Page 1 of 24
European Journal of Applied Sciences – Vol. 12, No. 3
Publication Date: June 25, 2024
DOI:10.14738/aivp.123.16994
Diarra, S., & Islam, M. S. (2024). Energy and Trust-Aware Routing in Wireless Networks for Multimedia Applications. European
Journal of Applied Sciences, Vol - 12(3). 127-150.
Services for Science and Education – United Kingdom
Energy and Trust-Aware Routing in Wireless Networks for
Multimedia Applications
Sidy Diarra
School of Science & Engineering, Atlantic International University (AIU),
Pioneer Plaza, 900 Fort Street Mall 905, Honolulu, HI 96813, USA
Mohammad Shahidul Islam
School of Science & Engineering, Atlantic International University (AIU),
Pioneer Plaza, 900 Fort Street Mall 905, Honolulu, HI 96813, USA
ABSTRACT
With rapid proliferation of wireless communication technologies and increasing
demand for multimedia applications, efficient routing in wireless networks has
become critical research area. Energy usage control and data exchange are key in
these networks. Due to sensor node resource constraints, wireless networks are
subject to security threats. So, energy-aware trust-based approaches are powerful
for identifying node behaviour and providing wireless network security. This
paper presents a novel approach that integrates energy and trust considerations
into the routing process to enhance the performance of multimedia applications in
wireless networks. This multifaceted approach aims to establish a comprehensive
framework that encompasses energy efficiency, trust, data security, path
optimization, and superior multimedia streaming quality within wireless
networks. This study encompasses the innovative Cluster formation technique by
utilizing Weigh Utility-based Stratified Sampling (WUSS), facilitates efficient node
clustering, leading to optimized resource allocation and energy efficiency. The
integration of Hybrid Energy Efficient Distribution (HEED) with Whale
Optimization Algorithm (WOA) for Cluster Head Selection enhances energy
balance and network longevity. Data Security is fortified through the utilization of
the Improved BlowFish Algorithm (IBFA), safeguarding multimedia content during
transmission. The Bilateral Floyd – Warshall algorithm is harnessed for optimal
path selection, reducing latency and packet loss for high-quality multimedia
delivery. Multimedia streaming involves both sensitive and non-sensitive data,
prioritizing seamless streaming while upholding data security. To simulate the
suggested research method, Python – 3.11.4 is utilized. The proposed approach is
utilized using several performance metrics such as Delivery rate, Network
lifetime, Throughput, Delay, Packet loss and Packet Delivery Ratio.
Keywords: Wireless networks, Multimedia applications, Weigh Utility-based Stratified
Sampling (WUSS), Hybrid Energy Efficient Distribution (HEED) with Whale Optimization
Algorithm (WOA), Improved BlowFish Algorithm (IBFA), Bilateral Floyd – Warshall
algorithm
Page 2 of 24
Services for Science and Education – United Kingdom 128
European Journal of Applied Sciences (EJAS) Vol. 12, Issue 3, June-2024
INTRODUCTION
Recently developed compact hardware devices and major wireless medium technical
enhancements have increased Wireless Multimedia Sensor Networks (WMSNs) applications.
The nodes that make up wireless sensor networks (WMSNs) are often energy-constrained
battery-operated devices that are deployed in hostile environments. They are able to identify
the area of interest for the purpose of data collection. Before being transmitted to their final
destination, sensory data may occasionally be subjected to analysis and processing [4].
Transmission of data is accomplished through the use of the routing protocol that is applied
over the network. A percentage of the energy that is stored in each node is utilized for the
purpose of self-configuration and network maintenance. Choosing a route path that requires
minimal power for path construction and data transmission is one of the most crucial
challenges in any routing protocol. Because of the nature of wireless networks, the quality of
the data that is going to be carried over these channels is significantly affected. As a result, the
transmission of multimedia data results in the appearance of low-quality video, blurry still
photos, and noise in audio recordings. In a network environment that is both self-structured
and constantly evolving, there is a risk that continuous route alterations will result in linkages
of low quality. In the realm of multimedia communications, the substandard quality of the
connections results in significant packet loss [8]. The use of link quality analysis is necessary
for the computation of consistent route selection metrics, and the link metrics that are given
by the various routing protocols are included in [9-11]. Unreliability of the link results in a
number of negative impacts when it comes to the routing of network packets between the
sender and the recipient [12]. Within the context of a wireless sensor network, the mobility of
nodes and sinks, in addition to the restricting energy of nodes, has a significant influence on
the routing process [13].
