0% found this document useful (0 votes)
48 views9 pages

Novel Beam Sector Antenna-Based Routing Protocol For MANET Hidden and Exposed Terminal Problem

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views9 pages

Novel Beam Sector Antenna-Based Routing Protocol For MANET Hidden and Exposed Terminal Problem

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

International Journal of Engineering Trends and Technology Volume 72 Issue 4, 23-31, April 2024

ISSN: 2231–5381 / https://doi.org/10.14445/22315381/IJETT-V72I4P103 © 2024 Seventh Sense Research Group®

Original Article

Novel Beam Sector Antenna-Based Routing Protocol for


MANET Hidden and Exposed Terminal Problem
S. Hemalatha1, Raghunath Mandipudi2, M. Arul Joseph Amalraj3, Venkata Rao Tavanam4,
Bhagavan Konduri5, Geeta T. Desai6, Chitra Devi D7, Thiyagesan M8
1
Department of Computer Science and Business Systems, Panimalar Engineering College, Chennai, Tamil Nadu, India.
2
Department of Electronics & Communication Engineering, Aditya College of Engineering, Surampalem, Andhra Pradesh, India.
3
Department of Chemistry, Veltech Multitech Dr Rangarajan Dr Sakunthala Engineering College, Chennai, Tamil Nadu, India.
4
Department of Electronics and Communication Engineering, Sreenidhi Institute of Science and Technology, Hyderabad, India.
5
Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram, Andhra Pradesh,
India.
6
Department of Electronic and Computer Science, AIKTC, Panvel, Maharashtra, India.
7
Department of Computer Science and Engineering, S.A.Engineering College, Chennai, Tamil Nadu, India.
8
Department of Electrical and Electronics Engineering, RMK Engineering College, Kavaraipettai, Tamil Nadu, India.
1Corresponding Author : [email protected]

Received: 18 November 2023 Revised: 20 February 2024 Accepted: 01 April 2024 Published: 24 April 2024

Abstract - Mobile ad hoc networks are the most widespread self-organizing and readily constructed networks for quick
communication in emergency circumstances. Addressing the Hidden and Exposed node terminals in a Mobile Ad hoc Network
reduces network performance. Several research projects have been proposed by incorporating the Directional antenna within
the MAC layer capabilities can help with the concealed and exposed nodes problem. Initially, the Omni antenna was utilized in
MANET for transmission; however, it was unable to accommodate extensive range, power optimization, or interference. This
research paper explores the use of beam sector directional antennas in physical and routing protocols to address hidden and
exposed node concerns in the MAC layer. This study introduced a unique routing strategy that addresses hidden and exposed
nodes by creating a route table based on the beam sector antenna orientation. This proposed antenna is divided into eight sectors
based on the location of the neighbor node, and the respective sector transmitter or receiver will transmit or receive the packet.
This antenna also determines the receiver direction based on the location of the next hope received and focuses the packet
floating. This technique supports the Hidden and Exposed node problem in MANET while also improving routing efficiency and
power optimization. This study was simulated using Network simulation, and the results showed a 25% to 35% improvement in
total MANET Network performance, a 30% to 40% increase in metric value, and an overall antenna gain of 18.5 dBi in the
beam sector antenna.

Keywords - MANET, Antenna, Physical Layer, Routing protocol, MAC layer, Hidden and Exposed Terminal (HET) problem.

1. Introduction battery performance and lower energy consumption [6], as


One of the challenging tasks of the Mobile Ad hoc packet route selection is part of power transfer with the
Network (MANET) [1] is the packet mission. In the MANET topological ordering of MANET nodes used to select routing.
protocol stack, packets flow into many forms to reach the
destination. Right from the network layer routing process, the To handle battery power management, multiple MANET
data link layer makes the packet of data and the physical layer protocols [7] and numerous new categories of routing
involved in the transmission. Packet transmission is one of the protocols [8] [9] are proposed. Several research articles have
biggest challenging tasks in MANET communication [2]. recently been published to improve the performance of the
Thwart the hidden and exposed nodes [3] and collision AODV protocol, including AOMDV [10], SQR-AODV [11],
avoidance [4] are the few. Many research works were invented AODV-BR [12], AODV-RD [13], AODV-BR [14],
for reliable packet transmission with the support of the best ATOMDV [15], and AMORLM [16], which are supports for
routing protocol [5], modifying data link layer functionality, increasing battery life. MANET parameters, such as
and better usage of smart antennas. Traditional routing minimizing MANET overhead to support better power
approaches use the routing protocol to enhance MANET management, are also regarded as important factors in

