Javascript is required
1.
S. Biswas, Y. M. K. P, M. Mrinal, E. Bhardwaj, S. Santhosh, S. Masood, and S. M. I., “The firefly unit: A MANET based communication system using Zigbee and LoRaWAN protocols for IoT applications in Remote Locations,” In 2021 International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), pp. 642–646, 2021. [Google Scholar] [Crossref]
2.
S. S. Abou Emira, K. Y. Youssef, and M. Abouelatta, “Power efficient routing protocol (AODV) for IoT based livestock applications,” In 2019 14th International Conference on Computer Engineering and Systems (ICCES), pp. 407–412, 2019. [Google Scholar] [Crossref]
3.
M. Umashankar, S. Mallikarjunaswamy, N. Sharmila, D. M. Kumar, and K. R. Nataraj, “A survey on IoT protocol in Real-time Aapplications and Its architectures,” In ICDSMLA 2021: Proceedings of the 3rd International Conference on Data Science, Machine Learning and Applications, pp. 119–130, 2023. [Google Scholar] [Crossref]
4.
P. Nayak and P. Sinha, “Analysis of random way point and random walk mobility model for reactive routing protocols for MANET using NetSim simulator,” In 2015 3rd International Conference on Artificial Intelligence, Modelling and Simulation (AIMS), pp. 427–432, 2015. [Google Scholar] [Crossref]
5.
N. Kumar, A. Agrawal, and R. A. Khan, “Emergency alert networks for disaster management: Applications perspective,” In 2018 International Conference on Research in Intelligent and Computing in Engineering (RICE), pp. 1–5, 2018. [Google Scholar] [Crossref]
6.
A. M. Zaalouk, M. M. Zarie, R. Nassar, V. E. Gerguis, H. H. Mahmoud, and M. M. Abdellatif, “IoTmC: A low cost IoT application for mobile communications,” In 2018 IEEE Global Conference on Internet of Things (GCIoT), pp. 1–5, 2018. [Google Scholar] [Crossref]
7.
A. K. Biswas and M. Dasgupta, “A secure hybrid routing protocol for mobile Ad-Hoc networks (MANETs),” In 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT), pp. 1–7, 2020. [Google Scholar] [Crossref]
8.
T. M. Noorul, R. S. Pramila, and N. Islam, “An analysis of routing protocols in MANETs and Internet of things,” In 2017 International Conference on IoT and Application (ICIOT), pp. 1–8, 2017. [Google Scholar] [Crossref]
9.
W. A. Jabbar, M. Ismail, and R. Nordin, “Evaluation of energy consumption in multipath OLSR routing in smart City applications,” In 2013 IEEE 11th Malaysia International Conference on Communications (MICC), pp. 401–406, 2013. [Google Scholar] [Crossref]
10.
M. K. Shah and L. K. Sharma, “Study on 6LoWPAN routing protocols with SD aspects in IoT,” In 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC) I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), 2018 2nd International Conference on, pp. 60–65, 2018. [Google Scholar] [Crossref]
11.
B. U. I. Khan, F. Anwar, R. F. Olanrewaju, M. L. B. M. Kiah, and R. N. Mir, “Game theory analysis and modeling of sophisticated multi-collusion attack in MANETs,” IEEE Access, vol. 9, pp. 61778–61792, 2021. [Google Scholar] [Crossref]
12.
M. Sharma, “A basis on prestige gotten better SIEM for nefarious link tracking in IoT,” In 2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART), pp. 352–355, 2022. [Google Scholar] [Crossref]
13.
S. Mallikarjunaswamy, N. Sharmila, G. K. Siddesh, K. Nataraj, and M. Komala, “A novel architecture for cluster based false data injection attack detection and location identification in smart grid,” Advances in Thermofluids and Renewable Energy: Select Proceedings of TFRE 2020, pp. 599–611, 2022. [Google Scholar] [Crossref]
14.
R. Shivaji, K. Nataraj, S. Mallikarjunaswamy, and K. R. Rekha, “Implementation of an effective hybrid partial transmit sequence model for peak to average power ratio in MIMO OFDM system,” In ICDSMLA 2020: Proceedings of the 2nd International Conference on Data Science, Machine Learning and Applications, pp. 1343–1353, 2022. [Google Scholar] [Crossref]
15.
U. Srilakshmi and B. Srinivasrao, “An evaluation of exposure and obstacle technique and its reply over mobile ad-hoc network,” In 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), pp. 525–530, 2017. [Google Scholar] [Crossref]
16.
M. Vanitha, N. Akash, and P. Vikas, “An Effective Approach on Clustering and Data Aggregation for the application of Internet of Things in Long Range Networks,” In 2022 6th International Conference on Electronics, Communication and Aerospace Technology, pp. 549–555, 2022. [Google Scholar] [Crossref]
17.
P. Bellavista, G. Cardone, A. Corradi, and L. Foschini, “Convergence of MANET and WSN in IoT urban scenarios,” IEEE Sens. J., vol. 13, no. 10, pp. 3558–3567, 2013. [Google Scholar] [Crossref]
18.
Z. Guo, I. G. Harris, C. B. Harris, Y. Jiang, and L. Tsaur, “A residual battery-aware routing algorithm based on DSR for BLE sensor networks,” In 2016 Wireless Telecommunications Symposium (WTS), pp. 1–6, 2016. [Google Scholar] [Crossref]
19.
T. Manjunath, S. Mallikarjunaswamy, M. Komala, N. Sharmila, and K. S. Manu, “An efficient hybrid reconfigurable wind gas turbine power management system using MPPT algorithm,” Int. J. Power. Elect. Dr. Syst., vol. 12, no. 4, p. 2501, 2021. [Google Scholar] [Crossref]
20.
R. Shivaji, K. R. Nataraj, S. Mallikarjunaswamy, and K. R. Rekha, “Design and implementation of reconfigurable DCT based adaptive PST techniques in OFDM communication system using interleaver encoder,” Indian J. Sci. Technol., vol. 13, no. 29, pp. 2108–2120, 2020. [Google Scholar] [Crossref]
21.
S. Hou, M. Wu, W. Liao, and D. Wang, “Performance comparison of AODV and DSR in MANET test-bed based on internet of things,” In 2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall), pp. 1–5, 2015. [Google Scholar] [Crossref]
22.
M. Kahla, M. Azab, and A. Mansour, “Secure, resilient, and self-configuring fog architecture for untrustworthy IoT environments,” In 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), pp. 49–54, 2018. [Google Scholar] [Crossref]
23.
M. El-Tager and Y. Gadallah, “SWSP: Socially-weighted shortest path routing for practical internet of things applications,” In 2019 IEEE Wireless Communications and Networking Conference (WCNC), pp. 1–6, 2019. [Google Scholar] [Crossref]
24.
N. Sharma, N. Iftekhar, and S. Khan, “Knowledge analytics in IOMT-MANET through QoS optimization for sustainability,” Smart and Sustainable Approaches for Optimizing Performance of Wireless Networks: Real-time Applications, pp. 245–260, 2022. [Google Scholar] [Crossref]
25.
S. Pamarthi and R. Narmadha, “Implementation of modified SFO algorithm to enhance QoS in wireless mobile adhoc networks for IoT applications,” In 2022 International Conference on Wireless Communications Signal Processing and Networking (WiSPNET), pp. 202–207, 2022. [Google Scholar] [Crossref]
26.
M. L. Umashankar, S. Mallikarjunaswamy, and M. V. Ramakrishna, “Design of High Speed Reconfigurable Distributed Life Time Efficient Routing Algorithm in Wireless Sensor Network,” J Comput. Theor. Nanos., vol. 17, no. 9–10, pp. 3860–3866, 2020. [Google Scholar] [Crossref]
27.
H. N. Mahendra, S. Mallikarjunaswamy, and S. R. Subramoniam, “An assessment of vegetation cover of Mysuru City, Karnataka State, India, using deep convolutional neural networks,” Environ. Monit. Assess., vol. 195, no. 4, p. 526, 2023. [Google Scholar] [Crossref]
28.
P. Satish, M. Srikantaswamy, and N. K. Ramaswamy, “A Comprehensive Review of Blind Deconvolution Techniques for Image Deblurring,” Traitement du Signal, vol. 37, no. 3, 2020. [Google Scholar] [Crossref]
29.
J. Bai, Y. Sun, and C. Phillips, “CRRP: A cooperative relay routing protocol for IoT networks,” In 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), pp. 1–6, 2016. [Google Scholar] [Crossref]
30.
R. H. Jhaveri, N. M. Patel, Y. Zhong, and A. K. Sangaiah, “Sensitivity analysis of an attack-pattern discovery based trusted routing scheme for mobile ad-hoc networks in industrial IoT,” IEEE Access, vol. 6, pp. 20085–20103, 2018. [Google Scholar] [Crossref]
