You are currently viewing a new version of our website. To view the old version click .
Electronics
  • Article
  • Open Access

12 December 2022

Game-Theory-Based Multimode Routing Protocol for Internet of Things

,
,
,
,
and
1
Faculty of Computer and Software Engineering, Huaiyin Institute of Technology, Huaian 233003, China
2
Institute of Computing, Kohat University of Science and Technology, Kohat 26000, Pakistan
3
Department of Computer Science and Engineering, Yanbu Industrial College, Royal Commission for Jubail and Yanbu, Yanbu Industrial City 41912, Saudi Arabia
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue Internet of Things for Smart Grid

Abstract

Various routing protocols have been proposed for ad hoc networks such as the Internet of Things (IoT). Most of the routing protocols introduced for IoT are specific to applications and networks. In the current literature, it is essential to configure all the network nodes with a single proposed protocol. Moreover, it is also possible for a single IoT network to consist of different kinds of nodes. Two or more IoT networks can also be connected to create a bigger heterogeneous network. Such networks may need various routing protocols with some gateway nodes installed. The role of gateway nodes should not be limited to the interconnection of different nodes. In this paper, a multi-mode hybrid routing mechanism is proposed that can be installed on all or a limited number of nodes in a heterogenous IoT network. The nodes configured with the proposed protocols are termed smart nodes. These nodes can be used to connect multiple IoT networks into one. Furthermore, a game-theory-based model is proposed that is used for intercommunication among the smart nodes to gain optimal efficiency. Various performance matrices are assessed under different network scenarios. The simulation results show that the proposed mechanism outperforms in broader heterogeneous IoT networks with diverse nodes.

1. Introduction

Various routing protocols for IoT have been proposed in the literature. Reactive, proactive, and hybrid methods are the most common [1]. In proactive routing, each node maintains an up-to-date routing table. To detect variations in the network, the nodes broadcast some control messages in the network. The reactive protocols are on demand: the source nodes generate some routing message whenever they need to send some data. Routing messages are flooded throughout the entire network. This mechanism is known as route discovery. When a path is determined, bandwidth is employed to communicate information [2]. Both protocols have advantages and disadvantages.
The type of network, features, and capabilities of nodes have a noteworthy effect on the efficiency or performance of various protocols. For example, nodes with higher mobility ratios outperform others when using the dynamic source routing (DSR) protocol [3]. According to this fact, we can assume that highly mobile nodes favor pure reactive protocols. Similarly, proactive protocols improve their packet delivery ratio (PDR) as the network size increases [4]. Additionally, proactive routing strategies result in fewer end-to-end delays. A hybrid of reactive and proactive protocols has been proposed by many researchers. Zone routing protocol (ZRP) [5] is the simplest basic hybrid protocol. The proactive routing is limited to the node’s immediate proximity in this routing protocol. The major goal is to reduce total network costs while taking into account the advantages and disadvantages of both types of reactive and proactive protocols.
Hybrid routing technologies combine reactive and proactive routing capabilities. The network is split into several sections in such protocols. The most typical option is to divide the network into zones or clusters [6]. If we partition a network into heterogeneous clusters or zones, there will be no use for the heterogeneity of member nodes within these segments. If we do not bind the nodes to a certain location, the heterogeneous routing protocols can be more efficient. Furthermore, the formation and frequent update of clusters, as well as the nomination of cluster heads (CHs), may result in additional node overhead [7]. Both clustered and non-clustered networks should be covered by the technique.
Multiple routing protocols can be used in the same network. In other words, by utilizing some gateway nodes, many different ad hoc networks can be merged into a single heterogeneous ad hoc network (HANETs). The basic goal of a larger network is to share and optimize resources [8]. Different nodes can use the help of other network nodes to get shorter pathways and transfer data to inaccessible nodes. The resourceful CHs are commonly regarded to be the gateway nodes [9]. Any programmable node should be assigned to the role of the gateway node. Furthermore, the role of gateway nodes in a heterogeneous network should not be confined to connecting distinct nodes. There should be a framework in place that allows gateway nodes to choose their own routing behavior. When choosing their routing behavior, nodes should take into account both their own parameters and the capabilities of the network. A node with proactive neighborhood, for instance, should adopt proactive routing. Similarly, in order to use less energy, nodes with lower remaining energies should switch to reactive routing. While communicating with other gateways and ordinary network nodes, gateway nodes should be able to intelligently choose a routing behavior.
Game theory (GT) is an economics and mathematics branch, but can be applied to any discipline to help people choose between several solutions. In the realm of networking, the GT technique is employed for a variety of objectives. Routing creation, application focus, network security, and network administration are the four fundamental factors that are used to model the relationship between wireless networks and GT [10]. The major goal of incorporating GT in wireless ad hoc networks is to construct a decision-making system in each node to enhance the performance of a network. To achieve improved throughputs, delays, energy consumption, and packet delivery ratios (PDR), GT is used to create routing algorithms for various types of ad hoc networks [9].
Smart nodes capable of understanding both reactive and proactive routing protocols are introduced in the proposed system. Such nodes will intelligently modify their routing behavior in response to network requirements and data traffic. These nodes serve as interfaces between nodes that have distinct routing protocols. By using such nodes, many heterogenous networks can be merged into a more efficient and larger network. The nodes in distinct networks with different routing protocols can be made to connect with each other to reduce delays in data transfer, boost dependability, and lessen energy usage. The routing protocol that will be used among the proposed smart nodes will also be studied and developed using a game-theoretic model. The smart nodes will be able to select the optimal routing protocol for their individual benefit and the benefit of the overall network.
The rest of the paper is organized as follows: The literature review is given in Section 2; Section 3 elaborates the proposed mechanism; the simulation results for different scenarios are given in Section 4; and lastly, in Section 5 the conclusion and future work are discussed.