This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)


S. Hemalatha et al. / IJETT, 72(4), 23-31, 2024

reducing battery power consumption; many optimization 2. Literature Survey


strategies are based on this goal. In the data link layer, several The authors of Rao et al. [30] proposed the new energy-
solution classes have been proposed to handle the Hidden and based route calculation protocol using an optimized genetic
Exposed nodes problem in wireless networks as a result of algorithm named GA-AOMDV, the method of choosing the
mobility changes. The major recommended solution for optimal path from the numerous paths in accordance with
solving hidden and exposed nodes is launching MAC layer shortest distance, less congestion, and minimal consumption
protocols. A group of authors proposed protocols for the of energy. However all the parameter estimation for finding
Medium Access Layer, such as NULLMAC protocol [17], the optimal route is cumbersome and overloaded to the source
RDBTMA protocol [18], WiCCP protocol [2], WiMARK node.
protocol [19], CAD-CW protocol [20], and CFC-MAC
protocol [21], in which each protocol does not achieve all Authors of Harihara Gopalan et al. [31] propose an
performance parameters and lags on some others. algorithm for routing and finding the optimal path for data
acceleration from the source node named Fuzzified Particle
Conventionally, the antenna was used within MAC Swarm Optimization oriented Routing (FPSOR) algorithm to
protocol through the Distribution Coordination Function in reduce the overhead and data loss in MANET. This algorithm
IEEE 802.11 named CSMA/CA, along handshaking uses the Fuzzified method to find out the fresh route for
technique. Recently, these antennas have been overcome by finding the best route but to find the fresh path, this algorithm
smart antennas [22] due to providing more number of nodes needs to work on energy consumption, which is not perfectly
connectivity and gaining power; some kind of antenna predictable in all the nodes.
support interference [9], long transmission range [24] and
transmission capacity [25]. Mahmud et al. [26] proposed GPS- Ryu et al. [32] proposed the reputation-based routing
based MAC-designed directional antennas for defending protocol based on Q-Learning, which uses reinforcement
hidden and exposed terminal problems. learning in game theory. Finding the reputation nodes process,
which excludes the attackers and intruders nodes, simulation
Wang et al. [27] invented the CMDMAC protocol to research of the proposed routing protocol overcomes the black
resolve the MANET Hidden and Exposed node problem with hole attack scenario and the gray hole attack. It produces a
the corporative directional antenna, and Kulcu et al. [22] better packet loss ratio, end-to-end delay computation, and
proposed the smart antenna using the IETF 6TiSCH protocol energy efficiency. However the adaptation of Game theory
for MAC layer scheduling mechanism to overcome hidden and Reinforcement learning methods into Q-Learning is
and exposed node issue. Vigneshwaran et al. [7] invented the needed a trained data set, and a new attacker node could not
sector-based direction antenna by dividing geographical be predicted.
locations into sectors and proposed the sector-based
antenna. Periyakaruppan [8] uses the MIMO link to propose To address the issue of exposed nodes in MANETs, the
the COASC strategy to overcome the MAC layer problem authors of Sivaram et al. [18] suggested the RDBTMA
with the support of scheduling in Physical layer network protocol, which operates on RTS/CTS and busy tone signals.
capacity. Furthermore, fast transmission is supported by NACK signals,
and simulation results reveal that when compared to the
Several methods have been implemented to give solutions present protocol, this study effort reached just the PDR
to the MANET challenges with the support of the routing (17.8%), packet delay was 38%, and throughput was 21.9%.
protocol, MAC layer operation, Hidden and exposed terminal The packet loss rate was 14.9%. The authors Liu Kai et al. [21]
problems and antenna usages. However, none of the methods suggested the ETF MAC protocol with a new multichannel
has proposed one technique to cover all the challenges. This MAC to address the exposed terminal problem. Along with
article proposes a routing technique with the antenna sector RTS/CTS discourse for channel allocation, conflict-free
direction with the support of the MANET challenges of best traffic channel work is performed; this work avoids packet
routing protocol can get along with MAC layer improvement, collision. The simulation results are compared with the CAM-
Hidden and exposed nodes solution, and better antenna MAC protocol using only a few performance variables, such
usages. The antenna is divided into eight sectors; each as packet drop rate, delay, and channel utilization, to
direction is fixed to the neighbour node transmission, and the determine the best. Viral et al. [2] conducted a collection of
routing protocol route selection is based on the beam direction studies on hidden node issues and their solutions. This article
defined for each node. This kind of routing protocol could projected the virtual Jamming issues and RTS/CTS for
solve physical, MAC layer and Network layer challenges. The creating JAM in wireless networks and also addresses WiCCP
organization of this article starts with a discussion of the protocol to resolve the hidden node issues and other
literature survey in Chapter 2, the proposed method of antenna techniques usages such as Omni directional antenna, increase
mechanism, design and routing stages in Chapter 3, followed transmission time, software enhancement is supported for
by research methods and result discussion in Chapter 4, and improving Hidden and exposed node problem, but software
finally ending with conclusion and feature work in Chapter 5. updates are not precise.

