Comparative Study of AODV, MAODV and RAODV to Improve Security using TCP Connections
Abstract
Full Text:
PDFReferences
"Wireless Network Industry Report". http://www.wireless-nets.com/ resources /downloads/wireless_industry_report _2007. html
Kush, A., Taneja, S.: A Survey of Routing Protocols in Mobile Adhoc Networks International Journal of Innovation, Management and Technology 1(3), 279–285 (2010)
Perkins, C., Royer, E.B., Das, S.: Adhoc On-Demand Distance Vector (AODV). Routing IETF Internet Draft (2003)
S.R. Das, R. Castaneda, J. Yan, and R. Sengupta. Comparative performance evaluation of. protocols for mobile, ad hoc networks. In 7th Int. Conf. on Computer Communications andNetworks (IC3N), pages 153–161, October 1998.
Kioumourtzis, G.: Simulation and Evaluation of Routing Protocols for Mobile Adhoc Networks. Thesis, Master of Science in Systems Engineering and Master of Science in Computer Science, Naval Postgraduate School, Monterey, California (2005)
NS-2 Network simulator http://www.isi.edu/nsnam/ns.
Ram Ramanathan and Jason Redi “A brief overview of ad hoc networks:challenges and directions” www.ir.bbn.com/~ramanath/pdf/commmag-manets.pdf
D. B. Johnson and D. A. Maltz, “Dynamic Source Routing in Ad-Hoc Ad hoc Networks," Mobile Computing, ed. T. Imielinski and H. Korth, Kluwer Academic Publishers, 1996, pp. 153-181
C. E. Perkins and P. Bhagwat, “Highly Dynamic Destination-Sequenced Distance-ector. Routing (DSDV) for Mobile Computers,” SIGCOMM, London, UK, August 1994, pp. 234-244.
E. M. Royer and C. Toh, “A Review of Current Routing Protocols for Ad Hoc Mobile. Wireless Networks,” IEEE Personal Communications, pp. 46–55, April 1999.
C. Perkins, Ad hoc On demand Distance Vector (AODV) routing, IETF Internet draft (1997), http://www.ietf.org/internet-drafts/draftietf-manet-aodv-00.txt..
Samir R. Das, Robert Castaneda and Jiangtao Yan, “Simulationbased performance evaluation of routing protocols for mobile ad hoc networks”.
Vincent D. Park and M.Scott Corson. A highly adaptive distributed routing algorithm for mobile wireless networks. In Proceedings of INFOCOM 1997, 1997
Seyed Mehdi Moosavi, MarjanKuchaki Rafsanjani, “An Algorithm for Cluster Maintenance Based on Membership Degree of Nodes for MANETs”, “International Journal of Advancements in Computing Technology (IJACT)”,AICIT, vol.3, no.4, pp.73-78, 2011.
He XU, Suo-ping WANG, Ru-chuan WANG, “A Novel RFID Reader System Framework basedon Peer-to-Peer Network”, “International Journal of Advancements in Computing Technology (IJACT)”,AICIT, vol.3, no.3, pp.104-110, 2011.
C. E. Perkins and E. M. Royer, “Ad hoc On-Demand Distance Vector Routing”, In Proceedings of IEEE WMCSA, pp. 90-100, 1999.
Sima ,A. Kush, “Malicious Node Detection in MANET” in Computer Engineering and Intelligent Systems ISSN 2222-1719 Vol 2, No.4,pp. 6-13, 2011
DOI: https://doi.org/10.23956/ijarcsse.v7i7.108
Refbacks
- There are currently no refbacks.