2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications 2012
DOI: 10.1109/trustcom.2012.89
|View full text |Cite
|
Sign up to set email alerts
|

Analysis and Modeling Experiment Performance Parameters of Routing Protocols in MANETs and VANETs

Abstract: In wireless ad-hoc networks, routing protocols are used to calculate efficient routes. These protocols are divided into two main categories with respect to their routing behavior; ondemand (reactive) and table driven (proactive). Reactive routing protocols calculate routes for destination in the network, when it is needed therefore these are known as on-demand routing protocols. Proactive protocols are based on periodic exchange of control messages and maintaining routing tables, that is why these are known as… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
3
3
3

Relationship

1
8

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 10 publications
(17 reference statements)
0
6
0
Order By: Relevance
“…The unique characteristics of VANETs, such as centerless infrastructure, high mobility, and frequent network topology changes, create challenging and critical technical issues such as routing reliability, routing QoS, and link failure in order to avoid attackers for a variety of reasons, such as faked location, man-in-the-middle tampering, and malicious information (Chuan, 2012;Eiza & Ni, 2012;Sagar et al, 2012).…”
Section: Networking Techniques: Routingmentioning
confidence: 99%
“…The unique characteristics of VANETs, such as centerless infrastructure, high mobility, and frequent network topology changes, create challenging and critical technical issues such as routing reliability, routing QoS, and link failure in order to avoid attackers for a variety of reasons, such as faked location, man-in-the-middle tampering, and malicious information (Chuan, 2012;Eiza & Ni, 2012;Sagar et al, 2012).…”
Section: Networking Techniques: Routingmentioning
confidence: 99%
“…Works devoted to the self-regulation of systems and ensuring their viability [9][10][11], among them there are some works aimed at modeling the behavior of complex systems. The works devoted to functioning and modeling the behavior of self-regulating systems, such as the MANET and VANET networks [12,13], which have a clearly defined target function, can be noted. Complex adaptive and self-regulating systems must be characterized by the coherence of their components and be resistant to destructive influences.…”
Section: Related Workmentioning
confidence: 99%
“…Unlike proactive routing protocols, reactive protocols do not generate sustained routing overhead. Reactive protocols usually take more time to find a route as compared to a proactive protocol [20]. Both these approaches have their pros and cons and no single routing protocol is able to work efficiently in all possible scenarios.…”
Section: Routing Protocolsmentioning
confidence: 99%