نتایج جستجو برای: aodv protocol

تعداد نتایج: 250651  

2016
Inderpreet Kaur

DOI: 10.5281/zenodo.59957 ABSTRACT Mobile ad-hoc network has been used in various areas for data transmission over long distances. These nodes have been configured with different movable equipments. There are two types of routing protocols for data communication that are Proactive and Reactive protocol. Proactive protocols are table driven protocol that selects the route from the routing table ...

2006
Rei-Heng Cheng Tung-Kuang Wu Chang-Wu Yu Chun-Hung Kuo

Ad-hoc On-Demand Distance Vector Routing (AODV) is a famous routing protocol for mobile ad hoc networks. Routing path established with AODV remains unchanged during data transmission unless the link fails. Due to the mobile nature of nodes in an ad hoc network, the network topology changes frequently. As a result, some intermediate nodes of an earlier established path may later become redundant...

2006
Mieso K. Denko Hua Lu

A mobile ad hoc network (MANET) is a collection of wireless mobile nodes forming a temporary network without the aid of any fixed communication infrastructure. Due to limited resources, frequent network partitions and unpredictable topological changes, proactive clustering schemes incur high overheads in this environment. In this paper, we propose an on-demand, distributed clustering algorithm ...

Journal: :IJDSN 2008
Jian Yin Sanjay Kumar Madria

In this paper, we present an Energy Efficient Secure Routing Protocol for Sensor Networks (ESecRout). The protocol uses the symmetric cryptography to secure messages, and uses a small cache in sensor nodes to record the partial routing path (previous and next nodes) to the destination. It guarantees that the destination will be able to identify and discard the tampered messages and ensure that ...

2012
Chaitali Biswas Dutta Utpal Biswas

Wireless sensor network (WSN) is basically a wireless network, comprised of a large number of sensor nodes which are densely deployed, small in size, lightweight and portable. AODV is a well known, standardized routing protocol used in WSNs. AODV is subject to several attacks like black hole, worm hole, mad in the middle etc. Several Intrusion detection systems (IDS) have been proposed which su...

2015
Tarek Elahmady Eltobely Mohamed Talaat Faheem Ahmed Zaki Badr Haitham Atef Ghalwash

A Mobile Ad hoc NETwork (MANET) is a collection of wireless nodes communicating with each other without any predetermined topology. In recent years, application domains of wireless ad hoc networks highly affected military and non-military organizations. In this paper, a comparison using NS2 for AODV, DSDV and CBRP is conducted. Metrics of packet delivery fraction and the energy behavior of topo...

Journal: :Int. Arab J. Inf. Technol. 2017
Mohamed Er-rouidi Houda Moudni Hassan Faouzi Hicham Mouncif Abdelkrim Merbouha

Mobile Ad-Hoc Network (MANET) is a decentralized, self-organizing and a dynamic network. These futures make MANET becomes more and more used in many domains. However, this kind of network still suffers from various types of restrictions. Among these restrictions, and the biggest one is the energy consumption. The classical routing protocols proposed by Internet Engineering Task Force (IETF), in...

Journal: :Informatica 2022

Mobile Ad-hoc Network (MANET) is a wireless network that comes with few routing protocols which have varied mechanisms. Studies show operations consume energy while current research focuses more on MANET protocol operation and its performance evaluation, the required for successful equally demands quality attention of researchers. Hence, need to expand scope study neglected area studies. To bri...

Journal: :International journal of emerging science and engineering 2023

This paper aimed at the detection of wormhole attack and proposed a new method called as Neighbour Node Ratio Adhoc On demand Distance Vector Routing (NNR-AODV). NNR-AODV is an extended version traditional AODV routing protocol. The calculates neighbour node count for every based on that it will decide whether present or not. Furthermore, able to detect both external internal attacked nodes. Al...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید