A Novel Algorithm For The Development of A Multipath Protocol For Routing and Energy Efficient in IoT With Varying Density
A Novel Algorithm For The Development of A Multipath Protocol For Routing and Energy Efficient in IoT With Varying Density
https://doi.org/10.1007/s11235-024-01170-1
Abstract
Data transmission from sensor nodes is the biggest problem for IoT networks. Overusing communication power shortens
node lifespans. Thus, network issues including QoS, security, network heterogeneity, congestion avoidance, reliable routing,
and energy savings must be addressed. Routing protocols are essential for delivering data between organizations. Information
gathering and consolidation require data aggregation to minimize traffic congestion, operating expenses, energy usage, and
network lifespan. IoT data aggregation makes route planning dependable, energy-efficient, and difficult. Disjoint & Scalable
Multipath Routing (D&SMR) is a new routing system developed using NS2 simulation. The method estimates delivery
success using decision trees and neural networks. We evaluate characteristics such as (D&SMR) routing scheme predictability,
node popularity, power consumption, speed, and location while training the model. Simulation results show that (D&SMR)
outperforms a reliable routing system in terms of delivery success, lost messages, overhead, and hop count. The proposed
hybrid routing method involves cluster construction and intra- and inter-cluster routing. The study found that (D&SMR) beats
previous research in network resilience, packet transmission efficiency, end-to-end latency, and energy usage.
Keywords Internet of Things (IoT) · Energy efficiency · Network life time · Optimal path selection · Packet inquiry (PINQ)
123
770 R. S. Abujassar
cost-effectiveness, adaptability, resilience, and support for Fig. 2 Network Topologies with NCH
mobility. Ad hoc networking is widely prevalent in many
IoT applications, including but not limited to disaster res- IoT devices and the recent advancements in interoperable
cue, cooperative intelligent transportation systems (CITS), protocols and middleware technologies, the dimensions of
e-health, logistics, military scenarios, and environmental MANETs are continuously expanding. Consequently, these
sensing, among others. The user’s text consists of three networks are becoming intricate compositions of diverse
numerical references: [10, 11]. Furthermore, the ad hoc mode devices, facilitating the transmission of critical data. In addi-
is a fundamental component of 5 G deployment modes, play- tion, the multi-hop transmission paradigm operates on the
ing a crucial role in increasing the network’s coverage area, assumption that devices exhibit complete cooperation and
maintaining service resilience, and improving the overall faithfully fulfill their roles in routing and forwarding. How-
user experience [5, 12, 13]. ever, there are several motives, such as the goal of conserving
Figure 1 illustrates the visual representation. Ad hoc energy, that might lead to nodes refraining from forward-
networks are self-governing networks that function indepen- ing and routing packets. Certain entities with self-centered
dently, or stub networks that establish connections with an motives may exhibit a reluctance to engage in collaborative
existing fixed network. It is not advisable to solely depend efforts. Conversely, in the case of individuals with malevo-
on pre-existing infrastructure. Therefore, the absence of an lent intent, their primary goal is to disrupt the network and
access point is evidenced by the decentralized nature of the manipulate packet contents. These behaviors have a signifi-
network, where each individual node functions as a router cant influence on the availability of connections in MANETs,
and assumes the role of forwarding packets on behalf of other leading to reduced connectivity and perhaps causing various
nodes. packet transmission issues. In the context of multi-hop trans-
Figure 1 illustrates an exemplar of a mobile ad hoc net- missions, it is important to note that each forwarding node
work (MANET) in the context of the IoT. On the other has the potential to engage in a Man in the Middle (MITM)
hand, Fig. 2 portrays a scenario in which a satellite dissem- assault. Furthermore, as a result of the inherent spontane-
inates data simultaneously to several destinations inside a ity of the IoT and MANETs, devices possess the freedom to
huge IoT network. The satellite facilitates the transmission join or depart from the network at any given moment. Conse-
and reception of communications, mostly directed towards a quently, individuals who are newly introduced to the network
nearby smart device located on an aircraft or vessel. These lack pertinent information, rendering them susceptible to
messages serve the purpose of disseminating auditory and manipulation by malicious actors. Additionally, the process
visual warnings. In the context of MANETs and the IoT, of joining and departing the network contributes to unstable
it is common for devices to often depart from and join the connectivity, leading to heightened traffic and subsequent
network or exhibit mobility, resulting in a dynamic alteration congestion. Furthermore, incidents necessitate updating the
of the network’s topology. This particular attribute presents a network topology.
multitude of issues, particularly in the context of routing pro-
tocols, as self-organizing protocols become indispensable in
these ecosystems [14, 15]. The essential components of the
IoT are self-organization, information exchange, and infor- 2 The main contribution of this work
mation routing. To facilitate these operations, energy- and
computation-limited devices employ routing protocols that The contributions of this study are significant and note-
prioritize optimization at the expense of security, in par- worthy. The contributions of this study are summarized as
ticular. Furthermore, due to the escalating proliferation of follows:
123
A novel algorithm for the development of a multipath protocol... 771
• In this study, we provide a novel Disjoint & Scalable & The following portions of this work are organized in the
Multipath Routing (D&SMR) algorithm and an adaptive follows manner: Sect. 3 presents a comprehensive review
multipath routing protocol specifically designed for IoT of the current body of research on safe routing inside the
and MANETs. IoT framework. Section 4 of this article provides a thorough
• In this study, we present a mathematical assessment examination of the secure routing protocol that we have cre-
model that encompasses key attributes of a node, includ- ated. In addition, we give a mathematical model to evaluate
ing mobility and uncooperative behaviors. This model is the technique that we have suggested. Section 5 of this study
designed to be applicable to many ad hoc routing proto- evaluates the evaluation of our technique and the results that
cols. were obtained. To summarize, Sect. 6 functions as the con-
• The proposed technique aims to improve node energy cluding part of the study and also outlines potential areas for
efficiency by optimizing the energy consumption of sup- further research.