31.
S. Shebin and S. Mallikarjunaswamy, “A software tool that provides relevant information for diabetic patients to help prevent diabetic foot,” IOSR J. Computer Eng., vol. 16, no. 2, pp. 69–73, 2014. [Google Scholar] [Crossref]
32.
S. Mallikarjunaswamy, K. Nataraj, P. Balachandra, and N. Sharmila, “Design of High Speed Reconfigurable Coprocessor for Interleaver and De-Interleaver Operations,” J. Impact Factor, vol. 6, no. 1, pp. 30–38, 2015. [Google Scholar]
33.
M. M. Pandith, N. K. Ramaswamy, M. Srikantaswamy, and R. K. Ramaswamy, “A comprehensive review of geographic routing protocols in wireless sensor network,” Inf. Dyn. Appl, vol. 1, no. 1, pp. 14–25, 2022. [Google Scholar] [Crossref]
34.
N. Sharmila, K. R. Nataraj, and K. R. Rekha, “An efficient dynamic power management model for a stand-alone DC Microgrid using CPIHC technique,” Int. J. Power. Elect. Dr., vol. 12, no. 3, pp. 1439–1449, 2021. [Google Scholar] [Crossref]
35.
M. Hussaini, S. A. Nor, H. Bello-Salau, H. J. Hadi, A. A. Gumel, and K. A. Jahun, “Mobility support challenges for the integration of 5G and IoT in named data networking,” In 2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf), pp. 1–7, 2019. [Google Scholar] [Crossref]
36.
S. Pooja, M. Mallikarjunaswamy, and S. Sharmila, “Image region driven prior selection for image deblurring,” Multimed. Tools Appl., 2023. [Google Scholar]
37.
H. N. Mahendra, S. Mallikarjunaswamy, D. M. Kumar, S. Kumari, S. Kashyap, S. Fulwani, and A. Chatterjee, “Assessment and prediction of air quality level using ARIMA model: A case study of surat city, gujarat state, India,” Nat. Env. Pollut. Technol., vol. 22, no. 1, 2023. [Google Scholar] [Crossref]
38.
S. Mallikarjunaswamy, K. R. Nataraj, and K. R. Rekha, “Design of high-speed reconfigurable coprocessor for next-generation communication platform,” Emerging Research in Electronics, Computer Science and Technology: Proceedings of International Conference, ICERECT 2012, pp. 57–67, 2014. [Google Scholar] [Crossref]
39.
H. N. Mahendra, S. Mallikarjunaswamy, V. Rekha, V. Puspalatha, and N. Sharmila, “Performance analysis of different classifier for remote sensing application,” Int. J. Eng. Adv. Technol., vol. 9, no. 1, pp. 7153–7158, 2019. [Google Scholar] [Crossref]
40.
S. Thazeen, S. Mallikarjunaswamy, G. K. Siddesh, and N. Sharmila, “Conventional and Subspace Algorithms for Mobile source detection and radiation formation,” Traitement du Signal, vol. 38, no. 1, 2021. [Google Scholar] [Crossref]
41.
E. U. Gallardo-Romero and D. Ruiz-Aguilar, “High order edge-based finite elements for 3D magnetotelluric modeling with unstructured meshes,” Comput. & Geosci., vol. 158, p. 104971, 2022. [Google Scholar] [Crossref]
42.
S. Gul, S. Räbiger, and Y. Saygın, “Context-based extraction of concepts from unstructured textual documents,” Inf. Sci., vol. 588, pp. 248–264, 2022. [Google Scholar] [Crossref]
43.
L. Cheng, X. Deng, B. Xie, Y. Jiang, and F. Xiao, “A new 3D OpenFoam solver with improved resolution for hyperbolic systems on hybrid unstructured grids,” App. Math. Mode., vol. 108, pp. 142–166, 2022. [Google Scholar] [Crossref]
44.
S. Chaitra, V. Rekha, A. M. Harisha, T. A. Madhu, S. Mallikarjunaswamy, N. Sharmila, and H. N. Mahendra, “A comprehensive review of parallel concatenation of LDPC code techniques,” Indian J. Sci. Tech., vol. 14, no. 5, pp. 432–444, 2021. [Google Scholar] [Crossref]
45.
M. L. Umashankar, T. N. Anitha, and S. Mallikarjunaswamy, “An efficient hybrid model for cluster head selection to optimize wireless sensor network using simulated annealing algorithm,” Indian J. Sci. Tech., vol. 14, no. 3, pp. 270–288, 2021. [Google Scholar] [Crossref]
46.
A. C. Savitha, M. N. Jayaram, and others, “Development of energy efficient and secure routing protocol for M2M communication,” Int. J. Perfor. Eng., vol. 18, no. 6, p. 426, 2022. [Google Scholar] [Crossref]
47.
K. Shashi Raj, G. K. Siddesh, S. Mallikarjunaswamy, and K. Vivek Raj, “Interference resilient stochastic prediction based dynamic resource allocation model for cognitive MANETs,” Indian J. Sci. Tech., vol. 13, no. 41, pp. 4332–4350, 2020. [Google Scholar] [Crossref]
48.
V. B. Chenam and S. T. Ali, “A designated cloud server-based multi-user certificateless public key authenticated encryption with conjunctive keyword search against IKGA,” Com. Stand. & Inter., vol. 81, p. 103603, 2022. [Google Scholar] [Crossref]
49.
Q. Wu, T. Lai, L. Zhang, Y. Mu, and F. Rezaeibagha, “Blockchain-enabled multi-authorization and multi-cloud attribute-based keyword search over encrypted data in the cloud,” J. Syst. Archit., vol. 129, p. 102569, 2022. [Google Scholar] [Crossref]
50.
M. Li, G. Wang, S. Liu, and J. Yu, “Multi-keyword fuzzy search over encrypted cloud storage data,” Pro. Com. Sci., vol. 187, pp. 365–370, 2021. [Google Scholar] [Crossref]
51.
D. Y. Venkatesh, K. Mallikarjunaiah, and M. Srikantaswamy, “A Comprehensive Review of Low Density Parity Check Encoder Techniques,” Ingénierie des Systèmes d’Information, vol. 27, no. 1, 2022. [Google Scholar] [Crossref]
52.
R. Mishra, D. Ramesh, D. R. Edla, and L. Qi, “DS-Chain: A secure and auditable multi-cloud assisted EHR storage model on efficient deletable blockchain,” J. Indust. Inf. Int., vol. 26, p. 100315, 2022. [Google Scholar] [Crossref]
53.
O. O. Olakanmi and K. O. Odeyemi, “Faster and efficient cloud-server-aided data de-duplication scheme with an authenticated key agreement for Industrial Internet-of-Things,” Int. Things, vol. 14, p. 100376, 2021. [Google Scholar] [Crossref]
54.
P. Muddumadappa, S. Anjanappa, and M. Srikantaswamy, “An efficient reconfigurable cryptographic model for dynamic and secure unstructured data sharing in multi-cloud storage server,” J. Intell Syst. Control, vol. 1, no. 1, pp. 68–78, 2022. [Google Scholar] [Crossref]
55.
P. S. Challagidad and M. N. Birje, “Efficient multi-authority access control using attribute-based encryption in cloud storage,” Pro. Com. Sci., vol. 167, pp. 840–849, 2020. [Google Scholar] [Crossref]
56.
Y. Gupta, “Novel distributed load balancing algorithms in cloud storage,” Expert. Syst. Appl., vol. 186, p. 115713, 2021. [Google Scholar] [Crossref]
57.
H. N. Mahendra and S. Mallikarjunaswamy, “An Efficient Classification of Hyperspectral Remotely Sensed Data Using Support Vector Machine,” Int. J. Elect. Telecommun., pp. 609–617, 2022. [Google Scholar] [Crossref]
58.
H. N. Mahendra, S. Mallikarjunaswamy, C. B. Nooli, M. Hrishikesh, N. Kruthik, and H. M. Vakkalanka, “Cloud based Centralized Smart Cart and Contactless Billing System,” In 2022 7th International Conference on Communication and Electronics Systems (ICCES), pp. 820–826, 2022. [Google Scholar] [Crossref]
59.
P. Dayananda, M. Srikantaswamy, S. Nagaraju, R. Velluri, and M. K. Doddananjedevaru, “Efficient detection of faults and false data injection attacks in smart grid using a reconfigurable Kalman filter,” Int. J. Power Elect. Drive Syst., vol. 13, no. 4, p. 2086, 2022. [Google Scholar] [Crossref]
60.
S. Thazeen, S. Mallikarjunaswamy, M. N. Saqhib, and N. Sharmila, “DOA method with reduced bias and side lobe suppression,” In 2022 International Conference on Communication, Computing and Internet of Things (IC3IoT), pp. 1–6, 2022. [Google Scholar] [Crossref]
61.
S. Rathod, N. K. Ramaswamy, M. Srikantaswamy, and R. K. Ramaswamy, “An efficient reconfigurable peak cancellation model for peak to average power ratio reduction in orthogonal frequency division multiplexing communication system,” Int. J. Elect. Com. Eng., vol. 12, no. 6, pp. 6239–6247, 2022. [Google Scholar] [Crossref]
62.
H. N. Mahendra, S. Mallikarjunaswamy, and S. R. Subramoniam, “An assessment of vegetation cover of Mysuru City, Karnataka State, India, using deep convolutional neural networks,” Environ. Monit. Assess., vol. 195, no. 4, p. 526, 2023. [Google Scholar] [Crossref]
Search
Open Access
Research article