3. Proposed Mechanism

The proposed study’s major goal is to design and create a network that uses many routing protocols to function together. In a single network, heterogeneity is measured in terms of distinct routing protocols. There may be nodes in a heterogeneous network with varying capabilities and parameters. Energy level, energy consumption ratio, mobility ratio, PDR, and so on are examples of these parameters. The nodes are meant to utilize a specific routing protocol based on the type of parameters.
Some intelligent nodes, known as smart nodes, are programmed to comprehend the routing behavior of various underlying heterogeneous nodes. By acting as gateways between the heterogeneous nodes, these nodes make it easier for them to communicate with one another. Furthermore, when these smart nodes communicate with one another, the most appropriate default routing behavior for them can be established to enhance the overall network’s performance. A game-theory based on the prisoner’s dilemma is used to change default routing behavior. This is an evolutionary process in which nodes evaluate the required parameters over time and adjust their routing behavior accordingly.
Two basic routing protocols are chosen to be employed to connect the nodes in the underlying ad hoc network. These protocols can be of any type. We generalize this by taking the two categories of reactive and proactive protocols. For communication, all the smart nodes can utilize one or both protocols. The preprogrammed nodes operate on a particular routing protocol and cannot be adapted. The smart nodes can include both routing characteristics. Figure 1 depicts the three different classes of nodes. The nodes are classified based on their behavior. A HANET can be created by joining two or more networks that each have proactive and reactive nodes.
Figure 1. Proposed types of nodes and the in-between communication modes.
With the help of Figure 1, the routing capacity of smart nodes can be explained. In this diagram, a smart node communicates proactively with a proactive node while also being perceived as a member of its own family by a reactive node. Depending on their preferences and the GT, smart nodes adjust their routing behavior towards other smart nodes. A smart node can also operate as a connector between two separate nodes.
Figure 2 depicts a small network with heterogeneous nodes using three different routing strategies: proactive, reactive, and smart routing. There are five proactive and eight reactive nodes. This network could alternatively be thought of as a hybrid of two networks combined with the help of some smart nodes. Nodes with similar routing protocols may usually communicate with one another. The proposed smart routing technique, on the other hand, allows nodes with various routing protocols to communicate more effectively. The image depicts two sample scenarios, which are further detailed in Table 2:
Figure 2. Smart links interconnecting heterogeneous nodes.
Table 2. Two cases depicted in Figure 2.
We have two noteworthy cases, as shown in Figure 2 and Table 2. Both the source and destination nodes (R31 and R36) in the first scenario use a reactive routing protocol. A shorter route can be established by involving nodes from different classes when employing the proposed smart nodes. In case 2, two reactive nodes (R52 and R42) cannot connect to each other. These reactive nodes can be linked by enlisting the help of a proactive node and the proposed smart nodes.
This section is further broken into the following subsections: in Section 3.1, several sample network scenarios are given. Section 3.2 discusses the network’s key assumptions and characteristics. The game model is explained in Section 3.3, and the structure and actions of smart nodes are explained in Section 3.4.

3.1. Case Scenarios

While discussing the proposed mechanism, various possibilities might be considered. Figure 3, Figure 4, Figure 5 and Figure 6 depict several case scenarios.
Figure 3. Different nodes are positioned in distinct yet interconnected locations.
Figure 4. Dissimilar nodes are randomly deployed in the same area.
Figure 5. Nodes from the same class are deployed in an L form.
Figure 6. Most of the network nodes are smart nodes.
As demonstrated in Figure 3, two separate networks can be combined to form a larger heterogeneous network. The smart nodes allow the reactive and proactive nodes to connect with each other. Two kinds of communications in such types of heterogeneous networks are possible: common and unusual. In most cases, nodes send and receive data from other nodes that are comparable to them. Heterogeneous nodes communicate with each other in the situation of unusual communication. In this case, the proposed protocol’s performance for common type of communication may be inadequate. However, the suggested protocol outperforms when acting as a gateway between two different types of nodes for an unusual type of communication.
The different nodes in Figure 4 are distributed randomly in the same area. Both reactive and proactive nodes benefit from smart nodes, which allow them to more efficiently send and receive data.
A case scenario is given in Figure 5, in which a class of nodes is arranged in an L form. If the top-most and the right-most nodes, from this class, want to communicate, they should follow the whole route through all the nodes of their class. Using smart nodes, a new diagonal route which is significantly shorter, can be created by involving nodes of another class. The smart link refers to a path that the smart nodes are involved in.
With the proposed smart nodes, a variety of options are available. As shown in Figure 6, a network made up of practically all of the smart nodes is achievable. In such a type of network, the nodes rationally adjust their routing behavior to be proactive or reactive. The adaptation relies on the node’s parameters first, then on the preferences of all known nodes.