plementary nodes in the provided topology that are not
part of the primary path. In scenarios where nodes within
a network experience migration or new nodes join, it 3 Background and related work
is feasible to employ an alternative node situated on a
distinct path from the primary one to alleviate any dis- The issue of mobility challenges in IoT routing protocols
turbances to the primary path. has been the subject of substantial research in recent years,
• If any node inside a multipath or disjoint network as evidenced by several scholarly works [16–19]. Numerous
becomes inactive or fails, our algorithm will initiate the studies have consistently highlighted the absence of stan-
creation of a new, distinct multipath or disjoint network dardized protocols in the domain of reliable routing for IoT
prior to any network events taking place. devices, with particular emphasis on ad hoc routing. Numer-
• The Internet of Things-enabled network (IOTN) is now ous previous studies [20–23] have focused on the develop-
a prominent field of research. While the IoT has been ment of routing protocols that prioritize improvements in
successfully used in several real-time applications, it is routing efficiency rather than mesh topology connections,
important to acknowledge that one significant limitation owing to the distinctive attributes and limitations of IoT
of IoT is its energy constraint. The management of energy devices. The IoTN has garnered considerable attention in
limitations is achieved through the use of several energy- academic studies because of its extensive potential for appli-
efficient strategies. Of all the actions conducted by the cation in several areas such as healthcare, surveillance, item
IOTN, routing stands out as the most energy-intensive tracking, and environmental monitoring, among others. The
task. In light of the aforementioned considerations, this author has provided a citation range, indicating that they are
paper presents a proposed route selection strategy that referencing multiple sources. An IoTN consists of a mul-
takes into consideration both the reliability score and titude of wireless sensors that possess the ability to detect,
the sensitiveness of the data. The nodes’ reliability score transmit, and analyze data. Wireless sensors are commonly
is computed using evidence theory, and users are given put in regions that are inaccessible to humans, posing chal-
the opportunity to specify the expected reliability score lenges in sensor management. The sensors are responsible for
for data forwarding. According to the specified criteria, monitoring the surrounding environment and gathering the
the route selection is prioritized based on the depend- necessary data. The data that has been gathered is transmitted
ability score, with secondary consideration given to the to a high-capacity node for additional data processing, facil-
route’s length. The suggested technique’s performance itated by data transfer. Data transfer can occur through two
is evaluated using common performance indicators, and distinct methods, namely direct and indirect data transmis-
the findings demonstrate that the proposed approach pro- sion. Data transmission encompasses two primary entities,
duces superior results. namely the source and destination nodes. The source and
• The objective of this study is to provide many pathways destination nodes may alternatively be referred to as sender
from a given source to a destination, with the aim of miti- and receiver nodes. When engaging in direct data transmis-
gating the impact of a single point of failure.The optimal sion, the source node is able to establish a direct connection
pathway selection is determined by taking into account with the destination node. Nevertheless, this is not feasible in
the level of sensitivity associated with the data being con- all instances. The most prevalent kind of data transfer is an
veyed. The calculation of route dependability entails the indirect method of communication. Indirect data transmis-
use of trust characteristics. The incorporation of the clus- sion is the conveyance of data from a source to a destination
tering idea has the effect of lowering energy usage and via one or more intermediate nodes. The present methodol-
enhancing manageability. ogy raises a number of concerns, as the forwarding behavior
of the intermediary nodes remains uncertain, and there is a
potential for malevolent intent on the part of the nodes. The
123
772 R. S. Abujassar
aforementioned factor has an impact on the velocity, uni- To assess their impact on network performance. Accord-
formity, and dependability of data transfer. Therefore, it is ing to the source, sensing devices are activated exclusively
important to take into account all of these elements in order through heat application. The REERS system offers energy
to guarantee the secure transfer of data. efficiency solutions for extensive implementations [27]. Effi-
Despite the manifold benefits of the IoT, including cient route selection for data aggregation is crucial in IoT
its capacity for self-governance, dynamic topology, cost- contexts characterized by extensive connectivity. The REER
effectiveness, and ease of deployment, it continues to face framework takes into account both real-time and non-real-
limitations in terms of energy consumption, memory use, time situations. A routing system that prioritizes energy
and processing capabilities [24]. Out of all the aforemen- efficiency utilizes cost-effective paths to enhance the per-
tioned concerns, the issue of energy restriction stands out formance of real-time applications by reducing latency and
as the most crucial problem that requires immediate atten- optimizing energy consumption. In their study, they con-
tion. The utilization of a sensor’s energy is facilitated by ducted data aggregation from designated monitoring stations,
three modules, namely sensing, processing, and communi- with a particular emphasis on optimizing the data gather-
cation. Out of all the many capabilities, communication is ing process. The scheme’s algorithm aggregates data from
the most energy-intensive. Routing is a pivotal procedure both collecting and loading regions. The proposed method-
that facilitates communication between sensors, and it is ology enhances the longevity of the network by evaluating
often recognized as the most energy-intensive operation [25]. the expense of the path between different regions and then
Due to the dynamic nature of the IoTN, determining opti- transmitting the load of each sensing node. Researchers
mal paths from the source to the destination is a significant have found that mobile data collection sinks exhibit energy
challenge. Furthermore, the Index of Orthodontic Treatment efficiency. Mobile devices can interact with data sensors
Need IoT demonstrates active engagement in many real-time to collect and combine data while navigating a specific
applications. Therefore, it is imperative for the routing mech- path. This process involves many stages, including initial-
anism to provide both reasonable data transmission time and ization, aggregation region selection, and path design, as
enhanced dependability. In order to ensure low energy use, outlined in reference [28]. The authors in [29] examine the
it is imperative that these fundamental standards are met. energy and dynamic spectrum considerations associated with
Attain satisfaction by using less energy. This article pro- cluster-based routing. The implementation of self-distributed
poses a reliable route selection technique based on clustering, clustering techniques results in a reduction in power con-
which effectively addresses the aforementioned difficulties sumption and the generation of optimal clusters. The system
while also ensuring energy efficiency. This study employs possesses a greater number of co-sensing channels. The sys-
a cluster-based method due to its energy-saving potential. tem transmits data across clusters by utilizing gateway nodes
The essence of the clustering strategy is in the management with higher energy levels and shared channels. It determines
of node members by the Node Cluster Head (NCH) node the head node by considering factors such as residual energy,
inside the clusters. The energy consumption of the NCH node channel availability, neighboring nodes, and distance from
is reduced, resulting in balanced energy consumption. This the sink. The proposed solution provides an efficient method
study ensures dependability by incorporating the fundamen- to transfer data from the root to the sink. Achieving green
tal principle of trust. The trust parameters play a crucial role routing in a wireless sensor network (WSN) poses signifi-
in characterizing the characteristics of sensor nodes. More- cant challenges. Wireless sensor networks (WSNs) possess a
over, the present study aims to examine a specific facet of finite amount of energy, which is allocated towards the exe-
data security, focusing on user preferences. This study cal- cution of crucial activities in remote locations. Consequently,
culates numerous routes between the source and destination the availability of energy is diminished, thereby resulting in
and ultimately selects the route with a higher dependabil- a reduction in the overall lifespan of the network.
