Advertisement

DEAR-2: An Energy-Aware Routing Protocol with Guaranteed Delivery in Wireless Ad-hoc Networks

  • Muhammad Umair HassanEmail author
  • Muhammad Shahzaib
  • Kamran Shaukat
  • Syed Nakhshab Hussain
  • Muhammad Mubashir
  • Saad Karim
  • Muhammad Ahmad Shabir
Chapter
Part of the EAI/Springer Innovations in Communication and Computing book series (EAISICC)

Abstract

Nodes can connect with each other to form a self-organizing, infrastructure-less, wireless ad-hoc network, in which every node performs the actions of both host and router. The demand for wireless ad-hoc networks is growing because of their simple and quick installation. However, the limited power of nodes and continuously changing topologies of wireless networks adversely affect the performance of wireless ad-hoc networks. A major problem is maximizing the lifetime of wireless networks while ensuring that packets are delivered to their destinations. Much research has been published on the routing protocols of wireless ad-hoc networks, but most of the algorithms focus on a single performance metric of wireless networks. In this chapter, we propose a routing protocol referred to as DEAR-2 for a heterogeneous wireless ad-hoc network. We have embedded the energy and device type awareness features of the Device and Energy Aware Routing (DEAR) routing algorithm in the face routing algorithm, which focuses only on guaranteed delivery.

