2011 Third International Conference on Advanced Computing 2011
DOI: 10.1109/icoac.2011.6165188
|View full text |Cite
|
Sign up to set email alerts
|

A novel cross layered energy based ad hoc on-demand routing protocol for MANETs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2013
2013
2017
2017

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…Ionut D. Aron et al [8] proposed a localized route repair (LRR) technique, which repairs a route on the fly as soon as it is broken and eliminates the need for network-wide flooding. LRR technique resulted in an enormous reduction in overhead when simulated on an event driven packet level simulator and results in nearly 30 percent overhead savings.…”
Section: Related Studymentioning
confidence: 99%
“…Ionut D. Aron et al [8] proposed a localized route repair (LRR) technique, which repairs a route on the fly as soon as it is broken and eliminates the need for network-wide flooding. LRR technique resulted in an enormous reduction in overhead when simulated on an event driven packet level simulator and results in nearly 30 percent overhead savings.…”
Section: Related Studymentioning
confidence: 99%
“…The additional overheads (calculation of trust and energy) will further drain the power resources of mobile nodes which are anyway likely to be running on limited battery power. Avoid nodes which have low energy [15]. If nodes which are highly trusted run out of energy then it is waste of putting in the overhead of calculating trust and then considering the node for routing.…”
Section: Introductionmentioning
confidence: 99%
“…Some of the consideration must also made towards a dynamic energy conscious routing algorithm ACER where cross layer interaction is provided to utilize the energy related information from physical and MAC layers [8]. MAC protocols can be broadly classified as contention-based and contention-free schemes.…”
Section: International Journal Of Computer Applications (0975 -8887) mentioning
confidence: 99%