Next Article in Journal
An IoT-Based Framework and Ensemble Optimized Deep Maxout Network Model for Breast Cancer Classification
Next Article in Special Issue
A Proficient ZESO-DRKFC Model for Smart Grid SCADA Security
Previous Article in Journal
Ship Detection in Spaceborne SAR Images under Radio Interference Environment Based on CFAR
Previous Article in Special Issue
Human Emotions Recognition, Analysis and Transformation by the Bioenergy Field in Smart Grid Using Image Processing
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Game-Theory-Based Multimode Routing Protocol for Internet of Things

1
Faculty of Computer and Software Engineering, Huaiyin Institute of Technology, Huaian 233003, China
2
Institute of Computing, Kohat University of Science and Technology, Kohat 26000, Pakistan
3
Department of Computer Science and Engineering, Yanbu Industrial College, Royal Commission for Jubail and Yanbu, Yanbu Industrial City 41912, Saudi Arabia
*
Author to whom correspondence should be addressed.
Electronics 2022, 11(24), 4134; https://doi.org/10.3390/electronics11244134
Submission received: 28 October 2022 / Revised: 17 November 2022 / Accepted: 22 November 2022 / Published: 12 December 2022
(This article belongs to the Special Issue Internet of Things for Smart Grid)

Abstract

:
Various routing protocols have been proposed for ad hoc networks such as the Internet of Things (IoT). Most of the routing protocols introduced for IoT are specific to applications and networks. In the current literature, it is essential to configure all the network nodes with a single proposed protocol. Moreover, it is also possible for a single IoT network to consist of different kinds of nodes. Two or more IoT networks can also be connected to create a bigger heterogeneous network. Such networks may need various routing protocols with some gateway nodes installed. The role of gateway nodes should not be limited to the interconnection of different nodes. In this paper, a multi-mode hybrid routing mechanism is proposed that can be installed on all or a limited number of nodes in a heterogenous IoT network. The nodes configured with the proposed protocols are termed smart nodes. These nodes can be used to connect multiple IoT networks into one. Furthermore, a game-theory-based model is proposed that is used for intercommunication among the smart nodes to gain optimal efficiency. Various performance matrices are assessed under different network scenarios. The simulation results show that the proposed mechanism outperforms in broader heterogeneous IoT networks with diverse nodes.

1. Introduction

Various routing protocols for IoT have been proposed in the literature. Reactive, proactive, and hybrid methods are the most common [1]. In proactive routing, each node maintains an up-to-date routing table. To detect variations in the network, the nodes broadcast some control messages in the network. The reactive protocols are on demand: the source nodes generate some routing message whenever they need to send some data. Routing messages are flooded throughout the entire network. This mechanism is known as route discovery. When a path is determined, bandwidth is employed to communicate information [2]. Both protocols have advantages and disadvantages.
The type of network, features, and capabilities of nodes have a noteworthy effect on the efficiency or performance of various protocols. For example, nodes with higher mobility ratios outperform others when using the dynamic source routing (DSR) protocol [3]. According to this fact, we can assume that highly mobile nodes favor pure reactive protocols. Similarly, proactive protocols improve their packet delivery ratio (PDR) as the network size increases [4]. Additionally, proactive routing strategies result in fewer end-to-end delays. A hybrid of reactive and proactive protocols has been proposed by many researchers. Zone routing protocol (ZRP) [5] is the simplest basic hybrid protocol. The proactive routing is limited to the node’s immediate proximity in this routing protocol. The major goal is to reduce total network costs while taking into account the advantages and disadvantages of both types of reactive and proactive protocols.
Hybrid routing technologies combine reactive and proactive routing capabilities. The network is split into several sections in such protocols. The most typical option is to divide the network into zones or clusters [6]. If we partition a network into heterogeneous clusters or zones, there will be no use for the heterogeneity of member nodes within these segments. If we do not bind the nodes to a certain location, the heterogeneous routing protocols can be more efficient. Furthermore, the formation and frequent update of clusters, as well as the nomination of cluster heads (CHs), may result in additional node overhead [7]. Both clustered and non-clustered networks should be covered by the technique.
Multiple routing protocols can be used in the same network. In other words, by utilizing some gateway nodes, many different ad hoc networks can be merged into a single heterogeneous ad hoc network (HANETs). The basic goal of a larger network is to share and optimize resources [8]. Different nodes can use the help of other network nodes to get shorter pathways and transfer data to inaccessible nodes. The resourceful CHs are commonly regarded to be the gateway nodes [9]. Any programmable node should be assigned to the role of the gateway node. Furthermore, the role of gateway nodes in a heterogeneous network should not be confined to connecting distinct nodes. There should be a framework in place that allows gateway nodes to choose their own routing behavior. When choosing their routing behavior, nodes should take into account both their own parameters and the capabilities of the network. A node with proactive neighborhood, for instance, should adopt proactive routing. Similarly, in order to use less energy, nodes with lower remaining energies should switch to reactive routing. While communicating with other gateways and ordinary network nodes, gateway nodes should be able to intelligently choose a routing behavior.
Game theory (GT) is an economics and mathematics branch, but can be applied to any discipline to help people choose between several solutions. In the realm of networking, the GT technique is employed for a variety of objectives. Routing creation, application focus, network security, and network administration are the four fundamental factors that are used to model the relationship between wireless networks and GT [10]. The major goal of incorporating GT in wireless ad hoc networks is to construct a decision-making system in each node to enhance the performance of a network. To achieve improved throughputs, delays, energy consumption, and packet delivery ratios (PDR), GT is used to create routing algorithms for various types of ad hoc networks [9].
Smart nodes capable of understanding both reactive and proactive routing protocols are introduced in the proposed system. Such nodes will intelligently modify their routing behavior in response to network requirements and data traffic. These nodes serve as interfaces between nodes that have distinct routing protocols. By using such nodes, many heterogenous networks can be merged into a more efficient and larger network. The nodes in distinct networks with different routing protocols can be made to connect with each other to reduce delays in data transfer, boost dependability, and lessen energy usage. The routing protocol that will be used among the proposed smart nodes will also be studied and developed using a game-theoretic model. The smart nodes will be able to select the optimal routing protocol for their individual benefit and the benefit of the overall network.
The rest of the paper is organized as follows: The literature review is given in Section 2; Section 3 elaborates the proposed mechanism; the simulation results for different scenarios are given in Section 4; and lastly, in Section 5 the conclusion and future work are discussed.

