Minimization of Power Consumption in Mobile Adhoc Networks

Full Text (PDF, 555KB), PP.38-44

Views: 0 Downloads: 0


B.Ruxanayasmin 1,* B.Ananda Krishna 1 T.Subhashini 1

1. Department of ECE, Gudlavalleru Engineering College, Gudlavalleru, Krishna Dt, AP, India

* Corresponding author.


Received: 11 Mar. 2013 / Revised: 1 May 2013 / Accepted: 8 Jul. 2013 / Published: 8 Jan. 2014

Index Terms

MANET, Power consumption, Security, Compression, Decompression


An ad hoc network is a mobile wireless network that has no fixed access point or centralized infrastructure. Each node in the network functions as a mobile router of data packets for other nodes and should maintain the network routes for long standing which is not possible due to limited battery source. Also, due to node mobility, link failures in such networks are very frequent and render certain standard protocols inefficient resulting in wastage of power and loss in throughput. The power consumption is an important issue with the goal to maintain the network lives for long by consuming less power. The power consumption can be achieved by modifying algorithms such as cryptographic algorithms,Routing algorithms, Multicast Algorithms, Energy Efficient Algorithms and Power Consumption Techniques in High Performance Computing, Compression and decompression algorithms, minimizing link failure algorithms, and by power control algorithms. In this work, we have proposed a new algorithm for minimization of power consumption in Ad hoc networks. The performance of the proposed model is analyzed and it is observed that, information could be sent with security consuminglesscomputational power, thereby increasing the battery life.

Cite This Paper

B.Ruxanayasmin, B.Ananda Krishna, T.Subhashini, "Minimization of Power Consumption in Mobile Adhoc Networks", International Journal of Computer Network and Information Security(IJCNIS), vol.6, no.2, pp.38-44, 2014. DOI:10.5815/ijcnis.2014.02.06


[1]Subirkumarsharkar, T.G.Basavaraju, C.Puttamadappa, “Ad hoc mobile wireless networks, Principles, protocols and applications”, Auerbach PublicationsBoston, MA, USA©2007.
[2]B.Ruxanayasmin, B.Ananda Krishna and T.Subhashini, “Implementation of Data Compression Techniques in Mobile Ad hoc Networks”, International Journal of Computer Applications, Volume 80, No. 08, Oct.2013.
[3]Ravindra .E, VinayaDatt V Kohir and V. D Mytri, “A Local Route Repair Algorithm Based On Link Failure Prediction In Mobile Ad Hoc Network”, World Journal of Science and Technology 2011.
[4]Mr.S.A.Jain and MsAruna.A, Kadam, “A Study of Congestion Control Mechanism Using Link Failure Detection in MANET”, International Journal of Engineering Research and Applications.
[5]DiaaSalama, HatemAbdual Kader, and MohiyHadhoud, “Studying the effects of Most Common Encryption Algorithms”, International Arab Journal of e-Technology, Vol. 2, No. 1, January 2011.
[6]Guoliang Xing,Chenyang Lu, Ying Zhang, Qingfeng Huang, Robert Pless, “Minimum Power Configuration in Wireless Sensor Networks”, Washington University in St. Louis Palo Alto Research Center (PARC).
[7]AbdellahIdrissi, “How to minimize the energy consumption in Mobile Ad hoc Networks”, International Journal of Artificial Intelligence & Applications (IJAIA), Vol.3, No.2, March 2012.
[8]P.Balakumar, Dr.M.Rajani, “Multicast Algorithm for Mobile Ad Hoc Network Increasing Power-Efficient”, International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 2, February 2012.
[9]B.Ruxanayasmin, Dr. B.Ananda Krishna, “Minimization of power consumption in MANETs”, International journal of engineering research and technology (IJERT), PP.31-35, 2013.
[10]Geraud Allard, Pascale Minet, Dang-Quan Nguyen, and NirishaShrestha, “Evaluation of the Energy Consumption in MANET”, Institute national de recherché en informatique et en automatique, N 5851, FEBRUARY 2006.
[11]Steven W. Smith, “The Scientist and Engineer’s Guide to Digital Signal Processing”, Chapter 27 – Data Compression.
[12]Ziv J. and Lempel A., "A Universal Algorithm for Sequential Data Compression", IEEE Transactions on Information Theory, May 1977.