2015
DOI: 10.1016/j.procs.2015.04.252
|View full text |Cite
|
Sign up to set email alerts
|

Detection of Malicious Node Behaviour via I-Watchdog Protocol in Mobile Ad Hoc Network with DSDV Routing Scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
14
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(14 citation statements)
references
References 20 publications
0
14
0
Order By: Relevance
“…Dynamic Connectivity Factor (DCFP) has been developed, where DCFP refer neighbour based dynamic connectivity factor [4].…”
Section: Dcfp Methodologymentioning
confidence: 99%
See 2 more Smart Citations
“…Dynamic Connectivity Factor (DCFP) has been developed, where DCFP refer neighbour based dynamic connectivity factor [4].…”
Section: Dcfp Methodologymentioning
confidence: 99%
“…This has become very promising in the various applications of MANET & VANET. This is because of their strong capacities like high data rates as well as low power consumption [4]. UWB uses low energy levels [5] and these can be used in short range and high bandwidth (>500MHz).…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…17 Different works handling data transmission were proposed for VANET recently. 17 Different works handling data transmission were proposed for VANET recently.…”
Section: Related Workmentioning
confidence: 99%
“…Mobile networks get the attention of researchers these last years because of their wide applications. 17 Different works handling data transmission were proposed for VANET recently. 18 These works concern generally methods of routing or broadcasting information through nodes.…”
Section: Related Workmentioning
confidence: 99%