2. Related Work

In ad hoc networks, GT can be used for a variety of purposes. GT has been used to create routing protocols for several types of ad hoc networks [10]. The major goal is to meet the QoS requirements. A ZRP-like GT-based protocol has been proposed by Selvi et al. [11]. In this mechanism, the node extinction rate is calculated to manage the network architecture. Moreover, to improve ad hoc QoS routing, a routing protocol based on the energy efficiency of zones is devised. This research describes a new way of enhancing the energy economy of ZRP-based protocols that control network topology by guessing node life expectancy. Furthermore, to increase QoS parameters, a game is paired with an efficient ZRP-based protocol. The authors state that the main objectives are to a) manage network topology according to the energy consumption rate; and b) improve QoS-aware techniques in terms of bandwidth, PDR, and some other parameters. Das and Tripathy [9] presented a technique that solely focuses HANETs. It focuses on cluster-based heterogeneous networks and comprises six phases. The GT model that is employed is a non-cooperative one. The basic goal is to construct clusters in a HANET as quickly as possible. The mixed strategies of several heterogeneous nodes are optimized using linear programming and GT.
A transmission power control-based strategy is described in the paper [12], which allows mobile nodes to balance transmission rate and power consumption to achieve a trade-off between transmission rate and power consumption. For each node, two tables define and update the average transmission rate as well as the amount of time the neighboring node is used for data transfer.
Some GT-based routing methods in ad hoc networks are primarily concerned with security. For device-to-device networks, Lv et al. [13] have suggested a secure GT-based routing algorithm. This proposed method operates in cluster-based networks. All data traffic is redirected through some secure routes that have been defined.
GT has been used by the authors to develop simple routing and load-balancing protocols. There is no mechanism in these strategies to handle diverse nodes in a wider network. The majority of GT-based routing methods place a premium on selfish node management. Zheng [14] proposes a reliable GT-based routing technique for a wireless sensor network (WSN) with certain selfish nodes. To balance resource consumption and reliability, a game model is applied. For resource-constrained network nodes, the network’s global information is not necessary. Furthermore, all nodes are free to act selfishly under this technique. Each player node’s four primary elements are taken into account in this proposed effort. This study takes into account transmission power, connectivity, dependability, and collision. Furthermore, network node heterogeneity is supported by the findings.
In recent years, a number of studies have been published proposing hybrid routing methods. The main focus of the majority of research projects has been on improving QoS parameters. The major goal is to improve targeted ad hoc networks by taking into account the following factors: latency, node energy, PDR, routing and processing overhead, and throughput [15]. ZRP [16] is a basic hybrid routing protocol that has been developed for many sorts of ad hoc networks. Various upgraded or modified variants of ZRP have been proposed in recent literature.
The “Dynamic Relationship-Zone Routing Protocol” (DRZRP) [17] is a ZRP-based protocol that focuses on relational zones rather than normal ZRP zones. The mechanism states that it is obvious for some nodes to communicate with non-zonal nodes on a regular basis. The zones, with a specified radius, are created based on the frequency of data transmission among the nodes. These zones are dynamically maintained, and the DRZRP algorithm decides proactive routing behavior inside these zones. This work is mainly concentrated on the delays and communication and processing overhead.
A sleep scheduling protocol based on ZRP has been proposed by Shanthy and Padma [18]. In this mechanism, the nodes are separated into zones and assigned to each zone with a zone leader. The selection of zone leader is based on residual energy, proximity, distance from the border, and link quality. To ensure load balancing, the zone leader detects many routes from border nodes to the target and distributes traffic along these channels. A sleep-duty cycling system that can be adjusted is also put in place. This is done so that energy is conserved at border nodes. The method is similar to other approaches that combine cluster-based processes with a sleep scheduling algorithm.
An enhanced ZRP protocol for vehicular ad hoc networks (VANETs) [19] has been proposed to efficiently meet diverse traffic circumstances. The zones are replaced with clusters in this technique, and some clustering mechanisms are used. The normal clustering mechanisms influence the majority of the work. Gasmi et al. [20] offer yet another modified ZRP. The writers of this study concentrate on the quality of service in the Internet of Vehicles (IoV). By utilizing the QoS function based on various parameters, a ZRP-based link-state mechanism is presented to improve IoV applications’ link stability.
For WSNs, the “State Aware Link Maintenance Approach” (SALMA) [15], a hybrid routing protocol, has been proposed. DSR and OLSR are used as the base protocols for the SALMA. There are three types of nodes: black, grey, and white. The classes are created based on the nodes’ activity status. During routing and data transfer, these various nodes use DSR, OLSR, or both protocols. This protocol was created specifically for WSNs and is therefore not useful in HANETs. In [21], several authors suggest that for MANETs, a dynamic cuckoo search (DCS) be combined with a hybrid zone-based hierarchical routing protocol (ZHRP). This mechanism focuses on improving interzone and intrazonal routing links.
Multimode routing protocols fall within the hybrid routing protocols category. These technologies make it simple for network nodes to switch between routing techniques. Different nodes in the same network may use different routing behaviors at the same time. Heo et al. [22] have suggested a hybrid routing system that allows nodes to vary their routing behavior. Each node in the network establishes its own routing protocol by examining several parameters at the start. The nodes do not change their routing protocols once they have been configured. Hoebeke and Demeester suggest another multimode routing scheme in their article [23]. Here, each node in the network has the ability to select a single routing mode and there are three primary modalities that are discussed: proactive, reactive, and flooding. The entireties in the routing table are also tagged with each node’s mode. A single routing database is used for all the network nodes. The base reactive and proactive protocols are AODV and WRP. This work does not address HANETs.
The authors in [24] propose a multipath heterogeneous ad hoc network “MHAR-OLSR” that combines MANET, FANET and VANET nodes. This multipath routing protocol uses a uniform communication language for heterogeneous ad hoc network components while taking into account their individual properties—transmission range, location, and speed. Four key components are the focus of this work: path classification, path computation, node identification and path selection. The TCMs are also modified in this work in order to achieve its objectives. Hauge et al. [25] outline an experiment with a depth first search (DFS) routing protocol that can be used as an inter-network routing protocol to establish a federated network that was conducted during the Coalition Warrior Interoperability eXercise (CWIX) 2019. The authors claim that their proposed work can be used in heterogeneous networks that have an interconnect overlay architecture. The authors also claim that this mechanism works very well with low-data-rate transmission technologies.
In [26], an autonomous cluster-based routing protocol is proposed. Some autonomous clusters are defined in heterogeneous MANETs. The proposed mechanism has the ability to efficiently route data in different domains. The gateways between different MANETs are designed to adaptively behave according to the nature of the data. Table 1 shows summary of relevant articles.

3. Proposed Mechanism

The proposed study’s major goal is to design and create a network that uses many routing protocols to function together. In a single network, heterogeneity is measured in terms of distinct routing protocols. There may be nodes in a heterogeneous network with varying capabilities and parameters. Energy level, energy consumption ratio, mobility ratio, PDR, and so on are examples of these parameters. The nodes are meant to utilize a specific routing protocol based on the type of parameters.
Some intelligent nodes, known as smart nodes, are programmed to comprehend the routing behavior of various underlying heterogeneous nodes. By acting as gateways between the heterogeneous nodes, these nodes make it easier for them to communicate with one another. Furthermore, when these smart nodes communicate with one another, the most appropriate default routing behavior for them can be established to enhance the overall network’s performance. A game-theory based on the prisoner’s dilemma is used to change default routing behavior. This is an evolutionary process in which nodes evaluate the required parameters over time and adjust their routing behavior accordingly.
Two basic routing protocols are chosen to be employed to connect the nodes in the underlying ad hoc network. These protocols can be of any type. We generalize this by taking the two categories of reactive and proactive protocols. For communication, all the smart nodes can utilize one or both protocols. The preprogrammed nodes operate on a particular routing protocol and cannot be adapted. The smart nodes can include both routing characteristics. Figure 1 depicts the three different classes of nodes. The nodes are classified based on their behavior. A HANET can be created by joining two or more networks that each have proactive and reactive nodes.
With the help of Figure 1, the routing capacity of smart nodes can be explained. In this diagram, a smart node communicates proactively with a proactive node while also being perceived as a member of its own family by a reactive node. Depending on their preferences and the GT, smart nodes adjust their routing behavior towards other smart nodes. A smart node can also operate as a connector between two separate nodes.
Figure 2 depicts a small network with heterogeneous nodes using three different routing strategies: proactive, reactive, and smart routing. There are five proactive and eight reactive nodes. This network could alternatively be thought of as a hybrid of two networks combined with the help of some smart nodes. Nodes with similar routing protocols may usually communicate with one another. The proposed smart routing technique, on the other hand, allows nodes with various routing protocols to communicate more effectively. The image depicts two sample scenarios, which are further detailed in Table 2:
We have two noteworthy cases, as shown in Figure 2 and Table 2. Both the source and destination nodes (R31 and R36) in the first scenario use a reactive routing protocol. A shorter route can be established by involving nodes from different classes when employing the proposed smart nodes. In case 2, two reactive nodes (R52 and R42) cannot connect to each other. These reactive nodes can be linked by enlisting the help of a proactive node and the proposed smart nodes.
This section is further broken into the following subsections: in Section 3.1, several sample network scenarios are given. Section 3.2 discusses the network’s key assumptions and characteristics. The game model is explained in Section 3.3, and the structure and actions of smart nodes are explained in Section 3.4.