3.2. Assumptions and Features

The following are the essential assumptions and aspects of the proposed mechanism:

3.2.1. Network Model

The network is assumed to have a variety of nodes. The network can be compared to a game denoted by G as shown in Equation (1). Where N represents the set of all the nodes of heterogeneous connected networks, S denotes the strategies, and U and I are used for utility and improvement functions, respectively.
G =   N ,   S , U ,   I  

3.2.2. Network Layer

At the physical layer, all nodes are believed to have the same attributes. Only at the network layer do the heterogeneous nodes use distinct routing behaviors. If we suppose that there is also heterogeneity at the physical layer, then the proposed smart nodes should be able to decode the various signals sent by heterogeneous nodes. The smart nodes could use a variety of physical interfaces to understand different signals. However, this work focuses mainly on the network layer.

3.2.3. Base Protocols

The network uses two base protocols: AODV and DSDV. AODV is a reactive protocol, whereas the latter is proactive. Any of these protocols can be used by any of the network nodes. The smart nodes can understand both protocols, but only one of them is used for communication at a time. Other protocols instead of AODV and DSDV can also be used in the proposed mechanism. However, our main focus is on these two protocols during the design and implementation.

3.2.4. Classifications of Nodes

Two groups of nodes can be made based on two classes: type of nodes and protocol-based nodes. There are four types of nodes in the node-type category: (a) source, (b) destination, (c) relay, and (d) neighbor nodes. Equations (2)–(5) are used to define these four types.
S n N   :   n i N a l i v e n i N a d i
The source node is denoted by S n that is the node n i member of network N. S n is a member of alive nodes N a l i v e and active data initiating nodes N a d i .
D n N   :   n i N a l i v e n i N a d r   D n N   :   n i N a l i v e n i N a d r
In Equation (3), D n denotes the destination nodes that are members of sets of alive and active data receiver nodes N a d r .
N E n N   :   n j R t T b l e i n j   i s   N e x t H o p
The set of neighbor nodes of node n i can be represented by N E n . N E n j is a neighbor node of n i that is present in the routing table R t T b l e of node n i , and is marked as N e x t H o p .
R E n N   :   n i N a l i v e n i N a d f   n i R t T b l e S n
In Equation (5), a relay node R E n i is the node that is present in the routing table of source node S n .
Different classes of routing protocols can be used for network nodes. Each node must belong to at least one class as shown in Equation (6). The entire heterogeneous network is composed of the nodes belonging to these classes.
N = n i   C l a s s A     n i   C l a s s B     n i   C l a s s C
In our case, we are using three classes: C l a s s A for proactive nodes, C l a s s B for reactive nodes, and C l a s s C for smart nodes. In the proposed mechanism the three classes can be further defined by Equations (7)–(9).
P r o N N : n i   C l a s s B   |   G e n e r a t e s   T C M   R e s p o n d s   t o   T C M
The proactive nodes, P r o N belonging to C l a s s B , periodically generate topological control messages (TCM) also known as HELLO messages. These nodes also respond to relevant TCM.
R e a N N : n i   C l a s s B   |   G e n e r a t e s   R P k t   R e s p o n d s   t o   R P k t
R e a N denote the reactive nodes. These nodes belong to C l a s s B . These nodes generate and receive routing packets i.e., route request (RREQ), route replies (RREP), and route errors (RERR).
S m r t N N : n i   C l a s s C   |   C l a s s C = C l a s s A     C l a s s B  
Both reactive and proactive features are present in smart nodes   S m r t N . These nodes represent the coming together of reactive and proactive activities.

3.2.5. Neighborhood and Routing Tables

Routing tables are available in two different formats. The routing table used by C l a s s A nodes is shown in Table 3.
Table 3. Routing table for ClassA (Proactive).
C l a s s B nodes retain routing information in their routing tables in the following format shown in Table 4.
Table 4. Routing Table for ClassB (Reactive).
For the storage of routing information, a S m r t N uses both C l a s s A and C l a s s B routing tables. A translator is kept in such nodes to change the values between both the routing tables. Furthermore, each smart node maintains an additional table in which it stores information about its neighbors. These data are gathered after a certain amount of time has passed in order to compute the data about neighbor nodes. The table primarily comprises energy and consumption ratios, and neighbors’ mobility ratios as shown in Table 5.
Table 5. Information about Neighbors.

3.2.6. Nodes’ Energy Level

Each node has a finite amount of energy. Due to their heterogeneous nature, nodes’ energy levels may differ from one another. If a node has enough energy to be spent on data packet transmission, processing, and reception, it is said to be alive. The dead nodes cannot be considered as part of the network. At any point in time if a node fails due to any reason—such as breakage or battery failure—then the node can be considered a dead node.
E n i and E I n i t i a l n i are the current and initial energies of a node n i , respectively. The ratio of a node’s energy consumption over time t is defined as, Δ E t n i   = E T t n i   E T n i   . After a certain amount of time, the energy fluctuation must fulfill the equation E n i > Δ E n i . The value Δ E may differ for each node due to the heterogeneous environment. E R m n t n i is the remaining energy ratio of a node, n i at time t , as computed in Equation (10).
E R m n t n i = E t n i E I n i t i a l n i
In Equation (11), λ E t n i   represents the current energy to energy consumption ratio at time t of a node n i .
λ E t n i = E t n i Δ E t n i
The median of the known nodes’ λ E t n j can be used to calculate the energy threshold value, T h E , as shown in Equation (11). Each smart node can send a request to its known nodes to get these values.
T h E = M e d λ E t n j

