

Routing - An Ultimate Optimization in Mobile Adhoc Network
Abstract
Keywords
References
A.E.Gamal, J Mammen, B.Prabhakar, D. Shah, Throughput-delay trade-off in wireless networks, in: Proceedings of IEEE (INFOCOM'04). IEEE, March 2004.)
Multipath Routing in Mobile Ad Hoc Networks:Issues and Challenges Stephen Mueller , Rose P. Tsang , and Dipak Ghosal
NEW SECURITY ALGORITHM FOR MOBILE ADHOC NETWORKS USING ZONAL ROUTING PROTOCOL by G.Varaprasad S. Dhanalakshmi M. Rajaram
MANET Security Issues Nishu Garg R.P.Mahapatra
Hedrick, C.: Routing Information Protocol. Internet Request For Comments 1058 (1988)
B. Karp and H. Kung, “Greedy Perimeter Stateless Routing for Wireless Networks”, In Proceedings of International Conference on Mobile Computing and Networking, pp. 243-254(2003).
[7] D. Johnson and D. Maltz, „„Dynamic source routing in ad hoc wireless networks,‟‟ in Mobile Computing, T. Imielinski and H. Korth, Eds., pp.153--181. Kluwer Academic Publishers, Norwell, Mass., 1996.)
[8] Perkins, C.E., Royer, E.M.: Ad-hoc On-Demand Distance Vector Routing. Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications (1999)
Johnson, D.B., Maltz, D.A.: Dynamic Source Routing in Ad Hoc Wireless Networks. Mobile Computing. (1996) 153-181
Stephen Mueller , Rose P. Tsang , and Dipak Ghosal Department of Computer Science, University of California, Davis, CA 95616 Sandia National Laboratories, Livermore, CA 94551
Reliable Ad-hoc On-demand Distance Vector Routing Protocol - Sandhya Khurana, Neelima Gupta, Nagender Aneja Proceedings of the International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies 2006
[12] Yih-Chun Hu, David B. Johnson, and Adrian Perrig, “SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad hoc Networks”,Proceedings of the 4th IEEE Workshop on Mobile Computing Systems & Applications (WMCSA 2002), IEEE, Calicoon, NY
Seung Yi, Prasad Naldurg, Robin Kravets, “A Security-Aware Routing Protocol for Wireless Ad Hoc Networks”, Proceedings of 6th World Multi-Conference on Systemics, Cybernetics and Informatics (SCI), Orlando, FL, July 2002, pp.286-292.
Pietro Michiardi and Refik Molva, “CORE: A Collaborative Reputation Mechanism to enforce node cooperation in Mobile Ad hoc Networks”,Sixth IFIP conference on security communications, and multimedia (CMS 2002), Portoroz, Slovenia., 2002.
S. Buchegger and J.-Y. Le Boudec,“Performance analysis of the CONFIDANT protocol (cooperation of nodes: Fairness in dynamic ad-hoc networks)”, Proceedings of The Third ACM International Symposium on Mobile Ad Hoc Networking and Computing, 9-11 June, 2002, Lausanne, Switzerland, ACM Press, 2002, pp. 226–236.
Cooperative Packet Caching and Shortest Multipath Routing in Mobile Ad hoc Networks Alvin Valera, Winston K.G. Seah and SV Rao Department of Computer Science School of Computing, National University of Singapore, Singapore 117543 pp 1.
Mobile Ad-hoc On Demand Data Delivery Protoco l by Humayun Bakht School of Computing and Mathematical Sciences Liverpool John Moores University [N] C. E. Perkins and E. M. Royer,
“Ad Hoc On-demand Distance Vector Routing,” In Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, LA, February 1999, pp. 90-100
C. Perkins, Ad hoc On demand Distance Vector (AODV) routing, IETF Internet draft (1997), http://www.ietf.org/internet-drafts/draft-ietf-manet-aodv-00.txt.
Implementation of DSR and DSDV protocol for Mobile Adhoc Networking by Bikash Rath
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 3.0 License.