An Enhanced QoS-Aware Multipath Routing Protocol for Real-Time IoT Applications in MANETs

venkata reddy pathapalli srinivasappa1*,
nandini prasad kanakapura shivaprasad1,
puttamadappa chaluvegowda2
1
Department of Information Science and Engineering, Dr. Ambedkar Institute of Technology, 560056 Bengaluru, India
2
Department of Electronics and Communication Engineering, Dayananda Sagar University, 560078 Bengaluru, India
Information Dynamics and Applications
|
Volume 2, Issue 2, 2023
|
Pages 51-62
Received: 03-04-2023,
Revised: 04-14-2023,
Accepted: 04-19-2023,
Available online: 05-16-2023
View Full Article|Download PDF

Abstract:

Recent transmission of large volumes of data through mobile ad hoc networks (MANETs) has resulted in degraded Quality of Service (QoS) due to factors such as packet loss, delay, and packet drop in multipath routing. To address this issue, a traffic-aware Enhanced QoS-Aware Multipath Routing Protocol (EQMRP) has been proposed for real-time IoT applications in MANETs. EQMRP efficiently switches between multiple paths and monitors traffic conditions to maintain an optimal data transmission rate. The proposed method considers different delay sensitivity levels and link expiration time (LTE) to maintain QoS in each path. Through IoT application data analysis, EQMRP maintains QoS in each path more efficiently than conventional methods. The proposed method has been simulated and validated using MATLAB, and the performance analysis shows that EQMRP achieves a higher packet delivery ratio, lower delay, and reduced packet drop compared to conventional methods. In conclusion, the traffic-aware EQMRP protocol offers a significant improvement in QoS for real-time IoT applications in MANETs.
Keywords: Quality of Service (QoS), Internet of Things (IoT), Link Expiration Time (LET), Mobile Ad hoc Network (MANET)

1. Introduction

Mobile Ad hoc Networks (MANETs) are wireless mobile nodes that transmit data without a centralized infrastructure. However, this makes it challenging to ensure Quality of Service (QoS) due to limited power and bandwidth, changing topology, and real-time applications [1].

QoS support is critical in wireless and mobile networking with jitter, packet delivery ratio, throughput, and end-to-end latency being important considerations [2], [3]. Conventional routing protocols, such as table-driven and demand-based, have limitations in addressing MANET challenges [4]. For example, table-based techniques like OLSR add significant overhead even when there is no real traffic, while on-demand protocols like Ad hoc On-Demand Distance Vector (AODV) cause delays and overburden some intermediary nodes due to frequent data processing [5].

To address these challenges, the proposed QoS-aware routing protocol monitors traffic conditions and efficiently switches operations. It identifies and sends high-priority real-time application data across low-latency MANET paths, considers different delay sensitivity levels and link expiration time, and selects the optimal path that meets QoS requirements while minimizing network bandwidth and battery consumption. The proposed protocol is evaluated through simulations, and the results demonstrate its effectiveness in improving QoS metrics compared to conventional methods [6]. In conclusion, the proposed QoS-aware routing protocol can contribute to the development of efficient and reliable MANETs for real-time applications. The research in this area is crucial for addressing the challenges of wireless and mobile networking settings and enabling the seamless communication of mobile devices. The proposed protocol can also serve as a benchmark for future research in this area.

Figure 1 shows the fundamental block diagram of a MANET using IoT, which highlights the key components of the network and their interactions. The figure provides a visual representation of the network architecture and can help readers better understand the proposed QoS-aware routing protocol.