3.2.7. Nodes’ Mobility Ratio

The network’s nodes are mobile and have variable mobility ratios. The kth location of a node n i is L o c k n i = x k , y k where x and y are the coordinates. If a node n i moves from location k to location l in a time period t, then it can be denoted as Δ L o c k , l t n i and computed as in Equation (12).
Δ L o c k , l t n i = x k x l 2 + y k y l 2 t  
The same can be said for the n i node’s mobility ratio, which is indicated by   M o b R a t i o ( n i ) . A smart node requires a threshold value for mobility ratio, T h M , during default protocol selection, which can be calculated using Equation (13).
T h M = M e d M o b R a t i o n j  

3.3. Game Modeling

As previously stated, the network can be viewed as a game. The strategies and utility functions of player nodes as well as the game matrix and improvement functions are addressed in this subsection.

3.3.1. Nodes’ Strategies and Utility Function

S denotes the strategy of nodes towards routing protocol selection in the game. The routing behavior of a node is determined by three major characteristics. The energy level, consumption ratio, and mobility ratio of the nodes are these metrics. A proactive routing technique is preferred by nodes with a higher degree of energy while highly mobile nodes, on the other hand, require reactive routing for best results.
The nodes first examine their mobility ratio. For a higher value of mobility, the nodes adjust their default routing protocol to reactive. If the mobility level is higher, then the energy consumption ratio and current level are examined. With the reduced energy consumption ratio, nodes with a higher energy level adapt to proactive routing behaviour. A node’s power is tested afterward. For a smart node   n i , i.e., S m r t N N, two strategies are defined: S i = s r , s p , where s r represents the strategy with a reactive protocol ( R e a N ) and S i = s p denotes a member of the P r o N class, i.e., proactive node. If two smart nodes with different routing protocols are communicating with each other, then an adequate level of energy and time is wasted on unwanted routing and topology control packets. This wastage can be considered the transmission cost on routing. The payoff functions are determined by node strategies. Equation (14) can be used to define the payoff function for two smart nodes.
U n i , n j = 1 C P r o N , i , 1 C R e a N , j           w h e r e   R P n i R P n j 1 , 1               w h e r e   R P n i = R P n j
where C P r o N , i is the cost of routing for the class of proactive nodes due to the smart node n i . Between two smart nodes, the following game matrix can be formed:
There is no need to change the routing protocol of n i   and n j , if both are using the same routing protocol. If two nodes have distinct routing behaviors, their routing performance will be impaired, as shown in the Table 6. The situation where both the smart nodes operate on different protocols is referred to as the degraded protocols and denoted by Δ R and Δ P. It is clear from Lemma 1 that the game strageies form a pure Nash Equilibrium.
Table 6. Game matrix.
Lemma1. 
In the proposed game, the strategy pairs s r , s p and   ( s p , s r ) form a pure Nash Equilibrium.
Proof. 
There are two major classes of nodes in the network. These are reactive and proactive classes. Each smart node is allowed to choose either of these two routing protocols. In Table 5 the strategies are given along with the payoffs. In case both the interacting nodes use the same routing protocol then there will be an optimal situation denoted by 1 ,   1 . It is clear that the payoff should be less than 1 for the cases s r , s p and ( s p , s r ). The distinct nodes should change their strategies to gain an optimal payoff. Therefore, according to the definition, the situation is a pure Nash Equilibrium for this game. □
To switch the routing from a costly routing protocol, an evolutionary technique, referred to as the improvement function I , is used.

3.3.2. Improvement Function

Each node in the network establishes its default routing protocol at the outset and refreshes it after a certain amount of time has passed. With the passage of time, the default behavior changes based on the parameters considered. If a node in the game matrix receives Δ R or Δ P. It kicks off the game’s second phase. Both of its routing tables are scanned. The NextHop fields are checked in both tables. Using the following Equation (15), to obtain the most common routing protocol in the neighborhood, the entries are counted and compared.
C o u n t   D i s t i n c t P r o R t T b l e N e x t H o p > C o u n t   D i s t a n t R e a R t T b l e N e x t H o p
If the criterion is met, the node n i adjusts to proactive as its default routing protocol; otherwise, it switches to reactive protocol. If the node receives Δ R or Δ P again, it evaluates all of the stored nodes in its routing tables, and accordingly modifies its routing protocol, following the same approach as with Equations (16)–(18).
T o t a l P r o = D i s t i n c t P r o R t T b l e A l l   n o d e s
T o t a l R e a = D i s t i n c t R e a R t T b l e A l l   n o d e s
S i z e O f T o t a l R e a > S i z e O f T o t a l P r o
Two sets, T o t a l R e a and   T o t a l P r o , are used in these equations and are known to node   n i   . The node n i   switches its routing behavior according to the largest known routing protocol in the network.