ity score as the final route. In their publication, the authors In [30], double deep Q-learning dynamic arithmetic
provide a novel methodology known as the multi-hop, adap- reinforcement learning (DQARL) is proposed for energy-
tive, tree-based energy-balanced (DMATEB) method [26]. efficient clustering and scheduling in reliable routing. The
The algorithm determines the nearest node that possesses initial step suggests using Hunter Prey Optimization (HPO)
a substantial amount of remaining energy. The utilization to find the best head. The selection includes many fitness
of multi-hop routing, which incorporates the use of clus- functions. In the second phase, duty cycling extends network
ters, enhances both data collection efficiency and the overall life. This solution uses distributed scheduling to efficiently
lifespan of the network. The authors in [27] introduced the minimize sensor node energy usage. Schedulers examined
EACRA system as a means of mitigating the issue of peri- sleep, listen, and transmit modes. Weighted Practical Byzan-
odic duplicate data transfer. The data is transferred from tine Fault Tolerance (WPBFT) ensures stable routing and
sensing devices in response to contextual changes, result- reduces packet transmission time in the third phase. This
ing in reduced energy consumption and message exchange. method selects the optimal source-cluster head path. This
123
A novel algorithm for the development of a multipath protocol... 773
study investigates the power consumption of the compressor neighboring nodes. This approach reduces the costs associ-
during the 20-minute start-up of the HRF under certain fail- ated with the Low Energy Adaptive Clustering Hierarchy
ure scenarios, including blockage of the 3-way valve and (LEACH) protocol. In [38], we propose a network struc-
clogging of the capillary tube. The efficacy of these set- ture called the delay-aware data collection network structure
tings was evaluated in six failure scenarios. The compressor’s (DADCNS) in order to select tracks that have the least amount
power consumption is rapidly affected by both quantitative of latency in data gathering. This approach uses both top-
and qualitative changes in the refrigerant stream caused by down and bottom-up techniques to construct a hierarchical
these difficulties. The compressor power data clearly exhib- tree structure that governs the distances, rankings, and delays
ited noticeable discrepancies in relation to the analyzed of the nodes.
issues with refrigerant passage changes, serving as a sig- In [39], the reduction of energy utilization is achieved by
nal for fault detection [31]. The author introduced a novel the implementation of a multi-hop algorithm that balances
algorithm in the publication referenced as [32]. During the routing costs. The algorithm is capable of withstanding fail-
optimization process, several factors are carefully consid- ures in both head and sensor nodes. In order to optimize
ered, including channel fade margin, cross-correlation and energy dissipation, the SEED protocol is designed to min-
coherence time, spectral efficiency, interference level, power imize the occurrence of duplicate transmissions. However,
consumption, retransmission rate, access probability, and it is not compatible with various sensor data. To tackle the
propagation delay. To improve the scheduling efficiency of issue of heterogeneous data trafficking and energy utilization
the DE algorithm, many steps are meticulously designed: in sensor nodes, an additional approach was introduced. In
startup, mutation, crossover, fitness evaluation, selection the LEACH Vice Cluster Head (L-VH) [15] protocol, a sub-
for iteration evolution, and termination. The OMPS model ordinate cluster head with the second highest energy level is
assesses many measures including as latency, PDR, spectrum responsible for managing the workload. The VH system does
usage, interference level, energy efficiency, and the success not operate simultaneously with the NCH system; rather, it
rate of created paths. remains in a dormant state until the CH system uses a suffi-
The present technique employed by MDTA exhibits cient amount of energy. Upon awakening, VH assumes the
reduced energy consumption in comparison to prevailing responsibilities previously assigned to NCH and thereafter
energy-aware routing systems. Additionally, it evaluates the fulfills CH’s role. The reduction in the time required for
cost of data transmission in relation to the size of the net- selecting the next head and the decrease in the number of
work. The Agile data delivery system employs a very efficient messages processed by VH for communication management
data transmission mechanism that facilitates seamless com- are seen. The researchers in the referenced study propose
munication between several nodes. The MDTA algorithm a novel approach called Traffic and Energy-Aware Routing
enhances the formulation of the root-to-sink path by consid- (TEAR) to identify nodes with high traffic and low energy
ering both end-to-end latency and energy usage. This concept consumption. In this particular scenario, TEAR does not offer
is applicable to a wide range of sensor and vehicle networks redundant data filtering. The ETASA technique, which is a
[33]. Wireless Sensor Networks (WSNs) encounter chal- hybrid approach, offers enhanced load balancing by effec-
lenges in achieving energy-efficient data monitoring. The tively managing the energy consumption of sensing devices.
