Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
Viewing 1-5 of 5 total results
A review of routing protocols for mobile ad hoc networks ...
E.M. Royer, C.-K. TohA review of current routing protocols for ad hoc mobile wireless networks IEEE Personal Communications, 6 (2) (1999), pp. 46-55 Google Scholar
Detect DDoS flooding attacks in mobile ad hoc networks ...
Royer, E.M. and Toh, C-K. (1999) 'A review of current routing protocols for ad hoc mobile wireless networks', IEEE Personal Communications, Vol. 6, pp.46-55. Google Scholar
Routing Protocols for Ad Hoc Mobile Wireless Networks
5. References [Royer99]Elizabeth M. Royer, Chai-Keong Toh, "A Review of Current Routing Protocols for Ad Hoc Mobile Wireless Networks", IEEE Personal Communications, Vol. 6, No. 2, pp. 46-55, April 1999. Gives a review of routing protocols for ad hoc networks. [Perkins94]C.E. Perkins and P. Bhagwat, "Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for Mobil...
Major challenges of Mobile Adhoc Networks | Oriental ...
J. Macker, ”Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations”. IETF RFC 2501, January 1999. Mohammed Saeed Al-kahtani, “Survey on Security Attacks in Vehicular Ad hoc Networks (VANETs),” IEEE 2012....
A survey of secure wireless ad hoc routing - IEEE Journals ...
Abstract: Ad hoc networks use mobile nodes to enable communication outside wireless transmission range. Attacks on ad hoc network routing protocols disrupt network performance and reliability. The article reviews attacks on ad hoc networks and discusses current approaches for establishing cryptographic keys in ad hoc networks....