Mobile networks (MANETs) and wireless mesh networks (WMNs) are used in a variety of research areas, including the military, industry, healthcare, agriculture, the Internet of Things (IoT), transportation, and smart cities. The swift advancement in MANET technology is the driving force behind this rising adoption rate. Routing over MANET is a critical problem due to the dynamic nature of the link qualities, even when nodes are static. A key challenge in MANETs is the need for an efficient routing protocol that establishes a route according to certain performance metrics related to the link quality. The routing protocols utilised by the nodes in WMNs and MANETs are distinct. Nodes in both types of networks exchange data packets through the routing protocols. For this highly mobile network, the On-Demand Distance Vector (AODV) routing protocol has been suggested as a possible solution. Recent years have attracted researchers' attention to AODV since it is a routing technique for networks that prevents looping. The architecture of this routing protocol considers several factors, including the mobility of nodes, the failure of connection links, and the loss of packets. In this systematic review, one of the key focuses is bringing attention to the classic AODV, which was developed after discussing the recent development of several versions of AODV. The AODV routing protocol performs a path strength check to generate a more reliable and secure route between the source and destination nodes. In AODV, investigations demonstrate advances in both the format protocol approach and the network simulation-2 (NS-2), and these improvements were made in the same scenario used to revitalise AODV. It has been discovered that the AODV is more effective in several aspects, such as throughput, end-to-end delay, packet delivery ratio (PDR), energy consumption, jitter, packet loss ratio, and network overhead. Furthermore, this paper presents this systematic review based on AODV modifications in the Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA). It also provides a methodological framework for the papers' selection.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC9455269 | PMC |
http://dx.doi.org/10.7717/peerj-cs.1079 | DOI Listing |
Sensors (Basel)
January 2025
Institute of Intelligent Manufacturing Technology, Shenzhen Polytechnic University, Shenzhen 518000, China.
This paper introduces a novel energy-efficient lightweight, void hole avoidance, localization, and trust-based scheme, termed as Energy-Efficient and Trust-based Autonomous Underwater Vehicle (EETAUV) protocol designed for 6G-enabled underwater acoustic sensor networks (UASNs). The proposed scheme addresses key challenges in UASNs, such as energy consumption, network stability, and data security. It integrates a trust management framework that enhances communication security through node identification and verification mechanisms utilizing normal and phantom nodes.
View Article and Find Full Text PDFSci Rep
January 2025
Department of Computer Science & Engineering, Manipal Institute of Technology Bengaluru, Manipal Academy of Higher Education, Manipal, Karnataka, India.
Conserving energy of sensor nodes and ensuring balanced workloads among them are fundamental concerns in Wireless Sensor Network (WSN) design. Clustering strategies offer a promising avenue to minimize node energy consumption, thereby prolonging network lifespan. Nevertheless, numerous multi-hop routing protocols using clustering technique face the challenge of nodes nearer to the Base Station (BS) depleting their energy faster due to forwarding data from the entire network leading to premature node failure and network partitioning known as 'hotspot problem'.
View Article and Find Full Text PDFSci Rep
January 2025
Department of Electronics and Communication Engineering, Nagarjuna College of Engineering and Technology, Bengaluru, 562164, Karnataka, India.
Wireless sensor networks (WSNs) are imperative to a huge range of packages, along with environmental monitoring, healthcare structures, army surveillance, and smart infrastructure, however they're faced with numerous demanding situations that impede their functionality, including confined strength sources, routing inefficiencies, security vulnerabilities, excessive latency, and the important requirement to keep Quality of Service (QoS). Conventional strategies generally goal particular troubles, like strength optimization or improving QoS, frequently failing to provide a holistic answer that effectively balances more than one crucial elements concurrently. To deal with those challenges, we advocate a novel routing framework that is both steady and power-efficient, leveraging an Improved Type-2 Fuzzy Logic System (IT2FLS) optimized by means of the Reptile Search Algorithm (RSA).
View Article and Find Full Text PDFSci Rep
January 2025
School of Computer Science Engineering and Information Systems, Vellore Institute of Technology, Vellore, India.
This is a moment of heavy necessity for a dependable internet connection in the modern world, which is used to engage in business dealings, communicate with other people, entertain oneself, and lead a daily life. Therefore, a Wi-Fi 6 router must have an internal wire-free connection within a house or business. However, as they depend on the weather and are installed in ways that expose them to infiltration, they are vulnerable.
View Article and Find Full Text PDFSci Rep
December 2024
Research and Development, ICU Medical India LLP, Chennai, Tamil Nadu, 600006, India.
In clustered cognitive radio sensor networks (CRSNs), availability of free channels, spectrum sensing and energy utilization during clustering and cluster head (CH) selection is essential for fairness of time and event-driven data traffic. The existing multi-hop routing protocols in CRSNs generally adopt a perfect spectrum sensing which is not same in the practical spectrum sensing of nodes in real networks. High imbalance in residual energy between the selected CHs negatively impacts the delivery of data packets.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!