© 2024 The authors. This article is published by IIETA and is licensed under the CC BY 4.0 license (http://creativecommons.org/licenses/by/4.0/).
OPEN ACCESS
Internal node power management of the wireless network is becoming the most difficult task in the Mobile Adhoc Network. Power outages on any node in the MANET degrade overall communication network performance. Efficient power management solutions are required for all tiers of the MANET protocol. The Physical layer might keep track of the antenna transmission and reception power strategies, as well as the power management plans for idea nodes and sleep nodes. The MAC layer power management could increase the packet delivery ratio, average delay, average jitter, and network delay metrics. The network layer's power management is supported by the link's lifetime and node mobility. TCP/IP protocols enable reliable packet transmission, which improves the transport layer. This survey paper conducted a thorough survey of the MANET protocol stack. This survey paper conducted a thorough investigation of MANET protocol stack power management in order to identify factors that can be improved to achieve a better power management strategy in MANET nodes.
MANET, power management, antenna, protocol stack, energy, performance metric
Because of the advancement of wireless networks in computer networking, the Mobile Adhoc Network has become critical in establishing a communication network via a wireless medium without the use of an access point. The key obstacles of creating a MANET in terms of features are transmission range limitation, routing overhead, battery power constraint, asymmetric connection, nature of wireless network, packet loss, mobile notes route modifications, frequent network partitioning, and so on.
Among the problems, battery power management is critical in MANET [1] functioning operations. The method of increasing battery power is done by combining packet transmission, synchronization signals, beacon signal creation, and so on. Several routing protocols have been developed to improve battery power usage during packet transport. Even new hybrid protocols are being introduced to improve battery power consumption. Concentrating solely on routing packet transfer is insufficient for consuming battery power; other layers also play an important role in power optimization. Instant physical layer beacon signal, MAC layer link establishment, network layer routing, transport layer connection establishment utilizing the TCP or UDP protocol, application layer usages, and so on.
Major factors include the maintenance of power management in MANET nodes, which is based on the MANET protocol stack, as depicted in Figure 1. Antenna use [2] in the physical layers increases the power optimization so that an efficient antenna is needed to deliver the packets, MAC layer performance considerations [3]. Support for power reduction, optimal routing protocol technique [1, 4, 5] essential to reduce packet loss, Congestion control with TCP synchronization [6]. Improvements for power reduction, as well as maintaining the nodes' links [7] and preventing link failures, and incorporating security elements [8, 9] into the application layers, all help to improve the MANET.
This page provides a survey of how the various levels contribute to MANET's power management. The article is organized so that section II discusses power management in MANET protocol layers, followed by a comparative analysis of power management techniques in MANET in section III, a summary of all the methodologies used in MANET for power management in section IV, and a conclusion to the new technique in section V.
Figure 1. Power Management in MANET nodes
Each layer in the MANET protocol stack is responsible for optimizing power utilization to extend the life of individual nodes. The physical layer requires power optimization through efficient antenna usage, the MAC layer requires power optimization through improved performance factors, the network layer requires power optimization through node selection, life time computation, link details, and so on, and the transport layer requires power optimization via TCP synchronization. This section discusses the relevance of each layer as well as the computing methods, including the necessary equations and parameters.
2.1 Physical layer
MANET physical layer power management is based on the consideration of physical layer modulation, noise, antenna power gain, coding schemes, and interference. The physical layer is made up of PHY and antenna components [10]. PHY components include signal transmission, reflection and reception models, MAC schemes, channel distortions, physical parameters, and neighbour node interference. Antenna functions and attributes refer to the antenna components that are employed to capture signals when the antenna is transmitting. The total energy utilized for antenna signal operation included antenna power transmission, antenna power reception, and power required in idle and sleep modes, as estimated by the equation from Eq. (1) to Eq. (4).
Antenna Transmission Power = Power required to transmit signals * Vol * time (1)
Antenna Receiving Power = Power required to receive the signals * Vol * time (2)
Antenna Idle Power = Power required to Idle mode * Vol* time (3)
Antenna Sleep Power = Current required to sleep * Vol * time (4)
2.2 MAC layer
MANET, power control at the MAC layer assessing quantitatively from routing indicators such as energy usage, Packet Delivery Ratio (PDR) [11], Average Delay, Average Jitter, and Network Delay. Energy consumption is assessed in joules, and packet loss in the first or middle node, as well as the lost node, consumes the same amount of energy. The average packet delivery rate refers to the rate at which data is received from the sender. Average Packet Delivery Rate PAvg, derived from the Eq. (5).
PAvg = (NTrp * 100 + (n! /! (n-r)!))) / (lim r ->∞ NSp) (5)
where,NTrp - Number of Packet received totally.
NSp -Total number of Packet send.
The Average End to End Delay is also important parameter in MAC layer power management, which is computed from the Eq. (6):
Delay Avg = ∑ (Tr- Ts)/ Lim r-> ∞ NRP (6)
where, NRp - total number of received packet from all the nodes
Tr - Movement of packet received.
Ts- Packet Send.
The Average Jitter is the variation on delay in each packet which uses many data packets to play a role. The Eq. (7) is used for the Jitter computation.
