메뉴 건너뛰기




Volumn , Issue , 2016, Pages 71-102

Study and Performance of Mobile Ad Hoc Routing Protocols

Author keywords

[No Author keywords available]

Indexed keywords


EID: 84897496482     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1201/b11447-5     Document Type: Chapter
Times cited : (6)

References (71)
  • 1
    • 85137430008 scopus 로고    scopus 로고
    • Accessed 01/07/2011
    • Bluetooth SE. Bluetooth Specification, 2010. Available at Iittp://www.bluetooth.com (Accessed 01/07/2011).
    • (2010)
  • 5
    • 51849126004 scopus 로고    scopus 로고
    • Master’s Thesis in Computing Science, Department of Computing Science, Umea University, Sweden
    • K. Gorantala. Routing protocols in mobile ad-hoc networks. Master’s Thesis in Computing Science, Department of Computing Science, Umea University, Sweden, 2006.
    • (2006) Routing protocols in mobile ad-hoc networks
    • Gorantala, K.1
  • 6
    • 4143105612 scopus 로고    scopus 로고
    • Optimized link state routing protocol
    • Internet Draft, November,, Accessed 01/07/2011
    • P. Jacquet, P. Muhlethaler, and A. Qayyum. Optimized link state routing protocol. IETF MANET, Internet Draft, November 1998. Available at http://tools.ietf.org/search/draft-ietf-manet-olsr-00 (Accessed 01/07/2011).
    • (1998) IETF MANET
    • Jacquet, P.1    Muhlethaler, P.2    Qayyum, A.3
  • 7
    • 0010316932 scopus 로고
    • Master’s thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, September
    • S. Jarecki. Proactive secret sharing and public key cryptosystems. Master’s thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, September 1994.
    • (1994) Proactive secret sharing and public key cryptosystems
    • Jarecki, S.1
  • 9
    • 0001831930 scopus 로고    scopus 로고
    • The resurrecting duckling security issues for ad-hoc wireless networks
    • B. Christianson, B. Crispo, and M. Roe (eds), Lecture Notes in Computer Science 1796. Berlin: Springer-Verlag
    • F. Stajano and R. Anderson. The resurrecting duckling security issues for ad-hoc wireless networks. In B. Christianson, B. Crispo, and M. Roe (eds) 7th International Workshop on the Security Protocols. Lecture Notes in Computer Science 1796. Berlin: Springer-Verlag, 1999.
    • (1999) 7th International Workshop on the Security Protocols
    • Stajano, F.1    Anderson, R.2
  • 20
    • 85137494407 scopus 로고    scopus 로고
    • Berlin: Department of Electrical Engineering, Telecommunication Networks Group, Technische Universität Berlin
    • J. Weinmiller. Grouping Wireless Picocells with a Distribution System. Berlin: Department of Electrical Engineering, Telecommunication Networks Group, Technische Universität Berlin, 2007.
    • (2007) Grouping Wireless Picocells with a Distribution System
    • Weinmiller, J.1
  • 22
    • 85137426282 scopus 로고    scopus 로고
    • Web site
    • AWDS (Ad Hoc Wireless Distribution Service) Web site: http://awds.berlios.de
  • 23
    • 0002334456 scopus 로고    scopus 로고
    • CGSR (clusterhead gateway switch routing protocol)-routing in clustered multihop, mobile wireless networks with fading channel
    • April
    • C.-C. Chiang, H.-K. Wu, W. Liu, and M. Gerla. CGSR (clusterhead gateway switch routing protocol)-routing in clustered multihop, mobile wireless networks with fading channel. In IEEE Singapore International Conference on Networks, SICON’97, April 1997, pp. 197-211.
    • (1997) IEEE Singapore International Conference on Networks, SICON’97 , pp. 197-211
    • Chiang, C.-C.1    Wu, H.-K.2    Liu, W.3    Gerla, M.4
  • 25
    • 34548744531 scopus 로고
    • DBF (distributed Bellman-Ford routing protocol): Distributed asynchronous Bellman-Ford algorithm
    • Englewood Cliffs, NJ: Prentice-Hall
    • D.P. Bertsekas and R.G. Gallager, DBF (distributed Bellman-Ford routing protocol): distributed asynchronous Bellman-Ford algorithm. In Data Networks. Englewood Cliffs, NJ: Prentice-Hall, 1987, pp. 325-333.
    • (1987) Data Networks. , pp. 325-333
    • Bertsekas, D.P.1    Gallager, R.G.2
  • 28
    • 84907551158 scopus 로고    scopus 로고
    • A wireless hierarchical routing protocol with group mobility
    • New Orleans, September
    • G. Pei, M. Gerla, X. Hong, and C.-C. Chiang. A wireless hierarchical routing protocol with group mobility. In IEEE WCNC’99, New Orleans, September 1999. Available at http://wiki.uni.lu/secan-lab/Hieracical+State+Routing.html
    • (1999) IEEE WCNC’99
