Page 1 of 24

European Journal of Applied Sciences – Vol. 12, No. 3

Publication Date: June 25, 2024

DOI:10.14738/aivp.123.16994

Diarra, S., & Islam, M. S. (2024). Energy and Trust-Aware Routing in Wireless Networks for Multimedia Applications. European

Journal of Applied Sciences, Vol - 12(3). 127-150.

Services for Science and Education – United Kingdom

Energy and Trust-Aware Routing in Wireless Networks for

Multimedia Applications

Sidy Diarra

School of Science & Engineering, Atlantic International University (AIU),

Pioneer Plaza, 900 Fort Street Mall 905, Honolulu, HI 96813, USA

Mohammad Shahidul Islam

School of Science & Engineering, Atlantic International University (AIU),

Pioneer Plaza, 900 Fort Street Mall 905, Honolulu, HI 96813, USA

ABSTRACT

With rapid proliferation of wireless communication technologies and increasing

demand for multimedia applications, efficient routing in wireless networks has

become critical research area. Energy usage control and data exchange are key in

these networks. Due to sensor node resource constraints, wireless networks are

subject to security threats. So, energy-aware trust-based approaches are powerful

for identifying node behaviour and providing wireless network security. This

paper presents a novel approach that integrates energy and trust considerations

into the routing process to enhance the performance of multimedia applications in

wireless networks. This multifaceted approach aims to establish a comprehensive

framework that encompasses energy efficiency, trust, data security, path

optimization, and superior multimedia streaming quality within wireless

networks. This study encompasses the innovative Cluster formation technique by

utilizing Weigh Utility-based Stratified Sampling (WUSS), facilitates efficient node

clustering, leading to optimized resource allocation and energy efficiency. The

integration of Hybrid Energy Efficient Distribution (HEED) with Whale

Optimization Algorithm (WOA) for Cluster Head Selection enhances energy

balance and network longevity. Data Security is fortified through the utilization of

the Improved BlowFish Algorithm (IBFA), safeguarding multimedia content during

transmission. The Bilateral Floyd – Warshall algorithm is harnessed for optimal

path selection, reducing latency and packet loss for high-quality multimedia

delivery. Multimedia streaming involves both sensitive and non-sensitive data,

prioritizing seamless streaming while upholding data security. To simulate the

suggested research method, Python – 3.11.4 is utilized. The proposed approach is

utilized using several performance metrics such as Delivery rate, Network

lifetime, Throughput, Delay, Packet loss and Packet Delivery Ratio.

Keywords: Wireless networks, Multimedia applications, Weigh Utility-based Stratified

Sampling (WUSS), Hybrid Energy Efficient Distribution (HEED) with Whale Optimization

Algorithm (WOA), Improved BlowFish Algorithm (IBFA), Bilateral Floyd – Warshall

algorithm

Page 2 of 24

Services for Science and Education – United Kingdom 128

European Journal of Applied Sciences (EJAS) Vol. 12, Issue 3, June-2024

INTRODUCTION

Recently developed compact hardware devices and major wireless medium technical

enhancements have increased Wireless Multimedia Sensor Networks (WMSNs) applications.

The nodes that make up wireless sensor networks (WMSNs) are often energy-constrained

battery-operated devices that are deployed in hostile environments. They are able to identify

the area of interest for the purpose of data collection. Before being transmitted to their final

destination, sensory data may occasionally be subjected to analysis and processing [4].

Transmission of data is accomplished through the use of the routing protocol that is applied

over the network. A percentage of the energy that is stored in each node is utilized for the

purpose of self-configuration and network maintenance. Choosing a route path that requires

minimal power for path construction and data transmission is one of the most crucial

challenges in any routing protocol. Because of the nature of wireless networks, the quality of

the data that is going to be carried over these channels is significantly affected. As a result, the

transmission of multimedia data results in the appearance of low-quality video, blurry still

photos, and noise in audio recordings. In a network environment that is both self-structured

and constantly evolving, there is a risk that continuous route alterations will result in linkages

of low quality. In the realm of multimedia communications, the substandard quality of the

connections results in significant packet loss [8]. The use of link quality analysis is necessary

for the computation of consistent route selection metrics, and the link metrics that are given

by the various routing protocols are included in [9-11]. Unreliability of the link results in a

number of negative impacts when it comes to the routing of network packets between the

sender and the recipient [12]. Within the context of a wireless sensor network, the mobility of

nodes and sinks, in addition to the restricting energy of nodes, has a significant influence on

the routing process [13].

