2012
DOI: 10.1007/978-81-322-0970-6_32
|View full text |Cite
|
Sign up to set email alerts
|

Improvising the Ad hoc on Demand Distance Vector Routing Protocol When Nodes or Links Fails

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(8 citation statements)
references
References 2 publications
0
8
0
Order By: Relevance
“…Each routing protocol has a security issue associated to it. So, whether its routing or unencrypted message each layer of the TCP/IP model requires the security at its best [4]. The classification of attacks in MANET is as follows: -2.1.1.…”
Section: Attacks In Manetmentioning
confidence: 99%
“…Each routing protocol has a security issue associated to it. So, whether its routing or unencrypted message each layer of the TCP/IP model requires the security at its best [4]. The classification of attacks in MANET is as follows: -2.1.1.…”
Section: Attacks In Manetmentioning
confidence: 99%
“…They generally divided into three categories: it will describe the comparison of these three protocols. These comparisons were based on parameters like number of input, time analysis, rate of sending data for packet delivery ratio (PDR), end to end delay and load [4]. n proactive routing each node maintains a table containing routing related information.…”
Section: Routing Protocolsmentioning
confidence: 99%
“…proactive routing protocol includes destination sequence distance vector (DSDV) routing protocol as well as many other routing protocol like optimized link state routing protocol (OLSR), wireless routing protocol (WRP). Here the advantage of proactive protocols updates its routing table data irrespective of data traffic [4].…”
Section: Routing Protocolsmentioning
confidence: 99%
See 2 more Smart Citations