A Review of Power Management Approaches for Mobile Ad Hoc Networks

A Review of Power Management Approaches for Mobile Ad Hoc Networks

S. Hemalatha* M. Rajasekaran Lalit Kumar Sagar C. R. Komala G. Nixon Samuel Vijayakumar A. Nageswaran Maganti Syamala J. Deepa

Department of Computer Science and Business System, Panimalar Engineering College, Chennai 600066, India

Department of Computer Science & Engineering, Madanapalle Institute of Technology & Science, Madanapalle 517325, India

Department of Computer Science and Engineering, SRMIST Delhi NCR Campus, Modinagar 201204, India

Department of Information Science and Engineering, HKBK College of Engineering, Bengaluru 560045, India

Department of Physics, R.M.K. Engineering College, Kavaraipettai 601206, India

Department of Computer Science and Engineering, Loyola Institute of Technology, Chennai 600123, India

Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswaram, 522302, India

Department of Electronics and Communication Engineering, K. Ramakrishnan College of Technology, Trichy 621112, India

Corresponding Author Email: 
pithemalatha@gmail.com
Page: 
137-145
|
DOI: 
https://doi.org/10.18280/jesa.570114
Received: 
30 October 2023
|
Revised: 
16 January 2024
|
Accepted: 
30 January 2024
|
Available online: 
29 February 2024
| Citation

© 2024 The authors. This article is published by IIETA and is licensed under the CC BY 4.0 license (http://creativecommons.org/licenses/by/4.0/).

OPEN ACCESS

Abstract: 

Internal node power management of the wireless network is becoming the most difficult task in the Mobile Adhoc Network. Power outages on any node in the MANET degrade overall communication network performance. Efficient power management solutions are required for all tiers of the MANET protocol. The Physical layer might keep track of the antenna transmission and reception power strategies, as well as the power management plans for idea nodes and sleep nodes. The MAC layer power management could increase the packet delivery ratio, average delay, average jitter, and network delay metrics. The network layer's power management is supported by the link's lifetime and node mobility. TCP/IP protocols enable reliable packet transmission, which improves the transport layer. This survey paper conducted a thorough survey of the MANET protocol stack. This survey paper conducted a thorough investigation of MANET protocol stack power management in order to identify factors that can be improved to achieve a better power management strategy in MANET nodes.

Keywords: 

MANET, power management, antenna, protocol stack, energy, performance metric

1. Introduction

Because of the advancement of wireless networks in computer networking, the Mobile Adhoc Network has become critical in establishing a communication network via a wireless medium without the use of an access point. The key obstacles of creating a MANET in terms of features are transmission range limitation, routing overhead, battery power constraint, asymmetric connection, nature of wireless network, packet loss, mobile notes route modifications, frequent network partitioning, and so on.

Among the problems, battery power management is critical in MANET [1] functioning operations. The method of increasing battery power is done by combining packet transmission, synchronization signals, beacon signal creation, and so on. Several routing protocols have been developed to improve battery power usage during packet transport. Even new hybrid protocols are being introduced to improve battery power consumption. Concentrating solely on routing packet transfer is insufficient for consuming battery power; other layers also play an important role in power optimization. Instant physical layer beacon signal, MAC layer link establishment, network layer routing, transport layer connection establishment utilizing the TCP or UDP protocol, application layer usages, and so on.

Major factors include the maintenance of power management in MANET nodes, which is based on the MANET protocol stack, as depicted in Figure 1. Antenna use [2] in the physical layers increases the power optimization so that an efficient antenna is needed to deliver the packets, MAC layer performance considerations [3]. Support for power reduction, optimal routing protocol technique [1, 4, 5] essential to reduce packet loss, Congestion control with TCP synchronization [6]. Improvements for power reduction, as well as maintaining the nodes' links [7] and preventing link failures, and incorporating security elements [8, 9] into the application layers, all help to improve the MANET.

This page provides a survey of how the various levels contribute to MANET's power management. The article is organized so that section II discusses power management in MANET protocol layers, followed by a comparative analysis of power management techniques in MANET in section III, a summary of all the methodologies used in MANET for power management in section IV, and a conclusion to the new technique in section V.

Figure 1. Power Management in MANET nodes

2. Manet Protocol Power Management

Each layer in the MANET protocol stack is responsible for optimizing power utilization to extend the life of individual nodes.  The physical layer requires power optimization through efficient antenna usage, the MAC layer requires power optimization through improved performance factors, the network layer requires power optimization through node selection, life time computation, link details, and so on, and the transport layer requires power optimization via TCP synchronization. This section discusses the relevance of each layer as well as the computing methods, including the necessary equations and parameters.

2.1 Physical layer

MANET physical layer power management is based on the consideration of physical layer modulation, noise, antenna power gain, coding schemes, and interference. The physical layer is made up of PHY and antenna components [10]. PHY components include signal transmission, reflection and reception models, MAC schemes, channel distortions, physical parameters, and neighbour node interference. Antenna functions and attributes refer to the antenna components that are employed to capture signals when the antenna is transmitting. The total energy utilized for antenna signal operation included antenna power transmission, antenna power reception, and power required in idle and sleep modes, as estimated by the equation from Eq. (1) to Eq. (4).

