2022
DOI: 10.1155/2022/5256133
|View full text |Cite
|
Sign up to set email alerts
|

Delay-Driven Opportunistic Routing with Multichannel Cooperative Neighbor Discovery for Industry 4.0 Wireless Networks Based on Power and Load Awareness

Abstract: During data transmission, a decentralised Mobile Ad Hoc Network (MANET) might result in high Energy Consumption (EC) and a short Network Lifetime (NLife). To address these difficulties, an on-demand Power and Load-Aware multipath node-disjoint source routing is presented based on the Enhanced Opportunistic Routing (PLAEOR) protocol. This unique protocol aims at using power, load, and latency to manage routing costs depending on control packet flooding from the destination node. However, the exchange of control… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2025
2025

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 25 publications
(2 citation statements)
references
References 39 publications
0
2
0
Order By: Relevance
“…Aditya et al [18] have suggested the Power and Load-Aware Enhanced OR (PLAEOR) protocol based on the opportunistic gradient forwarding strategy. This protocol considers the remaining power, transfer energy, and expected packet delay to select the optimum routes.…”
Section: A Single-rate and Single-power Or Protocolsmentioning
confidence: 99%
“…Aditya et al [18] have suggested the Power and Load-Aware Enhanced OR (PLAEOR) protocol based on the opportunistic gradient forwarding strategy. This protocol considers the remaining power, transfer energy, and expected packet delay to select the optimum routes.…”
Section: A Single-rate and Single-power Or Protocolsmentioning
confidence: 99%
“…Consequently, the IIoT is vulnerable to a variety of security threats [9] due to the challenges posed by managing and distributing the massive amounts of data generated by interactions between many devices. Due to data attacker's unpredictability, the FDIA stands out as one of the most destructive intrusion networks in the IIoT [10]. As hostile devices authorized in the networks carry out their usual data gathering tasks, detecting a FDIA becomes a non-trivial effort due to the attack's complexity.…”
Section: Introductionmentioning
confidence: 99%