Ieee Infocom 2009 2009
DOI: 10.1109/infcom.2009.5062174
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient Filter-based Addressing Protocol for Autoconfiguration of Mobile Ad Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
16
0

Year Published

2011
2011
2014
2014

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(16 citation statements)
references
References 13 publications
0
16
0
Order By: Relevance
“…WPR neither considers network partitions [25,26] nor unauthorized backbone nodes [27]. Because backbone nodes are static, we assume that network partitions do not occur very often.…”
Section: Discussionmentioning
confidence: 99%
“…WPR neither considers network partitions [25,26] nor unauthorized backbone nodes [27]. Because backbone nodes are static, we assume that network partitions do not occur very often.…”
Section: Discussionmentioning
confidence: 99%
“…A route which contains maximum trusted route selection value is selected as secure route. The trusted route selection value is calculated by using multiple security metrics such as residual route load capacity, node trust level, route trust level and hop count to ensure high security in network [3].These parameters are describe as: a) Residual Route Load Capacity: To reduce packet loss and remove falsely sensed of a node as malicious by a neighbouring node that is monitoring the trust level. Mobile node should select a route towards secure gateway which has maximum available load capacity.The residual route load capacity of a route is the minimum available load capacity at any node, including the GW and all others intermediate MNs in that route.…”
Section: Proposed Workmentioning
confidence: 99%
“…978-1-4799-3914-5114/$31.00 ©2014 IEEE In this paper, we propose and analyze a protocol named AADP, a filter-based addressing protocol. The protocol is based on filter address protocol (F AP) by Natalia et al [10] , Fan and Subramani [7] which are in turn, based on Duplicate address detection (DAD) protocol [11] . In this protocol, we use the data structure proposed in F AP protocol which stores the addresses of the nodes in a compact and efficient way [10] .…”
Section: Introductionmentioning
confidence: 99%
“…In the subsequent sections, we will discuss this data structure called filter in detail. Using filter-based approach for the protocol makes the protocol robust to packet losses [10] . In addition, the protocol also maintains a network identifier which is used to uniquely identify the networks.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation