Author:
Garg Shiwani,Verma Anil Kumar
Reference11 articles.
1. Aarti, Tyagi SS (2013) Study of MANET: characteristics, challenges, application and security attacks. Int J Adv Res Comput Sci Softw Eng 3(5):252–257
2. Chakeres ID, Belding-Royer EM (2004) AODV routing protocol implementation design. In: Proceedings of 24th international conference distributed computing systems workshops, 2004. IEEE, pp 698–703
3. Marina MK, Das SR (2006) Ad hoc on demand multipath distance vector routing. Wireless Commun Mobile Comput 6(7):969–988
4. Bai F, Sadagopan N, Helmy A (2003) Important: a framework to systematically analyze the impact of mobility on performance of routing protocols for ad hoc networks. In: Proceedings of IEEE information communications conference. San Francisco
5. Bai F, Helmy A (2006) A survey of mobility models. Wireless adhoc networks, vol 206. University of Southern California, USA
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Cluster-based multiple malicious node detection using honeypot-AODV in MANETs;International Journal of Communication Networks and Distributed Systems;2024
2. Comparison of Mobile AdHoc Network Routing Protocols Based on NS3;2022 IEEE 22nd International Conference on Communication Technology (ICCT);2022-11-11
3. Probabilistic Model Checking of AODV;Quantitative Evaluation of Systems;2020