authors in [34] propose a scheduling approach that takes These devices are able to alternate between active and dor-
into account both sensor and network energy, with a focus mant states depending on considerations of energy levels and
on energy efficiency and quality. The effectiveness of data data transmission speeds. This paper aims to provide a rout-
fusion is contingent upon the costs associated with data for- ing method that prioritizes both route dependability and data
warding as well as the power capacity of the sensing nodes. sensitivity, drawing inspiration from previous research in the
The proposed methodology aims to reduce the number of field. The majority of current literature focuses on providing
active nodes while ensuring the integrity and dependability security measures; however, it fails to address the ability for
of the data. In their publication, the authors in [35] presented users to customize their route preferences. Nevertheless, this
a routing system that utilizes location-based information to study enables the author to establish the anticipated reliabil-
enhance the optimization of residual energy and network ity score of the route, taking into consideration the sensitivity
quality. The PEDAP algorithm was developed based on the of the data that is to be transferred. This concept serves to
concept of a near-optimal spanning tree with the objective of safeguard data against potential security risks while also mit-
enhancing the lifetime of a network [36]. The localized PEDP igating energy use. Furthermore, the work demonstrates an
system described in Reference [37] utilizes a distributed increased quality of service (QoS). The subsequent section
design, in contrast to other systems that adopt a centralized will provide an explanation of the functionality of the sug-
approach. In the seventeenth reference, the power-efficient gested strategy. A comparison has been shown in Table 1.
gathering in sensor information systems (PEGASIS) proto-
col is described as a method that exclusively sends packets to
123
774 R. S. Abujassar
4 Proposed an optimal rout selection illustrates a schematic representation of the overall flow of
strategy the proposed work.
When a source node desires to send a message to a des-
Despite the multitude of advantages associated with the IoT, tination node, the proposed methodology yields numerous
its primary issue is energy limitations. In the majority of potential pathways from the source to the destination. Fur-
real-time applications, sensors are deployed in hostile envi- thermore, the user has the option to indicate the anticipated
ronments to facilitate the acquisition and analysis of data. As reliability of the chosen route. The selection process involves
a result, periodic recharging or replacement of sensors is not choosing the route that aligns with the desired level of trust-
feasible, potentially resulting in a node’s premature failure. worthiness from a set of available routes. As a result, this
The prevention of this issue can only be achieved through the study takes into account the data’s sensitivity and makes a
prudent utilization of the existing energy resources. Energy modest contribution to the field of data security. This study
consumption is inversely proportional to the duration of net- primarily emphasizes the aspects of energy efficiency, route
work operation. This study aims to explore several strategies reliability, and a little consideration of data security. The sub-
for minimizing energy usage, with a specific focus on the sequent section provides a comprehensive explanation of the
implementation of an energy-efficient and secure routing proposed research.
method. The energy consumption associated with the func-
tioning of sensors is mostly attributed to the routing process,
which surpasses all other processes in terms of energy uti- 4.1 Proposed D&SMR with its assumption
lization. Therefore, this study presents a routing policy for
the IoT that aims to enhance energy efficiency and ensure This paper is conducted based on specific assumptions, and
trustworthiness. The present study employs the cluster model the proposed methodology demonstrates superior perfor-
as a means to achieve the objective of enhancing energy mance when aligned with these assumptions. The assump-
efficiency. In this particular framework, the NCH has the tions are enumerated as follows:
responsibility of overseeing and controlling the activities of
the node members. The NCH undergoes alteration within
a designated time frame. In this manner, the utilization of • This study involves the implementation of a resilient
energy in the sensor nodes is distributed evenly, resulting in mobile base station (BS) that is provided with a battery
a consistent energy consumption pattern. The Algorithm 1 of substantial capacity.
• The nodes within the network stay immobile and have
limited mobility at low speeds or with no movements.
123
A novel algorithm for the development of a multipath protocol... 775
• All nodes are equipped with information about their indi- Table 2 Math Notation
vidual positions, notwithstanding the absence of Global Notation Definition
Positioning System (GPS) functionalities. The network is
composed of nodes that may be classified as either NCH n Nodes
or node members. t Trust node
• The NCH possesses the capability to establish communi- R Reliable Node
cation with both the Base Station (BS) and other Cluster R̄ Non-Reliable Node
Node Heads. The nodes possess the ability to communi- K Represent all nodes Reliable OR non-Reliable
cate only with their respective cluster heads. δ Probability for node trust
T Denoted to the shortest path
4.2 Topology formation with its NCH z Denoted to Next Hop
z̄ Denoted to Next Hop but in the main path
Clustering’s primary goal is to allocate a NCH for each clus- d Distance
ter, ensuring that the NCH manages node members. The IoT K_s Nodes in the route from source
lacks a centralized authority for overseeing node function-
ality, which is addressed by the introduction of a NCH to
resolve this concern. Given the significant function played by node is denoted by δ and may be expressed as follows 3 and
the NCH, it is imperative that it exhibit qualities of trustwor- 4:
thiness and honesty. As a result, it is critical to observe node
behavior and select the most appropriate nodes to serve as the z = {R}; z̄ = { R̄}; K = t;
NCH. It serves as the cluster’s governing body. Therefore, it is T 1(z) = δ; T 1(z̄) = 0; T 1(K ) = 1 − δ; (3)
imperative that the NCH organization maintain a high level of
trustworthiness in its functioning. Nevertheless, the process In this manner, the calculation of node reliability is per-
of assessing the reliability of a node is more complex than formed, and the computation of dependability scores by two
it initially appears. While it is possible to quantify a node’s distinct nodes that are adjacent is expressed as follows. The
trustworthiness, it is not advisable to rely solely on the trust equations provided below illustrate fictitious representation
evaluation provided by a single node. As a result, this study of the aforementioned events.
chose two distinct neighboring nodes to evaluate the sensor
node’s dependability score. The evidence theory is used to z = {R}; z̄ = { R̄};
measure the nodes’ dependability score. The use of evidence
K = t; T 1(z) = 0; T 1(z̄) = δ; T 1(K ) = 1 − δ; (4)
theory is advantageous because it does not require any prior
knowledge of probabilistic ideas. The real reliability score Equation (5) represents the proposal made by two neigh-
is obtained by combining the reliability scores computed by boring nodes. The node has a significant degree of reliabil-
two distinct neighborhood nodes; all notations are shown in ity. Equation (6) depicts the scenario when adjacent nodes
Table 2. As denoted by Eq. (1), it is possible to categorize sen- acknowledge the existence of unreliability in the node.