3.4. Architecture and Functions of Smart Nodes

The design of smart nodes, their functions, and the algorithms employed in the mechanism are detailed in this subsection. Various scenarios are presented, along with smart node responses. As previously stated, smart nodes act rationally, allowing different types of communication and data packets to be received and intelligent case-based decisions to be made.

3.4.1. Diagram for Smart Nodes

The architecture of proposed smart nodes is divided into two sections: the first is reception control, which deals with packet recognition and the latter is routing protocol selection. The packet analysis is the subject of the first module. The received packets are classified as (a) data, (b) routing, and (c) TCM packets using a message parser. A different set of instructions is followed for each type of packet. The routing protocol module receives the set of instructions. The routing tables are kept in the routing protocol module. This module additionally adjusts the routing mode based on the previous module’s instructions. This module also keeps track of the neighbors’ information as well as a temporary storage cache. This architecture is presented in Figure 7 and is further explained in Table 7.
Figure 7. Smart node’s architecture.
Table 7. Smart nodes’ operational steps.

3.4.2. Algorithms

This section goes through three major algorithms. Algorithm 1 describes the technique for smart nodes to choose an initial default routing protocol. The selected routing protocol may update with the passage of time, according to the GT process. Algorithm 2 describes how to update the routing protocol. Smart nodes accept packets and conduct different tasks depending on the nature of packets received. Algorithm 3 explains this procedure.
Algorithm 1: Selection of Default Routing Protocol
Input:  n i
Output: DefaultRoutingProtocol
Begin:
  • W i t h   Neigh Table
  • U p d a t e   Records
  • C a l c u l a t e
  • ThE = Med λ E n j
  • ThM = Med MobRatio
  • E n d   W i t h
  • I f   MobRatio ( n i ) > ThM
  • Return   Reactive
  • E l s e   I f   λ E n i > ThE OR ER n i > β
  • Return   Proactive
  • E l s e   Return   Reactive
  • E l s e   I f
The neighbors’ table is taken first, according to Algorithm 1. By obtaining new information from its known nodes, the smart node updates the entries. The threshold values for energy to consumption ratios and mobility ratios are calculated in stages 4 and 5. The routing mode is determined from step 7 by comparing the node’s data to the estimated threshold values. If the node’s λ E is larger than or if its remaining energy ratio is greater than β in step 9, the 0 < β < 100 represents a coefficient value obtained during simulations.
Algorithm 2: Evolution Process for Default Routing Protocol
Input:  n i
Output: DefaultRoutingProtocol
Begin:
  • I f   CurrentTime     LastReadTime   >   ExpiryInterval  
  • r o u n d = 0
  • E n d   i f
  • i f   G matrix = Δ R   O R   G matrix = Δ P
  • i f   r o u n d = 0
  • PP = Count   Distinct ProRtTable . NextHop
  • RP = Count   Distinct ReaRtTable . NextHop
  • I f   ( PP > RP )
  • Return   Proactive
  • E l s e
  • Return   Reactive
  • r o u n d = 1
  • E n d   I f
  • E l s e
  • PP = Count   Distinct ProRtTable . DestIP
  • PP = PP + Count   Distinct ProRtTable . NextHop
  • RP = Count   Distinct ReaRtTable . DestIP
  • RP = RP + Count   Distinct ReaRtTable . NextHop
  • If PP > RP
  • Return   Proactive
  • E l s e
  • Return   Reactive
  • r o u n d = 1
  • E n d   I f
  • E n d   I f
  • E l s e
  • Return   n i . DefltRtProc
  • LastReadTime = CurrentTime
  • E n d   I f
In Algorithm 2, the round variable is utilized to change the evolutionary rounds for parameter consideration. This round gets reset to its original value when a certain amount of time has passed. The time is verified for expiry in step one. If the round has expired, step 2 sets the first round. In step 4, the game matrix is examined for the chances of a degraded routing protocol. If there is a degraded protocol, steps 6 to 12 are carried out for the case of first round, and steps 15 to 23 are carried out for the cases of the next rounds. At first, the node examines the neighbors’ parameters, but in subsequent cases, the node considers all the known nodes in its routing tables.
Algorithm 3: Operational Tasks of Smart Nodes
Input: Packet
Output:
Begin:
  • U p o n   R e c e p t i o n   o f   Packet
  • P a r s e   Packet
  • Cache = Packet
  • I f   Packet . Protocol = Reactive
  • R T = R e a R t T a b l e
  • E l s e
  • R T = P r o R t T a b l e
  • E n d   I f
  • I f   Packet . T y p e = R o u t i n g
  • R t P r o . M o d e = Reactive
  • I f   P a c k e t . D e s t = n i . A d d r e s s
  • REPLY   P a c k e t . S o u r c e
  • E l s e   I f   P a c k e t . D e s t   e x i s t s   i n   R T . D e s t
  • Forward   R T . N e x t H o p
  • E l s e
  • Broadcast   Packet
  • E l s e   I f
  • Update   R e a R t T a b l e
  • E n d   I f
  • I f   Packet . T y p e = T C
  • R t P r o . M o d e = P r o active
  • REPLY   P a c k e t . S o u r c e
  • Update   P r o R t T a b l e
  • E n d   I f
  • I f   Packet . T y p e = D A T A
  • i f   P a c k e t . D e s t = n i . A d d r e s s
  • REPLY   A C K
  • E l s e   I f   P a c k e t . D e s t   e x i s t s   i n   R T . D e s t I P
  • FORWARD   t o   R T . N e x t H o p
  • E l s e
  • REPLY   E R R O R
  • E n d   I f
  • E n f   I f
Algorithm 3 deals with packet arrival and node’s operations regarding the kind of packet. Initially, a temporary variable RT is allocated to one of the routing tables. Step 9 determines whether the packet is of routing type. For a route packet arrival, actions are conducted from steps 10 to 18. The node either acknowledges the source, or broadcasts or forwards the packet during these steps. Step 20 determines whether or not the packet is a proactive TCM. The routing table is modified after the TC message is acknowledged. At step 25, the packet is checked to see if it contains data. Respective operations (steps 26–31) are performed according to the nature of the data packet.