24
S. Hemalatha et al. / IJETT, 72(4), 23-31, 2024

Mekala et al. [33] presented the MAC protocol, which is receiving antenna is assigned to the neighbor nodes’
implemented with Sensor and directional antenna support, in transmission based on the hidden and exposed nodes. The
this research to improve the performance of wireless sensor routing is determined based on the direction assigned by the
networks. The MAC protocol, with the help of a directional antenna.
antenna, helps to overcome the hidden and exposed node
problem, and the research simulation results generate a 3. Antenna Array Mechanism
multihop that is reduced across long distances and is energy The objective of this article is to invent the routing
optimized. protocol based on the antenna beam direction, which
addresses the MAC layer issues of Hidden and Exposed nodes
Z. Wei et al. [34] proposed gossip-based neighbor node problem and better antenna usage, finally achieving power
discovery in VANET by deploying numerous sensors on the optimizations.
roadside and receiving information via GSIM-ND multipacket
reception. Simulation results were compared to other existing 3.1. Antenna Array
CRA and SBA algorithms. The convergence time is reduced The design of the antenna array is divided into eight
by 40 to 90% when the number of modulation modes k is set sectors; each sector could transmit 45° in direction as given in
to 1. When the number of modulation modes is changed, the Figure 1. Each beam sector antenna has a transmitter and
outcome fails to improve convergence time. This approach receiver, as shown in Figure 2. The direction of the
works well when the derivation of a neighbor node can be transmission determines the functionality of the beam sector
completed within the time constraints. Zhiqing Wei et al. [23] antenna and the table was created based on the neighbor node
discovered a strategy for lowering convergence time with direction.
prior knowledge of neighbor node information for 6 th
generation mobile nodes. They proposed incorporating the
gossip mechanism into the ISAC-enabled ND algorithm.
When compared to Q-learning-based mechanisms, simulation
of the proposed work lowered convergence time significantly,
even when used to reinforce learning. The ND Algorithm, as
well as ISAC techniques, is not required for MANET
operation.

Liang et al. [28] found neighbor node detection in


FANET to solve multiple channels accessing problems. They
present two algorithms, BR-DA and BR-DA-FANET, as well
as two protocols, ND-LP and ACI-LP, for beam tracking and
channel enabling. All of this comes together to produce the
FA-MMAC-DA protocol for ND discovery and interruption
avoidance. When compared to the previous ND protocol, the
simulation of our protocol results in less delay. However, this
method fails to detect the rapid finding of ND and Fig. 1 Antenna model
transmission delay. Trung Kien Vu and Sungoh Kwon [29]
offer a location aware on demand routing system for mobile
nodes notwithstanding the presence of node location error.
They employed the Kalam filter to determine the actual node
location, and the simulation results improved on prior work.
However, the poor location information about the nodes,
which caused incorrect routing, also reduced MANET
performance.