JA = [∑ (Tr- DAvg-Ts) 2] / Lim r-> ∞ NRP (7)
Throughput of the network is the ratio between amounts of data passing totally in a local connection with time spends for transfer the data which is computed using the Eq. (8).
Ta= (lim r-> ∞ NRP )/ T tra (8)
2.3 Network layer
Power management in network layers is based on node power, link connection, link lifetime, node mobility, and node distance.
2.3.1 Node power
Every node requires residual power to transmit packets; when this power is depleted, packet transmission fails and the route line is disconnected. The formula in Eq. (9) is used to estimate the minimal power required for transmitting and receiving packets at each node.
Mn = [∑ fn=1 MMax * ( MMin /Mg)] (9)
where, f - total number of n nodes.
MMax - maximum receiving power.
MMin - Minimum receiving power.
Mg - Received power of nth node.
2.3.2 Link connectivity
Link connectivity is the bidirectional connection between the pair of nodes is estimated as follows in the Eq. (10).
Kn = 1/f [ ∑fn=1 (Kg/t)] (10)
where,
t - total connectivity.
Kg - connectivity of g th node.
2.3.3 Life time of the link
Life time of the every link is needed for connecting two nodes for sending packets. The link is used for transmitting packets [11]. Due to dynamic topologies changes the link may get to disconnect in MANET, so life time of the link to be estimated in advanced before choosing the route. That could be estimated using energy model shown in the Eq. (11).
Nn = 1/f [ ∑fg=1 Eg] (11)
where,
Eg - Energy dissipation of g th node.
2.3.4 Node mobility
Mobility of the node is an important factor in MANET as shown in the Eq. (12),
Nm = 1/|ph| ∑ g= Ph Bg (12)
|ph| - Set of neighbour nodes.
Bg - relative mobility.
2.3.5 Node distance
Distance between the nodes used to estimate the link stability, which is evaluated using the formula in the Eq. (13).
Rn = ∑fg=1 ( Ug, ph) (13)
ph - Set of neighbour nodes.
Ug - Energy of current node.
2.4 Transport layer
Reliable packet transmission is done in TCP protocol in MANET transport layer. So transport layers support responsibility of packet delivery by giving ACK signal to the sender so that the retransmission of packet will not be initiated [12].
Old ACK and New ACK time was used in TCP protocol to inform the source about the packet received. Received Packet Rate of the destination using the formula in the Eq. (14).
RPR = (Dnap - Doap) / (Tnak - Toack) (14)
where, Doap - Number packets received at Toack,
Dnap - Number of packets received at Tnack,
Toack - Old ACK time,
Tnack - New ACK time.
This chapter conducted a thorough comparative analysis of the MANET power management protocol by introducing many classifications, as shown in Tables 1 to 6, along with the methodology utilized and the benefits and drawbacks of each method.
3.1 Based on mobility awareness
The authors of the MANET Research paper conducted research on mobility-aware energy-based power optimization. Al-Gabri et al. [4] conducted study utilizing the LEA-AODV method to determine energy reduction, but the results produced better load balancing. RREQ modified the methodology of study conducted on Woungang et al. [5] to develop the Energy Field. Gu and Zhu [1] used the Route Energy Comprehensive Index to achieve success in energy consumption. The study [12] achieved energy consumption utilizing the network lifetime by enabling the RREQ. Alghamdi [13] employs the LBMMRE-AOMDV procedures to achieve maximum residual energy.
Table 1. Summary of mobility awareness
Authors |
Methodologies |
Merits |
Al-Gabriet al. [4] |
LEA-AODV |
Distribute Load Balances |
Woungang et al. [5] |
RREQ modify |
Energy Field |
Gu and Zhu [1] |
Route Energy Comprehensive Index |
Energy Consumption |
Al-Gabri et al. [4] |
Network Lifetime By Enabling The RREQ |
Energy consumed |
Alghamdi [13] |
LBMMRE-AOMDV |
Maximum Residual Energy |
3.2 Based on topology management
Groups of study work carried out with the goal of power management could benefit from topological management, as indicated in Table 2. Chaudhry and Tapaswi [14] used the Optimized Power Control technique to manage power, and the results were good in terms of transmission power, delay, and energy consumption, however they failed OPC-CC. Namdev and Mishra [15] used M AODV methods to reduce delay and overhead, although Link Breakage was challenging to reduce. Rahmani et al. [16] used the Automata-Based Topology for power increases; the outcomes generated the Self-Aware, Self-Adaptive, and Self-Adjust Topology, however Routing Topologies became laborious.
Singh et al. [17] developed the Secure Optimized Link State Routing Protocol, which produced the link and message without relying on a third party but did not provide for attack detection. Sridhar et al. [18] employ the POR Algorithm to change the network capacity; nonetheless, the research fails due to poor network performance The TESAODV approach reduced network lifetime in the study however the research failed to maintain energy levels. Rao and Singh [3] used the KF-MAC approaches to obtain QOS parameters, but the findings yielded maximum delays.