sor nodes as either trustworthy or non-trustworthy, as well as Ultimately, the node is classified as either dependable or
reliable or non-reliable. undependable. The significance of qualities is critical in the
decision-making process, and several approaches have been
suggested to determine the appropriate weights.
n : t = {R, R̄} (1)
1
The aforementioned Eq. (1) illustrates the potential trustwor- T 1(z) ⊕ T 2(z) = T 1(z)T 2(z)
d
thiness of sensor node n, which may be classified as either +T 1(z)T 2(K ) + T 1(K )T 2(z)
trustworthy or non-trustworthy. This equation serves as a rep- 1
resentation of this classification as following: T 1(z̄) ⊕ T 2(z̄) = T 1(z̄)T 2(z̄)
d
+T 1(z̄)T 2(K ) + T 1(K )T 2(z̄)
z = {R}; z̄ = { R̄}; K = t (2) 1
T 1(K ) ⊕ T 2(K ) = T 1(K )T 2(K ) (5)
d
In the above equation, the symbol R represents the concept
of reliability, whereas the symbol R̄ denotes non-reliability. where d is given by
Additionally, the symbol K represents the hypothesis pertain-
ing to the potential reliability or non-reliability of the node. d = T 1(z)T 2(z) + T 1(z)T 2(K ) + T 1(K )T 2(z)
The probability function denoting the trustworthiness of the +T 1( Z̄ )T 2( Z̄ ) +
123
776 R. S. Abujassar
T 1( Z̄ )T 2(K ) + T 1(K )T 2(z̄) + T 1(K )T 2(K ) (6) tematically evaluates each path based on its node count and
dependability score. The selection of a path is contingent
If there are numerous nearby nodes aside from the prin- upon the presence of a matching dependability score, which
cipal node, the following equation will be used to begin the is mentioned in conjunction with the path request message.
computation of the ideal weight based on the most advanta- When the dependability score is lower than expected, the
geous distance, using the D&SMR technique. As a result, the shortest path is disregarded. The dependability score for the
following equation explains how the primary approach deter- given path is computed using the node’s reliability score,
mines the most favorable weight for the nearby elements. We which is measured on a scale from zero to one. A score of
made each cluster head pick the next alternative hop based one signifies that the node is entirely trustworthy, while a
on the minimum distance, as indicated: ∀ CH→ NextHop = score of zero indicates that the node is entirely unreliable.
min(distances−d ) Until arriving at the destination, the route The intermediate value of 0.5 indicates that the node has
will serve as the foundation for the new routing table by cre- a certain degree of reliability. When the base station (BS)
ating the matrix_route as follows: M Rout equals min(∀ CHnh encounters a cluster, all the nodes that are part of the cluster
with minimum distance ∈ Cluster). transmit the dependability score together with their identi-
The node’s dependability score ranges from zero to one, fication to the BS. The base station (BS) selects the node
with a value of one indicating perfect reliability and a value with the highest dependability score and formally designates
of zero denoting complete unreliability. The presence of an it as the NCH. Subsequently, the remaining nodes transmit
intermediate value of 0.5 suggests that the node has limited the JOIN request to the NCH and operate under the CH’s
reliability. When the base station (BS) encounters a cluster, purview. As a result, the cluster selects the most dependable
all the nodes that are part of the cluster transmit the depend- node, the NCH, as shown in Algorithm 1 (Table 3).
ability score together with their identification to the BS. The
base station (BS) selects the node with the highest depend-
ability score and formally designates it as NCH. Following
that, the remaining nodes transmit the JOIN request to the Algorithm 1 Algorithm for NCH
NCH and operate under the NCH’s purview. As a result, 1: Cr eatalltoplogiesthenselect N C H
2: count = 0; Min = 100sec
the NCH is selected based on the identification of the most 3: (N C H → selected Basedon L S D B I n f o.Histor y)
dependable node within the cluster. When the nodes inside a 4: count E xchangeI nquir y Packetsoutbound f r omallnodes
cluster need to transmit data to nodes in another cluster, they 5: Allad jacent N odes ←∈ / mainpath(N C H &Dest)
accomplish this by utilizing the NCH node. The NCH plays 6: while N H ¬main Route do
7: get N H _i_d
a vital role in the process of routing, as it is responsible for 8: count + +
managing and maintaining two essential tables: the recent 9: Computether eliableallnodesnotinthemainpath
pathways database and the reliability scores table. When a 10: K _r = N H (K _r ) + N N H (K _r )
network node intends to transmit a message to another node, 11: if K _r > count then
12: Declar etheK istheN C H
it proceeds by forwarding the PINQ message to its desig- 13: end if
nated next-hop controller. The PINQ message consists of 14: if r out[K ][N Hid ] = ad jandr out[K ][N Hid ] = Primar y Ad j
three components: the source ID, the destination ID, and then
the predicted path reliability. The NCH verifies the destina- 15: N ext H op[K ] = arar out[K ][N H ]
16: i ← ID+1
tion identification (ID) and cross-references it with the most 17: Fomring Route[K ][N H ] =
up-to-date path database. The current path table comprises r out[N ext H op[N H _i_d]][Ad jacent]
the paths that have been most recently accessed. The table 18: end if
in question is designed to accommodate a maximum of 10 19: P_r = (NCH, V _i), (NCH, D)
20: N C H = Find(AD J _LeadT o_Dest(D)
entities, with a mechanism in place to automatically remove 21: ∈ / M N H , Long Distance)
older entities. This concept effectively preserves memory and 22: Check_its_K (Ad jacent_N ode)
facilitates the path-searching procedure. The routing method 23: H ead_Path_to_Destination = Head− > V _i =
is outlined in the following manner: Assuming that the table (V _i + 1, D)
24: V _i_Ad jacnet_Labeled As Available = (P_r out) ∈ /
includes the anticipated trajectory, the message’s dependabil- Destination∩
ity score is evaluated. If a certain route meets the specified 25: ∀Ad jacentsourr ounded As_alt =
condition, it is chosen for the purpose of transmitting data. Head− > V _i− > Destination
Conversely, in instances where the required path is absent 26: end while
27: r etur n N ode_has_ AD J W ith Low Dist_Build Path;
from the database, the process of path discovery is initiated,
leading to the retrieval of various pathways. The NCH sys-
123
A novel algorithm for the development of a multipath protocol... 777
Table 3 Algorithm Notation and Definition time it takes for a data packet to be transmitted and success-
Notation Definition fully received. Before evaluating the performance effects of
network topologies on the calculation of a backup path in
NH Next Hop MANET, it is essential to determine the network components
NNH Next Next Hop that could affect the quality of service (QoS) of the video
ADJ Adjacent Node data being sent. This research specifically examines three
Dest Destination distinct qualities. This study aims to elucidate the impacts of
alt Alternative Node video traffic strategies by specifically examining three key
S Source attributes. To evaluate the influence of node density, it is
NCH Node Cluster Head critical to recognize that higher densities are associated with
PINQ Packets Inquiry longer lifespans compared to lower or intermediate densities.