From the literature survey, many researchers invented


different solutions for the invention of routing protocol,
hidden and exposed nodes challenges, and usage of antenna
design. All the research work addresses the specific issues, not
concentrating on all the challenges. This article proposed a
new routing protocol to overcome the beam allocation in the
antenna, MAC layer operations, Hidden and Exposed nodes
issues and power optimization. The proposed work antenna is
divided into eight sectors; each sector transmission and Fig. 2 Node antenna setting

25
S. Hemalatha et al. / IJETT, 72(4), 23-31, 2024

3.2. Antenna Design Weight 3.4. Beam Sector Routing Protocol


Designing the antenna transmission and receiving signal This article proposed a novel routing protocol called bam
is done with the support of the neighbor node direction. The sector routing protocol, which is a collaborative routing
antenna design of the receiving signal and transmission signal protocol based on demand. Every node has the beam sector
output is estimated by using the weight of each beam sector. direction of the other node’s transmission, which has
Let S(t) power signal sent from an antenna transmission signal transmission free from the hidden and elimination
weight for each antenna sector wRi, where 1 ≤ i ≤ 8. The direction. The beam sector routing protocol works as follows.
received signal of the ith antenna is estimated using Equation Step 1: Source node sends the RREQ signal to all the
(1), and the received signal output is estimated using Equation neighbor nodes about the route path needed for the
(2). destination.
𝑥𝑖(𝑡) = 𝑠(𝑡) ∑𝑁 𝑗=1 𝑤𝑇𝑗 ℎ𝑗𝑖 (1) Step 2: All the intermediate nodes flood the RREQ to the
𝑁 next neighbor by using the assigned path to reach the
destination.
𝑅𝑒𝑐𝑒𝑖𝑣𝑒𝑑 𝑠𝑖𝑔𝑛𝑎𝑙 𝑜𝑢𝑡𝑝𝑢𝑡 𝑜𝑓 𝑟(𝑡) = ∑ 𝑊𝑟𝑖𝑋𝑖(𝑡) (2)
Step 3: Shortest path is determined as per the Ad hoc on-
𝑖=1
Demand Vector protocol (AODV).
Step 4: Source nodes send the packets
3.3. Design the Antenna Sector Beam for Neighboring
Step 5: Destination node sends the acknowledgement back.
Nodes
To design the beam sector transmission for the MANET
nodes, Let the MANET Nodes N = {n 1, n2, n3...nn}, n is the 4. Simulation Results and Discussion
maximum number of nodes; the algorithm I for designing the In this section the proposed beam sector routing protocol
MANET antenna transmission and receiving sector as has been implemented in AODV protocol using the Network
follows. Simulator NS2.32, where the simulation parameters are
defined in the TABLE II as named as BSR-AODV protocol.
Algorithm I to determine the antenna sector beam for Three different antennas are considered for the results to work
neighbor nodes comparison. Beam sector antenna adopted with normal
Step 1: Generate the beacon signal and receive the location AODV protocol called (N- AODV), Hidden and Exposed
of the neighbor nodes in the region. work in MAC layer with AODV called HE-AODV Power-
Step 2: For each node, find out the hidden and exposed related parameters like signal power and energy consumption
nodes. are taken for comparison, antenna-related parameters like
Step 3: Start assigning the beam sector to the neighbor node collision and transmission speed, efficiency are considered for
For each node Ni, neighbor node ne1, ne2, ne3...nen the comparison and finally packet related parameters End to
For each beam sector, if the nei is not having the End delay, packet delivery ratio are considered for the
hidden and exposed nodes in this direction, then comparison. Initially, 50 nodes are defined for taking the
assign the beam sector to the nei. comparison, and 5 counts increase every 10 ms the node count
Otherwise, check another sector. to reach the maximum 95 nodes.
Repeat all the nodes.
Table 1. Simulation value
To understand the beam sector direction allocation, for all
illustrations from Figure 3, and beam sector allocation as S.No Parameter Value set
shown for node A given in TABLE I. The beam sector 1 PHY DSSS
assigned was A1 beam for B7, A2 beam for I7, A3 beam for 2 CWmin 32 bit
K7, A4 beam for K8. 3 CWmax 1024 bit
4 Channel Data Rate 11Mbps
5 Basic Data Rate 1Mbps
6 SIFS 15 µs
7 DIFS 45 µs
8 Slot time 15 µs
9 Propagation delay 1 µs
10 Packet Payload 10000bits
11 MAC Header 200 bits
12 PHY Header 150bits
13 ACK 250 bits
14 RTS 250 bits
15 CTS 250 bits
16 Hidden signal 250 bits
Fig. 3 Node beam antenna selections 17 Exposed Signal 250 bits

