2001
DOI: 10.1023/a:1011426611520
|View full text |Cite
|
Sign up to set email alerts
|

Untitled

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0
2

Year Published

2005
2005
2022
2022

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 349 publications
(7 citation statements)
references
References 12 publications
0
5
0
2
Order By: Relevance
“…Setelah itu node asal mengirim paket Route Request (RREQ) ke semua node tetangga miliknya untuk mencari rute. Node tetangga yang juga disebut node intermediate akan melakukan cara yang sama lalu meneruskan paket RREQ ke node tetangganya juga sampai paket RREQ tiba di node tujuan [2]. Node tujuan yang menerima RREQ akan membalas dengan menggunakan paket Route Reply (RREP) melalui node intermediate hingga ke node asal.…”
Section: Pendahuluanunclassified
“…Setelah itu node asal mengirim paket Route Request (RREQ) ke semua node tetangga miliknya untuk mencari rute. Node tetangga yang juga disebut node intermediate akan melakukan cara yang sama lalu meneruskan paket RREQ ke node tetangganya juga sampai paket RREQ tiba di node tujuan [2]. Node tujuan yang menerima RREQ akan membalas dengan menggunakan paket Route Reply (RREP) melalui node intermediate hingga ke node asal.…”
Section: Pendahuluanunclassified
“…Some routing protocols achieve fault tolerance by providing multiple path [2429]. Multipath can improve communication reliability, realize load-balancing, and relieve congestion.…”
Section: Related Workmentioning
confidence: 99%
“…Based on this information, each node finds the locations of some affected regions caused by wormholes and stop forwarding packets which came from those regions to isolate the wormhole (Nasipuri et al, 2001;Pirzada and McDonald, 2004). The distribution wormhole detection algorithm can be further classified into two approaches, namely, non-routing neighboring monitoring based approach (Huang and Lee, 2003) where each node monitors the topology structure of its neighbors (Wang et al, 2010;Maheshwari et al, 2007), or the inputs and outputs data flows (Khalil et al, 2005;2008) and routing receiver monitoring based approach where a data packet is monitored by the nodes in its routine.…”
Section: Jcsmentioning
confidence: 99%