Keywords

FACE DEAR Energy-aware routing Guaranteed delivery Planar graphs 

References

  1. 1.
    Avudainayagam, A., Fang, Y., & Lou, W. (2002). DEAR: A device and energy aware routing protocol for mobile adhoc networks. In MILCOM 2002. Proceedings (Vol. 1). Piscataway, NJ: IEEE.Google Scholar
  2. 2.
    Khan, F., Rahman, F., Khan, S., & Kamal, S. A. (2018). Performance analysis of transport protocols for multimedia traffic over mobile Wi-Max network under nakagami fading. In Information technology-New generations (pp. 101–110). Cham: Springer.CrossRefGoogle Scholar
  3. 3.
    Jan, M. A., Nanda, P., He, X., & Liu, R. P. (2013, November). Enhancing lifetime and quality of data in cluster-based hierarchical routing protocol for wireless sensor network. In 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing (HPCC_EUC) (pp. 1400–1407). Piscataway, NJ: IEEE.Google Scholar
  4. 4.
    Khan, F. (2014). Secure communication and routing architecture in wireless sensor networks. In 2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE) (pp. 647–650). Piscataway, NJ: IEEE.CrossRefGoogle Scholar
  5. 5.
    Singh, S., Woo, M., & Raghavendra, C. S. (1998). Power-aware routing in mobile adhoc networks. In Proceedings of the 4th Annual ACM/IEEE International Conference on Mobile Computing and Networking. New York: ACM.Google Scholar
  6. 6.
    Ko, Y.-B., & Vaidya, N. H. (2000). Location-aided routing (LAR) in mobile adhoc networks. Wireless Networks, 6(4), 307–321.CrossRefGoogle Scholar
  7. 7.
    Tarique, M., & Tepe, K. E. (2009). Minimum energy hierarchical dynamic source routing for mobile adhoc networks. Adhoc Networks, 7(6), 1125–1135.CrossRefGoogle Scholar
  8. 8.
    Karp, B., & Kung, H.-T. (2000). GPSR: Greedy perimeter stateless routing for wireless networks. In Proceedings of the 6th Annual International Conference on Mobile Computing and Networking. New York: ACM.Google Scholar
  9. 9.
    Ryu, J.-H., & Cho, D.-H. (2001). A new routing scheme concerning energy conservation in wireless home ad-hoc networks. IEEE Transactions on Consumer Electronics, 47(1), 1–5.CrossRefGoogle Scholar
  10. 10.
    Bondy, J. A., & Murty, U. S. R. (1976). Graph theory with applications. Amsterdam: Elsevier North-Holland.CrossRefGoogle Scholar
  11. 11.
    Alam, M., Ferreira, J., Mumtaz, S., Jan, M. A., Rebelo, R., & Fonseca, J. A. (2017). Smart cameras are making our beaches safer: A 5G-envisioned distributed architecture for safe, connected coastal areas. IEEE Vehicular Technology Magazine, 12(4), 50–59.CrossRefGoogle Scholar
  12. 12.
    Jan, M. A., Jan, S. R. U., Alam, M., Akhunzada, A., & Rahman, I. U. (2018). A comprehensive analysis of congestion control protocols in wireless sensor networks. Mobile Networks and Applications, 23(3), 1–13.CrossRefGoogle Scholar
  13. 13.
    Alam, M., Albano, M., Radwan, A., & Rodriguez, J. (2012). Context parameter prediction to prolong mobile terminal battery life. In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (pp. 476–489). Berlin: Springer.Google Scholar
  14. 14.
    Alam, M., Albano, M., Radwan, A., & Rodriguez, J. (2012). Context based node discovery mechanism for energy efficiency in wireless networks. In 2012 IEEE International Conference on Communications (ICC).Google Scholar
  15. 15.
    Usman, M., Jan, M. A., He, X., & Alam, M. (2018). Performance evaluation of high definition video streaming over mobile ad hoc networks. Signal Processing, 148, 303–313.CrossRefGoogle Scholar
  16. 16.
    Jan, M. A., Usman, M., He, X., & Rehman, A. U. (2018). SAMS: A Seamless and Authorized Multimedia Streaming framework for WMSN-based IoMT. IEEE Internet of Things Journal.  https://doi.org/10.1109/JIOT.2018.2848284
  17. 17.
    Bose, P., Morin, P., Stojmenović, I., & Urrutia, J. (2001). Routing with guaranteed delivery in ad hoc wireless networks. Wireless Networks, 7(6), 609–616.CrossRefGoogle Scholar
  18. 18.
    Khan, F., ur Rehman, A., Usman, M., Tan, Z., & Puthal, D. (2018). Performance of cognitive radio sensor networks using hybrid automatic repeat ReQuest: Stop-and-wait. Mobile Networks and Applications, 23(3), 1–10.  https://doi.org/10.1007/s11036-018-1020-4.CrossRefGoogle Scholar
  19. 19.
    Frey, H., & Stojmenovic, I. (2006). On delivery guarantees of face and combined greedy-face routing in adhoc and sensor networks. In Proceedings of the 12th Annual International Conference on Mobile Computing and Networking. New York: ACM.Google Scholar
  20. 20.
    Fida, N., Khan, F., Jan, M. A., & Khan, Z. (2016, September). Performance analysis of vehicular adhoc network using different highway traffic scenarios in cloud computing. In International Conference on Future Intelligent Vehicular Technologies (pp. 157–166). Cham: Springer.Google Scholar
  21. 21.
    Jan, M. A., Khan, F., Alam, M., & Usman, M. (2017). A payload-based mutual authentication scheme for internet of things. Future Generation Computer Systems. Google Scholar
  22. 22.
    Alam, M., Albano, M., Radwan, A., & Rodriguez, J. (2013). CANDi: Context-aware node discovery for short-range cooperation. Transactions on Emerging Telecommunications Technologies, 26(5), 861–875.  https://doi.org/10.1002/ett.2763.CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Muhammad Umair Hassan
    • 1
    Email author
  • Muhammad Shahzaib
    • 2
  • Kamran Shaukat
    • 3
  • Syed Nakhshab Hussain
    • 3
  • Muhammad Mubashir
    • 1
  • Saad Karim
    • 3
  • Muhammad Ahmad Shabir
    • 1
  1. 1.School of Information Science and EngineeringUniversity of JinanJinanChina
  2. 2.Department of Computer ScienceNorwegian University of Science and TechnologyTrondheimNorway
  3. 3.Department of Information and TechnologyUniversity of PunjabJhelumPakistan

Personalised recommendations