2017 9th IEEE-GCC Conference and Exhibition (GCCCE) 2017
DOI: 10.1109/ieeegcc.2017.8448068
|View full text |Cite
|
Sign up to set email alerts
|

Performance Analysis of Popular MANET Protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2017
2017
2018
2018

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 30 publications
0
5
0
Order By: Relevance
“…After a thorough investigation of packet length-based covert channel countermeasures and techniques, it is noteworthy to mention that up to this point, there is no solution presented to counter such type of packet length covert channels. In addition, any propose security solution should take into account the performance of network systems [31,32]. In other words, any security solution has to attain a balance to keep a system performance intact [33].…”
Section: Resultsmentioning
confidence: 99%
“…After a thorough investigation of packet length-based covert channel countermeasures and techniques, it is noteworthy to mention that up to this point, there is no solution presented to counter such type of packet length covert channels. In addition, any propose security solution should take into account the performance of network systems [31,32]. In other words, any security solution has to attain a balance to keep a system performance intact [33].…”
Section: Resultsmentioning
confidence: 99%
“…In this type of protocols, routes are computed when required [10]. A reactive protocol floods a control message to discover a route.…”
Section: B Reactive Routing Protocolsmentioning
confidence: 99%
“…video, audio, etc.) [10]. In terms of security, malicious behavior cannot be detected rapidly [17] compared with proactive protocols.…”
Section: B Reactive Routing Protocolsmentioning
confidence: 99%
See 2 more Smart Citations