Research Article
Relay Node-Based Routing Algorithm for Reducing Latency in
Industrial Mobile Communication Network
Hatem S. A. Hamatta ,
1
Abdul Basit,
2
K. A. Sharada,
3
Y. Venkateswara Reddy,
4
K. Ragavan,
5
Mohiuddin Ali Khan,
6
Arvind Kumar Shukla ,
7
Vivek Singh Kushwah ,
8
and Roviel Berhane
9
1
Department of Applied Sciences, Aqaba University College, Al Balqa Applied University, Aqaba, Jordan
2
Department of Computer science and Information Technology, Maulana Azad National Urdu University, Hyderabad,
Telangana, India
3
Department of CSE, HKBK College of Engineering, Bangalore, Karnataka, India
4
Department of Electronics and Communication Engineering, Malla Reddy Institute of Technology, Hyderabad, India
5
Department of ECE, Ramco Institute of Technology, Rajapalayam, Tamil Nadu, India
6
Department of Computer and Network Engineering, Jazan University, Jazan, Saudi Arabia
7
Department of Computer Applications, IFTM University, Moradabad, Uttar Pradesh, India
8
Department of Electronics and Communication Engineering, Amity School of Engineering and Technology (ASET),
Amity University Madhya Pradesh, Maharajpura Dang, Gwalior, India
9
Department of Chemical Engineering College of Biological and Chemical Engineering, Addis Ababa Science and
Technology University, Addis Ababa, Ethiopia
Correspondence should be addressed to Hatem S. A. Hamatta; hatem@bau.edu.jo
and Roviel Berhane; roviel.berhane@aastustudent.edu.et
Received 16 May 2022; Revised 19 July 2022; Accepted 15 April 2023; Published 20 June 2023
Academic Editor: Kalidoss Rajakani
Copyright © 2023 Hatem S. A. Hamatta et al. This is an open access article distributed under the Creative Commons Attribution
License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is
properly cited.
Mobile network nodes perform time transfer during data packet performance in an asynchronous manner. Network nodes get
packets for transmission from node sensors that reject the demands of node attackers. When packet loss occurs unexpectedly
due to a network removal, it is exceedingly difficult to detect assaults and time forwarding. Attack detection accuracy
deteriorates, and packet loss rates rise. A strategy for node mobile intermediate that gets over attacks that identify the forward
choosing is provided for improved data forwarding. Network performance is completely damaged by specific attacks, such as
communication processes that degrade or lose packets. The algorithm’s architecture ensures that the best nodes are chosen for
relaying and that transmission packets that do not drop are declined. To enable the node and create an effective path routing,
a process is executed. Decreasing the amount of packet loss and increasing attack efficiency are being identified.
1. Introduction
The mobile network accepts the user in its environment
such as the performance of the protected monitor network,
irregular behaviour to evade the worry protection, and lack
of middle coherence in the middle. As a result, distinct layers
of intruders may alter in a mobile environment. In a mobile
network, there are many layers for available intrusions [1].
While nodes are malfunctioning due to intrusions at the
layer linking the data, denial of communication is misbehav-
ing at the application layer. Intruders use a variety of tech-
niques, such as dropping poles, withholding connections,
black holes, spoofing connections, and Sybil, to determine
where they are in the network and how to get in [2].
Hindawi
Wireless Communications and Mobile Computing
Volume 2023, Article ID 7297208, 10 pages
https://doi.org/10.1155/2023/7297208