3.3 Based on the algorithms
A set of research studies was conducted for power optimization employing algorithms, some of which achieved good metrics but failed on others, as summarized in Table 3. Musthafa et al. [19] apply the SNDA methodology to gather power in MANET nodes. The research results in Reliable Communication; however it requires greater emphasis on Security. Vij et al. [20] used the Game Theory-Based Model approach for Node Energy Level, and the simulation resulted in Propagation Delay and High Overhead. Nobahary and Babaie [8] applied the Credit-Based Method algorithm for power optimization research to Managing Less Energy Consumption, but they only obtained Generic Network Features.
The IDSM approach employed by Veeraiah and Krishna [9] to obtain dependable QoS produced results that did not meet the overall performance requirements. Abirami and Sumithra [21] employ the NCV-AODV algorithm for Enhanced Neighbour Credit Cost, but the researchers were unable to control the delay, therefore the delay remains high. Jim and Gregory [22] rely on an artificial immune system Increases the Packet Delivery Ratio and reduces Package Loss, but does not lower packet loss. Ponnusamy [23] employ the Energy-Efficient Method to provide Reliable Data Transmission, but the results show that the overhead increased. Ramesh et al research is supported by the MSD-SNDT method [24]. According to the simulation studies, energy consumption is very low while utilization is high.
Hasani and Babaie [25] used the Fuzzy-Dependent SN Detection Method to find more active nodes for power maintenance, but the findings were unexpected, and the system was too expensive. Nobahary et al. [26] used game theory in their research on nodes cooperating to play a repeated game, although the overall efficiency of the study was not met. Hadi et al. [27] applied the AODV Using a Wireless Network technique to improve packet delivery, although the findings yield a lower packet delivery ratio.
Table 2. Summary of topology management
Authors |
Methodologies |
Merits |
Demerits |
Chaudhry and Tapaswi [14] |
Optimized Power Control |
Good Performance in Transmission Power, Delay, and Energy Consumption |
Failed OPC -CC |
Namdev and Mishra [15] |
M AODV |
Reduced Delay and Overhead |
Link Breakage |
Rahmani et al. [16] |
Automata-Based Topology |
Self-Aware, Self-Adaptive, and Self-Adjust Topology |
Routing Topologies |
Sri et al. [6] |
POR Algorithm |
Changing the Network Capacity |
Poor Network Performance |
Singh et al. [17] |
Secure Optimized Link State Routing Protocol |
Link and Message Without Depending on the Third Party |
Failed to Consider Attack Detection |
Sridhar et al. [18] |
TESAODV |
Reduced the Network Lifetime |
Unable to Maintain Energy Levels |
Rao and Singh[3] |
KF-MAC |
QOS Parameters |
Maximum Delay |
Table 3. Summary of algorithmic methods
Authors |
Methodologies |
Merits |
Demerits |
Musthafa et al. [19] |
SNDA |
Reliable Communication |
Severe Security |
Vij et al. [20] |
Game Theory-Based Model |
Node’s Energy Level |
Propagation Delay High Overhead |
Nobahary and Babaie [8] |
Credit-Based Method |
Managing Less Energy Consumption |
Generic Network Features |
Veeraiah and Krishna [9] |
IDSM |
Reliable QoS |
Not Satisfied the Overall Performance Parameters |
Abirami and Sumithra [21] |
NCV-AODV |
Enhanced Neighbour Credit Cost |
Delay Remains Also High |
Jim and Gregory [22] |
Artificial Immune System |
Increases the PDR |
Package Loss |
Ponnusamy [23] |
Energy-Efficient Method |
Reliable Data Transmission |
Overhead Is Increased |
Ramesh et al. [24] |
MSD-SNDT |
Energy Consumption is very Less |
Vitality Utilizations |
Hasani and Babaie [25] |
Fuzzy-Dependent SN Detection Method |
More Active Nodes |
Power Consumption Is High System Too Costly |
Nobahary et al. [26] |
Game Theory |
Nodes Cooperate to Play Repeated Game |
Overall Efficiency Is Not Satisfied |
Hadi et al. [27] |
AODV Using A Wireless Network |
- |
Less Packet Delivery Ratio |
Table 4. Summary of cluster head
Authors |
Methodologies |
Merits |
Demerits |
Kumar et al. [28] |
ORS |
Better Throughput, Lower Latency, Lower Jitter, PDR |
- |
Venkatesh and Chakravarthi [29] |
HAMBOCHLD |
Energy Waste Reduced |
- |
Goyal et al. [30] |
HAODV |
PDF, END, Routing overhead |
- |
Raj Kumar and Bala [31] |
EECAO |
- |
Lengthy Lifetime |
Al-Najjar [32] |
ACO |
Network Lifespan and Residual Energy |
Two Cluster Heads |
|
PDR and NLT metrics |
Uniform Distribution of Energy |
- |
Devika and Sudha [33] |
C-SEWO |
Innovative Design |
- |
3.4 Based on cluster head
A set of study work was completed by forming the clustering head to generate power management in MANET, as summarized in Table 4. Kumar et al. [28] uses the ORS to gain better throughput, lower latency, lower jitter, and PDR. Venkatesh and Chakravarthifor MANET [29] employs HAMBOCHLD Cluster formation to achieve achievement in energy waste reduction. Goyal et al. [30] employs HAODV approaches to improve packet delivery ratio, end-to-end delay, and reduce routing overhead. Raj Kumar and Bala [31] employ the EECAO approach, but the study fails by yielding the Lengthy Lifetime. Al-Najjar [32] employ the ACO technique to increase network lifespan and residual energy; however the best results require two cluster heads. Devika and Sudha's [33] research used PDR and NLT measures to achieve consistent energy distribution and utilize the C-SEWO approach [34] for innovative design.
