2016
DOI: 10.1016/j.adhoc.2015.08.008
|View full text |Cite
|
Sign up to set email alerts
|

Performance evaluation of mobile agent based resource management protocol for MANETs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 23 publications
0
6
0
Order By: Relevance
“…Black box method is proposed in the article. 10 Black box is usually used to package mobile agent information, including encapsulation data of mobile agent, codes and execution states. Mobile agent is just a black box by looking from outside and the sensor node can only get the input or output information of mobile agent.…”
Section: Research On Security Of Mobile Agent In Mobile Agent Servermentioning
confidence: 99%
See 1 more Smart Citation
“…Black box method is proposed in the article. 10 Black box is usually used to package mobile agent information, including encapsulation data of mobile agent, codes and execution states. Mobile agent is just a black box by looking from outside and the sensor node can only get the input or output information of mobile agent.…”
Section: Research On Security Of Mobile Agent In Mobile Agent Servermentioning
confidence: 99%
“…In the security of mobile agent transfer process, researchers put forward some solutions, such as asymmetric encryption method, 5 a mixed variety of encryption mechanisms, 6 and pretty good privacy (PGP) encryption algorithm 7 . In the security of mobile agent in mobile agent server, solutions are partial results encapsulation mechanism, 8 hardware protection strategy, 9 the black box method, 10 and so on.…”
Section: Introductionmentioning
confidence: 99%
“…Thirdly, it is needed to manage the network to meet the requirement of communication quality when resources (bandwidth, queue length, battery capacity, etc.) are limited [7]. These issues may not only increase latency and packet loss rate but also reduce throughput.…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, it also suffers from internal and external interference failures. Other existing cross layer approach can be highlighted such as first, change in nodes mobility changes the topology of the network through unpredicted manner and this affects the link stability [16]; also when the nodes are battery based, any failure in node affects the established link and network topology as well. Third, meeting the communication quality requirement with restricted resources such as bandwidth and queue length [17][18].…”
Section: Introductionmentioning
confidence: 99%