3.1. Case Scenarios

While discussing the proposed mechanism, various possibilities might be considered. Figure 3, Figure 4, Figure 5 and Figure 6 depict several case scenarios.
As demonstrated in Figure 3, two separate networks can be combined to form a larger heterogeneous network. The smart nodes allow the reactive and proactive nodes to connect with each other. Two kinds of communications in such types of heterogeneous networks are possible: common and unusual. In most cases, nodes send and receive data from other nodes that are comparable to them. Heterogeneous nodes communicate with each other in the situation of unusual communication. In this case, the proposed protocol’s performance for common type of communication may be inadequate. However, the suggested protocol outperforms when acting as a gateway between two different types of nodes for an unusual type of communication.
The different nodes in Figure 4 are distributed randomly in the same area. Both reactive and proactive nodes benefit from smart nodes, which allow them to more efficiently send and receive data.
A case scenario is given in Figure 5, in which a class of nodes is arranged in an L form. If the top-most and the right-most nodes, from this class, want to communicate, they should follow the whole route through all the nodes of their class. Using smart nodes, a new diagonal route which is significantly shorter, can be created by involving nodes of another class. The smart link refers to a path that the smart nodes are involved in.
With the proposed smart nodes, a variety of options are available. As shown in Figure 6, a network made up of practically all of the smart nodes is achievable. In such a type of network, the nodes rationally adjust their routing behavior to be proactive or reactive. The adaptation relies on the node’s parameters first, then on the preferences of all known nodes.

3.2. Assumptions and Features

The following are the essential assumptions and aspects of the proposed mechanism:

3.2.1. Network Model

The network is assumed to have a variety of nodes. The network can be compared to a game denoted by G as shown in Equation (1). Where N represents the set of all the nodes of heterogeneous connected networks, S denotes the strategies, and U and I are used for utility and improvement functions, respectively.
G =   N ,   S , U ,   I  

3.2.2. Network Layer

At the physical layer, all nodes are believed to have the same attributes. Only at the network layer do the heterogeneous nodes use distinct routing behaviors. If we suppose that there is also heterogeneity at the physical layer, then the proposed smart nodes should be able to decode the various signals sent by heterogeneous nodes. The smart nodes could use a variety of physical interfaces to understand different signals. However, this work focuses mainly on the network layer.

3.2.3. Base Protocols

The network uses two base protocols: AODV and DSDV. AODV is a reactive protocol, whereas the latter is proactive. Any of these protocols can be used by any of the network nodes. The smart nodes can understand both protocols, but only one of them is used for communication at a time. Other protocols instead of AODV and DSDV can also be used in the proposed mechanism. However, our main focus is on these two protocols during the design and implementation.

3.2.4. Classifications of Nodes

Two groups of nodes can be made based on two classes: type of nodes and protocol-based nodes. There are four types of nodes in the node-type category: (a) source, (b) destination, (c) relay, and (d) neighbor nodes. Equations (2)–(5) are used to define these four types.
S n N   :   n i N a l i v e n i N a d i
The source node is denoted by S n that is the node n i member of network N. S n is a member of alive nodes N a l i v e and active data initiating nodes N a d i .
D n N   :   n i N a l i v e n i N a d r   D n N   :   n i N a l i v e n i N a d r
In Equation (3), D n denotes the destination nodes that are members of sets of alive and active data receiver nodes N a d r .
N E n N   :   n j R t T b l e i n j   i s   N e x t H o p
The set of neighbor nodes of node n i can be represented by N E n . N E n j is a neighbor node of n i that is present in the routing table R t T b l e of node n i , and is marked as N e x t H o p .
R E n N   :   n i N a l i v e n i N a d f   n i R t T b l e S n
In Equation (5), a relay node R E n i is the node that is present in the routing table of source node S n .
Different classes of routing protocols can be used for network nodes. Each node must belong to at least one class as shown in Equation (6). The entire heterogeneous network is composed of the nodes belonging to these classes.
N = n i   C l a s s A     n i   C l a s s B     n i   C l a s s C
In our case, we are using three classes: C l a s s A for proactive nodes, C l a s s B for reactive nodes, and C l a s s C for smart nodes. In the proposed mechanism the three classes can be further defined by Equations (7)–(9).
P r o N N : n i   C l a s s B   |   G e n e r a t e s   T C M   R e s p o n d s   t o   T C M
The proactive nodes, P r o N belonging to C l a s s B , periodically generate topological control messages (TCM) also known as HELLO messages. These nodes also respond to relevant TCM.
R e a N N : n i   C l a s s B   |   G e n e r a t e s   R P k t   R e s p o n d s   t o   R P k t
R e a N denote the reactive nodes. These nodes belong to C l a s s B . These nodes generate and receive routing packets i.e., route request (RREQ), route replies (RREP), and route errors (RERR).
S m r t N N : n i   C l a s s C   |   C l a s s C = C l a s s A     C l a s s B  
Both reactive and proactive features are present in smart nodes   S m r t N . These nodes represent the coming together of reactive and proactive activities.

3.2.5. Neighborhood and Routing Tables

Routing tables are available in two different formats. The routing table used by C l a s s A nodes is shown in Table 3.
C l a s s B nodes retain routing information in their routing tables in the following format shown in Table 4.
For the storage of routing information, a S m r t N uses both C l a s s A and C l a s s B routing tables. A translator is kept in such nodes to change the values between both the routing tables. Furthermore, each smart node maintains an additional table in which it stores information about its neighbors. These data are gathered after a certain amount of time has passed in order to compute the data about neighbor nodes. The table primarily comprises energy and consumption ratios, and neighbors’ mobility ratios as shown in Table 5.

