2016 International Conference on Wireless Networks and Mobile Communications (WINCOM) 2016
DOI: 10.1109/wincom.2016.7777199
|View full text |Cite
|
Sign up to set email alerts
|

Impact of mobility models on Optimized Link State Routing Protocol in MANET

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 4 publications
0
6
0
Order By: Relevance
“…In this distribution mobility model, the nodes in the network are randomly distributed. First, each node will select a target location with a random speed then the node will continue to move to another location target with another random speed [24], [25]. The simulation is carried out in two scenarios, the first scenario is the addition of variations in the speed of node movement and the second scenario is the addition of the network area.…”
Section: Resultsmentioning
confidence: 99%
“…In this distribution mobility model, the nodes in the network are randomly distributed. First, each node will select a target location with a random speed then the node will continue to move to another location target with another random speed [24], [25]. The simulation is carried out in two scenarios, the first scenario is the addition of variations in the speed of node movement and the second scenario is the addition of the network area.…”
Section: Resultsmentioning
confidence: 99%
“…These nodes will set their speed (S t ) and direction (D t ) for each specific time interval (t). The speed and direction of a node are calculated as follows [28]:…”
Section: Gauss-markov Mobility Modelmentioning
confidence: 99%
“…The performance of mobility models in mobile ad hoc networks (MANETs) has also been investigated [28,[36][37][38]. For instance, Abdullah et al [37] evaluated the RWP model on various routing protocols: ad hoc on-demand distance vector (AODV), optimized link state routing (OLSR), and Geographic Routing Protocol (GRP).…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Because each packet must be passed through intermediate nodes quickly, that packet has to travel from the source to the destination. Malicious routing attacks may target the routing detection or maintenance process by failing to follow the specifications of the routing protocol [2,3]. This increases the possibility of attacks such as eavesdropping, spoofing, denial of service, and impersonation.…”
Section: Introductionmentioning
confidence: 99%