Figure 1. The fundament block diagram of MANET using IoT

2. Methodology

2.1 Related Works

Several techniques have been investigated to improve Quality of Service (QoS) in Mobile Ad hoc Networks (MANETs), with a focus on supporting real-time applications and services. One such technique is the Priority-Aware Dynamic Source Routing (PA-DSR) protocol proposed by Biswas and Dasgupta [7]. This protocol assigns priority based on data rates to improve QoS for routing. Simulation results showed that the proposed PA-DSR protocol outperformed the conventional DSR protocol in terms of throughput, packet delivery ratio (PDR), and end-to-end delay for five unique connections. Noorul et al. [8] conducted performance analysis research to study the impact of different routing protocols on Quality of Service (QoS) for Voice over IP (VoIP) applications over Mobile Ad hoc Networks (MANETs). The routing protocols investigated included AODV, TORA, OLSR, and GRP, while different queuing choices such as FIFO, PQ, and WFQ were also analyzed [9], [10]. Their results showed that Jitter delay, packet delay in transit, and wireless LAN media access response time and throughput of 802.11 g technology at 54 Mbps are important factors that affect the quality of VoIP conversations. Khan et al. [11] proposed a smart routing method to connect an IoT service and its real-world data flow, aimed at improving the routing protocol in the context of the Internet of Things (IoT). Their proposed method can be used for urgent data services such as environmental monitoring using real-time data. The authors developed a new way to incorporate MANET overlays and construct them collectively over MANET to improve IoT urban data. Their proposed method can dynamically identify and send high-priority real-time application data across low-latency MANET paths. Sharma [12] presented TCP/IP traffic shaping techniques for real-time congestion control in the network model. They used a real-time token bucket to determine the number of buffer sizes and bucket sizes based on the result of the flow. Their results showed that the recommended solutions worked better in a congested traffic environment.

Mallikarjunaswamy et al. [13] proposed a mobility measure that accounts for the complicated network mobility situation in Mobile Ad hoc Networks (MANETs). Their proposed metric can handle new link breakages and/or link additions and is well-suited for mobile nodes that exhibit a non-zero pattern of Poisson distribution. The authors suggest that their proposed metric can enhance both the objective and subjective measures of network productivity and effectiveness.

This study proposes an Enhanced QoS-Aware Multipath Routing Protocol (EQMRP) for real-time Internet of Things (IoT) applications in Mobile Ad hoc Networks (MANETs), building upon previous works. The proposed method employs traffic condition monitoring and efficient switching operations, considers different delay sensitivity levels and link expiration time, and dynamically identifies and sends high-priority real-time application data across low-latency MANET paths. Simulation results show that EQMRP achieves a higher packet delivery ratio, lower delay, and reduced packet drop compared to conventional methods. These findings suggest that EQMRP can be an effective solution for improving Quality of Service (QoS) in real-time IoT applications in MANETs.

3. Proposed Methodology

3.1 Overview

As part of this work, a disjoint multipath routing mechanism has been introduced for the transmission of various Internet of Things (IoT) traffic classes, aimed at ensuring reliable and efficient data transmission. A queuing system model has been formulated based on traffic priorities, which is dependent on packet loss and delay. The traffic classes have been classified into four categories: loss-sensitive, critical (delay and loss-sensitive), delay-sensitive, and normal (delay-and-loss insensitive) [14], [15], [16]. This classification enables the routing protocol to prioritize the transmission of high-priority traffic, such as critical and delay-sensitive traffic, over low-priority traffic, such as normal traffic.

To enable the selection of discontinuous pathways, packets with varying priority must be sent through on-demand routing [17], [18]. In this study, the identified paths are grouped into four categories, namely normal, critical, delay-sensitive, and loss-sensitive, based on their total delay and link-expiration time (LET). The total end-to-end latency of a path is determined by the sum of all intermediate hop delays. To facilitate the routing process, each node maintains and updates a path table that contains the fields of path ID and the accumulated values of delay and LET towards the destination [19], [20], [21].

3.2 Estimation of Metrics
3.2.1 Node Link Expiration Time (LET)

The link expiration time between two nodes refers to the duration of time that the nodes are connected within a fixed network range R [22], [23], [24]. Using the motion parameters of two nodes, the duration of time for which these two nodes remain connected can be calculated. Let $\left(x_i, y_i\right)$ and $\left(x_j, y_j\right)$ denote the coordinates of nodes $n_i$ and $n_j$ respectively. Let $V_i$ and $V_j$ denote their speeds along the directions $D_i$ and $D_j$. The time duration between $n_i$ and $n_j$ is derived by using the Eq. (1) and Eq. (2).

$\left.L E T=\left(-(a b+c d)+\sqrt{a^2+c^2}\right) r^2-(a b-b c)^2\right) /\left(a^2+c^2\right)$
(1)

In this case, $\quad a=V_i \cos D_i-V_i \cos D_i; \quad b=x_i-x_j ; C=V_i \sin D_i-V_j \sin D_j ; d=y_i-y_j$.

3.2.2 End-to-End Delay (EED)

End-to-end delay of a route is the summation of all the link delays in the entire path. It is represented as,

$\operatorname{EED}(\operatorname{Path}(a, b))=\sum_{\left(L_{i, j} \in \operatorname{path}(a, b)\right)} \operatorname{Delay}\left(L_{i, j}\right)$
(2)
3.3 Categorizing Traffic Classes

The traffic classes are categorized as follows:

• Delay Sensitive: Time-critical monitoring techniques like distributed control systems are covered in this category, which includes intra-frames (I) in a video stream. A great deal of attention is paid to this specific topic [25], [26], [27].

• Loss Sensitive: Monitoring data, such as temperature readings or snapshot images recorded from several points of view, must be transmitted in a precise time period to the operator, but is also loss sensitive. A bi-directional frame(b) and a predictor frame make up this class (p).

• Normal (Delay and Loss-insensitive): Essential monitoring data may be included in this class, which may necessitate offline processing.

• Storage videos, environmental data from scalar sensors, and snapshot multimedia material that's not time-critical are all instances of crucial media. This class is considered the least significant [28], [29], [30], [31].

3.4 Queuing System Model for Disjoint Multipath Routing

Figure 2 illustrates the queuing system model based on node-disjoint multipath routing, incorporating the four traffic classes: loss-sensitive, critical (delay and loss-sensitive), delay-sensitive, and normal (delay-and-loss insensitive) [31], [32], [33]. Nodes are capable of transmitting real-time traffic of multiple traffic classes, which are received through a receiving buffer queue cache for dissimilar types of inward traffic. To ensure efficient transmission, a priority scheduler is employed to direct the packets to the sending buffer queue in a suitable order based on the priorities of the real-time packets as illustrated in Table 1.

A scheduler is employed to manage the packets in the sender buffer queue and transmit them through the route based on the situation of every disjoint path. At every relay node along the disjoint route, a queuing model is utilized in conjunction with priority to send real-time packets of varying priorities [34], [35].

Table 1. Traffic classes with multiple priorities
Traffic ClassesTraffic Priority (TP)
Delay SensitiveHigh
Loss SensitiveMiddle
Normal (Delay and Loss-insensitive)Low
Critical (Delay and Loss-sensitive)Lowest
Figure 2. The queuing system model based on node-disjoint multipath routing

The selected traffic control scheme employs a priority scheduler to send the packets of various traffic classes based on their required priorities. Inbound real-time data packets are cached at the receiver buffer, and a classifier is used to monitor the class of the inbound packet and route it to the appropriate queue. In every transmission window, the scheduler determines the sequence of packets in the sender buffer queue based on their available priorities [36], [37].

3.5 On Demand Multipath Routing

During on demand routing, disjoint paths are chosen so that packets with different priorities are transmitted based on their conditions.

The steps involved in this process are as follows:

1) Each node analyses the nodes based on its delay and link expiration time.

2) Ni sends a request message (RO_REQ) requesting routing.