3.2.6. Nodes’ Energy Level

Each node has a finite amount of energy. Due to their heterogeneous nature, nodes’ energy levels may differ from one another. If a node has enough energy to be spent on data packet transmission, processing, and reception, it is said to be alive. The dead nodes cannot be considered as part of the network. At any point in time if a node fails due to any reason—such as breakage or battery failure—then the node can be considered a dead node.
E n i and E I n i t i a l n i are the current and initial energies of a node n i , respectively. The ratio of a node’s energy consumption over time t is defined as, Δ E t n i   = E T t n i   E T n i   . After a certain amount of time, the energy fluctuation must fulfill the equation E n i > Δ E n i . The value Δ E may differ for each node due to the heterogeneous environment. E R m n t n i is the remaining energy ratio of a node, n i at time t , as computed in Equation (10).
E R m n t n i = E t n i E I n i t i a l n i
In Equation (11), λ E t n i   represents the current energy to energy consumption ratio at time t of a node n i .
λ E t n i = E t n i Δ E t n i
The median of the known nodes’ λ E t n j can be used to calculate the energy threshold value, T h E , as shown in Equation (11). Each smart node can send a request to its known nodes to get these values.
T h E = M e d λ E t n j

3.2.7. Nodes’ Mobility Ratio

The network’s nodes are mobile and have variable mobility ratios. The kth location of a node n i is L o c k n i = x k , y k where x and y are the coordinates. If a node n i moves from location k to location l in a time period t, then it can be denoted as Δ L o c k , l t n i and computed as in Equation (12).
Δ L o c k , l t n i = x k x l 2 + y k y l 2 t  
The same can be said for the n i node’s mobility ratio, which is indicated by   M o b R a t i o ( n i ) . A smart node requires a threshold value for mobility ratio, T h M , during default protocol selection, which can be calculated using Equation (13).
T h M = M e d M o b R a t i o n j  

3.3. Game Modeling

As previously stated, the network can be viewed as a game. The strategies and utility functions of player nodes as well as the game matrix and improvement functions are addressed in this subsection.

3.3.1. Nodes’ Strategies and Utility Function

S denotes the strategy of nodes towards routing protocol selection in the game. The routing behavior of a node is determined by three major characteristics. The energy level, consumption ratio, and mobility ratio of the nodes are these metrics. A proactive routing technique is preferred by nodes with a higher degree of energy while highly mobile nodes, on the other hand, require reactive routing for best results.
The nodes first examine their mobility ratio. For a higher value of mobility, the nodes adjust their default routing protocol to reactive. If the mobility level is higher, then the energy consumption ratio and current level are examined. With the reduced energy consumption ratio, nodes with a higher energy level adapt to proactive routing behaviour. A node’s power is tested afterward. For a smart node   n i , i.e., S m r t N N, two strategies are defined: S i = s r , s p , where s r represents the strategy with a reactive protocol ( R e a N ) and S i = s p denotes a member of the P r o N class, i.e., proactive node. If two smart nodes with different routing protocols are communicating with each other, then an adequate level of energy and time is wasted on unwanted routing and topology control packets. This wastage can be considered the transmission cost on routing. The payoff functions are determined by node strategies. Equation (14) can be used to define the payoff function for two smart nodes.
U n i , n j = 1 C P r o N , i , 1 C R e a N , j           w h e r e   R P n i R P n j 1 , 1               w h e r e   R P n i = R P n j
where C P r o N , i is the cost of routing for the class of proactive nodes due to the smart node n i . Between two smart nodes, the following game matrix can be formed:
There is no need to change the routing protocol of n i   and n j , if both are using the same routing protocol. If two nodes have distinct routing behaviors, their routing performance will be impaired, as shown in the Table 6. The situation where both the smart nodes operate on different protocols is referred to as the degraded protocols and denoted by Δ R and Δ P. It is clear from Lemma 1 that the game strageies form a pure Nash Equilibrium.
Lemma1. 
In the proposed game, the strategy pairs s r , s p and   ( s p , s r ) form a pure Nash Equilibrium.
Proof. 
There are two major classes of nodes in the network. These are reactive and proactive classes. Each smart node is allowed to choose either of these two routing protocols. In Table 5 the strategies are given along with the payoffs. In case both the interacting nodes use the same routing protocol then there will be an optimal situation denoted by 1 ,   1 . It is clear that the payoff should be less than 1 for the cases s r , s p and ( s p , s r ). The distinct nodes should change their strategies to gain an optimal payoff. Therefore, according to the definition, the situation is a pure Nash Equilibrium for this game. □
To switch the routing from a costly routing protocol, an evolutionary technique, referred to as the improvement function I , is used.

3.3.2. Improvement Function

Each node in the network establishes its default routing protocol at the outset and refreshes it after a certain amount of time has passed. With the passage of time, the default behavior changes based on the parameters considered. If a node in the game matrix receives Δ R or Δ P. It kicks off the game’s second phase. Both of its routing tables are scanned. The NextHop fields are checked in both tables. Using the following Equation (15), to obtain the most common routing protocol in the neighborhood, the entries are counted and compared.
C o u n t   D i s t i n c t P r o R t T b l e N e x t H o p > C o u n t   D i s t a n t R e a R t T b l e N e x t H o p
If the criterion is met, the node n i adjusts to proactive as its default routing protocol; otherwise, it switches to reactive protocol. If the node receives Δ R or Δ P again, it evaluates all of the stored nodes in its routing tables, and accordingly modifies its routing protocol, following the same approach as with Equations (16)–(18).
T o t a l P r o = D i s t i n c t P r o R t T b l e A l l   n o d e s
T o t a l R e a = D i s t i n c t R e a R t T b l e A l l   n o d e s
S i z e O f T o t a l R e a > S i z e O f T o t a l P r o
Two sets, T o t a l R e a and   T o t a l P r o , are used in these equations and are known to node   n i   . The node n i   switches its routing behavior according to the largest known routing protocol in the network.

3.4. Architecture and Functions of Smart Nodes

The design of smart nodes, their functions, and the algorithms employed in the mechanism are detailed in this subsection. Various scenarios are presented, along with smart node responses. As previously stated, smart nodes act rationally, allowing different types of communication and data packets to be received and intelligent case-based decisions to be made.

3.4.1. Diagram for Smart Nodes

The architecture of proposed smart nodes is divided into two sections: the first is reception control, which deals with packet recognition and the latter is routing protocol selection. The packet analysis is the subject of the first module. The received packets are classified as (a) data, (b) routing, and (c) TCM packets using a message parser. A different set of instructions is followed for each type of packet. The routing protocol module receives the set of instructions. The routing tables are kept in the routing protocol module. This module additionally adjusts the routing mode based on the previous module’s instructions. This module also keeps track of the neighbors’ information as well as a temporary storage cache. This architecture is presented in Figure 7 and is further explained in Table 7.