4. Simulation Results

The proposed work is simulated in NS2.35. AWK scripts were used to extract the results from the created trace files, and then MS Excel was used to create the graphs. The performance metrics accessed were remaining energy, throughput, PDR, and end-to-end delays. Some scenarios were created and the results with and without smart nodes were assessed. A heterogeneous network made up of AODV and DSDV nodes was used in these scenarios. The findings are compared with and without the smart nodes. In each example the network is first examined with the absence of nodes that have the proposed mechanism. After that, the proposed mechanism’s smart nodes are added to the network, and outcomes are analyzed. The duration of the simulation was 100 seconds. Table 8 lists the main simulation parameters. In four time pauses, the resultant values were recorded.
Table 8. Common parameters for all the simulations.

4.1. Case 1: Nodes from Different Classes Are Deployed in Separate but Nearby Fields

Figure 8 shows a screenshot of the NetAnim animator in this scenario. The AODV nodes are green, the DSDV nodes are blue, and the proposed smart nodes are red.
Figure 8. Case scenario 1: NS2 NetAnim Screenshot.
In Table 9, the parameters for heterogeneous nodes are listed. There are three classes of nodes, each with its own set of values. The common and uncommon communication types are considered in this example situation. In the previous section, these types were discussed.
Table 9. Case 1: Parameters for classes of nodes.
In scenario 1, where there are two classes of nodes coupled together but not overlapped in the area, Figure 9 displays the simulation results for frequent communication instances. Only DSDV nodes can communicate with each other. AODV nodes, on the other hand, only communicate with AODV. Values with and without smart nodes are shown in the graph. When it comes to common communication, smart nodes have a much smaller part in the network. The smart nodes would have formed part of either DSDV or AODV classes of nodes because there is no cross connectivity. If a smart node has the same number of DSDV and AODV neighbors, the reactive protocol will be used until the threshold energy level i.e., β is reached. The results reveal that the performance of such a network is almost unaffected by the presence of smart nodes.
Figure 9. Case 1: Type of common communication.
In the next experiment, the network was assumed to have two source nodes from DSDV class and two destination nodes from AODV destinations nodes for unusual communication. The routing protocols used by the sources and destinations were different. Because such communication is impossible without the smart nodes, the results for “Without Smart Nodes” cannot be calculated because there are no outputs. Only the energies of nodes are reported. Without the usage of smart nodes, the results show that this form of communication is not possible in general. The values for all QoS measures were recorded when the proposed smart nodes were used, as shown in Figure 10. It is worth noting, however, that the amount of remaining energy in the absence of smart nodes is significantly higher. This is because the network nodes cannot establish paths, thus there is no energy spent on routing and data communication.
Figure 10. Case 1: Uncommon communication type.

4.2. Case 2: Heterogeneous Nodes Are Not Placed Distinctly

In the previous section, we discussed this case. In this scenario, we have a network with three classes of nodes: DSDV, AODV, and smart nodes. All these nodes were randomly deployed in the same area. These nodes have positions that overlap in a certain area. The simulation’s NS2 screenshot is shown in Figure 11. The scenario includes 35 DSDV, 35 AODV, and 30 smart nodes.
Figure 11. Case scenario 2: NS2 NetAnim Screenshot.
The simulation parameters for this experiment are given in Table 10.
Table 10. Case 2: Parameters for classes of nodes.
Figure 12 shows the simulation results for Case Scenario 2. Except for energy usage, the network with smart nodes produces significantly better results in all performance parameters. For the smart node-based network, the results for residual energy at various time pauses are virtually identical or slightly better. In the absence of a smart node network, we kept the smart nodes dormant for the simulation. As a result, smart nodes experience minimal energy loss, resulting in superior average remaining energy values.
Figure 12. Case scenario 2: Random placement of heterogeneous nodes.

