2008 19th International Conference on Systems Engineering 2008
DOI: 10.1109/icseng.2008.49
|View full text |Cite
|
Sign up to set email alerts
|

Performance Study of Routing Protocols for Wireless Mesh Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
13
0
5

Year Published

2010
2010
2021
2021

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(18 citation statements)
references
References 12 publications
0
13
0
5
Order By: Relevance
“…proactive, stigmergic × simulation CONFIDANT [37] open PGP reputation punishment detection * reactive, DSR × simulation SEMTOR [25,38] individual, open self-signed individually trusted individually trusted * proactive, DSDV CN realistic motivation, design, and business models in [39,40,1,7,41,42,21]. In addition, scalability and performance aspects of routing protocols are handled in [43,44,45,46,47,48,9]. Trust and security related work is surveyed and discussed in [49,27,50,51,52], with solutions for particular routing functions in [53,34,54,31,37,55,56,57], and presentations of holistic security frameworks in [36,37,58,35,59].…”
Section: Background and Related Workmentioning
confidence: 99%
“…proactive, stigmergic × simulation CONFIDANT [37] open PGP reputation punishment detection * reactive, DSR × simulation SEMTOR [25,38] individual, open self-signed individually trusted individually trusted * proactive, DSDV CN realistic motivation, design, and business models in [39,40,1,7,41,42,21]. In addition, scalability and performance aspects of routing protocols are handled in [43,44,45,46,47,48,9]. Trust and security related work is surveyed and discussed in [49,27,50,51,52], with solutions for particular routing functions in [53,34,54,31,37,55,56,57], and presentations of holistic security frameworks in [36,37,58,35,59].…”
Section: Background and Related Workmentioning
confidence: 99%
“…Despite the availability of many routing protocols for multi-hop wireless networks, especially for mobile adhoc networks, the design of routing protocols for WMNs is still an active research area for several reasons [8].…”
Section: Routing Layermentioning
confidence: 99%
“…Among them are routing [14][15][16], security [17], and analyses of topologies, performance, mobility [18][19][20][21][22]. But research into community network management solutions and best practices still remains scarce.…”
Section: Related Workmentioning
confidence: 99%