Proceedings of the Third International Conference on Computing, Mathematics and Statistics (iCMS2017) 2019
DOI: 10.1007/978-981-13-7279-7_7
|View full text |Cite
|
Sign up to set email alerts
|

Mobile Ad-Hoc Network (MANET) Routing Protocols: A Performance Assessment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
26
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 43 publications
(32 citation statements)
references
References 4 publications
0
26
0
1
Order By: Relevance
“…Routing Protocol berfungsi untuk menentukan cara router berkomunikasi satu sama lain, mendistribusikan informasi yang memungkinkan setiap node untuk memilih rute jalur komunikasi pada suatu jaringan. Terdapat berbagai jenis protocol routing pada MANET dan yang saat ini sudah stabil dan sering digunakan dalam pengembangan penelitian adalah AODV, DSDV, OLSR, OLSR, dan DSR [10,11,12,13,14]. Gambar 3 Berikut adalah jenis Routing Protocols yang digunakan pada Ad Hoc Networks.…”
Section: Routing Protocolunclassified
“…Routing Protocol berfungsi untuk menentukan cara router berkomunikasi satu sama lain, mendistribusikan informasi yang memungkinkan setiap node untuk memilih rute jalur komunikasi pada suatu jaringan. Terdapat berbagai jenis protocol routing pada MANET dan yang saat ini sudah stabil dan sering digunakan dalam pengembangan penelitian adalah AODV, DSDV, OLSR, OLSR, dan DSR [10,11,12,13,14]. Gambar 3 Berikut adalah jenis Routing Protocols yang digunakan pada Ad Hoc Networks.…”
Section: Routing Protocolunclassified
“…Saudi et al [1] have proposed a protected on-request specially appointed routing convention dependent on DSR that forestalls attacks utilizing the symmetric cryptography. To influence the objective of the authenticity of each field in a route request, the initiator essentially incorporates a message verification code.…”
Section: Literature Surveymentioning
confidence: 99%
“…MANETs are made out of self-sorted remote gadgets that participate to control the system and forward one another messages [1]. The arrangement of secure routing to these systems faces explicit vulnerabilities because of the absence of fixed framework and the non-dependable clients that need to utilize the system [2].…”
Section: Introductionmentioning
confidence: 99%
“…Researchers are more interested in playing with the ad hoc environment to optimize the network based on routing parameters. Mobile ad hoc networks (MANETs) has also gained great attention due to its highly dynamic nature where the network comprises of nodes that carry out the communication without any fixed infrastructure through vibrant ways and performing as source nodes, destination nodes or even as intermediate nodes depending upon the requirement of the network [4]. The connectivity is managed through hops by hops communication without any base station due to restricted transmission range of the wireless edges.…”
Section: Introductionmentioning
confidence: 99%