Antenna Transmission Power = Power required to transmit signals * Vol * time              (1)

Antenna Receiving Power = Power required to receive the signals * Vol * time              (2)

Antenna Idle Power = Power required to Idle mode * Vol* time                  (3)

Antenna Sleep Power = Current required to sleep * Vol * time                (4)

2.2 MAC layer

MANET, power control at the MAC layer assessing quantitatively from routing indicators such as energy usage, Packet Delivery Ratio (PDR) [11], Average Delay, Average Jitter, and Network Delay. Energy consumption is assessed in joules, and packet loss in the first or middle node, as well as the lost node, consumes the same amount of energy. The average packet delivery rate refers to the rate at which data is received from the sender. Average Packet Delivery Rate PAvg, derived from the Eq. (5).

PAvg = (NTrp * 100 + (n! /! (n-r)!))) / (lim r ->∞ NSp)                 (5)

where,NTrp - Number of Packet received totally.

NSp -Total number of Packet send.

The Average End to End Delay is also important parameter in MAC layer power management, which is computed from the Eq. (6):

Delay Avg = ∑ (Tr- Ts)/ Lim r-> ∞ NRP                   (6)

where, NRp - total number of received packet from all the nodes

Tr - Movement of packet received.

Ts- Packet Send.

The Average Jitter is the variation on delay in each packet which uses many data packets to play a role. The Eq. (7) is used for the Jitter computation.

JA = [∑ (Tr- DAvg-Ts) 2] / Lim r-> ∞ NRP                           (7)

Throughput of the network is the ratio between amounts of data passing totally in a local connection with time spends for transfer the data which is computed using the Eq. (8).

Ta= (lim r-> ∞ NRP )/ T tra                             (8)

2.3 Network layer

Power management in network layers is based on node power, link connection, link lifetime, node mobility, and node distance.

2.3.1 Node power

Every node requires residual power to transmit packets; when this power is depleted, packet transmission fails and the route line is disconnected. The formula in Eq. (9) is used to estimate the minimal power required for transmitting and receiving packets at each node.

Mn = [∑ fn=1 MMax * ( MMin /Mg)]                      (9)

where, f - total number of n nodes.

MMax - maximum receiving power.

MMin - Minimum receiving power.

Mg - Received power of nth node.

2.3.2 Link connectivity

Link connectivity is the bidirectional connection between the pair of nodes is estimated as follows in the Eq. (10).

Kn = 1/f [ ∑fn=1 (Kg/t)]                   (10)

where,

t - total connectivity.

Kg - connectivity of g th node.

2.3.3 Life time of the link

Life time of the every link is needed for connecting two nodes for sending packets. The link is used for transmitting packets [11]. Due to dynamic topologies changes the link may get to disconnect in MANET, so life time of the link to be estimated in advanced before choosing the route. That could be estimated using energy model shown in the Eq. (11).

Nn = 1/f [ ∑fg=1 Eg]                           (11)

where,

Eg - Energy dissipation of g th node.

2.3.4 Node mobility

Mobility of the node is an important factor in MANET as shown in the Eq. (12),

Nm = 1/|ph| ∑ g= Ph B                 (12)

|ph| - Set of neighbour nodes.

Bg - relative mobility.

2.3.5 Node distance

Distance between the nodes used to estimate the link stability, which is evaluated using the formula in the Eq. (13).

Rn = ∑fg=1 ( Ug, ph)                 (13)

p- Set of neighbour nodes.

Ug - Energy of current node.

2.4 Transport layer

Reliable packet transmission is done in TCP protocol in MANET transport layer. So transport layers support responsibility of packet delivery by giving ACK signal to the sender so that the retransmission of packet will not be initiated [12].

Old ACK and New ACK time was used in TCP protocol to inform the source about the packet received. Received Packet Rate of the destination using the formula in the Eq. (14).

RPR = (Dnap - Doap) / (Tnak - Toack)                 (14)

where, Doap - Number packets received at Toack,

Dnap - Number of packets received at Tnack,

Toack - Old ACK time,

Tnack - New ACK time.

3. Comparison Analysis

This chapter conducted a thorough comparative analysis of the MANET power management protocol by introducing many classifications, as shown in Tables 1 to 6, along with the methodology utilized and the benefits and drawbacks of each method.

3.1 Based on mobility awareness

The authors of the MANET Research paper conducted research on mobility-aware energy-based power optimization. Al-Gabri et al. [4] conducted study utilizing the LEA-AODV method to determine energy reduction, but the results produced better load balancing. RREQ modified the methodology of study conducted on Woungang et al. [5] to develop the Energy Field. Gu and Zhu [1] used the Route Energy Comprehensive Index to achieve success in energy consumption. The study [12] achieved energy consumption utilizing the network lifetime by enabling the RREQ. Alghamdi [13] employs the LBMMRE-AOMDV procedures to achieve maximum residual energy.

