Efficient power aware AODV routing protocol in MANET

C Mafirabadza, TTT Makausi, P Khatri - Proceedings of the International …, 2016 - dl.acm.org
Mobile ad-hoc networks are mostly referred as MANETs. This type of network is consisted of
nodes which are independent, mobile and also able to exchange messages between …

Performance Comparison of Proactive and Reactive Routing Protocol in Mobile Ad Hoc Network

BM Susanto, A Hariyanto… - Journal of …, 2018 - sipora.polije.ac.id
Today, the use of Mobile Ad Hoc Network (MANET) is becoming increasingly popular due to
its flexibility and ease of use wherever and whenever. MANET is able to adapt to many …

A survey on enhancing wire/wireless routing protocol using machine learning algorithms

RM Yas, SH Hashem - IOP conference series: materials science …, 2020 - iopscience.iop.org
Routing is a technique used for choosing the best network's path and forwarding the data
over the selected path. This paper investigates the enhanced routing algorithms for …

[PDF][PDF] An improved wormhole attack detection and prevention method for wireless mesh networks

V Dani, V Birchha - International Journal of Advanced Research in …, 2015 - academia.edu
In the wireless mesh networks, the key role is played by the routers thus most of security
threats are occurred to breach routing functionalities. Therefore, number of different kinds of …

A survey on shortcut tree routing protocols for Zibee based wireless networks

RM Brigitta, P Samundiswary - 2016 International Conference …, 2016 - ieeexplore.ieee.org
Zigbee is a wireless networking standard which is broadly used in applications such as
remote control and sensor applications. They are suited for operation in coarse radio …

The Impact of Signal Strength over Routing Protocols in Wireless Networks

RJ Ismail - International Journal of Engineering and …, 2018 - ijemr.vandanapublications.com
In ad hoc routing protocols the source node may need an intermediate nodes to transmit the
packets into the destination if the destination is not within transmission range of the source …

An improved blackhole attack detection and prevention method for wireless ad-hoc network

G Bendale, S Shrivastava - … on ICT in Business Industry & …, 2016 - ieeexplore.ieee.org
The rapid development in communication technology has given rise to strong research
interest on Wireless Networks. The reality that mobile ad-hoc networks lack fixed …

[PDF][PDF] AModified PHYSICAL LAYER SECURITY BASED ROUTING PROTOCOL FOR SECURED WIRELESS MOBILE AD-HOC NETWORKS COMMUNICATIONS

S Sani, ZY Yusuf - work - bayerojet.org
Physical layer security is a justifiable method which is possible with the current
cryptographic techniques to battle security assaults in wireless networks. The open …

[PDF][PDF] A Comparative Performance Analysis of AODV, DSR and DSDV Protocol for Mobile Ad-hoc Networks

S Sharma, P Jagtap - network, 2017 - academia.edu
The quick growth of mobile communication in current years is especially observed in the
field of mobile system, wireless local area network, and ubiquitous computing. In this vast of …

[PDF][PDF] AN IMPROVED WORMHOLE ATTACK DETECTION AND PREVENTION IN WIRELESS MESH NETWORKS

T Vasantha - academia.edu
Network coding has been shown to be an effective approach to improve the wireless system
performance. However, many security issues impede its wide deployment in practice …