It is common practice for several sophisticated routing protocols to include wireless radio link
characteristics as a link cost evaluation measure for the purpose of ensuring network
stability. By computing the cost function, which defines whether a connection is of poor
quality or of high quality, firm routes are chosen throughout the selection process. Extending
the throughput and longevity of the network is unquestionably accomplished through the
utilization of LQE as a means for picking the right route [14-15]. Due to the informal nature of
the network environment, wireless sensor networks (WSN) are highly vulnerable to security
assaults, and nodes might turn malevolent. In order to guarantee that the process of data
forwarding goes off without a hitch, it is essential to differentiate the compromised node from
the other nodes. In order to identify trustworthy members, several routing protocols of
wireless sensor networks (WSNs) included trust management mechanisms. The participation
of a node in the route is contingent upon whether or not it is proven to be a trusted node; if it
is not, then the node will not be permitted to use the route. Trust may typically be determined
based on the conduct of nodes, the properties of links, the beliefs of neighbouring nodes, the
transmission rate, and the energy of the transmission [16-19].
Research Objectives
The objectives of this research are listed as follows.
1. To form clusters and select cluster heads to optimize data distribution, network
resource allocation, and reduce energy consumption.
Page 3 of 24
129
Diarra, S., & Islam, M. S. (2024). Energy and Trust-Aware Routing in Wireless Networks for Multimedia Applications. European Journal of Applied
Sciences, Vol - 12(3). 127-150.
URL: http://dx.doi.org/10.14738/aivp.123.16994
2. To incorporate trust metrics and mechanisms into the routing framework to ensure
secure and reliable communication, mitigating potential security breaches.
3. To implement advanced encryption and decryption techniques to enhance the security
of multimedia data during transmission.
4. To develop routing strategies that optimize energy consumption during multimedia
data transmission, extending network lifetime and reducing energy-related costs.
5. To modify the routing framework to cater to the unique demands of multimedia
streaming.
Paper Organization
The remainder of this paper is organized as follows. Section II describes the problem
statement. Section III describes materials and methods; in this Section, we have described the
proposed research technique, including the protocol, algorithm, mathematical
representations, and pseudocode. Section IV presents the existing methodologies literature
survey. Section V compares the proposed method to existing methods to offer simulated
results. Section VI summarizes the proposed method.
PROBLEM DESCRIPTION
The problem addressed by the research lies in the complexity of efficiently transmitting
multimedia data within wireless networks. This encompasses challenges related to optimizing
energy consumption while maintaining the quality of multimedia content, ensuring data
security, establishing reliable routing paths and enhancing trustworthiness in the network.
1. Lack of Scalability: Existing works cannot handle large-scale network environments,
which are a complex task that requires careful consideration and potential
modifications to ensure it remains efficient and effective under increased network load
[28]. Hence scalability was a major issue.
2. Security Issue: In existing works, the protocols required the exchange of trust-related
information among nodes. Ensuring the security and privacy of this information is
essential to prevent malicious nodes from manipulating trust scores or disrupting the
routing process [29]. The existing works lack in security and hence data privacy is a
major concern.
3. Inefficient Congestion Control: Congestion control might affect communication
interference among neighboring nodes. Managing interference while controlling
congestion is crucial for overall network performance [30]. In existing works,
congestion control mechanism was not efficient that affected the performance of the
overall network.
4. More Energy Consumption: To balance energy usage while maintaining secure
communication and trust evaluations is a complex issue to tackle in the design of the
proposed protocol [26]. In existing works, energy consumption was higher during
transmission of multimedia data.
This study encompasses the innovative Cluster formation technique by utilizing Weigh Utility- based Stratified Sampling (WUSS), facilitates efficient node clustering, leading to optimized
resource allocation and energy efficiency. The integration of Hybrid Energy Efficient
Distribution (HEED) with Whale Optimization Algorithm (WOA) for Cluster Head Selection
enhances energy balance and network longevity. Data Security is fortified through the