4.3. Case 3: Proactive Nodes Are Deployed in an L Pattern

In this example, we assume that all of the nodes of a particular class are clustered together in an L shape. The DSDV nodes are considered in this case. A similar instance was described in the previous section. If we do not use the smart nodes, the route entails all of the nodes of DSDV class, which is a lengthier route. The reactive AODV nodes can also be used by incorporating the smart nodes, and a diagonal route can be constructed, minimizing the number of intermediate nodes. Figure 13 depicts the screenshot for case 3. Table 11 shows the parameters used in this case scenario.
Figure 13. Case scenario 3: NS2 NetAnim Screenshot.
Table 11. Case 3: Parameters for classes of nodes.
The results for case 3 are shown in Figure 14. With a smart node-based network, the results for PDR, delays, and throughput are better. This is because of the establishment of a shorter route. However, the remaining energy is quite comparable. Because the non-proactive nodes are not employing their energies, less energy is spent without smart nodes. If we simply consider the values of DSDV nodes, the ratio of remaining energy in the absence of smart nodes will be significantly greater. Because the AODV routing burden is taken into account, the throughput of the smart node-based network is high. The AODV nodes were not involved in routing in the absence of smart nodes and so there was minimal routing overhead.
Figure 14. Case scenario 3: Proactive nodes are deployed in an L pattern.
The proposed protocol, identified as GMRP in the simulation results, has been compared with AODV and ZRP for further evaluation. A network of 100 nodes with an area of 1500 ms2 was taken. The nodes were programmed with AODV, ZRP and GMRP respectively and results were recorded for 200 pause times. The performance of the protocols in terms of PDR, average energy consumption, and end-to-end latency were accessed. Figure 15, Figure 16 and Figure 17 show the results. We can infer from the results that GMRP is a highly adaptive protocol that reacts to time. The nodes tend to alter their routing behavior as time progresses. This is because the nodes consume their energy with the passage of time. The performance of GMRP is comparable to AODV in terms of energy consumption and PDR. The smart nodes choose to adopt the reactive routing behavior since they initially have greater energies. The performance steadily declines after pause time 100 as a result of the change to proactive routing behavior. In case of end-to-end delays, the protocol performance is similar to AODV in the beginning but improves later. This is also due to the change of routing behavior from reactive to proactive. The nodes gradually start changing their routing protocol with the passage of time by looking into their remaining energies.
Figure 15. Packet delivery ratio (No. of packets received/No. of packets sent).
Figure 16. End-to-end delays (milliseconds).
Figure 17. Average energy consumption (Joules).

5. Conclusions and Future Work

Depending on their capabilities and the nature of their usage, ad hoc networks can take on a variety of configurations. Various ad hoc networks can be linked together for the creation of an efficient and more powerful network. A multimode hybrid routing protocol is proposed in this paper that can be utilized to create a HANET including nodes from diverse ad hoc networks. Moreover, the proposed routing protocol can be implemented in the entire network or a subset of the network nodes. The smart nodes are those nodes that use the proposed routing protocol to communicate. At the same time, the smart nodes preserve the routing tables for both reactive and proactive neighbors. These nodes can adjust their routing behavior adaptively as needed. Furthermore, its default routing protocol is adjusted using a game-theoretic technique. The smart nodes progress through many steps to find the best routing protocol for themselves and the entire network. The energy level and consumption and mobility ratios are the parameters used to establish the default routing protocol for these smart nodes.
We employed AODV and DSDV as base protocols in this work. Instead of these two, any type and number of protocols can be selected. With a set of finite parameters for the network nodes, linear programming can be used to implement numerous protocols by improving normalization and achieving the best solution. The consideration of multiple routing protocols could cause an uncertainty problem. A technique for making decisions under uncertainty can be created by combining game theory and linear programming.

Author Contributions

Conceptualization, S.K. and M.M.U.; methodology, M.M.U.; software, S.X.; investigation, N.A.; formal analysis, C.J. and M.M.U.; investigation, S.X.; resources, C.J.; data curation, M.M.U., C.J. and N.A.; writing—review and editing, S.K. and Z.I.; supervision, S.K.; project administration, S.K.; funding acquisition, C.J. and N.A. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Acknowledgments