3) Each node upon receiving the RO_REQ message, verifies its node cache.

4) When it identifies a suitable node with minimum delay and maximum LET, it initiates the routing process.

5) The discovered paths are categorized as Critical, Loss sensitive, Normal, and delay sensitive, based on which the appropriate traffic class is chosen for transmission.

6) The end-to-end delay of a path is derived by the composition of the delays of its intermediate hops [38], [39], [40].

7) Each node is able to maintain and update a path table that contains the fields of path id and the accumulated values of delay and LET towards the destination. Figure 3 shows the disjoint multipath routing [41], [42].

Figure 3. Disjoint multipath routing

For each path, $P_i$ between the source S and destination D, EEDi and LETi are computed and compared with the predefined threshold values EEDth and LETth.

1. If EED $>$ EEDth, in this case the path will be taken as delay sensitive.

2. If LET $>$ LETth in this case the path will be taken as delay sensitive loss sensitive.

3. If EED $>$ EEDth and LET $>$ LETth, in this case the path will be taken as delay sensitive delay and loss sensitive that is it will be considering a critical path [43], [44], [45].

4. Otherwise, the path is considered as delay and loss insensitive i.e., normal path. The classified paths with priority as shown in Table 2.

Table 2. Classified paths with priorities
Traffic ClassesPath Priority (PP)
Class Sensitive to Delay1
Class Sensitive to Loss2
Class Sensitive to Delay as well as Loss-sensitive3
Delay and loss insensitive4

The following Algorithm 1 illustrates the steps involved in EQMRP.

Algorithm 1 EQMRP

1. for each incoming traffic flow {Fj}, j=1, 2, ….m (Where m is represented the number of nodes)

2. Assign priority TPj as per its category

3. for each {Si,Di} pair

4. Determine the path set {PS}

5. for each path pi $\in$ PS,

6. Determine LET and EED using Eq. (1) and (2)

7. Classify the path and assign priority PPi as per Table 3.

8. end for

9. end for

10. if (TPj = High)

11. Assign pi with PPi = 1

12. else if (TPj = Medium)

13. Assign pi with PPi = 2

14. else if (TPj = Low)

15. Assign pi with PPi = 3

16. else if (TPj = Lowest)

17. Assign pi with PPi = 4

18. end if

19. end for

4. Experimental Results

The proposed Enhanced QoS-Aware Multipath Routing Protocol (EQMRP) has been implemented in MATLAB, and its performance has been compared with the RTA-AODV [46], [47], [48], [49] and traditional AODV routing protocols. The performance metrics evaluated in the study include end-to-end delay, packet delivery ratio, average packet drop, and average residual energy. These metrics enable the comparison of the proposed EQMRP protocol with existing routing protocols in terms of Quality of Service (QoS), network efficiency, and energy consumption.

4.1 Experimental Settings

The performance analysis of the proposed Enhanced QoS-Aware Multipath Routing Protocol (EQMRP) and conventional routing methods has been carried out, with respect to several parameters as shown in Table 3. The comparison is based on the evaluation of end-to-end delay, packet delivery ratio, packet drop, and residual energy. In this section, the results of varying nodes for the real-time traffic scenario are presented [50], [51], [52].

Table 3. Simulation settings
ParticularsRange
Number of Nodes50 to 250
Size of the Topology$500 \mathrm{~m} \mathrm{X} \mathrm{500m}$
MAC ProtocolIEEE 802.11b
Simulation Time100 seconds
Traffic TypesExponential, Video (for real-time), CBR (for non-real-time)
Traffic Rate$250 \mathrm{Kbps}$
Propagation ModelTwo Ray Ground
Antenna modelOmni Antenna
Initial Energy10 Joules
Transmission Power0.660
Receiving Power0.395
4.2 Results for Real-time Traffic

Table 4 and Figure 4 show the results of end-to-end delay obtained for all the protocols for the real-time traffic scenario [53], [54].

Figure 4 illustrates the comparison of delay between the proposed Enhanced QoS-Aware Multipath Routing Protocol (EQMRP) and the RTA-AODV and AODV protocols [55], [56]. The results show that the delay of EQMRP is 0.8% less than RTA-AODV and 1.2% less than AODV, indicating its superiority in reducing end-to-end delay [55], [56]. Table 5 and Figure 5 demonstrate the results of packet delivery ratio obtained for all the protocols in the real-time traffic scenario. Figure 6 shows that the packet delivery ratio of EQMRP is 0.98% higher than RTA-AODV and 1.45% higher than AODV, indicating its superiority in improving the packet delivery ratio. Table 6 and Figure 6 present the results of packet drop measured for all the protocols in the real-time traffic scenario [57], [58], [59].

Table 4. Results of end-to-end delay (Real-time)
NodesEQMRP (sec)RTA-AODV (sec)AODV (sec)
500.2390.6670.870
1000.3710.8011.118
1500.4810.9741.349
2000.7291.0011.412
2501.0161.2781.638
Figure 4. End-to-end delay (Real-time)
Table 5. Results of packet delivery ratio (Real-time)
NodesEQMRPRTA-AODVAODV
$\mathbf{5 0}$0.97780.94530.9053
$\mathbf{1 0 0}$0.97160.94460.8246
$\mathbf{1 5 0}$0.96890.94110.8111
$\mathbf{2 0 0}$0.96120.93720.7932
$\mathbf{2 5 0}$0.95450.91070.7717
Table 6. Results of packet drop (Real-time)
NodesEQMRPRTA-AODVAODV
$\mathbf{5 0}$145728864286
$\mathbf{1 0 0}$240349476177
$\mathbf{1 5 0}$502372138043
$\mathbf{2 0 0}$6744799510125
$\mathbf{2 5 0}$6818840111494
Figure 5. PDR - packet delivery ratio (Real-time)
Figure 6. Average packet drop (Real-time)
Table 7. Results of residual energy (Real-time)
NodesEQMRP (Joules)RTA-AODV (Joules)AODV (Joules)
506.515.844.92
1006.355.814.76
1506.315.764.56
2006.305.754.45
2506.295.734.37

Figure 6 illustrates the comparison of packet drops between the proposed Enhanced QoS-Aware Multipath Routing Protocol (EQMRP) and the RTA-AODV and AODV protocols. The results indicate that the packet drops of EQMRP are 0.75% less than RTA-AODV and 1.16% less than AODV, indicating its effectiveness in reducing packet loss and improving network reliability. Table 7 and Figure 7 present the results of average residual energy measured for all the protocols in the real-time traffic scenario [60], [61], [62].

Figure 7 shows that the residual energy of EQMRP 1.16% higher than RTA-AODV and 1.05% higher than AODV.

Figure 7. Residual energy (Real-time)

5. Conclusion

This paper proposes a method for controlling traffic in multi-path routing for the transmission of various Internet of Things (IoT) traffic classes with real-time applications. The proposed method is implemented using IoT to ensure dynamic and secured data sharing of real-time application data. The proposed method employs a disjoint multipath routing approach for transmitting various IoT traffic classes to ensure reliable and efficient data transmission. During on-demand routing, disjoint routes are selected to ensure packets with multiple priorities are transmitted according to the state. The discovered paths are grouped as Normal, Critical, Loss-sensitive, and Delay-sensitive, in accordance with the appropriate traffic class chosen for transmission. The proposed Enhanced QoS-Aware Multipath Routing Protocol (EQMRP) reduces the end-to-end delay with respect to node iterations. According to the simulation results, the proposed method demonstrates better performance compared to AODV (1.2%) and RTA-AODV (0.8%). The proposed method also shows better performance compared to conventional methods AODV (1.45%) and RTA-AODV (0.98%) with respect to packet delivery ratio and reduces packet drop compared to conventional methods AODV (1.16%) and RTA-AODV (0.75%). Moreover, the proposed method enhances residual energy compared to conventional methods AODV (1.05%) and RTA-AODV (0.85%). The proposed protocol has been simulated and validated using MATLAB. Simulation analysis shows that the proposed method exhibits better performance compared to conventional methods.