3.5 Based on mobility aware cluster
The cluster node formation was investigated based on node mobility, as shown in Table 5. Braik et al. [35] use the AGS-ROA method of clustering to reduce route failure. Venkatasubramanian [36] adopts the EPO-FGA approach for mobile node lifetime. Hamza and Vigila [34] utilize the HPSO-GA method for node energy. Hamza and Vigila [37] use EEMST approaches, but this extends the lifespan. Sivapriya and Mohandas [38] used the MKMPE approach, which resulted in higher packet loss. Saravanan et al. [39] use the E-CFSA for effective power usage. Bisen et al. [40] achieve the best performance using the E-MAVMMF methods. Arulprakash et al. [41] use the EBDC methods for reduced energy consumption.
3.6 Based on transmission range
Finally group of researchers undertaking the research on the power optimization could be done with the support of nodes transmission range, summarizes in the Table 6. Izharul et al. [42] employs the ATP-AODV approach to save a significant amount of energy; however the goal of producing ATP-latency fails. Jiao and Guo [7] implemented the metric norm throughout the routing process to balance the network's energy consumption, but it also extended the network's lifespan. Park et al. [2] employs the MTPR and MHR methods to reduce control, and employs neighbour nodes to send hello messages in order to maximize network throughput, which causes minor delays. Wang et al. [12] used the optimal transmission radius for flooding in large-scale networks to achieve an average setting time.
Table 5. Summary of mobility aware in cluster
Authors |
Methodologies |
Merits |
Demerits |
Braik et al. [35] |
AGS-ROA |
Reduce Route Failure |
- |
Venkatasubramanian [36] |
EPO-FGA |
Mobile Node's Lifetime |
- |
Hamza and Vigila [34] |
HPSO-GA |
Node Energy |
- |
Hamza and Vigila [37] |
EEMST |
- |
Prolong The Lifespan |
Sivapriya and Mohandas [38] |
MKMPE |
- |
Packet Loss |
Saravanan et al. [39] |
E-CFSA |
Effective |
- |
Bisen et al. [40] |
E-MAVMMF |
Best Performance |
- |
Arulprakash et al. [41] |
EBDC |
Reduced Consumption of Energy. |
- |
Table 6. Summary of transmission range
Authors |
Methodologies |
Merits |
Demerits |
Izharul et al. [42] |
Dynamic & Adjustable |
Low-Cost |
Each Node Having An Optimal Number Of Close To Three (3) Neighbour’s |
Jiao and Guo [7] |
ATP-AODV |
Saved A Large Amount Of Energy |
ATP-latency |
Park [2] |
Metric Norm During The Routing Process |
Balanced The Network's Energy Consumption |
Extended The Network's Lifespan |
|
MTPR and MHR |
Reducing Control |
|
Wang et al. [12] |
Neighbour Nodes They Use Hello Messages |
Maximization Of Network Throughput |
Creates Some Delays |
Izharul et al. [42] |
Energy Efficiency By Optimizing The Transmission Power |
Throughput Maximization |
- |
Jiao and Guo [7] |
Optimal Transmission Radius For Flooding In Large Scale Networks |
Average Setting Time |
- |
Table 7 summarizes several methodologies and algorithms with respect to the supporting parameters. Some methods support specific MANET parameters, whereas others do not.OPC approaches presented in study achieve the performance elements of power management, delay, energy, overhead, and congestion control but do not achieve PDF, load management, or security characteristics.Rahmani et al. [16] presented the M-AODV approach, which covers delay, energy, and overhead but does not support other parameters. The AUTOMATA approach is provided by study [43] yields just energy. The POR methods proposed by study [36] support only power, delay, and energy parameters, whereas the OLSR methods proposed by study [44] achieve only security characteristics.
Finally Sridhar et al. [18], Rao and Singh [3], Musthafa et al. [19], Jim et al. [22], Abirami and Sumithra [21], Ponnusamy [23], Rahmani et al. [16], Singh et al. [17], Ramesh et al. [24], Hasani et al. [25], Nobahary and Babaie [8], Hadi et al. [27], Kumar et al. [28], Venkatesh and Chakravarthi [29], Raj Kumar and Bala [31], Sahu and Patil [43], Al-Najjar [32], Devika and Sudha [33], Braik et al. [35], Saravanan et al. [39], Bisen et al. [40], Arulprakash et al. [41], Sivapriya and Mohandas [38] achieves only one parameters are fails to other parametersby using the methods TESAODV, KF-MAC, SNDA, AIS, NCV-AODV, EE, AUTOMATA, OLSR, MSD-SNDT, FSN, SNMN, SNAODV, QOS, CHLD, EECAO, ACO, CLU, C-SEWO, AGS-ROA, E-CFSA, E-MAVMMF, EBDC, E-CFSA, E-MAVMMF and MKMPE methods respectively.