    • Pei, G.1    Gerla, M.2    Hong, X.3    Chiang, C.-C.4
  • 29
    • 0003899978 scopus 로고    scopus 로고
    • The intrazone routing protocol (IARP) for ad hoc networks
    • July
    • Z.J. Haas, M.R. Pearlman, and P. Samar. The intrazone routing protocol (IARP) for ad hoc networks. Internet Draft, July 2002. Available at http://tools.ietf.org/html/draft-ietf-manet-zone-iarp
    • (2002) Internet Draft
    • Haas, Z.J.1    Pearlman, M.R.2    Samar, P.3
  • 30
    • 3142719292 scopus 로고
    • Multicluster, mobile, multimedia radio network
    • M. Gerla and J.T. Tsai. Multicluster, mobile, multimedia radio network. ACM Wireless Networks, vol. 1, no. 3, 1995, pp. 255-265.
    • (1995) ACM Wireless Networks , vol.1 , Issue.3 , pp. 255-265
    • Gerla, M.1    Tsai, J.T.2
  • 38
    • 51849126004 scopus 로고    scopus 로고
    • Master’s Thesis in Computing Science, Department of Computing Science, Umea University, Sweden, June
    • K. Gorantala. Routing protocols in mobile ad-hoc networks. Master’s Thesis in Computing Science, Department of Computing Science, Umea University, Sweden, June 2006.
    • (2006) Routing protocols in mobile ad-hoc networks
    • Gorantala, K.1
  • 40
    • 0033357103 scopus 로고    scopus 로고
    • IEEE Network, Special Issue on Network Security. Ithaca, NY: Cornell University
    • L. Zhou and Z.J. Haas. Securing Ad-Hoc Networks. IEEE Network, Special Issue on Network Security. Ithaca, NY: Cornell University, 1999.
    • (1999) Securing Ad-Hoc Networks
    • Zhou, L.1    Haas, Z.J.2
  • 43
    • 84880480009 scopus 로고    scopus 로고
    • A variant of Merkle signature scheme to protect AODV routing protocol, recent trends in wireless and mobile networks
    • S. Mandala, M.A. Ngadi, A.H. Abdullah, and A.S. Ismail. A variant of Merkle signature scheme to protect AODV routing protocol, recent trends in wireless and mobile networks. Communications in Computer and Information Science, vol. 84, part 1, 2010, pp. 87-98.
    • (2010) Communications in Computer and Information Science , vol.84 , pp. 87-98
    • Mandala, S.1    Ngadi, M.A.2    Abdullah, A.H.3    Ismail, A.S.4
  • 44
    • 80052146248 scopus 로고    scopus 로고
    • SENCAST: A scalable protocol for unicasting and multicasting in a large ad hoc emergency network
    • P. Appavoo and K. Khedo. SENCAST: a scalable protocol for unicasting and multicasting in a large ad hoc emergency network. International Journal of Computer Science and Network Security, vol. 8, no. 2, 2008, pp. 87-98.
    • (2008) International Journal of Computer Science and Network Security , vol.8 , Issue.2 , pp. 87-98
    • Appavoo, P.1    Khedo, K.2
  • 45
    • 85046342241 scopus 로고    scopus 로고
    • Improving reactive routing on wireless multirate ad hoc networks
    • Accessed 01/07/2011
    • R. Guimaraes and Ll. Cerda. Improving reactive routing on wireless multirate ad hoc networks. In Proceedings of 13th European Wireless, 2007. Available at https://upcommons.upc.edu/e-prints/bitstream/2117/1173/1/mr-aodv.pdf (Accessed 01/07/2011).
    • (2007) Proceedings of 13th European Wireless
    • Guimaraes, R.1    Cerda, L.2
  • 48
    • 84954568516 scopus 로고    scopus 로고
    • ARA - the ant-colony based routing algorithm for MANETs
    • Vancouver, British Columbia, Canada, August 18-21
    • M. Günes, U. Sorges, and I. Bouazizi. ARA - the ant-colony based routing algorithm for MANETs. In International Workshop on Ad Hoc Networking (IWAHN 2002), Vancouver, British Columbia, Canada, August 18-21, 2002, pp. 79-85.
    • (2002) International Workshop on Ad Hoc Networking (IWAHN 2002) , pp. 79-85
    • Günes, M.1    Sorges, U.2    Bouazizi, I.3
  • 49
    • 85137422037 scopus 로고    scopus 로고
    • Admission control enabled on demand routing (ACOR)
    • July,, Accessed 01/07/2011
    • N. Kettaf, A. Abouaissa, T. Vuduong, and P. Lorenz. Admission control enabled on demand routing (ACOR). Internet Draft, July 2006. Available at http://tools.ietf.org/html/draft-kettaf-manet-acor (Accessed 01/07/2011).
    • (2006) Internet Draft
    • Kettaf, N.1    Abouaissa, A.2    Vuduong, T.3    Lorenz, P.4
  • 52
    • 0035703920 scopus 로고    scopus 로고
    • On-demand multipath distance vector routing in ad hoc networks
    • Mission Inn, Riverside, California, November11-14
    • M. Marina and S. Das. On-demand multipath distance vector routing in ad hoc networks. In 9th International Conference on Network Protocols (ICNP), Mission Inn, Riverside, California, November11-14, 2001, pp. 14-23.