3.4.2. Algorithms

This section goes through three major algorithms. Algorithm 1 describes the technique for smart nodes to choose an initial default routing protocol. The selected routing protocol may update with the passage of time, according to the GT process. Algorithm 2 describes how to update the routing protocol. Smart nodes accept packets and conduct different tasks depending on the nature of packets received. Algorithm 3 explains this procedure.
Algorithm 1: Selection of Default Routing Protocol
Input:  n i
Output: DefaultRoutingProtocol
Begin:
  • W i t h   Neigh Table
  • U p d a t e   Records
  • C a l c u l a t e
  • ThE = Med λ E n j
  • ThM = Med MobRatio
  • E n d   W i t h
  • I f   MobRatio ( n i ) > ThM
  • Return   Reactive
  • E l s e   I f   λ E n i > ThE OR ER n i > β
  • Return   Proactive
  • E l s e   Return   Reactive
  • E l s e   I f
The neighbors’ table is taken first, according to Algorithm 1. By obtaining new information from its known nodes, the smart node updates the entries. The threshold values for energy to consumption ratios and mobility ratios are calculated in stages 4 and 5. The routing mode is determined from step 7 by comparing the node’s data to the estimated threshold values. If the node’s λ E is larger than or if its remaining energy ratio is greater than β in step 9, the 0 < β < 100 represents a coefficient value obtained during simulations.
Algorithm 2: Evolution Process for Default Routing Protocol
Input:  n i
Output: DefaultRoutingProtocol
Begin:
  • I f   CurrentTime     LastReadTime   >   ExpiryInterval  
  • r o u n d = 0
  • E n d   i f
  • i f   G matrix = Δ R   O R   G matrix = Δ P
  • i f   r o u n d = 0
  • PP = Count   Distinct ProRtTable . NextHop
  • RP = Count   Distinct ReaRtTable . NextHop
  • I f   ( PP > RP )
  • Return   Proactive
  • E l s e
  • Return   Reactive
  • r o u n d = 1
  • E n d   I f
  • E l s e
  • PP = Count   Distinct ProRtTable . DestIP
  • PP = PP + Count   Distinct ProRtTable . NextHop
  • RP = Count   Distinct ReaRtTable . DestIP
  • RP = RP + Count   Distinct ReaRtTable . NextHop
  • If PP > RP
  • Return   Proactive
  • E l s e
  • Return   Reactive
  • r o u n d = 1
  • E n d   I f
  • E n d   I f
  • E l s e
  • Return   n i . DefltRtProc
  • LastReadTime = CurrentTime
  • E n d   I f
In Algorithm 2, the round variable is utilized to change the evolutionary rounds for parameter consideration. This round gets reset to its original value when a certain amount of time has passed. The time is verified for expiry in step one. If the round has expired, step 2 sets the first round. In step 4, the game matrix is examined for the chances of a degraded routing protocol. If there is a degraded protocol, steps 6 to 12 are carried out for the case of first round, and steps 15 to 23 are carried out for the cases of the next rounds. At first, the node examines the neighbors’ parameters, but in subsequent cases, the node considers all the known nodes in its routing tables.
Algorithm 3: Operational Tasks of Smart Nodes
Input: Packet
Output:
Begin:
  • U p o n   R e c e p t i o n   o f   Packet
  • P a r s e   Packet
  • Cache = Packet
  • I f   Packet . Protocol = Reactive
  • R T = R e a R t T a b l e
  • E l s e
  • R T = P r o R t T a b l e
  • E n d   I f
  • I f   Packet . T y p e = R o u t i n g
  • R t P r o . M o d e = Reactive
  • I f   P a c k e t . D e s t = n i . A d d r e s s
  • REPLY   P a c k e t . S o u r c e
  • E l s e   I f   P a c k e t . D e s t   e x i s t s   i n   R T . D e s t
  • Forward   R T . N e x t H o p
  • E l s e
  • Broadcast   Packet
  • E l s e   I f
  • Update   R e a R t T a b l e
  • E n d   I f
  • I f   Packet . T y p e = T C
  • R t P r o . M o d e = P r o active
  • REPLY   P a c k e t . S o u r c e
  • Update   P r o R t T a b l e
  • E n d   I f
  • I f   Packet . T y p e = D A T A
  • i f   P a c k e t . D e s t = n i . A d d r e s s
  • REPLY   A C K
  • E l s e   I f   P a c k e t . D e s t   e x i s t s   i n   R T . D e s t I P
  • FORWARD   t o   R T . N e x t H o p
  • E l s e
  • REPLY   E R R O R
  • E n d   I f
  • E n f   I f
Algorithm 3 deals with packet arrival and node’s operations regarding the kind of packet. Initially, a temporary variable RT is allocated to one of the routing tables. Step 9 determines whether the packet is of routing type. For a route packet arrival, actions are conducted from steps 10 to 18. The node either acknowledges the source, or broadcasts or forwards the packet during these steps. Step 20 determines whether or not the packet is a proactive TCM. The routing table is modified after the TC message is acknowledged. At step 25, the packet is checked to see if it contains data. Respective operations (steps 26–31) are performed according to the nature of the data packet.

4. Simulation Results

The proposed work is simulated in NS2.35. AWK scripts were used to extract the results from the created trace files, and then MS Excel was used to create the graphs. The performance metrics accessed were remaining energy, throughput, PDR, and end-to-end delays. Some scenarios were created and the results with and without smart nodes were assessed. A heterogeneous network made up of AODV and DSDV nodes was used in these scenarios. The findings are compared with and without the smart nodes. In each example the network is first examined with the absence of nodes that have the proposed mechanism. After that, the proposed mechanism’s smart nodes are added to the network, and outcomes are analyzed. The duration of the simulation was 100 seconds. Table 8 lists the main simulation parameters. In four time pauses, the resultant values were recorded.

4.1. Case 1: Nodes from Different Classes Are Deployed in Separate but Nearby Fields

Figure 8 shows a screenshot of the NetAnim animator in this scenario. The AODV nodes are green, the DSDV nodes are blue, and the proposed smart nodes are red.
In Table 9, the parameters for heterogeneous nodes are listed. There are three classes of nodes, each with its own set of values. The common and uncommon communication types are considered in this example situation. In the previous section, these types were discussed.
In scenario 1, where there are two classes of nodes coupled together but not overlapped in the area, Figure 9 displays the simulation results for frequent communication instances. Only DSDV nodes can communicate with each other. AODV nodes, on the other hand, only communicate with AODV. Values with and without smart nodes are shown in the graph. When it comes to common communication, smart nodes have a much smaller part in the network. The smart nodes would have formed part of either DSDV or AODV classes of nodes because there is no cross connectivity. If a smart node has the same number of DSDV and AODV neighbors, the reactive protocol will be used until the threshold energy level i.e., β is reached. The results reveal that the performance of such a network is almost unaffected by the presence of smart nodes.
In the next experiment, the network was assumed to have two source nodes from DSDV class and two destination nodes from AODV destinations nodes for unusual communication. The routing protocols used by the sources and destinations were different. Because such communication is impossible without the smart nodes, the results for “Without Smart Nodes” cannot be calculated because there are no outputs. Only the energies of nodes are reported. Without the usage of smart nodes, the results show that this form of communication is not possible in general. The values for all QoS measures were recorded when the proposed smart nodes were used, as shown in Figure 10. It is worth noting, however, that the amount of remaining energy in the absence of smart nodes is significantly higher. This is because the network nodes cannot establish paths, thus there is no energy spent on routing and data communication.

4.2. Case 2: Heterogeneous Nodes Are Not Placed Distinctly

In the previous section, we discussed this case. In this scenario, we have a network with three classes of nodes: DSDV, AODV, and smart nodes. All these nodes were randomly deployed in the same area. These nodes have positions that overlap in a certain area. The simulation’s NS2 screenshot is shown in Figure 11. The scenario includes 35 DSDV, 35 AODV, and 30 smart nodes.
The simulation parameters for this experiment are given in Table 10.
Figure 12 shows the simulation results for Case Scenario 2. Except for energy usage, the network with smart nodes produces significantly better results in all performance parameters. For the smart node-based network, the results for residual energy at various time pauses are virtually identical or slightly better. In the absence of a smart node network, we kept the smart nodes dormant for the simulation. As a result, smart nodes experience minimal energy loss, resulting in superior average remaining energy values.