26
S. Hemalatha et al. / IJETT, 72(4), 23-31, 2024

Signal Power
0.008
0.007
0.006
0.005
BSR-AODV
Signal

0.004
N-AODV
0.003
HE-AODV
0.002
0.001
0
50 55 60 65 70 75 80 85 90 95
Nodes
Fig. 4 Signal power

Collision Rate
1.2

0.8
N-AODV
Packets

0.6
BSR-AODV
0.4 HE-AODV

0.2

0
50 55 60 65 70 75 80 85 90 95
Nodes
Fig. 5 Collision rate

4.1. Signal Power antennas. So the collision is less than 40 % more than the other
The beam sector routing protocol signal power values are work. The comparisons among the BSR-AODV, N-AODV
compared with the other methods of normal AODV and and HE-AODV are shown in Figure 5.
Hidden and Exposed AODV antenna design.
4.3. Transmission Speed
The nature of the BSR routing is that the power Since the use of the Beam sector antenna, any one of the
transmission is done only in the assigned sector of 45 degrees beams from the eight sectors is selected for the transmission
rather than 360 degrees of other antennas. So the signal power and receiving of the packets. So the speed for the packet
is double the transmission range is 10 % more than the other transmission from the antenna transmitter is compared with
work. The comparisons among the BSR-AODV, N-AODV the proposed antenna speed.
and HE-AODV are shown in Figure 4.
The antenna speed is compared with the proposed PMBS-
4.2. Collision Rate Antenna, which is depicted in Figure 6. The beam sector
The beam sector routing protocol collision rate is antenna produced more transmission of packets compared
compared with the other methods of normal AODV and with the N-AODV and HE-AODV since all the beams are
Hidden and Exposed AODV antenna design. The nature of the transmitting the packets, even the nodes get increased in the
BSR routing is about the power transmission only in the simulation, The beam sector AODV antenna transmission
assigned sector of 45 degrees rather than 360 degrees of other speed is 65%.

27
S. Hemalatha et al. / IJETT, 72(4), 23-31, 2024

Transmission Speed
6

4
N-AODV
Speed

3 BSR-AODV
2 HE-AODV

0
50 55 60 65 70 75 80 85 90 95
Nodes
Fig. 6 Transmission speed

Efficiency
1.2

0.8
N-AODV
Packets

0.6
BSR-AODV
0.4 HE-AODV

0.2

0
50 55 60 65 70 75 80 85 90 95
Nodes
Fig. 7 Efficiency

4.4. Efficiency get increased in the simulation, the other antenna could not
The Beam Sector antenna Efficiency is compared with produce better usage, where the proposed BSR-AODV
the N-AODV and HE-AODV antenna, which is depicted in Antenna energy consumption is 35 % more than with other.
Figure 7. The Beam sector Antenna shows more efficiency
compared with the N-AODV and HE-AODV; even though the 4.6. Packet Delivery Ratio
nodes get increased in the simulation, the other antenna could The packet delivery ratio of the Beam Sector
not produce better efficiency, where the proposed BSR- antenna BSR-AODV is compared with the N-AODV and HE-
AODV Antenna efficiency is 25 % more than with other. AODV antenna, which is depicted in Figure 9.

4.5. Energy Consumption The Beam sector Antenna BSR-AODV delivered more
The Beam Sector antenna energy consumed is compared packets because of better routing selection collision-free,
with the N-AODV and HE-AODV antenna, which is depicted hidden and exposed terminal avoidance, but the other methods
in Figure 8. The Beam sector Antenna BSR-AODV shows showed less packet delivery; even though the nodes increased
less energy consumed because of routing selection, collision- in the simulation, the other antenna could not produce a better
free, hidden and exposed terminal avoidance, but the other packet delivery ratio, where the proposed BSR-AODV PDR
methods show consumed more energy, even though the nodes is 45 % more than with other.