Table 1. Summary of mobility awareness

Authors

Methodologies

Merits

Al-Gabriet al. [4]

LEA-AODV

Distribute Load Balances

Woungang et al. [5]

RREQ modify

Energy Field

Gu and Zhu [1]

Route Energy Comprehensive Index

Energy Consumption

Al-Gabri et al. [4]

Network Lifetime By Enabling The RREQ

Energy consumed

Alghamdi [13]

LBMMRE-AOMDV

Maximum Residual Energy

3.2 Based on topology management

Groups of study work carried out with the goal of power management could benefit from topological management, as indicated in Table 2. Chaudhry and Tapaswi [14] used the Optimized Power Control technique to manage power, and the results were good in terms of transmission power, delay, and energy consumption, however they failed OPC-CC. Namdev and Mishra [15] used M AODV methods to reduce delay and overhead, although Link Breakage was challenging to reduce. Rahmani et al. [16] used the Automata-Based Topology for power increases; the outcomes generated the Self-Aware, Self-Adaptive, and Self-Adjust Topology, however Routing Topologies became laborious.

Singh et al. [17] developed the Secure Optimized Link State Routing Protocol, which produced the link and message without relying on a third party but did not provide for attack detection. Sridhar et al. [18] employ the POR Algorithm to change the network capacity; nonetheless, the research fails due to poor network performance The TESAODV approach reduced network lifetime in the study however the research failed to maintain energy levels. Rao and Singh [3] used the KF-MAC approaches to obtain QOS parameters, but the findings yielded maximum delays.

3.3 Based on the algorithms

A set of research studies was conducted for power optimization employing algorithms, some of which achieved good metrics but failed on others, as summarized in Table 3. Musthafa et al. [19] apply the SNDA methodology to gather power in MANET nodes. The research results in Reliable Communication; however it requires greater emphasis on Security. Vij et al. [20] used the Game Theory-Based Model approach for Node Energy Level, and the simulation resulted in Propagation Delay and High Overhead. Nobahary and Babaie [8] applied the Credit-Based Method algorithm for power optimization research to Managing Less Energy Consumption, but they only obtained Generic Network Features.

The IDSM approach employed by Veeraiah and Krishna [9] to obtain dependable QoS produced results that did not meet the overall performance requirements. Abirami and Sumithra [21] employ the NCV-AODV algorithm for Enhanced Neighbour Credit Cost, but the researchers were unable to control the delay, therefore the delay remains high. Jim and Gregory [22] rely on an artificial immune system Increases the Packet Delivery Ratio and reduces Package Loss, but does not lower packet loss. Ponnusamy [23] employ the Energy-Efficient Method to provide Reliable Data Transmission, but the results show that the overhead increased. Ramesh et al research is supported by the MSD-SNDT method [24]. According to the simulation studies, energy consumption is very low while utilization is high.

Hasani and Babaie [25] used the Fuzzy-Dependent SN Detection Method to find more active nodes for power maintenance, but the findings were unexpected, and the system was too expensive. Nobahary et al. [26] used game theory in their research on nodes cooperating to play a repeated game, although the overall efficiency of the study was not met. Hadi et al. [27] applied the AODV Using a Wireless Network technique to improve packet delivery, although the findings yield a lower packet delivery ratio.

Table 2. Summary of topology management

Authors

Methodologies

Merits

Demerits

Chaudhry and Tapaswi [14]

Optimized Power Control

Good Performance in Transmission Power, Delay, and Energy Consumption

Failed OPC -CC

Namdev and Mishra [15]

M AODV

Reduced Delay and Overhead

Link Breakage

Rahmani et al. [16]

Automata-Based Topology

Self-Aware, Self-Adaptive, and Self-Adjust Topology

Routing Topologies

Sri et al. [6]

POR Algorithm

Changing the Network Capacity

Poor Network Performance

Singh et al. [17]

Secure Optimized Link State Routing Protocol

Link and Message Without Depending

on the Third Party

Failed to Consider Attack Detection

Sridhar et al. [18]

TESAODV

Reduced the Network Lifetime

Unable to Maintain Energy Levels

Rao and Singh[3]

KF-MAC

QOS Parameters

Maximum Delay

Table 3. Summary of algorithmic methods

Authors

Methodologies

Merits

Demerits

Musthafa et al. [19]

SNDA

Reliable Communication

Severe Security

Vij et al. [20]

Game Theory-Based Model

Node’s Energy Level

Propagation Delay High Overhead

Nobahary and Babaie [8]

Credit-Based Method

Managing Less Energy Consumption

Generic Network Features

Veeraiah and Krishna [9]

IDSM

Reliable QoS

Not Satisfied the Overall Performance Parameters

Abirami and Sumithra [21]

NCV-AODV

Enhanced Neighbour Credit Cost

Delay Remains Also High

Jim and Gregory [22]

Artificial Immune System

Increases the PDR

Package Loss

Ponnusamy [23]

Energy-Efficient Method

Reliable Data Transmission

Overhead Is Increased

Ramesh et al. [24]

MSD-SNDT

Energy Consumption is very Less

Vitality Utilizations

Hasani and Babaie [25]

Fuzzy-Dependent SN Detection Method

More Active Nodes

Power Consumption Is High

System Too Costly

Nobahary et al. [26]

Game Theory

Nodes Cooperate to Play Repeated Game

Overall Efficiency Is Not Satisfied

Hadi et al. [27]

AODV Using A Wireless Network

-

Less Packet Delivery Ratio

Table 4. Summary of cluster head

Authors

Methodologies

Merits

Demerits

Kumar et al. [28]