    • (2001) 9th International Conference on Network Protocols (ICNP) , pp. 14-23
    • Marina, M.1    Das, S.2
  • 58
    • 0030264587 scopus 로고    scopus 로고
    • An efficient routing protocol for wireless networks
    • Special Issue on Routing in Mobile Communication Networks
    • S. Murthy and J.J. Garcia-Lunca-Aceves. An efficient routing protocol for wireless networks. ACM Mobile Networks and Applications Journal, vol. 1, no. 2 (Special Issue on Routing in Mobile Communication Networks), 1996, pp. 183-197.
    • (1996) ACM Mobile Networks and Applications Journal , vol.1 , Issue.2 , pp. 183-197
    • Murthy, S.1    Garcia-Lunca-Aceves, J.J.2
  • 59
    • 0031353437 scopus 로고    scopus 로고
    • A highly adaptive distributed routing algorithm for mobile wireless networks
    • April
    • V.D. Park and M.S. Corson. A highly adaptive distributed routing algorithm for mobile wireless networks. In Proceedings of INFOCOMM’97, April 1997.
    • (1997) Proceedings of INFOCOMM’97
    • Park, V.D.1    Corson, M.S.2
  • 61
    • 0032621035 scopus 로고    scopus 로고
    • A review of current routing protocols for ad-hoc mobile wireless networks
    • April
    • E.M. Royer and C.K. Toh. A review of current routing protocols for ad-hoc mobile wireless networks. IEEE Personal Communications Magazine, April 1999, pp. 46-55.
    • (1999) IEEE Personal Communications Magazine , pp. 46-55
    • Royer, E.M.1    Toh, C.K.2
  • 63
    • 17444426121 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for ad hoc networks
    • January
    • Y.-C. Hu, A. Perrig, and D. Johnson. Ariadne: a secure on-demand routing protocol for ad hoc networks. Wireless Networks Journal, vol. 11, no. 1-2, January 2005, pp. 21-38.
    • (2005) Wireless Networks Journal , vol.11 , Issue.1-2 , pp. 21-38
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.3
  • 64
    • 47049116391 scopus 로고    scopus 로고
    • Departamento de Ingeniería Telemática, Universidad Carlos III de Madrid, Jornadas Telecom I+D 2003, Actas de las XIII Jornadas Telecom I+D 2003, Madrid, Spain, November
    • I. Vidal, C. García, I. Soto, and J.I. Moreno. Servicios de Valor Añadido en Redes Móviles Ad-Hoc. Departamento de Ingeniería Telemática, Universidad Carlos III de Madrid, Jornadas Telecom I+D 2003, Actas de las XIII Jornadas Telecom I+D 2003, Madrid, Spain, November 2003.
    • (2003) Servicios de Valor Añadido en Redes Móviles Ad-Hoc
    • Vidal, I.1    García, C.2    Soto, I.3    Moreno, J.I.4
  • 66
    • 85137462119 scopus 로고    scopus 로고
    • TESLA certificates: An authentication tool for networks of computer-constrained devices
    • San Diego, CA, August
    • M. Bohge and W. Trappe. TESLA certificates: an authentication tool for networks of computer-constrained devices. In Proceedings of 2003 ACM workshop on Wireless Security (WiSE '03), San Diego, CA, August 2003.
    • (2003) Proceedings of 2003 ACM workshop on Wireless Security (WiSE '03)
    • Bohge, M.1    Trappe, W.2
  • 67
    • 11244269535 scopus 로고    scopus 로고
    • SEAD: Secure efficient distance vector routing for mobile wireless ad hoc networks
    • Y.-C. Hu, D.B. Johnson, and A. Perrig. SEAD: secure efficient distance vector routing for mobile wireless ad hoc networks. Ad Hoc Networks, 1, 2003, pp. 175-192.
    • (2003) Ad Hoc Networks , vol.1 , pp. 175-192
    • Hu, Y.-C.1    Johnson, D.B.2    Perrig, A.3
  • 70
    • 84877920509 scopus 로고    scopus 로고
    • Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hov Networks: A Comprehensive Study
    • Mohammed Tarique, Anwar Hossain, Rumana Islam, C. Akram Hossian. Issues of Long-Hop and Short-Hop Routing in Mobile Ad Hov Networks: a Comprehensive Study, Network Protocols and Algorithms, Vol 2, No. 2, 2010.
    • (2010) Network Protocols and Algorithms , vol.2 , Issue.2
    • Tarique, M.1    Hossain, A.2    Islam, R.3    Akram Hossian, C.4
  • 71
    • 79952358471 scopus 로고    scopus 로고
    • Localization Algorthims in Wireless Sensor Networks: Current Approaches and Future Challenges
    • Amitangshu Pal, Localization Algorthims in Wireless Sensor Networks: Current Approaches and Future Challenges, Network Protocols and Algorithms, Vol 2, No 1, 2010.
    • (2010) Network Protocols and Algorithms , vol.2 , Issue.1
    • Pal, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.