28
S. Hemalatha et al. / IJETT, 72(4), 23-31, 2024

Energy Consumed
45
40
35
30
25 N-AODV
Energy

20 BSR-AODV
15 HE-AODV
10
5
0
50 55 60 65 70 75 80 85 90 95
Nodes
Fig. 8 Energy consumed

Packet Delivery Ratio


60

50

40
N-AODV
Packets

30
BSR-AODV
20 HE-AODV

10

0
50 55 60 65 70 75 80 85 90 95
Nodes
Fig. 9 Packet delivery ratio

End to End Delay


40
35
30
25
BSR-AODV
Delay

20
N-AODV
15
HE-AODV
10
5
0
50 55 60 65 70 75 80 85 90 95
Nodes
Fig. 10 End to End delay

29
S. Hemalatha et al. / IJETT, 72(4), 23-31, 2024

4.7. End to End Delay to address hidden and exposed node concerns in the MAC
End to End Delay occurs when more time is taken to layer with a unique routing strategy that addresses hidden and
transmit of packet from the sender to the receiver. Beam exposed nodes by creating a route table based on the beam
sector-based antenna, the transmission beam and receiving sector antenna orientation. The antenna is divided into eight
beam are determined and hidden and exposed nodes collision sectors based on the location of the neighbor node, and the
avoided which aids in improvement of reducing the delay. respective sector transmitter or receiver will transmit or
receive the packet. This antenna also determines the receiver
The Omni directional antenna End to End Delay is direction based on the location of the next hope received and
compared with the proposed PMBS-Antenna, which is focuses the packet floating. This technique supports the
depicted in Figure 10. The Omni directional antenna delay is Hidden and Exposed node problem in MANET while also
more due to the collision among the nodes, and compared with improving routing efficiency and power optimization. This
the proposed PMBS-Antenna, even if the nodes get increased study was simulated using Network simulation, and the results
in the simulation, the proposed antenna delivers less delay showed double in the transmission range is 10 % more than
with more number of packets because of collision-free the other work, collision is less than 40 % more than the other
transmission. The proposed PMBS-Antenna End to End Delay work, antenna transmission speed is 65%, efficiency is 25 %,
is 45 to 50 % less than the Omni directional antenna. energy consumption is 35 % BSR-AODV PDR is 45 % End
to End Delay is 45 to 50 % lesser than the Omni directional
5. Conclusion and Future Work antenna. In feature, this work can be enhanced into other
This research article proposed the better use of beam antennas to support the Hidden and Exposed nodes problem
sector directional antennas in physical and routing protocols and improve the MANET performance.