4.3. Case 3: Proactive Nodes Are Deployed in an L Pattern

In this example, we assume that all of the nodes of a particular class are clustered together in an L shape. The DSDV nodes are considered in this case. A similar instance was described in the previous section. If we do not use the smart nodes, the route entails all of the nodes of DSDV class, which is a lengthier route. The reactive AODV nodes can also be used by incorporating the smart nodes, and a diagonal route can be constructed, minimizing the number of intermediate nodes. Figure 13 depicts the screenshot for case 3. Table 11 shows the parameters used in this case scenario.
The results for case 3 are shown in Figure 14. With a smart node-based network, the results for PDR, delays, and throughput are better. This is because of the establishment of a shorter route. However, the remaining energy is quite comparable. Because the non-proactive nodes are not employing their energies, less energy is spent without smart nodes. If we simply consider the values of DSDV nodes, the ratio of remaining energy in the absence of smart nodes will be significantly greater. Because the AODV routing burden is taken into account, the throughput of the smart node-based network is high. The AODV nodes were not involved in routing in the absence of smart nodes and so there was minimal routing overhead.
The proposed protocol, identified as GMRP in the simulation results, has been compared with AODV and ZRP for further evaluation. A network of 100 nodes with an area of 1500 ms2 was taken. The nodes were programmed with AODV, ZRP and GMRP respectively and results were recorded for 200 pause times. The performance of the protocols in terms of PDR, average energy consumption, and end-to-end latency were accessed. Figure 15, Figure 16 and Figure 17 show the results. We can infer from the results that GMRP is a highly adaptive protocol that reacts to time. The nodes tend to alter their routing behavior as time progresses. This is because the nodes consume their energy with the passage of time. The performance of GMRP is comparable to AODV in terms of energy consumption and PDR. The smart nodes choose to adopt the reactive routing behavior since they initially have greater energies. The performance steadily declines after pause time 100 as a result of the change to proactive routing behavior. In case of end-to-end delays, the protocol performance is similar to AODV in the beginning but improves later. This is also due to the change of routing behavior from reactive to proactive. The nodes gradually start changing their routing protocol with the passage of time by looking into their remaining energies.

5. Conclusions and Future Work

Depending on their capabilities and the nature of their usage, ad hoc networks can take on a variety of configurations. Various ad hoc networks can be linked together for the creation of an efficient and more powerful network. A multimode hybrid routing protocol is proposed in this paper that can be utilized to create a HANET including nodes from diverse ad hoc networks. Moreover, the proposed routing protocol can be implemented in the entire network or a subset of the network nodes. The smart nodes are those nodes that use the proposed routing protocol to communicate. At the same time, the smart nodes preserve the routing tables for both reactive and proactive neighbors. These nodes can adjust their routing behavior adaptively as needed. Furthermore, its default routing protocol is adjusted using a game-theoretic technique. The smart nodes progress through many steps to find the best routing protocol for themselves and the entire network. The energy level and consumption and mobility ratios are the parameters used to establish the default routing protocol for these smart nodes.
We employed AODV and DSDV as base protocols in this work. Instead of these two, any type and number of protocols can be selected. With a set of finite parameters for the network nodes, linear programming can be used to implement numerous protocols by improving normalization and achieving the best solution. The consideration of multiple routing protocols could cause an uncertainty problem. A technique for making decisions under uncertainty can be created by combining game theory and linear programming.

Author Contributions

Conceptualization, S.K. and M.M.U.; methodology, M.M.U.; software, S.X.; investigation, N.A.; formal analysis, C.J. and M.M.U.; investigation, S.X.; resources, C.J.; data curation, M.M.U., C.J. and N.A.; writing—review and editing, S.K. and Z.I.; supervision, S.K.; project administration, S.K.; funding acquisition, C.J. and N.A. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Acknowledgments

