ABSTRACT

Wireless networks have proven to be the foremost, affordable, and reliable technology effectively used in real-time indoor and outdoor applications. Energy efficiency, reliability, and security are the primary factors considered in the design of green communications. The emerging technology of machine-to-machine communication [1] across various intelligent devices shares information and performs cooperative tasks without any human interaction. Green wireless networking [2] for WPAN, WLAN, or WMAN is based on network reconfiguration and redeployment. This improves the energy efficiency and increases the network life cycle. Recent trends in wireless networks are attributed with accuracy, quality of service, and interoperability across various functional devices like base station (BS), source nodes, mobile nodes, data gathering nodes, cluster head nodes, and the sink nodes. Due to the constraints in energy and memory resources, the energy-efficient protocols are the primary concern in the design of wireless networks. Wireless networks operate in hostile environments that are vulnerable to security threats. Hence, the security protocols based on energy-efficient methodologies are used in wireless networks. Energy and security management

6.1 Introduction .......................................................................................................................... 119 6.2 Issues and Challenges ........................................................................................................... 120 6.3 Architecture of GNS for Wireless Networks ........................................................................ 121 6.4 Green Network Metrics ........................................................................................................ 122

6.4.1 Energy Metrics ......................................................................................................... 122 6.4.2 Security Metrics........................................................................................................ 122

6.5 GNS Components for Wireless Networks ............................................................................ 123 6.5.1 Components of GNS for Ad Hoc Networks ............................................................. 123

6.5.1.1 Energy-Efficient Localization ....................................................................124 6.5.1.2 Energy-Efficient Secure Routing ............................................................... 125 6.5.1.3 Energy-Efficient Secure Key Management ................................................ 126

6.5.2 Components of GNS for Sensor Networks ............................................................... 127 6.5.2.1 Energy-Efficient Secure Localization ........................................................ 127 6.5.2.2 Energy-Efficient Secure Routing ............................................................... 128 6.5.2.3 Energy-Efficient Secure Data Aggregation ............................................... 129 6.5.2.4 Energy-Efficient Secure Key Management ................................................ 130

6.6 Design of GNS for Sensor Networks .................................................................................... 132 6.6.1 Simulation Results .................................................................................................... 135

6.7 Conclusions and Future Directions ....................................................................................... 136 Author Biography .......................................................................................................................... 136 Abbreviations ................................................................................................................................. 137 References ...................................................................................................................................... 138

protocols [3] are primarily used in localization and routing to establish a secure communication channel in wireless networks. The security protocols are attributed with authenticity, integrity, and confidentiality [4,5] between the nodes in the network. Secure-path routing (SPR) [6] aims to design the network topology with minimum route cost and decrease the rate of compromised nodes in the network. The routing cost is a function of latency, packet transmission rate, and number of hops between the source node and the sink node.