Next groups of research from the authors from Vij et al. [20], Nobahary and Babaie [8], Venkatasubramanian [36], Hamza and Vigila [34], Kumar et al. [28], Thanappan and Perumal [45], Reddy and Mungara [46], Phakathi et al. [47], Ravi et al. [48], Alghamdi [49], Satyanarayana et al. [50], Vinayakan et al. [51] and Saraswathi et al. [52] were achieved two metric parameters by using the methods of GAME THEORY, CREDIT-BASED, EPO-FGA, PSO-GA, EEMST, CC, GAME THEORY, ML, QOS, FUZZY, HFO, FRAMEWORK, CONJUNCTION, AOMDV, HGFNN respectively.
Another set of research done by the authors Veeraiah and Krishna [9], Namdev and Mishra [15], Sri et al. [6], Goyal et al. [30], utilizing the methodologies of IDSM, M-AODV, POR, HAODV, QOS and obtains just three parameters. Finally, the two research studies conducted by the authors of Chen and Liu [53] and Rashmi et al. [16] employing QoS and OPC approaches, respectively, produce the most number of performance metrics,as shown in Table 7. Research on power management is still ongoing to accomplish all kinds of parameter metrics.
Table 7. Summary of power management method with supporting performance
Article |
Methods/ Algorithm |
Power |
Delay |
Energy |
Congestion Control |
PDR |
Overhead |
Security |
Load |
Sridhar et al. [18] |
TESAODV |
|
|
√ |
|
|
|
|
|
Rao and Singh [3] |
KF-MAC |
|
√ |
|
|
|
|
|
|
Musthafa et al. [19] |
SNDA |
|
√ |
|
|
|
|
|
|
Jim and Gregory [22] |
AIS |
|
|
|
√ |
|
|
|
|
Abirami and Sumithra [21] |
NCV-AODV |
|
√ |
|
|
|
|
|
|
Ponnusamy [23] |
EE |
|
|
|
|
|
√ |
|
|
Rahmani et al. [16] |
AUTOMATA |
|
|
√ |
|
|
|
|
|
Singh et al. [17] |
OLSR |
|
|
|
|
|
|
√ |
|
Ramesh et al. [24] |
MSD-SNDT |
|
|
√ |
|
|
|
|
|
Hasani and Babaie [25] |
FSN |
|
|
√ |
|
|
|
|
|
Nobahary and Babaie [8] |
SNMN |
|
|
√ |
|
|
|
|
|
Hadi et al. [27] |
SNAODV |
|
|
|
|
√ |
|
|
|
Kumar et al. [28] |
QOS |
|
|
|
|
√ |
|
|
|
Venkatesh and Chakravarthi [29] |
CHLD |
|
|
|
|
|
|
|
√ |
Raj Kumar and Bala [31] |
EECAO |
|
|
√ |
|
|
|
|
|
Sahu and Patil [43] |
ACO |
|
|
√ |
|
|
|
|
|
Al-Najjar [32] |
CLU |
|
|
√ |
|
|
|
|
|
Devika and Sudha [33] |
C-SEWO |
√ |
|
|
|
|
|
|
|
Braik et al. [35] |
AGS-ROA |
|
√ |
|
|
|
|
|
|
Saravanan et al. [39] |
E-CFSA |
|
|
√ |
|
|
|
|
|
Bisen et al. [40] |
E-MAVMMF |
|
|
√ |
|
|
|
|
|
Arulprakash et al. [41] |
EBDC |
|
|
√ |
|
|
|
|
|
Sivapriyaand Mohandas [38] |
E-CFSA |
|
|
√ |
|
|
|
|
|
Vij et al. [20] |
MKMPE |
|
|
|
|
√ |
|
|
|
Nobahary and Babaie [8] |
GAME THEORY |
|
√ |
|
|
|
√ |
|
|
Venkatasubramanian [36] |
CREDIT-BASED |
√ |
|
√ |
|
|
|
|
|
Hamza and Vigila [34] |
EPO-FGA |
√ |
|
|
|
√ |
|
|
|
Kumar et al. [28] |
EEMST |
√ |
|
|
|
√ |
|
|
|
Thanappan and Perumal [45] |
CC |
|
√ |
√ |
|
|
|
|
|
Reddy and Mungara [46] |
GAME THEORY |
|
√ |
√ |
|
|
|
|
|
Phakathi et al. [47] |
QOS |
|
√ |
√ |
|
|
|
|
|
Ravi et al. [48] |
FUZZY |
|
√ |
√ |
|
|
|
|
|
Alghamdi [49] |
HFO |
|
√ |
√ |
|
|
|
|
|
Satyanarayana et al. [50] |
FRAMEWORK |
|
√ |
√ |
|
|
|
|
|
Vinayakan et al. [51] |
CONJUNCTION |
|
√ |
√ |
|
|
|
|
|
Saraswathi et al. [52] |
AOMDV |
|
√ |
√ |
|
|
|
|
|
Veeraiah and Krishna [9] |
HGFNN |
|
√ |
√ |
|
|
|
|
|
Namdev and Mishra [15] |
IDSM |
√ |
√ |
√ |
|
|
|
|
|
Sri et al. [6] |
M-AODV |
|
√ |
√ |
|
|
√ |
|
|
Goyal et al. [30] |
POR |
√ |
√ |
√ |
|
|
|
|
|
Chen and Liu [53] |
HAODV |
√ |
√ |
√ |
|
|
|
|
|
Rashmi et al. [16] |
QOS |
|
|
|
|
|
√ |
√ |
√ |
Sridhar et al. [18] |
QOS |
|
√ |
√ |
|
|
√ |
√ |
√ |
Rao and Singh [3] |
OPC |
√ |
√ |
√ |
√ |
|
√ |
|
|
This survey article elaborates on the importance of power management in MANET nodes to achieve better performance. Initially, all the layers' responsibility for power management with the support of computation methods of each layer was discussed. Later, the different power management techniques with respect to the topology, transmission range, clustering nodes, and mobility was discussed. Finally, the comparative study of all the methods with the performance factors, Full-fledged power management can be obtained when all performance variables are met by the nodes. More study is needed to ensure that all performance factors in MANET are met in order to achieve an efficient power management strategy in the MANET protocol stack.