It is common practice for several sophisticated routing protocols to include wireless radio link

characteristics as a link cost evaluation measure for the purpose of ensuring network

stability. By computing the cost function, which defines whether a connection is of poor

quality or of high quality, firm routes are chosen throughout the selection process. Extending

the throughput and longevity of the network is unquestionably accomplished through the

utilization of LQE as a means for picking the right route [14-15]. Due to the informal nature of

the network environment, wireless sensor networks (WSN) are highly vulnerable to security

assaults, and nodes might turn malevolent. In order to guarantee that the process of data

forwarding goes off without a hitch, it is essential to differentiate the compromised node from

the other nodes. In order to identify trustworthy members, several routing protocols of

wireless sensor networks (WSNs) included trust management mechanisms. The participation

of a node in the route is contingent upon whether or not it is proven to be a trusted node; if it

is not, then the node will not be permitted to use the route. Trust may typically be determined

based on the conduct of nodes, the properties of links, the beliefs of neighbouring nodes, the

transmission rate, and the energy of the transmission [16-19].

Research Objectives

The objectives of this research are listed as follows.

1. To form clusters and select cluster heads to optimize data distribution, network

resource allocation, and reduce energy consumption.

Page 3 of 24

129

Diarra, S., & Islam, M. S. (2024). Energy and Trust-Aware Routing in Wireless Networks for Multimedia Applications. European Journal of Applied

Sciences, Vol - 12(3). 127-150.

URL: http://dx.doi.org/10.14738/aivp.123.16994

2. To incorporate trust metrics and mechanisms into the routing framework to ensure

secure and reliable communication, mitigating potential security breaches.

3. To implement advanced encryption and decryption techniques to enhance the security

of multimedia data during transmission.

4. To develop routing strategies that optimize energy consumption during multimedia

data transmission, extending network lifetime and reducing energy-related costs.

5. To modify the routing framework to cater to the unique demands of multimedia

streaming.

Paper Organization

The remainder of this paper is organized as follows. Section II describes the problem

statement. Section III describes materials and methods; in this Section, we have described the

proposed research technique, including the protocol, algorithm, mathematical

representations, and pseudocode. Section IV presents the existing methodologies literature

survey. Section V compares the proposed method to existing methods to offer simulated

results. Section VI summarizes the proposed method.

PROBLEM DESCRIPTION

The problem addressed by the research lies in the complexity of efficiently transmitting

multimedia data within wireless networks. This encompasses challenges related to optimizing

energy consumption while maintaining the quality of multimedia content, ensuring data

security, establishing reliable routing paths and enhancing trustworthiness in the network.

1. Lack of Scalability: Existing works cannot handle large-scale network environments,

which are a complex task that requires careful consideration and potential

modifications to ensure it remains efficient and effective under increased network load

[28]. Hence scalability was a major issue.

2. Security Issue: In existing works, the protocols required the exchange of trust-related

information among nodes. Ensuring the security and privacy of this information is

essential to prevent malicious nodes from manipulating trust scores or disrupting the

routing process [29]. The existing works lack in security and hence data privacy is a

major concern.

3. Inefficient Congestion Control: Congestion control might affect communication

interference among neighboring nodes. Managing interference while controlling

congestion is crucial for overall network performance [30]. In existing works,

congestion control mechanism was not efficient that affected the performance of the

overall network.

4. More Energy Consumption: To balance energy usage while maintaining secure

communication and trust evaluations is a complex issue to tackle in the design of the

proposed protocol [26]. In existing works, energy consumption was higher during

transmission of multimedia data.

This study encompasses the innovative Cluster formation technique by utilizing Weigh Utility- based Stratified Sampling (WUSS), facilitates efficient node clustering, leading to optimized

resource allocation and energy efficiency. The integration of Hybrid Energy Efficient

Distribution (HEED) with Whale Optimization Algorithm (WOA) for Cluster Head Selection

enhances energy balance and network longevity. Data Security is fortified through the