Open Access
Subscription Access
IMPROVED ENERGY EFFICIENCY IN MOBILE ADHOC NETWORKS USING MOBILITY BASED ROUTING
Subscribe/Renew Journal
Energy conservation is a key element in MANET and so the architecture of the protocol demands particular consideration. Several MANET designs explored processes for the storage of renewable resources. Energy dissipation is a key coordinating factor among MANET nodes. Power utilization is ensured in monitoring applications that battery depletions are lowered to avoid regular substitution. MANET primarily aims to relay data by using energy-efficient routing protocols and an increasing lifespan of the network. The results of the simulation show that the approach suggested improves energy efficiency compared to other approaches. The findings are checked and provide decreased power usage, better packet distribution, lower packet error rate, higher network lifetime and lower end-to-end latency compared to conventional methods.
Keywords
Energy Efficiency, MANETs, Mobility, Routing.
Subscription
Login to verify subscription
User
Font Size
Information
- V. Rajaravivarma, “Virtual Local Area Network Technology and Applications”, Proceedings of International Symposium on System Theory, pp. 49-52, 1997.
- J. Jubin and J.D. Tornow, “The DARPA Packet Radio Network Protocols”, Proceedings of the IEEE, Vol.75, No. 1, pp. 21-32, 1987.
- N.B. Salem and J.P. Hubaux, “Securing Wireless Mesh Networks”, IEEE Transactions on Wireless Communications, Vol. 13, No. 2, pp. 50-55, 2006.
- E. Shi and A. Perrig, “Designing Secure Sensor Networks”, IEEE Transactions on Wireless Communications, Vol. 11, No. 6, pp. 38-43, 2004.
- A. Stojmenovic, “Geocasting with Guaranteed Delivery in Sensor Networks”, IEEE Transactions on Wireless Communications, Vol. 11, No. 6, pp. 29-37, 2004.
- Y.M. Huang, H.Y. Lin and T.I. Wang, “Inter-Cluster Routing Authentication for Ad Hoc Networks by a Hierarchical Key Scheme”, Journal of Computer Science and Technology, Vol. 21, No. 6, pp. 997-1011, 2006.
- IEEE Standards Association, “IEEE Standards for Local and Metropolitan Area Networks, Virtual Bridged Local Area Networks”, Available at https://standards.ieee.org/standard/802_1Q-2005.html, Accessed at 2005.
- W. Diffie and M. Hellman, “New Directions in Cryptography”, IEEE Transactions on Information Theory, Vol. 22, No. 6, pp. 644-654, 1976.
- M. Steiner, G. Tsudik and M. Waidner. “Diffie-Hellman Key Distribution Extended to Group Communication”, Proceedings of ACM Conference on Computer and Communications Security, pp. 31-37, 1996.
- Yueh-Min Huang, Ching-Hung Yeh, and Tzone-I Wang, “Constructing Secure Group Communication over Wireless Ad-Hoc Networks based on a Virtual Subnet”, IEEE Transactions on Wireless Communications, Vol. 14, no. 5, pp. 70-75, 2007.
- T. Karthikeyan and K. Praghash, “An Improved Task Allocation Scheme in Serverless Computing Using Gray Wolf Optimization (GWO) Based Reinforcement Learning (RIL) Approach”, Wireless Personal Communications, Vol. 117, No. 3, pp. 1-19, 2020.
- S. Kannan, G. Dhiman, and M. Gheisari, “Ubiquitous Vehicular Ad-Hoc Network Computing using Deep Neural Network with IoT-Based Bat Agents for Traffic Management”, Electronics, Vol. 10, no. 7, pp. 785-796, 2021.
- N.G. Veerappan Kousik, K. Suresh, R. Patan and A.H. Gandomi, “Improving Power and Resource Management in Heterogeneous Downlink OFDMA Networks”, Information, Vol. 11, No. 4, pp. 203-216, 2020
Abstract Views: 339
PDF Views: 176