[1] Gu, C., Zhu, Q. (2014). An energy-aware routing protocol for mobile ad hoc networks based on route energy comprehensive index. Wireless Personal Communications, 79(2): 1557-1570. https://doi.org/10.1007/s11277-014-1946-1
[2] Park, N.U., Nam, J.C., Cho, Y.Z. (2016). Impact of node speed and transmission range on the hello interval of MANET routing protocols. In 2016 International Conference on Information and Communication Technology Convergence (ICTC), Jeju, Korea (South), pp. 634-636. https://doi.org/10.1109/ICTC.2016.7763550
[3] Rao, M., Singh, N. (2018). Energy efficient QoS aware hierarchical KF-MAC routing protocol in MANET. Wireless Personal Communications, 101(2): 635-648.
[4] Al-Gabri, M., Li, C., Yang, Z., Naji Hasan, A.H., Zhang, X. (2012). Improved the energy of Ad Hoc On-Demand Distance Vector routing protocol. IERI Procedia, 2: 355-361. https://doi.org/10.1016/j.ieri.2012.06.101
[5] Woungang, I., Obaidat, M.S., Dhurandher, S.K., Ferworn, A., Shah, W. (2013). An ant-swarm inspired energy-efficient ad hoc on-demand routing protocol for mobile ad hoc networks. In 2013 IEEE international conference on communications (ICC), Budapest, Hungary, pp. 3645-3649. https://doi.org/10.1109/ICC.2013.6655119
[6] Sri, T.S., Prasad, J.R., Kumar, R.K. (2018). SEE: Synchronized efficient energy calculation for topology maintenance & power saving in ad hoc networks. Arabian Journal for Science and Engineering, 43(8): 4353-4363.https://doi.org/10.1007/s13369-017-3043-8
[7] Jiao, Z.S., Guo, Y. (2016). An improved AODV routing protocol based on energy optimization. IJISET–International Journal of Innovations in Science, Engineering and Technology, 3(6): 335-340.
[8] Nobahary, S., Babaie, S. (2018). A credit-based method to selfish node detection in mobile ad-hoc network. Applied Computing and Systems, 23(2): 118-127. https://doi.org/10.2478/acss-2018-0015
[9] Veeraiah, N., Krishna, B.T. (2018). Selfish node detection IDSM-based approach using individual master cluster node. In 2018 2nd International Conference on Inventive Systems and Control (ICISC), Coimbatore, India, pp. 427-431. https://doi.org/10.1109/ICISC.2018.8399109
[10] Devika, B., Sudha, P.N. (2020). Power optimization in MANET using topology management. Engineering Science and Technology, an International Journal, 23: 565-575. https://doi.org/10.1016/j.jestch.2019.07.008
[11] Thilagavathe, V., Dr. Duraiswamy, K. (2012). Cross layer based congestion control technique for reliable and energy aware routing in MANET. International Journal of Computer Applications, 36(12): 1-6.
[12] Wang, W., Liu, X., Yao, Y., Pan, Y., Chi, Z., Zhu, T. (2019). CRF: Coexistent routing and flooding using WIFI packets in heterogeneous IoT networks. In IEEE INFOCOM 2019-IEEE Conference on Computer Communications, Paris, France, pp. 19-27. https://doi.org/10.1109/INFOCOM.2019.8737525
[13] Alghamdi, S.A. (2016). Load balancing maximal minimal nodal residual energy ad hoc on-demand multipath distance vector routing protocol (LBMMRE-AOMDV). Wireless Networks, 22(4): 1355-1363. https://doi.org/10.1007/s11276-015-1029-6
[14] Chaudhry, R., Tapaswi, S. (2018). Optimized power control and efficient energy conservation for topology management of MANET with an adaptive Gabriel graph. Computers & Electrical Engineering, 72: 1021-1036.https://doi.org/10.1016/j.compeleceng.2018.03.013
[15] Namdev, A., Mishra, A. (2016). Interference-based topology control algorithm for delay-constrained mobile ad hoc networks. In 2016 IEEE Students' Conference on Electrical, Electronics and Computer Science (SCEECS), Bhopal, India, pp. 1-6. https://doi.org/10.1109/SCEECS.2016.7509297
[16] Rahmani, P., Javadi, H.H.S., Bakhshi, H., Hosseinzadeh, M. (2018). TCLAB: A new topology control protocol in cognitive MANETs based on learning automata. Journal of Network and Systems Management, 26(2): 426-462.https://doi.org/10.1007/s10922-017-9422-3
[17] Singh, T., Singh, J., Sharma, S. (2017). Energy efficient secured routing protocol for MANETs. Wireless Networks, 23(4): 1001-1009.https://doi.org/10.1007/s11276-015-1176-9
[18] Sridhar, S., Baskaran, R., Anitha, R., Sankar, R. (2017). Proficient and secured routing in MANET based on trust and energy supported AODV. Proceedings of the International Journal of Applied Mathematics and Informatics Sciences, 11(3): 807-817.