The authors of this paper would like to offer thanks for the research facilities provided by the Huaiyin Institute of Technology, China.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Bendale, L.M.; Jain, R.L.; Patil, G.D. Study of Various Routing Protocols in Mobile Ad-Hoc Networks. Int. J. Sci. Res. Netw. Secur. Commun. 2018, 6, 5–15. [Google Scholar]
  2. Prabha, K. Performance assessment and comparison of efficient ad hoc reactive and proactive network routing protocols. SN Comput. Sci. 2020, 1, 13. [Google Scholar] [CrossRef]
  3. Pal, P.; Pal, R. Observing of Mobility Model against Reactive Routing Protocols in MANETs of throughput, Average end-to-end delay, packet delivery ratio. Int. J. Comput. Sci. Eng. 2017, 5, 43–52. [Google Scholar]
  4. Wali, S.; Ullah, S.I.; Khan, A.U.; Salam, A. A Comprehensive Study on Reactive and Proactive Routing Protocols under different performance Metric. Sukkur IBA J. Emerg. Technol. 2019, 1, 39–51. [Google Scholar]
  5. Walikara, G.A.; Biradarb, R.C. A survey on hybrid routing mechanisms in mobile ad hoc networks. J. Netw. Comput. Appl. 2017, 77, 48–63. [Google Scholar] [CrossRef]
  6. Raheja, K.; Maakar, S.K. A survey on different hybrid routing protocols of MANET. Int. J. Comput. Sci. Inf. Technol. 2014, 5, 5512–5516. [Google Scholar]
  7. Gavhale, M.; Saraf, P.D. Survey on algorithms for efficient cluster formation and cluster head selection in MANET. Procedia Comput. Sci. 2016, 78, 477–482. [Google Scholar] [CrossRef]
  8. Qiua, T.; Chena, N.; Li, K.; Qiao, D.; Fu, Z. Heterogeneous ad hoc networks: Architectures, advances and challenges. Ad Hoc Netw. 2017, 55, 143–152. [Google Scholar] [CrossRef]
  9. Das, S.K.; Tripathi, S. Adaptive and intelligent energy efficient routing for transparent heterogeneous ad-hoc network by fusion of game theory and linear programming. Appl. Intell. 2018, 48, 1825–1845. [Google Scholar] [CrossRef]
  10. Charilas, D.; Athanasios, E.; Panagopoulos, D. A survey on game theory applications in wireless networks. Comput. Netw. 2010, 54, 3421–3430. [Google Scholar] [CrossRef]
  11. Selvi, P.T.; GhanaDhas, C.S. A Novel Algorithm for Enhancement of Energy Efficient Zone Based Routing Protocol for MANET. Mob. Netw. Appl. 2018, 24, 307–317. [Google Scholar] [CrossRef]
  12. Sharah, A.A.; Alhaj, M.; Naimat, F.A. Trade-off between Energy Consumption and Transmission Rate in Mobile Ad-Hoc Network. Int. J. Adv. Comput. Sci. Appl. 2021, 12, 245–252. [Google Scholar] [CrossRef]
  13. Lv, Y.; Feng, W.; Xiao, A.; Bao, X. Cluster-head Centered Fast Secure Routing based on Game theory for Device-to-Device Communication. Wirel. Pers. Commun. 2020, 113, 2079–2106. [Google Scholar] [CrossRef]
  14. Zheng, M. Game Theory Used for Reliable Routing Modeling in Wireless Sensor Networks. In Proceedings of the 11th International Conference on Parallel and Distributed Computing, Applications and Technologies, Wuhan, China, 8–11 December 2010. [Google Scholar]
  15. Umar, M.M.; Alrajeh, N.; Mehmood, A. SALMA: An efficient state-based hybrid routing protocol for mobile nodes in wireless sensor networks. Int. J. Distrib. Sens. Netw. 2016, 12, 2909618. [Google Scholar] [CrossRef]
  16. Haas, Z.J.; Pearlman, M.R.; Samar, P. The zone routing protocol (ZRP) for ad hoc networks. In Internet Draft, Draft-ietfmanet-zone-zrp-04.txt; IEEE: Piscataway, NJ, USA, 2002. [Google Scholar]
  17. Hu, Y.; Zhang, F.; Tian, T. Dynamic Relationship-Zone Routing Protocol for Ad Hoc Networks. Wirel. Pers. Commun. 2020, 114, 2461–2476. [Google Scholar] [CrossRef]
  18. Shanthy, R.; Padma, T. A zone routing protocol incorporated with sleep scheduling for MANETs. J. Ambient. Intell. Humaniz. Comput. 2021, 12, 4181–4191. [Google Scholar] [CrossRef]
  19. Yanga, X.; Chenb, Q.; Chenb, C.; Zhao, J. Improved ZRP Routing Protocol Based on Clustering. Procedia Comput. Sci. 2018, 131, 992–1000. [Google Scholar] [CrossRef]
  20. Gasmi, R.; Aliouat, M.; Seba, H. A Stable Link Based Zone Routing Protocol (SL-ZRP) for Internet of Vehicles Environment. Wirel. Pers. Commun. 2020, 112, 1045–1060. [Google Scholar] [CrossRef]
  21. Gopalan, S.H. ZHRP-DCSEI, a Novel Hybrid Routing Protocol for Mobile Ad-hoc Networks to Optimize Energy Using Dynamic Cuckoo Search Algorithm. Wirel. Pers. Commun. 2021, 118, 3289–3301. [Google Scholar] [CrossRef]
  22. Ung, H.; Choi, J. A new approach to adaptive multi-routing protocol for mobile ad hoc network. In International Workshop on Self-Organizing Systems; Springer: Berlin/Heidelberg, Germany, 2007. [Google Scholar]
  23. Hoebeke, I.M.J.; Demeester, P. Adaptive routing for mobile ad hoc networks. EURASIP J. Wirel. Commun. Netw. 2012, 2012, 126. [Google Scholar] [CrossRef][Green Version]
  24. Benjbara, C.; Habbani, A.; Mouchfiq, N. New Multipath OLSR Protocol Version for Heterogeneous Ad Hoc Networks. J. Sens. Actuator Netw. 2022, 11, 3. [Google Scholar] [CrossRef]
  25. Hauge, M.; Mjelde, T.M.; Holtzer, A.; Drijver, F.; Velt, R.I.; Hegland, A.M.; Ørbekk, E.; Barz, C.; Kirchhoff, J.; Rogge, H. Inter-network interoperability for heterogeneous networks at the tactical edge. In Proceedings of the 2020 Military Communications and Information Systems Conference (MilCIS), Canberra, ACT, Australia, 10–12 November 2020; pp. 1–7. [Google Scholar] [CrossRef]
  26. Okano, K.; Aoki, Y.; Ohta, O.; Kakuda, Y. An Inter-Domain Routing Protocol Based on Autonomous Clustering for Heterogeneous Mobile Ad Hoc Networks. IEICE Trans. Commun. 2015, 98, 1768–1776. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.