2007
DOI: 10.3844/ajassp.2007.333.338
|View full text |Cite
|
Sign up to set email alerts
|

Routing Protocol for Mobile Ad Hoc Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
20
0

Year Published

2010
2010
2014
2014

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(20 citation statements)
references
References 11 publications
0
20
0
Order By: Relevance
“…PIM is a multicast routing architecture to establish trees to many sparsely represented groups. The PIM is suitable for large heterogenous networks as it is robust, flexible and scalable (Alfawaer et al, 2007). PIM is a collection of protocols optimized for different scenario.…”
Section: Introductionmentioning
confidence: 99%
“…PIM is a multicast routing architecture to establish trees to many sparsely represented groups. The PIM is suitable for large heterogenous networks as it is robust, flexible and scalable (Alfawaer et al, 2007). PIM is a collection of protocols optimized for different scenario.…”
Section: Introductionmentioning
confidence: 99%
“…Thus multicast support is a critical and a desirable feature of ad hoc networks [4]. Many multicast routing protocols have been proposed for mobile ad hoc networks addressing different challenging issues and some remarkable achievements have been reported [1], [4], [6], [8], [9]. Among the MANET multicast protocols, AMRoute [6] and PAST-DM [4] are overlay multicast protocols that constrain the protocol state within the group members.…”
Section: Introductionmentioning
confidence: 99%
“…Some security research has been done for WLANs and wireless sensor networks (Karlof and Wagner, 2003;Perrig et al, 2002;Hu et al, 2002;Eschenauer and Gligor, 2002;Pietro et al, 2003;Wood and Stankovic, 2002;Alfawaer et al, 2007;Buratti and Verdone, 2009;Chen et al, 2007;E1 Emary and A1-Rabia, 2005;Jayakumar and Gopinath, 2008;Lu et al, 2004;Murad and Al-Mahadeen, 2007;Sapuan, 2005;Verdone et al, 2008), but pursuing security in wireless networks remains a challenging task. 802.15.4 Employs a fully handshake protocol for data transfer reliability and embeds the Advanced Encryption Standard (AES) for secure data transfer.…”
Section: Introductionmentioning
confidence: 99%