ORS

Better Throughput, Lower Latency, Lower Jitter, PDR

-

Venkatesh and Chakravarthi [29]

HAMBOCHLD

Energy Waste Reduced

-

Goyal et al. [30]

HAODV

PDF, END, Routing overhead

-

Raj Kumar and Bala [31]

EECAO

-

Lengthy Lifetime

Al-Najjar [32]

ACO

Network Lifespan and Residual Energy

Two Cluster Heads

 

PDR and NLT metrics

Uniform Distribution of Energy

-

Devika and Sudha [33]

C-SEWO

Innovative Design

-

3.4 Based on cluster head

A set of study work was completed by forming the clustering head to generate power management in MANET, as summarized in Table 4. Kumar et al. [28] uses the ORS to gain better throughput, lower latency, lower jitter, and PDR. Venkatesh and Chakravarthifor MANET [29] employs HAMBOCHLD Cluster formation to achieve achievement in energy waste reduction. Goyal et al. [30] employs HAODV approaches to improve packet delivery ratio, end-to-end delay, and reduce routing overhead. Raj Kumar and Bala [31] employ the EECAO approach, but the study fails by yielding the Lengthy Lifetime. Al-Najjar [32] employ the ACO technique to increase network lifespan and residual energy; however the best results require two cluster heads. Devika and Sudha's [33] research used PDR and NLT measures to achieve consistent energy distribution and utilize the C-SEWO approach [34] for innovative design.

3.5 Based on mobility aware cluster

The cluster node formation was investigated based on node mobility, as shown in Table 5. Braik et al. [35] use the AGS-ROA method of clustering to reduce route failure. Venkatasubramanian [36] adopts the EPO-FGA approach for mobile node lifetime. Hamza and Vigila [34] utilize the HPSO-GA method for node energy. Hamza and Vigila [37] use EEMST approaches, but this extends the lifespan. Sivapriya and Mohandas [38] used the MKMPE approach, which resulted in higher packet loss. Saravanan et al. [39] use the E-CFSA for effective power usage. Bisen et al. [40] achieve the best performance using the E-MAVMMF methods. Arulprakash et al. [41] use the EBDC methods for reduced energy consumption.

3.6 Based on transmission range

Finally group of researchers undertaking the research on the power optimization could be done with the support of nodes transmission range, summarizes in the Table 6. Izharul et al. [42] employs the ATP-AODV approach to save a significant amount of energy; however the goal of producing ATP-latency fails. Jiao and Guo [7] implemented the metric norm throughout the routing process to balance the network's energy consumption, but it also extended the network's lifespan. Park et al. [2] employs the MTPR and MHR methods to reduce control, and employs neighbour nodes to send hello messages in order to maximize network throughput, which causes minor delays. Wang et al. [12] used the optimal transmission radius for flooding in large-scale networks to achieve an average setting time.

Table 5. Summary of mobility aware in cluster

Authors

Methodologies

Merits

Demerits

Braik et al. [35]

AGS-ROA

Reduce Route Failure

-

Venkatasubramanian [36]

EPO-FGA

Mobile Node's Lifetime

-

Hamza and Vigila [34]

HPSO-GA

Node Energy

-

Hamza and Vigila [37]

EEMST

-

Prolong The Lifespan

Sivapriya and Mohandas [38]

MKMPE

-

Packet Loss

Saravanan et al. [39]

E-CFSA

Effective

-

Bisen et al. [40]

E-MAVMMF

Best Performance

-

Arulprakash et al. [41]

EBDC

Reduced Consumption of Energy.

-

Table 6. Summary of transmission range

Authors

Methodologies

Merits

Demerits

Izharul et al. [42]

Dynamic & Adjustable

Low-Cost

Each Node Having An Optimal Number Of Close To Three (3) Neighbour’s

Jiao and Guo [7]

ATP-AODV

Saved A Large Amount Of Energy

ATP-latency

Park [2]

Metric Norm During The Routing Process

Balanced The Network's Energy Consumption

Extended The Network's Lifespan

 

MTPR and MHR

Reducing Control

 

Wang et al. [12]

Neighbour Nodes They Use Hello Messages

Maximization Of Network Throughput

Creates Some Delays

Izharul et al. [42]

Energy Efficiency By Optimizing The Transmission Power

Throughput Maximization

-

Jiao and Guo [7]

Optimal Transmission Radius For Flooding In Large Scale Networks

Average Setting Time

-

4. Performance Comparison of Manet with Existing Methods

Table 7 summarizes several methodologies and algorithms with respect to the supporting parameters. Some methods support specific MANET parameters, whereas others do not.OPC approaches presented in study achieve the performance elements of power management, delay, energy, overhead, and congestion control but do not achieve PDF, load management, or security characteristics.Rahmani et al. [16] presented the M-AODV approach, which covers delay, energy, and overhead but does not support other parameters. The AUTOMATA approach is provided by study [43] yields just energy. The POR methods proposed by study [36] support only power, delay, and energy parameters, whereas the OLSR methods proposed by study [44] achieve only security characteristics.

