Performance Analysis of Trust Aware Routing in Wireless Networks for Multimedia Applications
Implementation Plan:
——————————–
Step- 1: Initially we create efficient and balanced clusters in wireless networks.
Step- 2: Next, Perform the Cluster Formation and Cluster Head Selection process, In this process we efficiently create clusters using Weigh Utility-based Stratified Sampling (WUSS). Next cluster head selection process in this process we used Whale Optimization method (WOA) will be linked with the Hybrid Energy Efficient Distribution (HEED) method.
Step- 3: Next, perform Data Security, In this process we enhance data security through the utilization of an Improved BlowFish Algorithm (IBFA). Building on the foundation of the BlowFish encryption method.
Step- 4: Next, we select the Optimal Path Selection, In this process we use the Bilateral Floyd-Warshall algorithm.
Step- 5: Next, Perform the Multimedia Streaming process. In this process we Identify and prioritize sensitive data packets that require special handling or encryption. This process helps maintain the integrity of both sensitive and non-sensitive content while delivering a reliable and high-quality Multimedia stream to the end user.
[ The process based on your proposal, Energy and trust-aware routing in wireless networks for multimedia applications ]
Step- 6: The proposed approach is validated using several performance metrics such as,
6.1: Delivery rate
6.2: Network lifetime
6.3: Throughput
6.4: Delay
6.5: Packet loss
6.6: Packet Delivery Ratio
===============================================================================================
Software Requirement:
———————————
1. Tool: Python 3.11.3 or and above
2. Operating System: Windows 10(64bit)
===============================================================================================
Note:-
———–
We perform the existing process based on the Reference 1 Title:- A secure trust-based protocol for hierarchical routing in wireless sensor network.
| Technology | Ph.D | MS | M.Tech |
|---|---|---|---|
| NS2 | 75 | 117 | 95 |
| NS3 | 98 | 119 | 206 |
| OMNET++ | 103 | 95 | 87 |
| OPNET | 36 | 64 | 89 |
| QULANET | 30 | 76 | 60 |
| MININET | 71 | 62 | 74 |
| MATLAB | 96 | 185 | 180 |
| LTESIM | 38 | 32 | 16 |
| COOJA SIMULATOR | 35 | 67 | 28 |
| CONTIKI OS | 42 | 36 | 29 |
| GNS3 | 35 | 89 | 14 |
| NETSIM | 35 | 11 | 21 |
| EVE-NG | 4 | 8 | 9 |
| TRANS | 9 | 5 | 4 |
| PEERSIM | 8 | 8 | 12 |
| GLOMOSIM | 6 | 10 | 6 |
| RTOOL | 13 | 15 | 8 |
| KATHARA SHADOW | 9 | 8 | 9 |
| VNX and VNUML | 8 | 7 | 8 |
| WISTAR | 9 | 9 | 8 |
| CNET | 6 | 8 | 4 |
| ESCAPE | 8 | 7 | 9 |
| NETMIRAGE | 7 | 11 | 7 |
| BOSON NETSIM | 6 | 8 | 9 |
| VIRL | 9 | 9 | 8 |
| CISCO PACKET TRACER | 7 | 7 | 10 |
| SWAN | 9 | 19 | 5 |
| JAVASIM | 40 | 68 | 69 |
| SSFNET | 7 | 9 | 8 |
| TOSSIM | 5 | 7 | 4 |
| PSIM | 7 | 8 | 6 |
| PETRI NET | 4 | 6 | 4 |
| ONESIM | 5 | 10 | 5 |
| OPTISYSTEM | 32 | 64 | 24 |
| DIVERT | 4 | 9 | 8 |
| TINY OS | 19 | 27 | 17 |
| TRANS | 7 | 8 | 6 |
| OPENPANA | 8 | 9 | 9 |
| SECURE CRT | 7 | 8 | 7 |
| EXTENDSIM | 6 | 7 | 5 |
| CONSELF | 7 | 19 | 6 |
| ARENA | 5 | 12 | 9 |
| VENSIM | 8 | 10 | 7 |
| MARIONNET | 5 | 7 | 9 |
| NETKIT | 6 | 8 | 7 |
| GEOIP | 9 | 17 | 8 |
| REAL | 7 | 5 | 5 |
| NEST | 5 | 10 | 9 |
| PTOLEMY | 7 | 8 | 4 |