2019
DOI: 10.1007/978-981-32-9585-8_20
|View full text |Cite
|
Sign up to set email alerts
|

Performance Analysis of Ad Hoc on-Demand Distance Vector Routing Protocol for Mobile Ad Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 12 publications
0
6
0
Order By: Relevance
“…The AODV routing protocol avoids the routing loop issue in ad-hoc networks ( Yan & Chung, 2020 ; Abbas et al, 2020 ). Because of their self-starting behavior, they do not require any stimulation and operate in an environment with several mobile nodes capable of withstanding various networking etiquette such as packet loss, link failure, and nodal mobility ( Taterh, Meena & Paliwal, 2020 ).…”
Section: Conceptual Designmentioning
confidence: 99%
“…The AODV routing protocol avoids the routing loop issue in ad-hoc networks ( Yan & Chung, 2020 ; Abbas et al, 2020 ). Because of their self-starting behavior, they do not require any stimulation and operate in an environment with several mobile nodes capable of withstanding various networking etiquette such as packet loss, link failure, and nodal mobility ( Taterh, Meena & Paliwal, 2020 ).…”
Section: Conceptual Designmentioning
confidence: 99%
“…The quality of channels in wireless sensor networks may be enhanced by encrypting the data using various keys. As described in [33][34][35][36][37], several authors suggested securing ad hoc on-demand distance vector, a secure routing protocol based on initial encryption that can withstand certain routing assaults while ensuring the integrity and acknowledgment of identification.…”
Section: Related Workmentioning
confidence: 99%
“…As described in [32][33][34][35][36], several authors suggested securing ad hoc on-demand distance vector, a secure routing protocol based on initial encryption that can withstand certain routing assaults while ensuring the integrity and acknowledgement of identification. Other authors introduced an energy-aware secure routing architecture that preserves a trusted environment, isolates misbehaving nodes, and has a minimal control cost.…”
Section: B Related Workmentioning
confidence: 99%