Finally Sridhar et al. [18], Rao and Singh [3], Musthafa et al. [19], Jim et al. [22], Abirami and Sumithra [21], Ponnusamy [23], Rahmani et al. [16], Singh et al. [17], Ramesh et al. [24], Hasani et al. [25], Nobahary and Babaie [8], Hadi et al. [27], Kumar et al. [28], Venkatesh and Chakravarthi [29], Raj Kumar and Bala [31], Sahu and Patil [43], Al-Najjar [32], Devika and Sudha [33], Braik et al. [35], Saravanan et al. [39], Bisen et al. [40], Arulprakash et al. [41], Sivapriya and Mohandas [38] achieves only one parameters are fails to other parametersby using the methods TESAODV, KF-MAC, SNDA, AIS, NCV-AODV, EE, AUTOMATA, OLSR, MSD-SNDT, FSN, SNMN, SNAODV, QOS, CHLD, EECAO, ACO, CLU, C-SEWO, AGS-ROA, E-CFSA, E-MAVMMF, EBDC, E-CFSA, E-MAVMMF and MKMPE methods respectively.

Next groups of research from the authors from Vij et al. [20], Nobahary and Babaie [8], Venkatasubramanian [36], Hamza and Vigila [34], Kumar et al. [28], Thanappan and Perumal [45], Reddy and Mungara [46], Phakathi et al. [47], Ravi et al. [48], Alghamdi [49], Satyanarayana et al. [50], Vinayakan et al. [51] and Saraswathi et al. [52] were achieved two metric parameters by using the methods of GAME THEORY, CREDIT-BASED, EPO-FGA, PSO-GA, EEMST, CC, GAME THEORY, ML, QOS, FUZZY, HFO, FRAMEWORK, CONJUNCTION, AOMDV, HGFNN respectively.

Another set of research done by the authors Veeraiah and Krishna [9], Namdev and Mishra [15], Sri et al. [6], Goyal et al. [30], utilizing the methodologies of IDSM, M-AODV, POR, HAODV, QOS and obtains just three parameters. Finally, the two research studies conducted by the authors of Chen and Liu [53] and Rashmi et al. [16] employing QoS and OPC approaches, respectively, produce the most number of performance metrics,as shown in Table 7. Research on power management is still ongoing to accomplish all kinds of parameter metrics.

Table 7. Summary of power management method with supporting performance

Article

Methods/ Algorithm

Power

Delay

Energy

Congestion Control

PDR

Overhead

Security

Load

Sridhar et al. [18]

TESAODV

 

 

 

 

 

 

 

Rao and Singh [3]

 KF-MAC

 

 

 

 

 

 

 

Musthafa et al. [19]

SNDA

 

 

 

 

 

 

 

Jim and Gregory [22]

AIS

 

 

 

 

 

 

 

Abirami and Sumithra [21]

NCV-AODV

 

 

 

 

 

 

 

Ponnusamy [23]

EE

 

 

 

 

 

 

 

Rahmani et al. [16]

AUTOMATA

 

 

 

 

 

 

 

Singh et al. [17]

OLSR

 

 

 

 

 

 

 

Ramesh et al. [24]

MSD-SNDT

 

 

 

 

 

 

 

Hasani and Babaie [25]

FSN

 

 

 

 

 

 

 

Nobahary and Babaie [8]

SNMN

 

 

 

 

 

 

 

Hadi et al. [27]

SNAODV

 

 

 

 

 

 

 

Kumar et al. [28]

QOS

 

 

 

 

 

 

 

Venkatesh and Chakravarthi [29]

CHLD

 

 

 

 

 

 

 

Raj Kumar and Bala [31]

EECAO

 

 

 

 

 

 

 

Sahu and Patil [43]

ACO

 

 

 

 

 

 

 

Al-Najjar [32]

CLU

 

 

 

 

 

 

 

Devika and Sudha [33]

C-SEWO

 

 

 

 

 

 

 

Braik et al. [35]

AGS-ROA

 

 

 

 

 

 

 

Saravanan et al. [39]

E-CFSA

 

 

 

 

 

 

 

Bisen et al. [40]

E-MAVMMF

 

 

 

 

 

 

 

Arulprakash et al. [41]

EBDC

 

 

 

 

 

 

 

Sivapriyaand Mohandas [38]

E-CFSA

 

 

 

 

 

 

 

Vij et al. [20]

MKMPE

 

 

 

 

 

 

 

Nobahary and Babaie [8]

GAME THEORY

 

 

 

 

 

 

Venkatasubramanian [36]

CREDIT-BASED

 

 

 

 

 

 

Hamza and Vigila [34]

EPO-FGA

 

 

 

 

 

 

Kumar et al. [28]

EEMST

 

 

 

 

 

 

Thanappan and Perumal [45]

CC

 

 

 

 

 

 

Reddy and Mungara [46]

GAME THEORY

 

 

 

 

 

 

Phakathi et al. [47]

QOS

 

 

 

 

 

 

Ravi et al. [48]

FUZZY

 

 

 

 

 

 

Alghamdi [49]

HFO

 

 

 

 

 

 

Satyanarayana et al. [50]

FRAMEWORK

 

 

 

 

 

 

Vinayakan et al. [51]

CONJUNCTION

 

 

 

 

 

 

Saraswathi et al. [52]