The authors of this paper would like to offer thanks for the research facilities provided by the Huaiyin Institute of Technology, China.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Bendale, L.M.; Jain, R.L.; Patil, G.D. Study of Various Routing Protocols in Mobile Ad-Hoc Networks. Int. J. Sci. Res. Netw. Secur. Commun. 2018, 6, 5–15. [Google Scholar]
  2. Prabha, K. Performance assessment and comparison of efficient ad hoc reactive and proactive network routing protocols. SN Comput. Sci. 2020, 1, 13. [Google Scholar] [CrossRef] [Green Version]
  3. Pal, P.; Pal, R. Observing of Mobility Model against Reactive Routing Protocols in MANETs of throughput, Average end-to-end delay, packet delivery ratio. Int. J. Comput. Sci. Eng. 2017, 5, 43–52. [Google Scholar]
  4. Wali, S.; Ullah, S.I.; Khan, A.U.; Salam, A. A Comprehensive Study on Reactive and Proactive Routing Protocols under different performance Metric. Sukkur IBA J. Emerg. Technol. 2019, 1, 39–51. [Google Scholar]
  5. Walikara, G.A.; Biradarb, R.C. A survey on hybrid routing mechanisms in mobile ad hoc networks. J. Netw. Comput. Appl. 2017, 77, 48–63. [Google Scholar] [CrossRef]
  6. Raheja, K.; Maakar, S.K. A survey on different hybrid routing protocols of MANET. Int. J. Comput. Sci. Inf. Technol. 2014, 5, 5512–5516. [Google Scholar]
  7. Gavhale, M.; Saraf, P.D. Survey on algorithms for efficient cluster formation and cluster head selection in MANET. Procedia Comput. Sci. 2016, 78, 477–482. [Google Scholar] [CrossRef] [Green Version]
  8. Qiua, T.; Chena, N.; Li, K.; Qiao, D.; Fu, Z. Heterogeneous ad hoc networks: Architectures, advances and challenges. Ad Hoc Netw. 2017, 55, 143–152. [Google Scholar] [CrossRef]
  9. Das, S.K.; Tripathi, S. Adaptive and intelligent energy efficient routing for transparent heterogeneous ad-hoc network by fusion of game theory and linear programming. Appl. Intell. 2018, 48, 1825–1845. [Google Scholar] [CrossRef]
  10. Charilas, D.; Athanasios, E.; Panagopoulos, D. A survey on game theory applications in wireless networks. Comput. Netw. 2010, 54, 3421–3430. [Google Scholar] [CrossRef]
  11. Selvi, P.T.; GhanaDhas, C.S. A Novel Algorithm for Enhancement of Energy Efficient Zone Based Routing Protocol for MANET. Mob. Netw. Appl. 2018, 24, 307–317. [Google Scholar] [CrossRef]
  12. Sharah, A.A.; Alhaj, M.; Naimat, F.A. Trade-off between Energy Consumption and Transmission Rate in Mobile Ad-Hoc Network. Int. J. Adv. Comput. Sci. Appl. 2021, 12, 245–252. [Google Scholar] [CrossRef]
  13. Lv, Y.; Feng, W.; Xiao, A.; Bao, X. Cluster-head Centered Fast Secure Routing based on Game theory for Device-to-Device Communication. Wirel. Pers. Commun. 2020, 113, 2079–2106. [Google Scholar] [CrossRef]
  14. Zheng, M. Game Theory Used for Reliable Routing Modeling in Wireless Sensor Networks. In Proceedings of the 11th International Conference on Parallel and Distributed Computing, Applications and Technologies, Wuhan, China, 8–11 December 2010. [Google Scholar]
  15. Umar, M.M.; Alrajeh, N.; Mehmood, A. SALMA: An efficient state-based hybrid routing protocol for mobile nodes in wireless sensor networks. Int. J. Distrib. Sens. Netw. 2016, 12, 2909618. [Google Scholar] [CrossRef]
  16. Haas, Z.J.; Pearlman, M.R.; Samar, P. The zone routing protocol (ZRP) for ad hoc networks. In Internet Draft, Draft-ietfmanet-zone-zrp-04.txt; IEEE: Piscataway, NJ, USA, 2002. [Google Scholar]
  17. Hu, Y.; Zhang, F.; Tian, T. Dynamic Relationship-Zone Routing Protocol for Ad Hoc Networks. Wirel. Pers. Commun. 2020, 114, 2461–2476. [Google Scholar] [CrossRef]
  18. Shanthy, R.; Padma, T. A zone routing protocol incorporated with sleep scheduling for MANETs. J. Ambient. Intell. Humaniz. Comput. 2021, 12, 4181–4191. [Google Scholar] [CrossRef]
  19. Yanga, X.; Chenb, Q.; Chenb, C.; Zhao, J. Improved ZRP Routing Protocol Based on Clustering. Procedia Comput. Sci. 2018, 131, 992–1000. [Google Scholar] [CrossRef]
  20. Gasmi, R.; Aliouat, M.; Seba, H. A Stable Link Based Zone Routing Protocol (SL-ZRP) for Internet of Vehicles Environment. Wirel. Pers. Commun. 2020, 112, 1045–1060. [Google Scholar] [CrossRef]
  21. Gopalan, S.H. ZHRP-DCSEI, a Novel Hybrid Routing Protocol for Mobile Ad-hoc Networks to Optimize Energy Using Dynamic Cuckoo Search Algorithm. Wirel. Pers. Commun. 2021, 118, 3289–3301. [Google Scholar] [CrossRef]
  22. Ung, H.; Choi, J. A new approach to adaptive multi-routing protocol for mobile ad hoc network. In International Workshop on Self-Organizing Systems; Springer: Berlin/Heidelberg, Germany, 2007. [Google Scholar]
  23. Hoebeke, I.M.J.; Demeester, P. Adaptive routing for mobile ad hoc networks. EURASIP J. Wirel. Commun. Netw. 2012, 2012, 126. [Google Scholar] [CrossRef] [Green Version]
  24. Benjbara, C.; Habbani, A.; Mouchfiq, N. New Multipath OLSR Protocol Version for Heterogeneous Ad Hoc Networks. J. Sens. Actuator Netw. 2022, 11, 3. [Google Scholar] [CrossRef]
  25. Hauge, M.; Mjelde, T.M.; Holtzer, A.; Drijver, F.; Velt, R.I.; Hegland, A.M.; Ørbekk, E.; Barz, C.; Kirchhoff, J.; Rogge, H. Inter-network interoperability for heterogeneous networks at the tactical edge. In Proceedings of the 2020 Military Communications and Information Systems Conference (MilCIS), Canberra, ACT, Australia, 10–12 November 2020; pp. 1–7. [Google Scholar] [CrossRef]
  26. Okano, K.; Aoki, Y.; Ohta, O.; Kakuda, Y. An Inter-Domain Routing Protocol Based on Autonomous Clustering for Heterogeneous Mobile Ad Hoc Networks. IEICE Trans. Commun. 2015, 98, 1768–1776. [Google Scholar] [CrossRef]
Figure 1. Proposed types of nodes and the in-between communication modes.
Figure 1. Proposed types of nodes and the in-between communication modes.
Electronics 11 04134 g001
Figure 2. Smart links interconnecting heterogeneous nodes.
Figure 2. Smart links interconnecting heterogeneous nodes.
Electronics 11 04134 g002
Figure 3. Different nodes are positioned in distinct yet interconnected locations.
Figure 3. Different nodes are positioned in distinct yet interconnected locations.
Electronics 11 04134 g003
Figure 4. Dissimilar nodes are randomly deployed in the same area.
Figure 4. Dissimilar nodes are randomly deployed in the same area.
Electronics 11 04134 g004
Figure 5. Nodes from the same class are deployed in an L form.
Figure 5. Nodes from the same class are deployed in an L form.
Electronics 11 04134 g005
Figure 6. Most of the network nodes are smart nodes.
Figure 6. Most of the network nodes are smart nodes.
Electronics 11 04134 g006
Figure 7. Smart node’s architecture.
Figure 7. Smart node’s architecture.
Electronics 11 04134 g007
Figure 8. Case scenario 1: NS2 NetAnim Screenshot.
Figure 8. Case scenario 1: NS2 NetAnim Screenshot.
Electronics 11 04134 g008
Figure 9. Case 1: Type of common communication.
Figure 9. Case 1: Type of common communication.
Electronics 11 04134 g009
Figure 10. Case 1: Uncommon communication type.
Figure 10. Case 1: Uncommon communication type.
Electronics 11 04134 g010
Figure 11. Case scenario 2: NS2 NetAnim Screenshot.
Figure 11. Case scenario 2: NS2 NetAnim Screenshot.
Electronics 11 04134 g011
Figure 12. Case scenario 2: Random placement of heterogeneous nodes.
Figure 12. Case scenario 2: Random placement of heterogeneous nodes.
Electronics 11 04134 g012
Figure 13. Case scenario 3: NS2 NetAnim Screenshot.
Figure 13. Case scenario 3: NS2 NetAnim Screenshot.
Electronics 11 04134 g013
Figure 14. Case scenario 3: Proactive nodes are deployed in an L pattern.
Figure 14. Case scenario 3: Proactive nodes are deployed in an L pattern.
Electronics 11 04134 g014
Figure 15. Packet delivery ratio (No. of packets received/No. of packets sent).