References
[1] Rajeev Kumar, “A Comprehensive Analysis of MAC Protocols for MANET,” International Conference on Electrical, Electronics,
Communication Computer Technologies and Optimization Techniques, Mysuru, India, pp. 56-58, 2017. [CrossRef] [Google Scholar]
[Publisher Link]
[2] Viral V. Kapadia, Sudarshan N. Patel, and Rutvij H. Jhaveri, “Comparative Study of Hidden Nodeproblem and Solution Using Different
Techniques and Protocols,” Journal of Computing, vol. 2, no. 3, pp. 65-67, 2010. [Google Scholar] [Publisher Link]
[3] Krishan Kumar, and Poonam, “Impact of MAC Layer on The Hidden and Exposed Terminal Problem in MANET,” International Journal
of Scientific Research in Computer Science, Engineering and Information Technology, vol. 7, no. 5, pp. 120-124, 2021. [CrossRef]
[Google Scholar] [Publisher Link]
[4] Caishi Huang, Chin-Tau Lea, and Albert Kai-Sun Wong, “A Joint Solution for the Hidden and Exposed Terminal Problems in CSMA/CA
Wireless Networks,” Computer Networks, vol. 56, no. 14, pp. 3261-3273, 2012. [CrossRef] [Google Scholar] [Publisher Link]
[5] Chetana Hemant Nemade, and Uma Pujeri, “Comparative Study and Performance Analysis of MANET Routing Protocol,” International
Journal of Electrical and Computer Engineering Systems, vol. 14, no. 2, pp. 145-154, 2023. [CrossRef] [Google Scholar] [Publisher Link]
[6] Muchtar Farkhana et al., “Energy Conservation of Content Routing through Wireless Broadcast Control in NDN based MANET: A
Review,” Journal of Network and Computer Applications, vol. 131, pp. 109-132, 2019. [CrossRef] [Google Scholar] [Publisher Link]
[7] Palanisamy Vigneshwaran, and Satkunarajah Suthaharan, “Evaluation of Sector-Based Routing Approach in Mobile Ad Hoc Networks,”
Innovations in Electrical and Electronic Engineering, vol. 661, pp. 561-573, 2020. [CrossRef] [Google Scholar] [Publisher Link]
[8] K. Periyakaruppan et al., “Optimization of Manet with Mimo for Forest Application using Advanced Antenna Models,” ICTACT Journal
On Microelectronics, vol. 8, no. 1, pp. 1318-1322, 2022. [CrossRef] [Google Scholar] [Publisher Link]
[9] Bowen Zeng, Tian Song, and Jianping An, “A Dual-Antenna Collaborative Communication Strategy for Flying Ad Hoc Networks,” IEEE
Communications Letters, vol. 23, no. 5, pp. 913-917, 2019. [CrossRef] [Google Scholar] [Publisher Link]
[10] M.K. Marina, and S.R. Das, “On-Demand Multipath Distance Vector Routing in ad Hoc Networks,” Proceedings Ninth International
Conference on Network Protocols, ICNP 2001, Riverside, CA, USA, pp. 14-23, 2001. [CrossRef] [Google Scholar] [Publisher Link]
[11] Shahram Jamali, Bita Safarzadeh, and Hamed Alimohammadi, “SQR-AODV: A Stable QoS-Aware Reliable On-Demand Distance Vector
Routing Protocol for Mobile ad Hoc Networks,” Scientific Research and Essays, vol. 6, no. 14, pp. 3015-3026, 2011. [Google Scholar]
[12] S.J. Lee, and M. Gerla, “AODV-BR: Backup Routing in ad Hoc Networks,” 2000 IEEE Wireless Communications and Networking
Conference, Chicago, IL, USA, pp. 1311-1316, 2000. [CrossRef] [Google Scholar] [Publisher Link]
[13] Jian Liu, and Fang-min Li, “An Improvement of AODV Protocol based on Reliable Delivery in Mobile ad Hoc Networks,” 2009 Fifth
International Conference on Information Assurance and Security, Xi'an, China, pp. 507-510, 2009. [CrossRef] [Google Scholar]
[Publisher Link]
[14] Hui Xia et al., “Impact of Trust Model on On-Demand Multi-Path Routing in Mobile ad Hoc Networks,” Computer Communications, vol.
36, no. 9, pp. 1078-1093, 2013. [CrossRef] [Google Scholar] [Publisher Link]

