2022
DOI: 10.4018/ijkbo.299970
|View full text |Cite
|
Sign up to set email alerts
|

MANET Proactive and Reactive Routing Protocols

Abstract: A group of wireless nodes forms a configuration that is linked to a remote medium forming dynamic topology. A routing protocol enables packets to travel from the sender to the destination via intermediate nodes. When a device or intermediate node delivers information to other nodes in an Ad hoc network, the node consumes some energy, and data transmission may be interrupted as all of the power is consumed. MANET is often power-driven devices, the difficult component in MANET is to lower the power consumption o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…Parameter initialization Initialize alpha, beta, and delta positions while (I < I max ) Evaluate fitness function using Equation (5) for (i = 1 ∶ N) Update wolf's position using Equation (11) Update 𝜈 using Equation ( 10) Evaluate C and V by applying Equations ( 9) and ( 7) respectively Update V 𝛼 , V 𝛽 and V 𝛿 using Equation ( 13) end for for (i = 1 ∶ N∕2)…”
Section: Algorithm 1 Pseudo Code Of Cbgwo Algorithmmentioning
confidence: 99%
See 2 more Smart Citations
“…Parameter initialization Initialize alpha, beta, and delta positions while (I < I max ) Evaluate fitness function using Equation (5) for (i = 1 ∶ N) Update wolf's position using Equation (11) Update 𝜈 using Equation ( 10) Evaluate C and V by applying Equations ( 9) and ( 7) respectively Update V 𝛼 , V 𝛽 and V 𝛿 using Equation ( 13) end for for (i = 1 ∶ N∕2)…”
Section: Algorithm 1 Pseudo Code Of Cbgwo Algorithmmentioning
confidence: 99%
“…3,4 However, their unique characteristics, such as dynamic topologies and limited resources, pose significant challenges to ensuring robust communication and security. 5 In the background of MANETs, Intrusion Detection Systems (IDS) provides security in network integrity against malicious activities. Unlike traditional wired networks, MANETs lack a fixed perimeter defense due to their dynamic nature.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…As a consequence, the network's topology may change abruptly and without prior notice. To put this in context, MANET may alternatively be described as a group of mobile nodes attached to a distant source that later creates a dynamic topology [2]. In addition to being a router for data sent to and received from the other mobile nodes, each node in the network has the ability to act as a sender, receiver, or intermediary node.…”
Section: Introductionmentioning
confidence: 99%