Figure 15. Packet delivery ratio (No. of packets received/No. of packets sent).
Electronics 11 04134 g015
Figure 16. End-to-end delays (milliseconds).
Figure 16. End-to-end delays (milliseconds).
Electronics 11 04134 g016
Figure 17. Average energy consumption (Joules).
Figure 17. Average energy consumption (Joules).
Electronics 11 04134 g017
Table 1. Research papers focusing on game-theory-based routing.
Table 1. Research papers focusing on game-theory-based routing.
PaperNetwork and FocusSummary
Das and Tripathy [9] (2019)Heterogeneous
Interconnectivity Clustering
Non-cooperative game-theory-based routing protocol
The clusters are made in six phases
A single protocol is used throughout the heterogeneous network
Sharah et al. [12] (2021) Homogeneous
Transmission rate
For network stability, a cooperative game is proposed
The main objective is the load balancing among nodes
For each neighbor, a single-hop transmission rate is used
Lv et al. [13] (2020) Homogeneous
Clustering
Security
Secure routing protocol based on clustering
The packets are floated through some defined secure paths.
No diversity of nodes or heterogeneity mentioned
Zheng [14] (2010)Heterogeneous
Selfish node
Resource utilization based on a game-theory-based mechanism
Each node independently acts as per its preferences
The interconnectivity among heterogenous nodes is not discussed
Hu et al. [17] (2020) Homogeneous
Relational Zones
Relationship-zones are proposed to replace the typical zones
The nodes frequently communicating with each other are said to be part of a single zone.
DRZRP protocol is used throughout the entire network
Shanthy and Padma [18] (2021) Homogeneous
Zones
Work scheduling
Similar to cluster-based mechanism
A simple sleep scheduling mechanism is proposed
Key parameters are energy level and degree of connectivity
Yang et al. [19] (2018) Homogeneous
Cluster
Proposed for VANETs
Clusters having similar functionalities to zones are proposed
A cluster division and CH selection mechanism
Umar et al., 2016 [15] Homogeneous
Nodes’ states
Uses OLSR and DSR as base protocols
Nodes are classified according to their activity levels
Each class of nodes has own routing procedure
Garmi et al. [20] (2020) Homogeneous
Link stability
Mainly designed for Internet of Vehicles
The foremost concern is the link stability
A typical hybrid routing mechanism for homogeneous network
Gopalan [21] (2021) Homogeneous
Link stability
Dynamic cuckoo search (DCS) () with hybrid zone hierarchical routing protocol (ZHRP)Interzonal and intrazonal link enhancement
Hoebeke et al. [23] (2012) Homogeneous
Multimode Routing
Nodes can change from reactive to proactive or vice versa
The nodes adapt their routing protocols in the beginning
Three modes: reactive, proactive, and flooding are proposed
Benjbara et al. [24]
(2022)
Heterogeneous
Interconnectivity
A modified version of OLSR is proposed
The main objective is to combine MANETs, FANETs and VANETs
The control messages of OLSR are modified to meet the diverse requirements of nodes
Hauge et al. [25]Heterogeneous
Interconnectivity
A routing protocol based on depth first search
Used to connect inter-networks during the Coalition Warrior Interoperability eXercise (CWIX) 2019
Also works well with low-data-rate transmission technologies
Okano et al. [26]
2015
Heterogeneous
Interconnectivity
An autonomous cluster-based routing protocol
Capable of combining multiple MANETs
The gateway nodes adaptively choose a routing behavior
Table 2. Two cases depicted in Figure 2.
Table 2. Two cases depicted in Figure 2.
Case #SourceDestinationIntermediate Nodes
With Smart NodesWithout Smart Nodes
1R31R36S21, P20, S22R32, R33, R34, R35
2R52R42S11, P20, S22Not Accessible
Table 3. Routing table for ClassA (Proactive).
Table 3. Routing table for ClassA (Proactive).
Destination IPNext HopMetricDest. Seq. Number
Table 4. Routing Table for ClassB (Reactive).
Table 4. Routing Table for ClassB (Reactive).
Destination IPSeq. #Hop-CountNext HopValidity Time
Table 5. Information about Neighbors.
Table 5. Information about Neighbors.
Neighbor-IDRemaining-EnergyEnergy-Consump.-RatioMobility-Ratio
Table 6. Game matrix.
Table 6. Game matrix.
Node j
Proactive (S = s2)Reactive (S = s1)
Node iProactive ( S = s p ) 1 ,   1 1 C R e a N , i , 1 C P r o N , j
Reactive ( S = s r ) 1 C P r o N , i , 1 C R e a N , j 1 ,   1
Table 7. Smart nodes’ operational steps.
Table 7. Smart nodes’ operational steps.
S#Nature of Received PacketInstructions to Be Followed
1Received packet
(Any type/Protocol)
Verify the message’s type before sending it to the module of routing protocol. Transfer a copy to Cache.
2Routing Packet
(RREQ/RREP/RERR)
Protocol: Reactive
Switch to reactive routing mode. Reply/Forward and update/make entries in the Rea-Routing-Table.
3TC Messages
Protocol: Proactive
Send it to TC, switch to Proactive mode, and respond to the sender. In the future, treat the sender as a proactive node. Update the Pro-Routing-Table
4Data packet
Protocol: Any
ACK in case of destination node otherwise forward using the routing table. If there is no appropriate record in the routing tables, do not react. Update/new entry in the routing tables.
Table 8. Common parameters for all the simulations.
Table 8. Common parameters for all the simulations.
Simulation Parameters
Size of Network1000 m × 1000 m
Type of ChannelWirelessChannel
Ifq Max packets50
Type of Network interfaceWirelessPhy/Phy
Type of MACMac/802_11
Max energy100 J
Power—Tx0.9 W
Power—Rx0.7 W
Power—Idle0.6 W
Power—Sleep0.1 W
Type of trafficCBR
Size of packets500
Duration of simulation100 s
Reading times10, 20, 40, 100
Table 9. Case 1: Parameters for classes of nodes.
Table 9. Case 1: Parameters for classes of nodes.
Parameters of Nodes
Nodes TypeDSDVAODVSmart
Color of nodesBlueGreenRed
Number of Nodes49
(0–48)
49
(49–97)
02
(98,99)
Common-Case Source nodes0, 149, 50-
Common-Case Destination node4897-
Unusual-Case Source nodes0, 1--
Unusual-Case Destination Node-96, 97-
LocationsRandom with
x-axis < 500
Random with
500 < x-axis < 1000
97 at 500, 350
98 at 500, 700
Table 10. Case 2: Parameters for classes of nodes.
Table 10. Case 2: Parameters for classes of nodes.
Parameters of Nodes
Type of Nodes DSDVAODVSmart
Color of NodesBlueGreenRed
Number of Nodes35
(0–34)
35
(35–69)
30
(70–99)
Source nodes0, 135, 36-
Destination node3469-
LocationsRandomRandomRandom
Table 11. Case 3: Parameters for classes of nodes.
Table 11. Case 3: Parameters for classes of nodes.
Parameters of Nodes
Type of NodesDSDVAODVSmart
Color of NodesBlueGreenRed
Number of Nodes20
(0–19)
20
(20–39)
20
(40–59)
Source node9--
Destination node19--
LocationsFixed (L Form)RandomRandom
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Khan, S.; Umar, M.M.; Jin, C.; Xiao, S.; Iqbal, Z.; Alnazzawi, N. Game-Theory-Based Multimode Routing Protocol for Internet of Things. Electronics 2022, 11, 4134. https://doi.org/10.3390/electronics11244134

AMA Style

Khan S, Umar MM, Jin C, Xiao S, Iqbal Z, Alnazzawi N. Game-Theory-Based Multimode Routing Protocol for Internet of Things. Electronics. 2022; 11(24):4134. https://doi.org/10.3390/electronics11244134

Chicago/Turabian Style

Khan, Shafiullah, Muhammad Muneer Umar, Chunhua Jin, Shaozhang Xiao, Zeeshan Iqbal, and Noha Alnazzawi. 2022. "Game-Theory-Based Multimode Routing Protocol for Internet of Things" Electronics 11, no. 24: 4134. https://doi.org/10.3390/electronics11244134

APA Style

Khan, S., Umar, M. M., Jin, C., Xiao, S., Iqbal, Z., & Alnazzawi, N. (2022). Game-Theory-Based Multimode Routing Protocol for Internet of Things. Electronics, 11(24), 4134. https://doi.org/10.3390/electronics11244134

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop