E-Tech 2004
DOI: 10.1109/etech.2004.1353851
|View full text |Cite
|
Sign up to set email alerts
|

An efficient routing protocol for mobile ad hoc networks with neighbor awareness and multicasting

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
18
0

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(18 citation statements)
references
References 10 publications
0
18
0
Order By: Relevance
“…These security threats along with various security schemes are reflected in various research papers [10][11] [12]. It should be noted that the security schemes and protocols used for adhoc wireless network can't applied directly to the WSN, because of the architectural complexity of the sensor nodes [13]. One of the most challenging security threats in WSN is the Denial of Service (DoS).…”
Section: Security Threats and Its Related Issuesmentioning
confidence: 99%
“…These security threats along with various security schemes are reflected in various research papers [10][11] [12]. It should be noted that the security schemes and protocols used for adhoc wireless network can't applied directly to the WSN, because of the architectural complexity of the sensor nodes [13]. One of the most challenging security threats in WSN is the Denial of Service (DoS).…”
Section: Security Threats and Its Related Issuesmentioning
confidence: 99%
“…Wireless ad hoc networks, on the other hand are selforganizing, dynamic topology networks formed by a collection of mobile nodes through radio links [8]. Minimal configuration, absence of infrastructure and quick deployment make them convenient for emergency situations.…”
Section: A Wireless Sensor and Ad Hoc Networkmentioning
confidence: 99%
“…Multicast routing protocols in MANETs can be classified into tree-based routing [2,8,11,12,[17][18][19]21,24] and mesh-based routing [4,14,30]. Tree-based routing protocols build a tree structure that connects all multicast members and provide one path between a pair of source node and destination node.…”
mentioning
confidence: 99%
“…Tree-based routing protocols build a tree structure that connects all multicast members and provide one path between a pair of source node and destination node. Examples of treebased routing protocols include the robust multicasting using an underlying link state [11], the multicast ad hoc on demand distance vector routing protocol (MAODV) [24], the reliability of the multicast ad hoc on-demand distance vector routing protocol (RMAODV) [2], the robust tree-based multicasting in ad hoc networks (RO-MANT) [29], the robust and cost-efficient group communication using overlay multicast in mobile ad hoc networks (AOM) [12], supporting reliable multicast in mobile ad hoc networks [17], the dynamical construction of a core-based group-shared multicast tree in mobile ad hoc networks [18], and the efficient routing protocol for mobile ad hoc networks with neighbor awareness and multicasting (NAMP) [21]. Mesh-based protocols build a mesh structure that connects the mobile nodes between the source node and the destination node to each other.…”
mentioning
confidence: 99%
See 1 more Smart Citation