NOMS 2008 - 2008 IEEE Network Operations and Management Symposium 2008
DOI: 10.1109/noms.2008.4575238
|View full text |Cite
|
Sign up to set email alerts
|

MANETs routing protocols evaluation in a scenario with high mobility MANET routing protocols performance and behavior

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 2 publications
0
5
0
Order By: Relevance
“…It is defined as the "failure of one or more transmitted packets to arrive at their destination" that is derived in Equation (6).…”
Section: Packet Loss Ratiomentioning
confidence: 99%
See 2 more Smart Citations
“…It is defined as the "failure of one or more transmitted packets to arrive at their destination" that is derived in Equation (6).…”
Section: Packet Loss Ratiomentioning
confidence: 99%
“…Proactive routing protocols switch their control information among nodes in a usual way that maintains updated routes for every node in the network. 6 Here, these protocols preserve information on entire routes throughout the network, even if they are not necessary, where every node records route to all other nodes in the network. While there is an urgent demand for routing, one of the nodes in the network desires to forward a packet (and there is no working route to the destination), and on-demand or reactive routing protocols update routing information.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Major vulnerabilities that have been so far researched are mostly these types which include selfishness, dynamic nature, and severe resource restriction, and also open network medium. A number of researches are done on security challenges and solutions in mobile ad hoc network: Schmidt and Trentin (2008) proposes that an effective MANET routing protocol must be equipped to deal with the dynamic and unpredictable topology changes associated with mobile nodes, whilst also being aware of the limited wireless bandwidth and device power considerations which may lead to reductions in transmission range or throughput. In the trade-model, each and every device has a tamper-resistant security module, public key infrastructure (PKI) to guarantee its validation, so it is used for account management.…”
Section: Related Workmentioning
confidence: 99%
“…The significant objective of routing protocol for dynamic networks isn't just to forward data from a source to a destination, yet additionally to improve the lifetime of the network. This can be accomplished by utilizing energyeffective routing protocols (de Oliveira Schmidt and Trentin, 2008;Lavanya et al, 2017). Contingent upon the applications utilized, various structures and plans have been applied in dynamic networks.…”
Section: Introductionmentioning
confidence: 99%