AOMDV

 

 

 

 

 

 

Veeraiah and Krishna [9]

HGFNN

 

 

 

 

 

 

Namdev and Mishra [15]

IDSM

 

 

 

 

 

Sri et al. [6]

M-AODV

 

 

 

 

 

Goyal et al. [30]

POR

 

 

 

 

 

Chen and Liu [53]

HAODV

 

 

 

 

 

Rashmi et al. [16]

QOS

 

 

 

 

 

Sridhar et al. [18]

QOS

 

 

 

Rao and Singh [3]

OPC

 

 

 

5. Conclusion

This survey article elaborates on the importance of power management in MANET nodes to achieve better performance. Initially, all the layers' responsibility for power management with the support of computation methods of each layer was discussed. Later, the different power management techniques with respect to the topology, transmission range, clustering nodes, and mobility was discussed. Finally, the comparative study of all the methods with the performance factors, Full-fledged power management can be obtained when all performance variables are met by the nodes. More study is needed to ensure that all performance factors in MANET are met in order to achieve an efficient power management strategy in the MANET protocol stack.

  References

[1] Gu, C., Zhu, Q. (2014). An energy-aware routing protocol for mobile ad hoc networks based on route energy comprehensive index. Wireless Personal Communications, 79(2): 1557-1570. https://doi.org/10.1007/s11277-014-1946-1

[2] Park, N.U., Nam, J.C., Cho, Y.Z. (2016). Impact of node speed and transmission range on the hello interval of MANET routing protocols. In 2016 International Conference on Information and Communication Technology Convergence (ICTC), Jeju, Korea (South), pp. 634-636. https://doi.org/10.1109/ICTC.2016.7763550

[3] Rao, M., Singh, N. (2018). Energy efficient QoS aware hierarchical KF-MAC routing protocol in MANET. Wireless Personal Communications, 101(2): 635-648.

[4] Al-Gabri, M., Li, C., Yang, Z., Naji Hasan, A.H., Zhang, X. (2012). Improved the energy of Ad Hoc On-Demand Distance Vector routing protocol. IERI Procedia, 2: 355-361. https://doi.org/10.1016/j.ieri.2012.06.101

[5] Woungang, I., Obaidat, M.S., Dhurandher, S.K., Ferworn, A., Shah, W. (2013). An ant-swarm inspired energy-efficient ad hoc on-demand routing protocol for mobile ad hoc networks. In 2013 IEEE international conference on communications (ICC), Budapest, Hungary, pp. 3645-3649. https://doi.org/10.1109/ICC.2013.6655119

[6] Sri, T.S., Prasad, J.R., Kumar, R.K. (2018). SEE: Synchronized efficient energy calculation for topology maintenance & power saving in ad hoc networks. Arabian Journal for Science and Engineering, 43(8): 4353-4363.https://doi.org/10.1007/s13369-017-3043-8

[7] Jiao, Z.S., Guo, Y. (2016). An improved AODV routing protocol based on energy optimization. IJISET–International Journal of Innovations in Science, Engineering and Technology, 3(6): 335-340.

[8] Nobahary, S., Babaie, S. (2018). A credit-based method to selfish node detection in mobile ad-hoc network. Applied Computing and Systems, 23(2): 118-127. https://doi.org/10.2478/acss-2018-0015

[9] Veeraiah, N., Krishna, B.T. (2018). Selfish node detection IDSM-based approach using individual master cluster node. In 2018 2nd International Conference on Inventive Systems and Control (ICISC), Coimbatore, India, pp. 427-431. https://doi.org/10.1109/ICISC.2018.8399109

[10] Devika, B., Sudha, P.N. (2020). Power optimization in MANET using topology management. Engineering Science and Technology, an International Journal, 23: 565-575. https://doi.org/10.1016/j.jestch.2019.07.008

[11] Thilagavathe, V., Dr. Duraiswamy, K. (2012). Cross layer based congestion control technique for reliable and energy aware routing in MANET. International Journal of Computer Applications, 36(12): 1-6. 

[12] Wang, W., Liu, X., Yao, Y., Pan, Y., Chi, Z., Zhu, T. (2019). CRF: Coexistent routing and flooding using WIFI packets in heterogeneous IoT networks. In IEEE INFOCOM 2019-IEEE Conference on Computer Communications, Paris, France, pp. 19-27. https://doi.org/10.1109/INFOCOM.2019.8737525

[13] Alghamdi, S.A. (2016). Load balancing maximal minimal nodal residual energy ad hoc on-demand multipath distance vector routing protocol (LBMMRE-AOMDV). Wireless Networks, 22(4): 1355-1363. https://doi.org/10.1007/s11276-015-1029-6

[14] Chaudhry, R., Tapaswi, S. (2018). Optimized power control and efficient energy conservation for topology management of MANET with an adaptive Gabriel graph. Computers & Electrical Engineering, 72: 1021-1036.https://doi.org/10.1016/j.compeleceng.2018.03.013

[15] Namdev, A., Mishra, A. (2016). Interference-based topology control algorithm for delay-constrained mobile ad hoc networks. In 2016 IEEE Students' Conference on Electrical, Electronics and Computer Science (SCEECS), Bhopal, India, pp. 1-6. https://doi.org/10.1109/SCEECS.2016.7509297