Future scope: The customer's trust is increased when the file gets communicated with multipath routing and with increased parallel operation without loss of information. at the same time, it will be capable to store in multi-cloud without any obstacles using this proposed method.

Limitations: In 6G communication technologies, the application will be sharing the data in 10000 Gb/s speed which requires high speed encryption and decryption process. The proposed method experiences attenuation and loss of information.

6. Acknowledgement

The authors would like to thank Dr. Ambedkar Institute of Technology, Dayananda Sagar University, Bengaluru, India, and vision group on science and technology (VGST) Karnataka Fund for Infrastructure Strengthening in Science & Technology Level-2 (JSSATEB) for all the support and encouragement provided by them to take up this research work and publish this paper.

Data Availability

The data used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest

The authors declare that they have no conflicts of interest.

References
1.
S. Biswas, Y. M. K. P, M. Mrinal, E. Bhardwaj, S. Santhosh, S. Masood, and S. M. I., “The firefly unit: A MANET based communication system using Zigbee and LoRaWAN protocols for IoT applications in Remote Locations,” In 2021 International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE), pp. 642–646, 2021. [Google Scholar] [Crossref]
2.
S. S. Abou Emira, K. Y. Youssef, and M. Abouelatta, “Power efficient routing protocol (AODV) for IoT based livestock applications,” In 2019 14th International Conference on Computer Engineering and Systems (ICCES), pp. 407–412, 2019. [Google Scholar] [Crossref]
3.
M. Umashankar, S. Mallikarjunaswamy, N. Sharmila, D. M. Kumar, and K. R. Nataraj, “A survey on IoT protocol in Real-time Aapplications and Its architectures,” In ICDSMLA 2021: Proceedings of the 3rd International Conference on Data Science, Machine Learning and Applications, pp. 119–130, 2023. [Google Scholar] [Crossref]
4.
P. Nayak and P. Sinha, “Analysis of random way point and random walk mobility model for reactive routing protocols for MANET using NetSim simulator,” In 2015 3rd International Conference on Artificial Intelligence, Modelling and Simulation (AIMS), pp. 427–432, 2015. [Google Scholar] [Crossref]
5.
N. Kumar, A. Agrawal, and R. A. Khan, “Emergency alert networks for disaster management: Applications perspective,” In 2018 International Conference on Research in Intelligent and Computing in Engineering (RICE), pp. 1–5, 2018. [Google Scholar] [Crossref]
6.
A. M. Zaalouk, M. M. Zarie, R. Nassar, V. E. Gerguis, H. H. Mahmoud, and M. M. Abdellatif, “IoTmC: A low cost IoT application for mobile communications,” In 2018 IEEE Global Conference on Internet of Things (GCIoT), pp. 1–5, 2018. [Google Scholar] [Crossref]
7.
A. K. Biswas and M. Dasgupta, “A secure hybrid routing protocol for mobile Ad-Hoc networks (MANETs),” In 2020 11th International Conference on Computing, Communication and Networking Technologies (ICCCNT), pp. 1–7, 2020. [Google Scholar] [Crossref]
8.
T. M. Noorul, R. S. Pramila, and N. Islam, “An analysis of routing protocols in MANETs and Internet of things,” In 2017 International Conference on IoT and Application (ICIOT), pp. 1–8, 2017. [Google Scholar] [Crossref]
9.
W. A. Jabbar, M. Ismail, and R. Nordin, “Evaluation of energy consumption in multipath OLSR routing in smart City applications,” In 2013 IEEE 11th Malaysia International Conference on Communications (MICC), pp. 401–406, 2013. [Google Scholar] [Crossref]
10.
M. K. Shah and L. K. Sharma, “Study on 6LoWPAN routing protocols with SD aspects in IoT,” In 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC) I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), 2018 2nd International Conference on, pp. 60–65, 2018. [Google Scholar] [Crossref]
11.
B. U. I. Khan, F. Anwar, R. F. Olanrewaju, M. L. B. M. Kiah, and R. N. Mir, “Game theory analysis and modeling of sophisticated multi-collusion attack in MANETs,” IEEE Access, vol. 9, pp. 61778–61792, 2021. [Google Scholar] [Crossref]
12.
M. Sharma, “A basis on prestige gotten better SIEM for nefarious link tracking in IoT,” In 2022 11th International Conference on System Modeling & Advancement in Research Trends (SMART), pp. 352–355, 2022. [Google Scholar] [Crossref]
13.
S. Mallikarjunaswamy, N. Sharmila, G. K. Siddesh, K. Nataraj, and M. Komala, “A novel architecture for cluster based false data injection attack detection and location identification in smart grid,” Advances in Thermofluids and Renewable Energy: Select Proceedings of TFRE 2020, pp. 599–611, 2022. [Google Scholar] [Crossref]
14.
R. Shivaji, K. Nataraj, S. Mallikarjunaswamy, and K. R. Rekha, “Implementation of an effective hybrid partial transmit sequence model for peak to average power ratio in MIMO OFDM system,” In ICDSMLA 2020: Proceedings of the 2nd International Conference on Data Science, Machine Learning and Applications, pp. 1343–1353, 2022. [Google Scholar] [Crossref]
15.
U. Srilakshmi and B. Srinivasrao, “An evaluation of exposure and obstacle technique and its reply over mobile ad-hoc network,” In 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), pp. 525–530, 2017. [Google Scholar] [Crossref]
16.
M. Vanitha, N. Akash, and P. Vikas, “An Effective Approach on Clustering and Data Aggregation for the application of Internet of Things in Long Range Networks,” In 2022 6th International Conference on Electronics, Communication and Aerospace Technology, pp. 549–555, 2022. [Google Scholar] [Crossref]
17.
P. Bellavista, G. Cardone, A. Corradi, and L. Foschini, “Convergence of MANET and WSN in IoT urban scenarios,” IEEE Sens. J., vol. 13, no. 10, pp. 3558–3567, 2013. [Google Scholar] [Crossref]
18.
Z. Guo, I. G. Harris, C. B. Harris, Y. Jiang, and L. Tsaur, “A residual battery-aware routing algorithm based on DSR for BLE sensor networks,” In 2016 Wireless Telecommunications Symposium (WTS), pp. 1–6, 2016. [Google Scholar] [Crossref]
19.
T. Manjunath, S. Mallikarjunaswamy, M. Komala, N. Sharmila, and K. S. Manu, “An efficient hybrid reconfigurable wind gas turbine power management system using MPPT algorithm,” Int. J. Power. Elect. Dr. Syst., vol. 12, no. 4, p. 2501, 2021. [Google Scholar] [Crossref]
20.
R. Shivaji, K. R. Nataraj, S. Mallikarjunaswamy, and K. R. Rekha, “Design and implementation of reconfigurable DCT based adaptive PST techniques in OFDM communication system using interleaver encoder,” Indian J. Sci. Technol., vol. 13, no. 29, pp. 2108–2120, 2020. [Google Scholar] [Crossref]
21.
S. Hou, M. Wu, W. Liao, and D. Wang, “Performance comparison of AODV and DSR in MANET test-bed based on internet of things,” In 2015 IEEE 82nd Vehicular Technology Conference (VTC2015-Fall), pp. 1–5, 2015. [Google Scholar] [Crossref]
22.
M. Kahla, M. Azab, and A. Mansour, “Secure, resilient, and self-configuring fog architecture for untrustworthy IoT environments,” In 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), pp. 49–54, 2018. [Google Scholar] [Crossref]
23.
M. El-Tager and Y. Gadallah, “SWSP: Socially-weighted shortest path routing for practical internet of things applications,” In 2019 IEEE Wireless Communications and Networking Conference (WCNC), pp. 1–6, 2019. [Google Scholar] [Crossref]
24.
N. Sharma, N. Iftekhar, and S. Khan, “Knowledge analytics in IOMT-MANET through QoS optimization for sustainability,” Smart and Sustainable Approaches for Optimizing Performance of Wireless Networks: Real-time Applications, pp. 245–260, 2022. [Google Scholar] [Crossref]
25.
S. Pamarthi and R. Narmadha, “Implementation of modified SFO algorithm to enhance QoS in wireless mobile adhoc networks for IoT applications,” In 2022 International Conference on Wireless Communications Signal Processing and Networking (WiSPNET), pp. 202–207, 2022. [Google Scholar] [Crossref]
26.
M. L. Umashankar, S. Mallikarjunaswamy, and M. V. Ramakrishna, “Design of High Speed Reconfigurable Distributed Life Time Efficient Routing Algorithm in Wireless Sensor Network,” J Comput. Theor. Nanos., vol. 17, no. 9–10, pp. 3860–3866, 2020. [Google Scholar] [Crossref]
27.
H. N. Mahendra, S. Mallikarjunaswamy, and S. R. Subramoniam, “An assessment of vegetation cover of Mysuru City, Karnataka State, India, using deep convolutional neural networks,” Environ. Monit. Assess., vol. 195, no. 4, p. 526, 2023. [Google Scholar] [Crossref]
28.
P. Satish, M. Srikantaswamy, and N. K. Ramaswamy, “A Comprehensive Review of Blind Deconvolution Techniques for Image Deblurring,” Traitement du Signal, vol. 37, no. 3, 2020. [Google Scholar] [Crossref]
29.
J. Bai, Y. Sun, and C. Phillips, “CRRP: A cooperative relay routing protocol for IoT networks,” In 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), pp. 1–6, 2016. [Google Scholar] [Crossref]
30.
R. H. Jhaveri, N. M. Patel, Y. Zhong, and A. K. Sangaiah, “Sensitivity analysis of an attack-pattern discovery based trusted routing scheme for mobile ad-hoc networks in industrial IoT,” IEEE Access, vol. 6, pp. 20085–20103, 2018. [Google Scholar] [Crossref]
31.
S. Shebin and S. Mallikarjunaswamy, “A software tool that provides relevant information for diabetic patients to help prevent diabetic foot,” IOSR J. Computer Eng., vol. 16, no. 2, pp. 69–73, 2014. [Google Scholar] [Crossref]
32.
S. Mallikarjunaswamy, K. Nataraj, P. Balachandra, and N. Sharmila, “Design of High Speed Reconfigurable Coprocessor for Interleaver and De-Interleaver Operations,” J. Impact Factor, vol. 6, no. 1, pp. 30–38, 2015. [Google Scholar]
33.
M. M. Pandith, N. K. Ramaswamy, M. Srikantaswamy, and R. K. Ramaswamy, “A comprehensive review of geographic routing protocols in wireless sensor network,” Inf. Dyn. Appl, vol. 1, no. 1, pp. 14–25, 2022. [Google Scholar] [Crossref]
34.
N. Sharmila, K. R. Nataraj, and K. R. Rekha, “An efficient dynamic power management model for a stand-alone DC Microgrid using CPIHC technique,” Int. J. Power. Elect. Dr., vol. 12, no. 3, pp. 1439–1449, 2021. [Google Scholar] [Crossref]
35.
M. Hussaini, S. A. Nor, H. Bello-Salau, H. J. Hadi, A. A. Gumel, and K. A. Jahun, “Mobility support challenges for the integration of 5G and IoT in named data networking,” In 2019 2nd International Conference of the IEEE Nigeria Computer Chapter (NigeriaComputConf), pp. 1–7, 2019. [Google Scholar] [Crossref]
36.
S. Pooja, M. Mallikarjunaswamy, and S. Sharmila, “Image region driven prior selection for image deblurring,” Multimed. Tools Appl., 2023. [Google Scholar]
37.
H. N. Mahendra, S. Mallikarjunaswamy, D. M. Kumar, S. Kumari, S. Kashyap, S. Fulwani, and A. Chatterjee, “Assessment and prediction of air quality level using ARIMA model: A case study of surat city, gujarat state, India,” Nat. Env. Pollut. Technol., vol. 22, no. 1, 2023. [Google Scholar] [Crossref]
38.
S. Mallikarjunaswamy, K. R. Nataraj, and K. R. Rekha, “Design of high-speed reconfigurable coprocessor for next-generation communication platform,” Emerging Research in Electronics, Computer Science and Technology: Proceedings of International Conference, ICERECT 2012, pp. 57–67, 2014. [Google Scholar] [Crossref]
39.
H. N. Mahendra, S. Mallikarjunaswamy, V. Rekha, V. Puspalatha, and N. Sharmila, “Performance analysis of different classifier for remote sensing application,” Int. J. Eng. Adv. Technol., vol. 9, no. 1, pp. 7153–7158, 2019. [Google Scholar] [Crossref]
40.
S. Thazeen, S. Mallikarjunaswamy, G. K. Siddesh, and N. Sharmila, “Conventional and Subspace Algorithms for Mobile source detection and radiation formation,” Traitement du Signal, vol. 38, no. 1, 2021. [Google Scholar] [Crossref]
41.
E. U. Gallardo-Romero and D. Ruiz-Aguilar, “High order edge-based finite elements for 3D magnetotelluric modeling with unstructured meshes,” Comput. & Geosci., vol. 158, p. 104971, 2022. [Google Scholar] [Crossref]
42.
S. Gul, S. Räbiger, and Y. Saygın, “Context-based extraction of concepts from unstructured textual documents,” Inf. Sci., vol. 588, pp. 248–264, 2022. [Google Scholar] [Crossref]
43.
L. Cheng, X. Deng, B. Xie, Y. Jiang, and F. Xiao, “A new 3D OpenFoam solver with improved resolution for hyperbolic systems on hybrid unstructured grids,” App. Math. Mode., vol. 108, pp. 142–166, 2022. [Google Scholar] [Crossref]
44.
S. Chaitra, V. Rekha, A. M. Harisha, T. A. Madhu, S. Mallikarjunaswamy, N. Sharmila, and H. N. Mahendra, “A comprehensive review of parallel concatenation of LDPC code techniques,” Indian J. Sci. Tech., vol. 14, no. 5, pp. 432–444, 2021. [Google Scholar] [Crossref]
45.
M. L. Umashankar, T. N. Anitha, and S. Mallikarjunaswamy, “An efficient hybrid model for cluster head selection to optimize wireless sensor network using simulated annealing algorithm,” Indian J. Sci. Tech., vol. 14, no. 3, pp. 270–288, 2021. [Google Scholar] [Crossref]
46.
A. C. Savitha, M. N. Jayaram, and others, “Development of energy efficient and secure routing protocol for M2M communication,” Int. J. Perfor. Eng., vol. 18, no. 6, p. 426, 2022. [Google Scholar] [Crossref]
47.
K. Shashi Raj, G. K. Siddesh, S. Mallikarjunaswamy, and K. Vivek Raj, “Interference resilient stochastic prediction based dynamic resource allocation model for cognitive MANETs,” Indian J. Sci. Tech., vol. 13, no. 41, pp. 4332–4350, 2020. [Google Scholar] [Crossref]
48.
V. B. Chenam and S. T. Ali, “A designated cloud server-based multi-user certificateless public key authenticated encryption with conjunctive keyword search against IKGA,” Com. Stand. & Inter., vol. 81, p. 103603, 2022. [Google Scholar] [Crossref]
49.
Q. Wu, T. Lai, L. Zhang, Y. Mu, and F. Rezaeibagha, “Blockchain-enabled multi-authorization and multi-cloud attribute-based keyword search over encrypted data in the cloud,” J. Syst. Archit., vol. 129, p. 102569, 2022. [Google Scholar] [Crossref]
50.
M. Li, G. Wang, S. Liu, and J. Yu, “Multi-keyword fuzzy search over encrypted cloud storage data,” Pro. Com. Sci., vol. 187, pp. 365–370, 2021. [Google Scholar] [Crossref]
51.
D. Y. Venkatesh, K. Mallikarjunaiah, and M. Srikantaswamy, “A Comprehensive Review of Low Density Parity Check Encoder Techniques,” Ingénierie des Systèmes d’Information, vol. 27, no. 1, 2022. [Google Scholar] [Crossref]
52.
R. Mishra, D. Ramesh, D. R. Edla, and L. Qi, “DS-Chain: A secure and auditable multi-cloud assisted EHR storage model on efficient deletable blockchain,” J. Indust. Inf. Int., vol. 26, p. 100315, 2022. [Google Scholar] [Crossref]
53.
O. O. Olakanmi and K. O. Odeyemi, “Faster and efficient cloud-server-aided data de-duplication scheme with an authenticated key agreement for Industrial Internet-of-Things,” Int. Things, vol. 14, p. 100376, 2021. [Google Scholar] [Crossref]
54.
P. Muddumadappa, S. Anjanappa, and M. Srikantaswamy, “An efficient reconfigurable cryptographic model for dynamic and secure unstructured data sharing in multi-cloud storage server,” J. Intell Syst. Control, vol. 1, no. 1, pp. 68–78, 2022. [Google Scholar] [Crossref]
55.
P. S. Challagidad and M. N. Birje, “Efficient multi-authority access control using attribute-based encryption in cloud storage,” Pro. Com. Sci., vol. 167, pp. 840–849, 2020. [Google Scholar] [Crossref]
56.
Y. Gupta, “Novel distributed load balancing algorithms in cloud storage,” Expert. Syst. Appl., vol. 186, p. 115713, 2021. [Google Scholar] [Crossref]
57.
H. N. Mahendra and S. Mallikarjunaswamy, “An Efficient Classification of Hyperspectral Remotely Sensed Data Using Support Vector Machine,” Int. J. Elect. Telecommun., pp. 609–617, 2022. [Google Scholar] [Crossref]
58.
H. N. Mahendra, S. Mallikarjunaswamy, C. B. Nooli, M. Hrishikesh, N. Kruthik, and H. M. Vakkalanka, “Cloud based Centralized Smart Cart and Contactless Billing System,” In 2022 7th International Conference on Communication and Electronics Systems (ICCES), pp. 820–826, 2022. [Google Scholar] [Crossref]
59.
P. Dayananda, M. Srikantaswamy, S. Nagaraju, R. Velluri, and M. K. Doddananjedevaru, “Efficient detection of faults and false data injection attacks in smart grid using a reconfigurable Kalman filter,” Int. J. Power Elect. Drive Syst., vol. 13, no. 4, p. 2086, 2022. [Google Scholar] [Crossref]
60.
S. Thazeen, S. Mallikarjunaswamy, M. N. Saqhib, and N. Sharmila, “DOA method with reduced bias and side lobe suppression,” In 2022 International Conference on Communication, Computing and Internet of Things (IC3IoT), pp. 1–6, 2022. [Google Scholar] [Crossref]
61.
S. Rathod, N. K. Ramaswamy, M. Srikantaswamy, and R. K. Ramaswamy, “An efficient reconfigurable peak cancellation model for peak to average power ratio reduction in orthogonal frequency division multiplexing communication system,” Int. J. Elect. Com. Eng., vol. 12, no. 6, pp. 6239–6247, 2022. [Google Scholar] [Crossref]
62.
H. N. Mahendra, S. Mallikarjunaswamy, and S. R. Subramoniam, “An assessment of vegetation cover of Mysuru City, Karnataka State, India, using deep convolutional neural networks,” Environ. Monit. Assess., vol. 195, no. 4, p. 526, 2023. [Google Scholar] [Crossref]