This difficulty occurs because the latter’s capacity to accu-
rately detect and maintain new pathways decreases when
the nodes spread out into different clusters, increasing the
5 Simulation experiment chances of creating a disconnected structure. When there
is less movement, regions consisting of nodes demonstrate
An evaluation was conducted using network simulation to increased stability, which allows for the provision of ser-
assess the effectiveness of the upgraded D&SMR protocol in vices for longer periods of time. After dividing the networks
NS2-simulated networks with both high and low node den- into many clusters, we conducted measurements to assess the
sities. The results derived from comparing the simulation packet delivery ratio, throughput, latency, and power con-
of the D&SMR protocol with other well-established proto- sumption.
cols, such as active trust [40], optimum routing [41], and
reliable routing [42], The NS2 simulation demonstrated the 5.1 Performance and analyses evaluation
potential of IoT technology to improve nodes’ preparedness
and agility in various connection situations. Radio propaga- In the simulation conducted, there were a total of 200 nodes
tion required a transmission capacity of 0.28 watts. Within when there was mobility and 300 nodes for a stable network.
a radius of 250 ms, the technology allowed nodes to send All nodes were distributed inside a square space of 1000 x
and receive data packets. To enable wireless transmission of 8002 . The distribution of all nodes is uniform and random.
multimedia files, the researcher included IEEE 802.11b tech- The placement of the sink node is positioned in the cen-
nology at both the physical and data-link layers. The NS2 troid of the area. Each node in the network is subject to a
utilized the Way-Point random mobility paradigm inside a random waypoint mobility (RWM) model, where the speed
roaming area measuring 1000 x 800m 2 . During the simu- of the nodes ranges from 0 to 10 m/s [43]. The simulation
lation, clusters of nodes emerged. The predicted beginning parameters have been described in Table 4. In this study,
velocity of 1 m/s was moderately low. However, the effects of we conducted a comparative analysis of D&SMR in rela-
this velocity selection will become apparent and substantial tion to active trust, reliable routing, and the optimum path.
in future research and relationships. Each simulation lasted The evaluation was based on many performance metrics,
for a length of 600 s. The experimental approach involved including PDR, energy consumption, average end-to-end
conducting one hundred trials, followed by the calculation (AE2E) latency, network lifespan, network energy consump-
of the mean value. The maximum length of a packet was tion, cluster formation time, and cluster lifetime.
1024B, although its capacity was restricted to 512 bytes. The
bit rate was set to 2Mb/sec. It is widely known that devices • CLUSTER Life TIME VS. NUMBER OF NODES
in an ad hoc configuration network have the ability to share The cluster building time refers to the processes of cluster
a wireless connection. The first simulated scenario consisted formation and NCH selection. A prolonged duration for
of an evenly distributed density of 200 to 300 nodes in each cluster setup implies that the procedure exhibits a high
cluster location. Throughout the experiment, a steady data level of complexity. Figure 3 demonstrates the influence
transmission rate of 512B per second was observed between of node density on the duration required for clustering
the source and destination nodes. The next part presents construction. As we can see, the proposed algorithm has
the results of the simulation, which are depicted visually in reduced the time by around 30% compared with reliable
the form of line graphs. The specific characteristics of the routing and 5% to 10%. The D&SMR algorithm was also
diagrams are provided in Table 4. The packet loss ratio is used for NCH selection, relying on the number of nodes
determined by dividing the number of discarded packets by in each cluster and the best energy for the nodes. Further-
the total number of sent packets. The average end-to-end more, based on the measurement distance, the sink node
latency is a statistical measure that calculates the average will be in the center of all cluster nodes.
123
778 R. S. Abujassar
Energy(i)
NC H LF = (7)
E total
123
A novel algorithm for the development of a multipath protocol... 779
123
780 R. S. Abujassar
123
A novel algorithm for the development of a multipath protocol... 781
equivalent in nature. The consideration of node energy 6 Conclusion and future work
is deemed essential in the processes of clustering, NCH
selection, and routing, owing to its impact on achieving This article presents a method for choosing a way that consid-
an optimal number of clusters. In the suggested method- ers both the reliability of the road and the level of sensitivity
ology, we employ an analytical optimization technique of the data being transmitted. Certain data possesses a higher
to determine the optimal number of clusters for our level of sensitivity, which in turn raises the probability of
network’s spectrum power analysis. This optimization potential modifications or removals taking place through-
process is carried out throughout the simulation, as shown out the routing process. Each individual pathway has the
in Fig. 10. This is because the next alternative hop will be capacity to contain nodes that are either reliable or malicious.