[16] Rahmani, P., Javadi, H.H.S., Bakhshi, H., Hosseinzadeh, M. (2018). TCLAB: A new topology control protocol in cognitive MANETs based on learning automata. Journal of Network and Systems Management, 26(2): 426-462.https://doi.org/10.1007/s10922-017-9422-3

[17] Singh, T., Singh, J., Sharma, S. (2017). Energy efficient secured routing protocol for MANETs. Wireless Networks, 23(4): 1001-1009.https://doi.org/10.1007/s11276-015-1176-9

[18] Sridhar, S., Baskaran, R., Anitha, R., Sankar, R. (2017). Proficient and secured routing in MANET based on trust and energy supported AODV. Proceedings of the International Journal of Applied Mathematics and Informatics Sciences, 11(3): 807-817.

[19] Musthafa, M.M., Vanitha, K., Rahman, A.M.Z., Anitha, K. (2020). An efficient approach to identify a selfish node in MANET. In 2020 International Conference on Computer Communication and Informatics (ICCCI), Coimbatore, India, pp. 1-3. https://doi.org/10.1109/ICCCI48352.2020.9104076

[20] Vij, A., Sharma, V., Nand, P. (2018). Selfish node detection using game theory in MANET. In 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN), Greater Noida, India, pp. 104-109.https://doi.org/10.1109/ICACCCN.2018.8748632

[21] Abirami, K.R., Sumithra, M.G. (2019). Evaluation of neighbor credit value-based AODV routing algorithms for selfish node behavior detection. Cluster Computing, 22(6): 13307-13316.https://doi.org/10.1007/s10586-018-1851-6

[22] Jim, L.E., Gregory, M.A. (2019). Improvised MANET selfish node detection using artificial immune system-based decision tree. In 2019 29th International Telecommunication Networks and Applications Conference (ITNAC), Auckland, New Zealand, pp. 1-6. https://doi.org/10.1109/ITNAC46935.2019.9077968

[23] Ponnusamy, M. (2021). Detection of selfish nodes through reputation model in mobile adhoc network-MANET. Turkish Journal of Computer and Mathematics Education (TURCOMAT): 12(9): 2404-2410.

[24] Ramesh, V., Kumar, C.S., Venkatakrishnan, S. (2021). A modified Skellam distribution is used in MANETs based on the selfish node detection technique. Materials Today Proceedings, 6(2): 896-903.

[25] Hasani, H., Babaie, S. (2019). Selfish node detection in ad hoc networks based on fuzzy logic. Neural Computing and Applications, 31(10): 6079-6090. https://doi.org/10.1007/s00521-018-3431-3

[26] Nobahary, S., Garakani, H.G., Khademzadeh, A., Rahmani, A.M. (2019). Selfish node detection based on hierarchical game theory in IoT. EURASIP Journal on Wireless Communications and Networking, 2019(1): 1-19. https://doi.org/10.1186/s13638-019-1564-4

[27] Hadi, A.A., Zulkarnain, M.A., Aljeroudi, Y. (2017). Improved selfish node detection algorithm for mobile ad hoc network. International Journal of Advanced Computer Science and Applications, 8(4): 103-108.

[28] Kumar, R.S., Manimegalai, P., Raj, V., Dhanagopal, R., Santhosh, A.J. (2022). Cluster head selection and energy efficient multicast routing protocol-based optimal route selection for mobile ad hoc networks. Wireless Communications and Mobile Computing, 2022: 5318136. https://doi.org/10.1155/2022/5318136

[29] Venkatesh, T., Chakravarthi, R. (2022). An energy-efficient algorithm in MANET using monarch butterfly optimization and cluster head load distribution. In 2022 International Conference on Communication, Computing and Internet of Things (IC3IoT), Chennai, India, pp. 1-5. https://doi.org/10.1109/IC3IOT53935.2022.9767917

[30] Goyal, A., Sharma, V.K., Kumar, S., Poonia, R.C. (2021). Hybrid AODV: An efficient routing protocol for MANET using MFR and firefly optimization technique. Journal of Interconnection Networks, 21(1): 2150004. https://doi.org/10.1142/S0219265921500043

[31] Raj Kumar, N.P., Bala, G.J. (2022). A cognitive knowledge-energy-efficient path selection using centroid and ant-colony optimized hybrid protocol for WSN-Assisted IoT. Wireless Personal Communications, 124(3): 1993-2028.

[32] Al-Najjar, A.A.M. (2021). Optimizing MANETs network lifetime using a proactive clustering algorithm. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12(8): 143-155.

