Performance Evaluation of Standard and Security Extended Protocols in MANET
Abstract
Keywords
Full Text:
PDFReferences
S.SriramSunther, Dr.R.Balasubramanian, S.Ramalakshmi, “Performance Evaluation of Route Securing Protocols in MANET”, International Conference on Computing and Control Engineering (ICCCE 2012), 12 & 13 April, 2012.
Abbas El Gamal, James Mammen, BalajiPrabhakar and Devavrat Shah, “Throughput- Delay Trade-off in Wireless Networks”, Department of EE and CS, Stanford University, IEEE 2004.
Adam.N, M.Y. Ismail, J. Abdullah, “Effect of Node Density on Performances of Three MANET Routing Protocols”, International Conference on Electronic Devices, Systems and Applications, 2010.
Adjih, et al., “Optimized Link State Routing Protocol,” IETF Internet Draft, draft-ietf-manet-olsr-08.txt, March 3, 2003.
Ahvar.E, and M. Fathy, “Performance Evaluation of Routing Protocols For High Density Ad-Hoc Networks based on Qos by Glomosim Simulator”, ISSN 1307-6884, 23 AUGUST 2007.
Charles E. Perkins, Elizabeth M. Belding-Royer, S. Das, “Ad-Hoc on Demand Distance Vector (AODV) routing, Mobile Ad Hoc Networking Working Group” July 2003.
Clausen.T, Ed. P. Jacquet, Ed.ProjectHipercom, “Optimized Link State Routing Protocol”, INRIA October 2003.
David Johnson and Albert Lysko, “Comparison of MANET routing protocols using a scaled indoor wireless grid”, 2008.
David B. Johnson, David A. Maltz, Yih-Chun Hu, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks”, Internet- Draft, draft-ietf- manet-dsr-10.txt, July 2004.
IdrisSkloul Ibrahim, peter J.B king, Robert Pooley “Performance Evaluation of Routing Protocols for Manet”, IEEE Computer Society, 2009.
Jun Liu,Jiejun Kong, Xiaoyan Hong, Mario Gerl “Performance Evaluation of Anonymous Routing Protocols in MANETs”, IEEE Communication Society WCNC publication,2006
Kunze, C., U. Grossmann, W. Storka and K. Muller-Glaser, “Application of ubiquitous computing in personal health monitoring systems”, in: DGBMT: Jahrestagung der DeutschenGesellschaft F r BiomedizinischeTechnik, 2002
LajosHanzo II, Rahim Tafazolli,” QoS-Aware Routing and Admission Control in Shadow- adding Environments for Multirate MANETs”, IEEE Transactions on mobile computing, vol. 10, no. 5, May 2011
Manel Guerrero Zapata,” Secure Ad hoc On-Demand Distance Vector Routing”,Mobile Computing and Communications Review, Volume 6, Number 3.
Noman Mohammed, HadiOtrok, Lingyu Wang, MouradDebbabi and Prabir Bhattacharya,” Mechanism Design-Based Secure Leader Election Model for Intrusion Detection in MANET”, IEEE transactions on depedable and secure computing..
Qi Biao, He Jian-hua, Yang Zong-kai, “Simulation of wireless Ad hoc routing protocols and its evaluation”, Huazhong University of Science and Technology (Nature Science Edition) 32 (8), 66–69, 2004.
Sanjay K. Dhurandher, Mohammad S. Obaidat, Fellow, IEEE, Karan Verma, Pushkar Gupta, and PravinaDhurandher ,” FACES: Friend-Based Ad Hoc Routing Using Challenges to Establish Security in MANETs Systems”, IEEE SYSTEMS JOURNAL, VOL. 5, NO. 2, JUNE 2011
SeemaMehlaet. al. / (IJCSE) International Journal on Computer Science and Engineering “Analyzing security of Authenticated Routing Protocol (ARAN)”, Vol. 02, No. 03, 2010, 664-668.
Sunil Taneja*and Ashwani Kush,” A Survey of Routing Protocols in Mobile Ad HocNetworks”, International Journal of Innovation, Management and Technology, Vol. 1, No. 3, August 2010,ISSN: 2010-0248.
YihChun Hu, Adrian Perrig, David B. Johnson, “Ariadne: A Secure OnDemand Routing Protocol for Ad Hoc Networks”, MobiCom‟02, September 23–26, 2002, Atlanta, Georgia, USA.
YasirAbdelgadir Mohamed Azween B. Abdullah, “Security Mechanism for MANETs”,
Zygmunt J. Haas, Cornell University Marc R. Pearlman, Cornell University, “The Zone Routing Protocol (ZRP) for Ad Hoc Networks” IETF Internet Draft, November 1997.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.