in sleep mode until a failure or any disconnection occurs The presence of malevolent nodes might result in unfavor-
during the transmission. The relationship between total able behaviors, rendering the route that incorporates them
energy consumption and round work may be observed unsuitable for sending extremely sensitive data. This study
in the context of minimizing the number of single-node introduces a new method for choosing a path that allows users
clusters, leading to reduced energy consumption. Fig- to designate the desired level of dependability for the chosen
ure 10 illustrates the declining trend of the node’s residual path. The dependability score is calculated on a scale ranging
energy rate. The D&SMR protocol has a larger residual from 0 to 1. The path that satisfies the specified dependability
energy compared to other protocols due to its ability to score is further optimized based on its duration. The execu-
disperse energy use among nodes, resulting in a slower tion of these procedures is carried out using a NCH with
depletion of energy in individual nodes. Hence, in the the objective of conserving energy. This concept efficiently
context of D&SMR, a greater number of nodes have a preserves energy and maximizes the lifespan of the network.
higher likelihood of survival in comparison to alternative The objective of this study is to investigate the capacity of
techniques. mobile nodes to improve energy efficiency. Our future work
The graph depicted in Fig. 9 showcases the rate of will focus on integrating D&SMR with other IoT technolo-
energy consumption among the nodes. A negative cor- gies, including edge computing and 5 G/6 G networks. We
relation exists between the lifespan of a network and its will also modify or improve the algorithm to tackle the issues
energy use. A network’s energy consumption is inversely posed by next-generation IoT systems. The clustered design
proportional to its longevity, meaning that a longer lifes- of the head node will result in further power savings. It will
pan is correlated with lower energy consumption. After also facilitate the expansion of the network to accommodate
thorough analysis, it has been concluded that the energy up to 1000 nodes. Furthermore, security measures will be
consumption rate linked to the proposed methodology is enhanced to prevent any malicious packets or assaults dur-
significantly lower than the already utilized approaches. ing transmission.
Selecting the most efficient route is crucial for reducing
Funding No Funding.
energy use. When a node demonstrates slow packet for-
warding, as is frequently observed with malicious nodes, Data and materials availability The datasets generated during and/or
it leads to higher energy consumption. However, our anal- analysed during the current study are available from the corresponding
ysis chooses the path based on dependable nodes, as author on reasonable request.
indicated by Eq. (8).
Declarations
Ks
K s (Routi ) = (8) Conflict of interest We certify that there is no actual or potential Conflict
∀nodes of interest in relation to this article.
Integrating the concept of clustering helps reduce energy Ethical approval I have approved there is no Conflict of interest for this
use even more. The recommended work’s minimal study.
energy consumption results in a significant improve-
ment in the network’s durability. Overall, the simulations
demonstrate that the D&SMR algorithm outperforms References
the active trust, reliable routing, and optimal routing
approaches to a substantial degree. Furthermore, it is 1. Ghamari, M., Janko, B., Sherratt, R. S., Harwin, W., Piechockic, R.,
D&SMR clearly outperforms active trust, reliable rout- & Soltanpur, C. (2016). A survey on wireless body area networks
ing, and optimal routing in terms of energy usage, with for ehealthcare systems in residential environments. Sensors, 16(6),
831.
average improvements of more than 19.36%, 28.02%,
2. Crosby, G. V., Ghosh, T., Murimi, R., & Chin, C. A. (2012). Wire-
30.07%, 31.97%, 40.2%, 52.58%, and 62.35%, respec- less body area networks for healthcare: A survey. International
tively, during the whole simulation period. Journal of Ad Hoc, Sensor & Ubiquitous Computing, 3(3), 1.
123
782 R. S. Abujassar
3. Arafat, M. Y., & Moh, S. (2022). JRCS: Joint routing and charg- 22. Kardaş, S., Celik, S., Arslan, A., & Levi, A. (2013). An efficient and
ing strategy for logistics drones. IEEE Internet of Things Journal, private RFID authentication protocol supporting ownership trans-
9(21), 21751–21764. fer. In Lightweight cryptography for security and privacy: Second
4. Mu, J., Wei, Y., Ma, H., & Li, Y. (2020). Spectrum allocation international workshop, LightSec 2013, Gebze, Turkey, May 6-7,
scheme for intelligent partition based on machine learning for 2013, Revised Selected Papers 2, Springer. pp. 130–141.
inter-WBAN interference. IEEE Wireless Communications, 27(5), 23. Saxena, D., & Patel, P. (2023). Energy-efficient clustering and
32–37. cooperative routing protocol for wireless body area networks
5. Al-Turjman, F. (2017). Energy-aware data delivery framework for (WBAN). Sādhanā, 48(2), 71.
safety-oriented mobile IoT. IEEE Sensors Journal, 18(1), 470–478. 24. Lalitha, S., Sundararajan, M., & Karthik, B. (2023). Reliable multi-
6. Aledhari, M., Razzak, R., Qolomany, B., Al-Fuqaha, A., & Saeed, path route selection strategy based on evidence theory for internet
F. (2022). Biomedical IoT: Enabling technologies, architectural of things enabled networks. Measurement: Sensors, 27, 100795.
elements, challenges, and future directions. IEEE Access, 10, 25. Raja Basha, A. (2022). A review on wireless sensor networks: Rout-
31306–31339. ing. Wireless Personal Communications, 125(1), 897–937.
7. Dian, F. J., Vahidnia, R., & Rahmati, A. (2020). Wearables and the 26. Haseeb, K., Saba, T., Rehman, A., Ahmed, Z., Song, H. H., &
internet of things (IoT), applications, opportunities, and challenges: Wang, H. H. (2022). Trust management with fault-tolerant super-
A survey. IEEE Access, 8, 69200–69211. vised routing for smart cities using internet of things. IEEE Internet
8. Barakah, D.M., & Ammad-Uddin, M (2012). A survey of chal- of Things Journal, 9(22), 22608–22617.
lenges and applications of wireless body area network (WBAN) 27. Chandnani, N., & Khairnar, C. N. (2022). An analysis of archi-
and role of a virtual doctor server in existing architecture. In 2012 tecture, framework, security and challenging aspects for data
Third international conference on intelligent systems modelling aggregation and routing techniques in IoT WSNs. Theoretical
and simulation, IEEE. pp. 214–219. Computer Science, 929, 95–113.
