2006
DOI: 10.1109/tmc.2006.83
|View full text |Cite
|
Sign up to set email alerts
|

Performance comparison of trust-based reactive routing protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
62
0
3

Year Published

2010
2010
2019
2019

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 135 publications
(71 citation statements)
references
References 21 publications
0
62
0
3
Order By: Relevance
“…Pirzada et al [3] evaluated the execution of three trust based receptive routing protocols (DSR, trusted AODV, and TORA) by differing the amount of malicious hubs and other experimental settings. The results demonstrate that each trust-based routing protocol has its own particular preference.…”
Section: Routing Protocols-the Trustedmentioning
confidence: 99%
“…Pirzada et al [3] evaluated the execution of three trust based receptive routing protocols (DSR, trusted AODV, and TORA) by differing the amount of malicious hubs and other experimental settings. The results demonstrate that each trust-based routing protocol has its own particular preference.…”
Section: Routing Protocols-the Trustedmentioning
confidence: 99%
“…This category of protocols belongs to reactive protocols (e.g.,) AODV and Temporally Ordered Routing Algorithm (TORA). In real world scenarios, reactive protocols proved better performance in MANET (Pirzada et al, 2006), in which we have chosen standard AODV routing protocol (Perkins et al, 2003) inspired by RFC 3561, for this performance assessment. Although there are many papers available that examines the performance of AODV using various simulators like NS-2, here the experiments are carried out related to real time scenario and considered all possible parameters that figure out AODV.…”
Section: Introductionmentioning
confidence: 99%
“…Another attack easy to implement is packet modification. In [9] an approach that the human society follows proposed to defend against the majority of routing attacks. Although the design of mechanisms to enhance security at all layers of the networking protocol stack has attracted the interest of the research community (e.g.…”
Section: Introductionmentioning
confidence: 99%