Research Article Relay Node-Based Routing Algorithm for Reducing Latency in Industrial Mobile Communication Network Hatem S. A. Hamatta , 1 Abdul Basit, 2 K. A. Sharada, 3 Y. Venkateswara Reddy, 4 K. Ragavan, 5 Mohiuddin Ali Khan, 6 Arvind Kumar Shukla , 7 Vivek Singh Kushwah , 8 and Roviel Berhane 9 1 Department of Applied Sciences, Aqaba University College, Al Balqa Applied University, Aqaba, Jordan 2 Department of Computer science and Information Technology, Maulana Azad National Urdu University, Hyderabad, Telangana, India 3 Department of CSE, HKBK College of Engineering, Bangalore, Karnataka, India 4 Department of Electronics and Communication Engineering, Malla Reddy Institute of Technology, Hyderabad, India 5 Department of ECE, Ramco Institute of Technology, Rajapalayam, Tamil Nadu, India 6 Department of Computer and Network Engineering, Jazan University, Jazan, Saudi Arabia 7 Department of Computer Applications, IFTM University, Moradabad, Uttar Pradesh, India 8 Department of Electronics and Communication Engineering, Amity School of Engineering and Technology (ASET), Amity University Madhya Pradesh, Maharajpura Dang, Gwalior, India 9 Department of Chemical Engineering College of Biological and Chemical Engineering, Addis Ababa Science and Technology University, Addis Ababa, Ethiopia Correspondence should be addressed to Hatem S. A. Hamatta; hatem@bau.edu.jo and Roviel Berhane; roviel.berhane@aastustudent.edu.et Received 16 May 2022; Revised 19 July 2022; Accepted 15 April 2023; Published 20 June 2023 Academic Editor: Kalidoss Rajakani Copyright © 2023 Hatem S. A. Hamatta et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Mobile network nodes perform time transfer during data packet performance in an asynchronous manner. Network nodes get packets for transmission from node sensors that reject the demands of node attackers. When packet loss occurs unexpectedly due to a network removal, it is exceedingly dicult to detect assaults and time forwarding. Attack detection accuracy deteriorates, and packet loss rates rise. A strategy for node mobile intermediate that gets over attacks that identify the forward choosing is provided for improved data forwarding. Network performance is completely damaged by specic attacks, such as communication processes that degrade or lose packets. The algorithms architecture ensures that the best nodes are chosen for relaying and that transmission packets that do not drop are declined. To enable the node and create an eective path routing, a process is executed. Decreasing the amount of packet loss and increasing attack eciency are being identied. 1. Introduction The mobile network accepts the user in its environment such as the performance of the protected monitor network, irregular behaviour to evade the worry protection, and lack of middle coherence in the middle. As a result, distinct layers of intruders may alter in a mobile environment. In a mobile network, there are many layers for available intrusions [1]. While nodes are malfunctioning due to intrusions at the layer linking the data, denial of communication is misbehav- ing at the application layer. Intruders use a variety of tech- niques, such as dropping poles, withholding connections, black holes, spoong connections, and Sybil, to determine where they are in the network and how to get in [2]. Hindawi Wireless Communications and Mobile Computing Volume 2023, Article ID 7297208, 10 pages https://doi.org/10.1155/2023/7297208