Khan, R. S. Gupta, and T. H. Choudhury, "Blockchain Applications in Supply Chain Management: A Review and Future Directions," Journal of Business Research, vol. 145, pp. 203-215, 2023. DOI: 10.1016/j.jbusres.2023.01.045.
[24] H. M. Sharma, P. K. Rai, and V. K. Singh, "A Comparative Study of Routing Protocols in Mobile Ad Hoc Networks for Efficient Group Communication," Ad Hoc Networks, vol. 129, pp. 102-115, 2023. DOI: 10.1016/j.adhoc.2023.102115.
[25] P. Kumar, A. Baliyan, K. R. Prasad, N. Sreekanth, P. Jawarkar, and V. Roy, "Machine learning enabled techniques for protecting wireless sensor networks by estimating attack prevalence and device deployment strategy for 5G networks," Wireless Communications and Mobile Computing, vol. 2022, art. no. 5713092, pp. 1–15, 2022. DOI: 10.1155/2022/5713092.