2010 2nd International Conference on Computer Engineering and Technology 2010
DOI: 10.1109/iccet.2010.5485241
|View full text |Cite
|
Sign up to set email alerts
|

Provisioning of Quality of Service in MANETs performance analysis & comparison (AODV and DSR )

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 6 publications
0
6
0
Order By: Relevance
“…In [3][4][5][6][7][8][9][10][11][12][13], various approaches to QoS provisioning and QoS routing for single path in MANETs have been studied and derived with the aim to reduce the connection set up latency, delay and bandwidth and to ensure guaranteed performance level to the QoS sensitive applications. Multipath routing is more promising in ad hoc networks since it provides additional features like load balancing, fault-tolerance, higher throughput etc., to ensure QoS assurance in ad hoc networks.…”
Section: Related Workmentioning
confidence: 99%
“…In [3][4][5][6][7][8][9][10][11][12][13], various approaches to QoS provisioning and QoS routing for single path in MANETs have been studied and derived with the aim to reduce the connection set up latency, delay and bandwidth and to ensure guaranteed performance level to the QoS sensitive applications. Multipath routing is more promising in ad hoc networks since it provides additional features like load balancing, fault-tolerance, higher throughput etc., to ensure QoS assurance in ad hoc networks.…”
Section: Related Workmentioning
confidence: 99%
“…MANETs are primarily used in the army and security-based applications e.g. covert missions, emergency, and rescue missions [8] [6] [9]. The availability of network resources, integrity, and confidentiality depends on the security mechanisms that are put in place.…”
Section: Introductionmentioning
confidence: 99%
“…This section, the approaches associated with the malicious behavior of the node is reviewed. The work of Sharma et al [19] has presented an authentication protocol for its neighboring nodes for resisting blackhole attack in the ad-hoc wireless environment. It has also been seen that frequently used routing schemes, e.g., adhoc on-demand distance vector (AODV) has been modified to offer dual acknowledgment scheme for authentication.…”
Section: Introductionmentioning
confidence: 99%