[33] Devika, B., Sudha, P.N. (2022). Chronological-squirrel earth worm optimization for power minimization using topology management in MANET. Distributed Computing and Optimization Techniques, 903: 219-229. https://doi.org/10.1007/978-981-19-2281-7_21

[34] Hamza, F., Vigila, S.M.C. (2023). An energy-efficient cluster head selection in MANETs using emperor penguin optimization fuzzy genetic algorithm. In Proceedings of International Conference on Recent Trends in Computing (ICRTC), Ghaziabad, India, pp. 453-468.https://doi.org/10.1007/978-981-19-8825-7_39

[35] Braik, M., Hammouri, A., Atwan, J., Al-Betar, M.A., Awadallah, M.A. (2022). White Shark Optimizer: A novel bio-inspired meta-heuristic algorithm for global optimization problems. Knowledge-Based Systems, 243, 108457.https://doi.org/10.1016/j.knosys.2022.108457

[36] Venkatasubramanian, S. (2022). Ridder optimized cluster head selection in MANETs is fuzzy and adapted gear based on the steering panel. NeuroQuantology, 20(12): 3830. https://doi.org/10.48047/NQ.2022.20.12.NQ773707

[37] Hamza, F., Vigila, S.M.C. (2021). Cluster head selection algorithm for MANETs using hybrid particle swarm optimization-genetic algorithm. International Journal of Computer Networks and Applications, 8(2): 119-129. https://doi.org/10.22247/ijcna/2021/208892

[38] Sivapriya, N., Mohandas, R. (2022). Optimal route selection for mobile ad-hoc networks based on cluster head selection and energy efficient. Computer Integrated Manufacturing Systems, 28(12): 1059-1065.

[39] Saravanan, R., Suresh, K., Arumugam, S.S. (2023). A modified k-means-based cluster head selection and Philippine eagle optimization-based secure routing for MANET. The Journal of Supercomputing, 79(9): 10481-10504. https://doi.org/10.1007/s11227-023-05053-1

[40] Bisen, D., Mishra, S., Saurabh, P. (2021). K-means based cluster formation and head selection through artificial neural network in MANET. Wireless Personal Communications. https://doi.org/10.21203/rs.3.rs-667651/v1

[41] Arulprakash, P., Kumar, A.S., Prakash, S.P. (2023). Optimal route and cluster head selection using energy efficient-modified African vulture and modified mayfly in manet. Peer-to-Peer Networking and Applications, 16(2): 1310-1326. https://doi.org/10.1007/s12083-023-01461-5

[42] Izharul, M., Ansari, H., Singh, S.P. (2016). Adaptive-transmission-power ad hoc on-demand distance vector routing protocol for mobile ad hoc network. International Journal of Computer Applications, 138(2): 1-10.

[43] Sahu, M.K., Patil, S. (2021). Enhanced double cluster head selection using ant colony optimization for energy-efficient routing in wireless sensor network. SAMRIDDHI: A Journal of Physical Sciences, Engineering and Technology, 13(01): 35-41. https://doi.org/10.18090/samriddhi.v13i01.7

[44] Sumathi, K., Kumar, D.V. (2020). Ambient intelligence-based fish swarm optimization routing protocol for congestion avoidance in mobile ad-hoc network. Networks, 6: 15. https://doi.org/10.22247/ijcna/2022/212559

[45] Thanappan, R., Perumal, T. (2022). Congestion aware MANET routing using evolutionary game theory and cross-layer design. ECS Transactions, 107(1): 1699. https://doi.org/10.1149/10701.1699ecst

[46] Reddy, V.S.N., Mungara, D.J. (2021). Machine learning-based efficient clustering and improve quality of service in Manet. Indian Journal of Computer Science and Engineering, 12(5): 1392-1399. https://doi.org/10.21817/indjcse/2021/v12i5/211205072

[47] Phakathi, T., Esiefarienrhe, B.M., Lugayizi, F. (2021). Comparative analysis of quality of service scheduling classes in mobile ad-hoc networks. arXiv preprint arXiv:2106.07051. https://doi.org/10.48550/arXiv.2106.07051

[48] Ravi, S., Matheswaran, U., Perumal, S., Sivakumar, S., Palvadi, S.K. (2022). Adaptive trust-based secure and optimal route selection algorithm for MANET using hybrid fuzzy optimization. Peer-to-Peer Networking and Applications, 16: 22-34. https://doi.org/10.1007/s12083-022-01351-2

[49] Alghamdi, S.A. (2022). Novel trust-aware intrusion detection and prevention system for 5G MANET-Cloud. International Journal of Information Security, 21(3): 469-488. https://doi.org/10.1007/s10207-020-00531-6

[50] Satyanarayana, P., Nihani, V.G.V., GA, J.D., DVA, K.R., CH, S.A. (2022). Design and implementation of trust based routing algorithm to enhance QoS for MANETs. In 2022 International Conference on Wireless Communications Signal Processing and Networking (WiSPNET), Chennai, India, pp. 64-68. https://doi.org/10.1109/WiSPNET54241.2022.9767100

[51] Vinayakan, K., Srinath, M.V., Adhiselvam, A. (2022). Security for multipath routing protocol using trust based AOMDV In MANETs. SpecialusisUgdymas, 2(43): 1640-1654.

[52] Saraswathi, R., Srinivasan, J., Aruna, S. (2022). An energy efficient routing protocol and cross layer based congestion detection using hybrid genetic fuzzy neural network (HGFNN) model for MANET. Journal of Algebraic Statistics, 13(2): 1007-1019. https://doi.org/10.52783/jas.v13i2.255

[53] Chen, Y., Liu, W. (2021). Mac layer energy consumption and routing protocol optimization algorithm for mobile ad hoc networks. Complexity, 2021: 1-12. https://doi.org/10.1155/2021/6687189