2017
DOI: 10.1007/s11277-017-4453-3
|View full text |Cite
|
Sign up to set email alerts
|

Quality of Service Enhancement of Mobile Adhoc Networks Using Priority Aware Mechanism in AODV Protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 13 publications
0
4
0
Order By: Relevance
“…A secure and temperature-aware routing protocol for WBSN, presented in [7], integrates the security primitive with thermal-aware routing to avoid hotspot nodes in the selected routes. Similarly, a priority-aware, distance vector routing protocol [15] uses hop-count with the transmission rate as a route selection metric. Most of the routing protocols consider the intra-BAN communication to broadcast data to the sink node by using single-hop and multi-hop communication in a star or mesh topology.…”
Section: Related Workmentioning
confidence: 99%
“…A secure and temperature-aware routing protocol for WBSN, presented in [7], integrates the security primitive with thermal-aware routing to avoid hotspot nodes in the selected routes. Similarly, a priority-aware, distance vector routing protocol [15] uses hop-count with the transmission rate as a route selection metric. Most of the routing protocols consider the intra-BAN communication to broadcast data to the sink node by using single-hop and multi-hop communication in a star or mesh topology.…”
Section: Related Workmentioning
confidence: 99%
“…The network layer based priority algorithms are presented in [11], [18], which distinguished the various traffic according to the type of the sensor nodes. Similarly, the Priority-Aware AODV (PA-AODV) protocol is presented in [19] and a Data Privacy based Pearson Correlation Coefficient (DP-PCC) is presented in [20]. Both of these schemes assign priorities according to the data rates.…”
Section: Related Workmentioning
confidence: 99%
“…The routing approach is categorized based on three types, that is, proactive routing protocols, reactive routing (on-demand) protocols, and hybrid routing protocols. [14][15][16] DSDV was a proactive protocol, in which the nodes in this protocol follows the table-based pre-established routes. 17,18 For route construction and maintenance, the overhead caused will possibly worsen the performance, reduce the scalability, and a lot of memory will be consumed by the routing table when the size of the network grows.…”
Section: Introductionmentioning
confidence: 99%
“…Routing protocols that are based on topology rely on the network's current topology, which is called table‐based routing. The routing approach is categorized based on three types, that is, proactive routing protocols, reactive routing (on‐demand) protocols, and hybrid routing protocols 14–16 . DSDV was a proactive protocol, in which the nodes in this protocol follows the table‐based pre‐established routes 17,18 .…”
Section: Introductionmentioning
confidence: 99%