Open Access
The dynamic source routing protocol for mobile ad-hoc networks
Reads0
Chats0
About:
The article was published on 1998-01-01 and is currently open access. It has received 1501 citations till now. The article focuses on the topics: Optimized Link State Routing Protocol & Ad hoc wireless distribution service.read more
Citations
More filters
Journal ArticleDOI
Performance evaluation of a discovery and scheduling protocol for multihop ad hoc mobile grids
TL;DR: This paper proposes the integration of resource discovery and scheduling for mobile ad hoc grids into a single protocol called DICHOTOMY (Discovery and sCHeduling prOTOcol for MobilitY), which allows computational tasks to be distributed appropriately in a mobile ad ad hoc grid, while mitigating the overhead of discovery messages exchanged among the nodes.
Relying on Safe Distance to Ensure Consistent Group Membership in Ad Hoc Networks
TL;DR: This paper proposes a protocol that allows hosts within communication range to maintain a consistent view of the group membership despite movement and frequent disconnections and relies on location information and a conservative notion of logical connectivity that creates the illusion of announced disconnection.
Proceedings ArticleDOI
Investigating Power Aware AODV for Efficient Power Routing in MANETs
Chee-Wah Tan,Sanjay K. Bose +1 more
TL;DR: This paper proposes and investigates a power-aware ad hoc on-demand distance vector routing protocol (PAW-AODV) for efficient power routing in a mobile ad hoc network.
Proceedings ArticleDOI
Characteristics of mobility models for mobile ad hoc networks
TL;DR: This research points out most of the characteristic that could differentiate those mobility models that could be used in the simulation of mobile ad hoc network protocol.
Proceedings ArticleDOI
A Security Architecture for Multihop Mobile Ad hoc Networks With Mobile Agents
Roshan Shaikh,Z.A. Shaikh +1 more
TL;DR: This work is an attempt to resolve two fundamental and flaming security vulnerabilities in these multihop MANETs: the identification of a malicious node(s) and design of a robust security model that could be implemented, even in a hostile environment in the presence of a number of non-colluding nodes.