Multi-Metric Energy Efficient Routing in Mobile Ad-Hoc Networks
Authors:
Evripidis Paraskevas,
Kyriakos Manousakis,
Subir Das,
John S. Baras
Abstract:
Increasing network lifetime by reducing energy consumption across the network is one of the major concerns while designing routing protocols for Mobile Ad-Hoc Networks. In this paper, we investigate the main reasons that lead to energy depletion and we introduce appropriate routing metrics in the routing decision scheme to mitigate their effect and increase the network lifetime. For our routing sc…
▽ More
Increasing network lifetime by reducing energy consumption across the network is one of the major concerns while designing routing protocols for Mobile Ad-Hoc Networks. In this paper, we investigate the main reasons that lead to energy depletion and we introduce appropriate routing metrics in the routing decision scheme to mitigate their effect and increase the network lifetime. For our routing scheme, we take into consideration multiple layer parameters, such as MAC queue utilization, node degree and residual energy. We integrate our multi-metric routing scheme into OLSR, a standard MANET proactive routing protocol. We evaluate via simulations in NS3 the protocol modifications under a range of different static and mobile scenarios. The main observations are that in static and low mobility scenarios our modified routing protocol leads to a significant increase (5\%-20\%) in network lifetime compared to standard OLSR and slightly better performance in terms of Packet Delivery Ratio (PDR).
△ Less
Submitted 30 March, 2016;
originally announced March 2016.
Trust-Aware Network Utility Optimization in Multihop Wireless Networks with Delay Constraints
Authors:
Evripidis Paraskevas,
Tao Jiang,
John S. Baras
Abstract:
Many resource allocation problems can be formulated as a constrained maximization of a utility function. Network Utility Maximization (NUM) applies optimization techniques to achieve decomposition by duality or the primal-dual method. Several important problems, for example joint source rate control, routing, and scheduling design, can be optimized by using this framework. In this work, we introdu…
▽ More
Many resource allocation problems can be formulated as a constrained maximization of a utility function. Network Utility Maximization (NUM) applies optimization techniques to achieve decomposition by duality or the primal-dual method. Several important problems, for example joint source rate control, routing, and scheduling design, can be optimized by using this framework. In this work, we introduce an important network security concept, "trust", into the NUM formulation and we integrate nodes' trust values in the optimization framework. These trust values are based on the interaction history between network entities and community based monitoring. Our objective is to avoid routing packets though paths with large percentage of malicious nodes. We also add end-to-end delay constraints for each of the traffic flows. The delay constraints are introduced to capture the quality of service (QoS) requirements imposed to each traffic flow.
△ Less
Submitted 9 May, 2016; v1 submitted 30 March, 2016;
originally announced March 2016.