2013 International Conference on Information Communication and Embedded Systems (ICICES) 2013
DOI: 10.1109/icices.2013.6508359
|View full text |Cite
|
Sign up to set email alerts
|

Secure implementation of routing protocols for wireless Ad hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2014
2014
2014
2014

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…We have done this by using the utility. /stdest located in /root/mz/indep-utils/cmu-scengen/setdest [13], [14] in the following manner. As mobility is measured in terms of pause time, so we have generated models by varying the pause time as shown below in Fig.…”
Section: B Mobility Modelsmentioning
confidence: 99%
See 1 more Smart Citation
“…We have done this by using the utility. /stdest located in /root/mz/indep-utils/cmu-scengen/setdest [13], [14] in the following manner. As mobility is measured in terms of pause time, so we have generated models by varying the pause time as shown below in Fig.…”
Section: B Mobility Modelsmentioning
confidence: 99%
“…For running simulation in NS2, the first step is to generate the traffic model for our adhoc network [13], [14], and we have generated several models by using the available utility in /root/mz/ns/indep-utils/cmu-scen-gen/ folder namely cbrgen.tcl as shown in Fig. 3.…”
Section: A Traffic Model/connection Patternmentioning
confidence: 99%