2020
DOI: 10.1109/access.2020.2970279
|View full text |Cite
|
Sign up to set email alerts
|

Abstract: The rapid advances in the wireless communication industry have paved the way for the enhancement of wireless mobile ad-hoc networks (MANETs) to support various domains including civilian environments, emergency operations, and military affairs. Source routing in MANETs is subject to some issues such as changes in the network topology, which lead to frequent link breakages that may increase the requests of route discoveries. Thus, this paper aims to enhance on-demand source routing protocols by proposing two me… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
21
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 56 publications
(21 citation statements)
references
References 42 publications
(33 reference statements)
0
21
0
Order By: Relevance
“…This route organization and route reorganization based routing protocol is the imperfect packet broadcasting among the nodes in the transmitting environment [9] [42]. Because the attacker node suddenly switches over its functioning by decreasing the packet delivery ratio.…”
Section: Swift Implicit Response Round Trip Time (Sirt) Mechanismmentioning
confidence: 99%
See 3 more Smart Citations
“…This route organization and route reorganization based routing protocol is the imperfect packet broadcasting among the nodes in the transmitting environment [9] [42]. Because the attacker node suddenly switches over its functioning by decreasing the packet delivery ratio.…”
Section: Swift Implicit Response Round Trip Time (Sirt) Mechanismmentioning
confidence: 99%
“…In this era, some nodes get removed from the routing path based on packet transmission speed and routing speed-accuracy rate, and the quality of service paths provides help to any failure node. The destination node contains complete details to start a pattern recognized to the link with low packet latency without the malicious nodes [9] [20] [41]. The target node organizes this information through dual procedure packet sharing with the remaining nodes through the routing path intermediate nodes.…”
Section: Use Best Approximationmentioning
confidence: 99%
See 2 more Smart Citations
“…An effective way is to insert this information into the header of the RREQ packet. This technique has been proposed in many recent studies [15][16][17][18][19][20], which has the advantage of not significantly increasing the packet size and affecting the overall performance of the entire network. We extend the RREQ packet, as shown in Figure 3.…”
Section: Modified the Rreq Packet Structurementioning
confidence: 99%