[19] Musthafa, M.M., Vanitha, K., Rahman, A.M.Z., Anitha, K. (2020). An efficient approach to identify a selfish node in MANET. In 2020 International Conference on Computer Communication and Informatics (ICCCI), Coimbatore, India, pp. 1-3. https://doi.org/10.1109/ICCCI48352.2020.9104076
[20] Vij, A., Sharma, V., Nand, P. (2018). Selfish node detection using game theory in MANET. In 2018 International Conference on Advances in Computing, Communication Control and Networking (ICACCCN), Greater Noida, India, pp. 104-109.https://doi.org/10.1109/ICACCCN.2018.8748632
[21] Abirami, K.R., Sumithra, M.G. (2019). Evaluation of neighbor credit value-based AODV routing algorithms for selfish node behavior detection. Cluster Computing, 22(6): 13307-13316.https://doi.org/10.1007/s10586-018-1851-6
[22] Jim, L.E., Gregory, M.A. (2019). Improvised MANET selfish node detection using artificial immune system-based decision tree. In 2019 29th International Telecommunication Networks and Applications Conference (ITNAC), Auckland, New Zealand, pp. 1-6. https://doi.org/10.1109/ITNAC46935.2019.9077968
[23] Ponnusamy, M. (2021). Detection of selfish nodes through reputation model in mobile adhoc network-MANET. Turkish Journal of Computer and Mathematics Education (TURCOMAT): 12(9): 2404-2410.
[24] Ramesh, V., Kumar, C.S., Venkatakrishnan, S. (2021). A modified Skellam distribution is used in MANETs based on the selfish node detection technique. Materials Today Proceedings, 6(2): 896-903.
[25] Hasani, H., Babaie, S. (2019). Selfish node detection in ad hoc networks based on fuzzy logic. Neural Computing and Applications, 31(10): 6079-6090. https://doi.org/10.1007/s00521-018-3431-3
[26] Nobahary, S., Garakani, H.G., Khademzadeh, A., Rahmani, A.M. (2019). Selfish node detection based on hierarchical game theory in IoT. EURASIP Journal on Wireless Communications and Networking, 2019(1): 1-19. https://doi.org/10.1186/s13638-019-1564-4
[27] Hadi, A.A., Zulkarnain, M.A., Aljeroudi, Y. (2017). Improved selfish node detection algorithm for mobile ad hoc network. International Journal of Advanced Computer Science and Applications, 8(4): 103-108.
[28] Kumar, R.S., Manimegalai, P., Raj, V., Dhanagopal, R., Santhosh, A.J. (2022). Cluster head selection and energy efficient multicast routing protocol-based optimal route selection for mobile ad hoc networks. Wireless Communications and Mobile Computing, 2022: 5318136. https://doi.org/10.1155/2022/5318136
[29] Venkatesh, T., Chakravarthi, R. (2022). An energy-efficient algorithm in MANET using monarch butterfly optimization and cluster head load distribution. In 2022 International Conference on Communication, Computing and Internet of Things (IC3IoT), Chennai, India, pp. 1-5. https://doi.org/10.1109/IC3IOT53935.2022.9767917
[30] Goyal, A., Sharma, V.K., Kumar, S., Poonia, R.C. (2021). Hybrid AODV: An efficient routing protocol for MANET using MFR and firefly optimization technique. Journal of Interconnection Networks, 21(1): 2150004. https://doi.org/10.1142/S0219265921500043
[31] Raj Kumar, N.P., Bala, G.J. (2022). A cognitive knowledge-energy-efficient path selection using centroid and ant-colony optimized hybrid protocol for WSN-Assisted IoT. Wireless Personal Communications, 124(3): 1993-2028.
[32] Al-Najjar, A.A.M. (2021). Optimizing MANETs network lifetime using a proactive clustering algorithm. Turkish Journal of Computer and Mathematics Education (TURCOMAT), 12(8): 143-155.
