2017
DOI: 10.1007/978-981-10-6916-1_21
|View full text |Cite
|
Sign up to set email alerts
|

Prevention of Conjunct Black Hole MANET on DSR Protocol by Cryptographic Method

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 1 publication
0
4
0
Order By: Relevance
“…AODV, DSR, TORA, and ABR are well-known reactive protocols. [41][42][43][44] Proactive protocols are considered as the table-driven routing protocols. Each node has a routing table, which stores data about the adjacent nodes or available paths.…”
Section: Routingmentioning
confidence: 99%
See 1 more Smart Citation
“…AODV, DSR, TORA, and ABR are well-known reactive protocols. [41][42][43][44] Proactive protocols are considered as the table-driven routing protocols. Each node has a routing table, which stores data about the adjacent nodes or available paths.…”
Section: Routingmentioning
confidence: 99%
“…Reactive protocols have higher performance than the proactive protocols in terms of throughput and routing overhead, but they have higher latency time in route discovery. AODV, DSR, TORA, and ABR are well‐known reactive protocols 41–44 …”
Section: Related Workmentioning
confidence: 99%
“…Despite the mentioned issues of nodes, MANETs are extensively used in some scenarios where the speed of network implementation is highly required without any pre-constructed structure in advance, for example, military communication, emergency communication and mobile conferencing [7][8][9]. In order to set up a network of mobile nodes, some famous routing protocols like Ad-hoc on-demand distance vector (AODV) [10], dynamic source routing (DSR) [11], etc. are designed for locating the trusted and optimal path between nodes.…”
Section: Introductionmentioning
confidence: 99%
“…Despite the fact that it has these issues, MANETs are generally utilized at times where the speed of system usage is profoundly required with no pre-built structure ahead of time, for example, military correspondence, crisis correspondence and portable conferencing [6,7]. Barely any well known steering conventions like Ad-hoc on-request separation vector (AODV) [8], dynamic source directing (DSR) [9], and so forth, were used to set up the system of portable hubs, for finding the trusted and ideal way between hubs. The thought of trust would affirm to be valuable for dynamic situations where the hubs required relying upon one another to achieve their objectives [10].…”
mentioning
confidence: 99%