Cite this:
APA Style
IEEE Style
BibTex Style
MLA Style
Chicago Style
GB-T-7714-2015
Srinivasappa, V. R. P., Shivaprasad, N. P. K., & Chaluvegowda, P. (2023). An Enhanced QoS-Aware Multipath Routing Protocol for Real-Time IoT Applications in MANETs. Inf. Dyn. Appl., 2(2), 51-62. https://doi.org/10.56578/ida020201
V. R. P. Srinivasappa, N. P. K. Shivaprasad, and P. Chaluvegowda, "An Enhanced QoS-Aware Multipath Routing Protocol for Real-Time IoT Applications in MANETs," Inf. Dyn. Appl., vol. 2, no. 2, pp. 51-62, 2023. https://doi.org/10.56578/ida020201
@research-article{Srinivasappa2023AnEQ,
title={An Enhanced QoS-Aware Multipath Routing Protocol for Real-Time IoT Applications in MANETs},
author={Venkata Reddy Pathapalli Srinivasappa and Nandini Prasad Kanakapura Shivaprasad and Puttamadappa Chaluvegowda},
journal={Information Dynamics and Applications},
year={2023},
page={51-62},
doi={https://doi.org/10.56578/ida020201}
}
Venkata Reddy Pathapalli Srinivasappa, et al. "An Enhanced QoS-Aware Multipath Routing Protocol for Real-Time IoT Applications in MANETs." Information Dynamics and Applications, v 2, pp 51-62. doi: https://doi.org/10.56578/ida020201
Venkata Reddy Pathapalli Srinivasappa, Nandini Prasad Kanakapura Shivaprasad and Puttamadappa Chaluvegowda. "An Enhanced QoS-Aware Multipath Routing Protocol for Real-Time IoT Applications in MANETs." Information Dynamics and Applications, 2, (2023): 51-62. doi: https://doi.org/10.56578/ida020201
SRINIVASAPPA V R P, SHIVAPRASAD N P K, CHALUVEGOWDA P. An Enhanced QoS-Aware Multipath Routing Protocol for Real-Time IoT Applications in MANETs[J]. Information Dynamics and Applications, 2023, 2(2): 51-62. https://doi.org/10.56578/ida020201
cc
©2023 by the author(s). Published by Acadlore Publishing Services Limited, Hong Kong. This article is available for free download and can be reused and cited, provided that the original published version is credited, under the CC BY 4.0 license.