30
S. Hemalatha et al. / IJETT, 72(4), 23-31, 2024

[15] Omar Smail et al., “A Multipath Energy-Conserving Routing Protocol for Wireless Ad Hoc Networks Lifetime Improvement,” EURASIP
Journal on Wireless Communications and Networking, vol. 2014, no. 139, pp. 1-12, 2014. [CrossRef] [Google Scholar] [Publisher Link]
[16] S.M. Benakappa, and M. Kiran, “Energy Aware Stable Multipath Disjoint Routing Based on Accumulated Trust Value in MAN,”
International Journal of Computer Network and Information Security, vol. 14, no. 4, pp. 14-26, 2022. [CrossRef] [Google Scholar]
[Publisher Link]
[17] Mahendrakumar Subramaniam et al., “Design of NULLMAC Protocol for Mobile Ad Hoc Network Using Adaptive Antenna Array,”
Mobile Information Systems, vol. 2023, pp. 1-11, 2023. [CrossRef] [Google Scholar] [Publisher Link]
[18] M. Sivaram et al., “Retransmission DBTMA Protocol with Fast Retransmission Strategy to Improve the Performance of MANETs,” IEEE
Access, vol. 7, pp. 85098-85109, 2019. [CrossRef] [Google Scholar] [Publisher Link]
[19] G. Kalfas et al., “WiMARK: An Intelligent MAC Protocol for ad Hoc WLANs with busy Tone and Power Control,” 13th European
Wireless Conference, Paris, pp. 1-4, 2007. [Google Scholar]
[20] K. Pavithra, and Raveendra Gudodagi, “Contention Based MAC Collision Avoidance Technique for Mobile Adhoc Networks,” 2023 3rd
International Conference on Intelligent Technologies, Hubli, India, pp. 1-6, 2023.[CrossRef] [Google Scholar] [Publisher Link]
[21] Nyi Nyi Linn, Kai Liu, and Qiang Gao, “A Contention-Free Cooperative MAC Protocol for Eliminating Heterogenous Collisions in
Vehicular Ad Hoc Networks,” Sensors, vol. 23, no. 2, pp. 1-28, 2023. [CrossRef] [Google Scholar] [Publisher Link]
[22] Sercan Kulcu, Sedat Gormus, and Yichao Jin, “Integration of Steerable Smart Antennas to IETF TiSCH Protocol for High Reliability
Wireless IoT Networks,” IEEE Access, vol. 9, pp. 147780-147790, 2021. [CrossRef] [Google Scholar] [Publisher Link]
[23] Zhiqing Wei et al., “Radar Assisted Fast Neighbor Discovery for Wireless Ad Hoc Networks,” IEEE Access, vol. 7, pp. 176514-176524,
2019. [CrossRef] [Google Scholar] [Publisher Link]
[24] Jinyong Lin et al., “A Survey of Flying Ad-Hoc Networks: Characteristics and Challenges,” 2018 Eighth International Conference on
Instrumentation & Measurement, Computer, Communication and Control, Harbin, China, pp. 766-771, 2018. [CrossRef] [Google
Scholar] [Publisher Link]
[25] Lin Ge et al., “Stochastic Geometry Analysis of Three-Dimensional Aerial Ad hoc Network with Directional Antennas,” 2020
International Conference on Wireless Communications and Signal Processing (WCSP), Nanjing, China, pp. 1094-1099, 2020. [CrossRef]
[Google Scholar] [Publisher Link]
[26] Md. Tareq Mahmud et al., “Cooperation-Based Adaptive and Reliable MAC Design for Multichannel Directional Wireless IoT Networks,”
IEEE Access, vol. 9, pp. 97518-97538, 2021. [CrossRef] [Google Scholar] [Publisher Link]
[27] Yu Wang et al., “Cooperative Multichannel Directional Medium Access Control for ad Hoc Networks,” IEEE Systems Journal, vol. 11,
no. 4, pp. 2675-2686, 2017. [CrossRef] [Google Scholar] [Publisher Link]
[28] Shijie Liang et al., “A Multichannel MAC Protocol without Coordination or Prior Information for Directional Flying Ad hoc Networks,”
Drones, vol. 7, no. 12, pp. 1-25, 2023. [CrossRef] [Google Scholar] [Publisher Link]
[29] Trung Kien Vu, and Sungoh Kwon, “Mobility-Assisted on-Demand Routing Algorithm for MANETs in the Presence of Location Errors,”
The Scientific World Journal, vol. 2014, pp. 1-12, 2014. [CrossRef] [Google Scholar] [Publisher Link]
[30] G. Balu Narasimha Rao, and Asesh Kumar Tripathy, “Energy Aware Routing through Genetic Algorithm and AOMDV in
MANET,” International Journal of Intelligent Systems and Applications in Engineering, vol. 12, no. 8s, pp. 435-441, 2024. [Google
Scholar] [Publisher Link]
[31] S. Harihara Gopalan et al., “Fuzzified Swarm Intelligence Framework using FPSOR Algorithm for High-Speed MANET- Internet of
Things (IoT),” Measurement: Sensors, vol. 31, 2024. [CrossRef] [Google Scholar] [Publisher Link]
[32] Joonsu Ryu, and Sungwook Kim, “Reputation-Based Opportunistic Routing Protocol Using Q-Learning for MANET Attacked by
Malicious Nodes,” IEEE Access, vol. 11, pp. 47701-47711, 2023. [CrossRef] [Google Scholar] [Publisher Link]
[33] Mekala Mahesh Reddy et al., “Solving the Hidden Terminal Problems Using Directional-Antenna Based MAC Protocol for Wireless
Adhoc Networks,” International Journal of Scientific and Research Publications, vol. 2, no. 12, pp. 380-385, 2012. [Google Scholar]
[Publisher Link]
[34] Zhiqing Wei et al., “Neighbor Discovery for VANET with Gossip Mechanism and Multipacket Reception,” IEEE Internet of Things
Journal, vol. 9, no. 13, pp. 10502-10515, 2022. [CrossRef] [Google Scholar] [Publisher Link]

31

You might also like