[33] Devika, B., Sudha, P.N. (2022). Chronological-squirrel earth worm optimization for power minimization using topology management in MANET. Distributed Computing and Optimization Techniques, 903: 219-229. https://doi.org/10.1007/978-981-19-2281-7_21
[34] Hamza, F., Vigila, S.M.C. (2023). An energy-efficient cluster head selection in MANETs using emperor penguin optimization fuzzy genetic algorithm. In Proceedings of International Conference on Recent Trends in Computing (ICRTC), Ghaziabad, India, pp. 453-468.https://doi.org/10.1007/978-981-19-8825-7_39
[35] Braik, M., Hammouri, A., Atwan, J., Al-Betar, M.A., Awadallah, M.A. (2022). White Shark Optimizer: A novel bio-inspired meta-heuristic algorithm for global optimization problems. Knowledge-Based Systems, 243, 108457.https://doi.org/10.1016/j.knosys.2022.108457
[36] Venkatasubramanian, S. (2022). Ridder optimized cluster head selection in MANETs is fuzzy and adapted gear based on the steering panel. NeuroQuantology, 20(12): 3830. https://doi.org/10.48047/NQ.2022.20.12.NQ773707
[37] Hamza, F., Vigila, S.M.C. (2021). Cluster head selection algorithm for MANETs using hybrid particle swarm optimization-genetic algorithm. International Journal of Computer Networks and Applications, 8(2): 119-129. https://doi.org/10.22247/ijcna/2021/208892
[38] Sivapriya, N., Mohandas, R. (2022). Optimal route selection for mobile ad-hoc networks based on cluster head selection and energy efficient. Computer Integrated Manufacturing Systems, 28(12): 1059-1065.
[39] Saravanan, R., Suresh, K., Arumugam, S.S. (2023). A modified k-means-based cluster head selection and Philippine eagle optimization-based secure routing for MANET. The Journal of Supercomputing, 79(9): 10481-10504. https://doi.org/10.1007/s11227-023-05053-1
[40] Bisen, D., Mishra, S., Saurabh, P. (2021). K-means based cluster formation and head selection through artificial neural network in MANET. Wireless Personal Communications. https://doi.org/10.21203/rs.3.rs-667651/v1
[41] Arulprakash, P., Kumar, A.S., Prakash, S.P. (2023). Optimal route and cluster head selection using energy efficient-modified African vulture and modified mayfly in manet. Peer-to-Peer Networking and Applications, 16(2): 1310-1326. https://doi.org/10.1007/s12083-023-01461-5
[42] Izharul, M., Ansari, H., Singh, S.P. (2016). Adaptive-transmission-power ad hoc on-demand distance vector routing protocol for mobile ad hoc network. International Journal of Computer Applications, 138(2): 1-10.
[43] Sahu, M.K., Patil, S. (2021). Enhanced double cluster head selection using ant colony optimization for energy-efficient routing in wireless sensor network. SAMRIDDHI: A Journal of Physical Sciences, Engineering and Technology, 13(01): 35-41. https://doi.org/10.18090/samriddhi.v13i01.7
[44] Sumathi, K., Kumar, D.V. (2020). Ambient intelligence-based fish swarm optimization routing protocol for congestion avoidance in mobile ad-hoc network. Networks, 6: 15. https://doi.org/10.22247/ijcna/2022/212559
[45] Thanappan, R., Perumal, T. (2022). Congestion aware MANET routing using evolutionary game theory and cross-layer design. ECS Transactions, 107(1): 1699. https://doi.org/10.1149/10701.1699ecst
[46] Reddy, V.S.N., Mungara, D.J. (2021). Machine learning-based efficient clustering and improve quality of service in Manet. Indian Journal of Computer Science and Engineering, 12(5): 1392-1399. https://doi.org/10.21817/indjcse/2021/v12i5/211205072
[47] Phakathi, T., Esiefarienrhe, B.M., Lugayizi, F. (2021). Comparative analysis of quality of service scheduling classes in mobile ad-hoc networks. arXiv preprint arXiv:2106.07051. https://doi.org/10.48550/arXiv.2106.07051
[48] Ravi, S., Matheswaran, U., Perumal, S., Sivakumar, S., Palvadi, S.K. (2022). Adaptive trust-based secure and optimal route selection algorithm for MANET using hybrid fuzzy optimization. Peer-to-Peer Networking and Applications, 16: 22-34. https://doi.org/10.1007/s12083-022-01351-2
[49] Alghamdi, S.A. (2022). Novel trust-aware intrusion detection and prevention system for 5G MANET-Cloud. International Journal of Information Security, 21(3): 469-488. https://doi.org/10.1007/s10207-020-00531-6
[50] Satyanarayana, P., Nihani, V.G.V., GA, J.D., DVA, K.R., CH, S.A. (2022). Design and implementation of trust based routing algorithm to enhance QoS for MANETs. In 2022 International Conference on Wireless Communications Signal Processing and Networking (WiSPNET), Chennai, India, pp. 64-68. https://doi.org/10.1109/WiSPNET54241.2022.9767100
[51] Vinayakan, K., Srinath, M.V., Adhiselvam, A. (2022). Security for multipath routing protocol using trust based AOMDV In MANETs. SpecialusisUgdymas, 2(43): 1640-1654.
[52] Saraswathi, R., Srinivasan, J., Aruna, S. (2022). An energy efficient routing protocol and cross layer based congestion detection using hybrid genetic fuzzy neural network (HGFNN) model for MANET. Journal of Algebraic Statistics, 13(2): 1007-1019. https://doi.org/10.52783/jas.v13i2.255
[53] Chen, Y., Liu, W. (2021). Mac layer energy consumption and routing protocol optimization algorithm for mobile ad hoc networks. Complexity, 2021: 1-12. https://doi.org/10.1155/2021/6687189