9. Qu, Y., Zheng, G., Ma, H., Wang, X., Ji, B., & Wu, H. (2019). A 28. Reddy Yeruva, A., Saleh Alomari, E., Rashmi, S., Shrivastava,
survey of routing protocols in WBAN for healthcare applications. A., Kathiravan, M., & Chaturvedi, A. (2023). A secure machine
Sensors, 19(7), 1638. learning-based optimal routing in ad hoc networks for classifying
10. Li, S., Kim, J. G., Han, D. H., & Lee, K. S. (2019). A survey of and predicting vulnerabilities. Cybernetics and Systems, 1–12.
energy-efficient communication protocols with QoS guarantees in 29. Vellela, S. S.,& Balamanigandan, R. (2023). Optimized cluster-
wireless multimedia sensor networks. Sensors, 19(1), 199. ing routing framework to maintain the optimal energy status in the
11. Rani, S., Talwar, R., Malhotra, J., Ahmed, S. H., Sarkar, M., & WSN mobile cloud environment. Multimedia Tools and Applica-
Song, H. (2015). A novel scheme for an energy efficient internet of tions, 1–20.
things based on wireless sensor networks. Sensors, 15(11), 28603– 30. Kaythry, P., Kishore, R., & Avinash, E. (2024). Reliability based
28626. https://doi.org/10.3390/s151128603 multistage ARQ for wide area wireless sensor networks. Journal
12. Yadav, R. N., Misra, R., & Saini, D. (2018). Energy aware cluster of Engineering Science and Technology, 19(2), 374–389.
based routing protocol over distributed cognitive radio sensor net- 31. Papachary, B., Arya, R.,& Dappuri, B. (2024). Power-aware QoS-
work. Computer Communications, 129, 54–66. https://doi.org/10. centric strategy for ultra reliable low latency communication in 5G
1016/j.comcom.2018.07.020 beyond wireless networks. Cluster Computing, 1–14.
13. Cengiz, K., & Dag, T. (2017). Energy aware multi-hop routing 32. Dasari, R., & Venkatram, N. (2024). Optimizing multichannel path
protocol for WSNs. IEEE Access, 6, 2622–2633. scheduling in cognitive radio Ad HoC networks using differential
14. Xiao, K., Wang, R., Deng, H., Zhang, L., & Yang, C. (2019). evolution. Scalable Computing: Practice and Experience, 25(2),
Energy-aware scheduling for information fusion in wireless sensor 1199–1218.
network surveillance. Information Fusion, 48, 95–106. 33. Rocha, D., Teixeira, G., Vieira, E., Almeida, J., & Ferreira, J.
15. Altowaijri, S. M. (2022). Efficient next-hop selection in multi-hop (2023). A modular in-vehicle c-its architecture for sensor data col-
routing for IoT enabled wireless sensor networks. Future Internet, lection, vehicular communications and cloud connectivity. Sensors,
14(2), 35. 23(3), 1724.
16. Moussa, N., Hamidi-Alaoui, Z., & El Belrhiti El Alaoui, A. (2020). 34. Kaur, P., Kaur, K., Singh, K., Bharany, S., Almazyad, A. S.,
ECRP: An energy-aware cluster-based routing protocol for wire- Xiong, G., Mohamed, A. W., Shokouhifar, M., & Werner, F.
less sensor networks. Wireless Networks, 26, 2915–2928. (2023). Acoustic monitoring in underwater wireless sensor net-
17. Mehmood, A., Mauri, J. L., Noman, M., & Song, H. (2015). works using energy-efficient artificial fish swarm-based clustering
Improvement of the wireless sensor network lifetime using leach protocol (EAFSCP).
with vice-cluster head. Ad Hoc and Sensor Wireless Networks, 35. Wang, H., Li, Y., Zhang, Y., Huang, T., & Jiang, Y. (2023).
28(1–2), 1–17. Arithmetic optimization AOMDV routing protocol for FANETs.
18. Shagari, N. M., Idris, M. Y. I., Salleh, R. B., Ahmedy, I., Murtaza, Sensors, 23(17), 7550.
G., & Shehadeh, H. A. (2020). Heterogeneous energy and traf- 36. Manoharan, J. S. (2023). A metaheuristic approach towards
fic aware sleep-awake cluster-based routing protocol for wireless enhancement of network lifetime in wireless sensor networks. KSII
sensor network. IEEE Access, 8, 12232–12252. Transactions on Internet & Information Systems, 17(4).
19. Salunkhe, S. P.,& Patil, H. D. (2016). Delay efficient authenticated 37. Hadwa, S. M., Ghouraba, R. F., Kabbash, I. A., & El-Desouky,
anonymous secure routing for MANETs. International Journal of S. S. (2023). Assessment of clinical and radiographic efficiency
Computer Applications, 148(4). of manual and pediatric rotary file systems in primary root canal
20. Sbeiti, M., Goddemeier, N., Behnke, D., & Wietfeld, C. (2015). preparation: A randomized controlled clinical trial. BMC Oral
PASER: Secure and efficient routing approach for airborne mesh Health, 23(1), 687.
networks. IEEE Transactions on Wireless Communications, 15(3), 38. Ullah, S., Saleem, A., Hassan, N., Muhammad, G., Shin, J., Minhas,
1950–1964. Q. -A.,& Khan, M. K. (2023). Reliable and delay aware routing
21. Babbitt, T. A.,& Szymanski, B. K. (2016). Trust based secure protocol for underwater wireless sensor networks. IEEE Access.
routing in delay tolerant networks. In 2016 IEEE Conference on 39. Gopi, B., Ramesh, G., & Logeshwaran, J. (2022). The fuzzy log-
Computer Communications Workshops (INFOCOM WKSHPS), ical controller based energy storage and conservation model to
IEEE. pp. 542–547. achieve maximum energy efficiency in modern 5G communication.
123
A novel algorithm for the development of a multipath protocol... 783
123