Cihan University-Erbil Conferences, 3rd International Conference on Communication Engineering and Computer Science (CIC-COCOS’19)

Font Size: 
Simulation-Based Evaluation of MANET Routing Protocols: AODV, FSR and ZRP
Mohamad T Sultan, Khaled N Yasen, Ali Q Saeed

Last modified: 2019-04-21

References


REFERENCES

[1]   Ni, Sze-Yao, et al. "The broadcast storm problem in a mobile ad hoc network." Proceedings of the 5th annual ACM/IEEE international conference on Mobile computing and networking. ACM, 1999.

[2]   Ko, Young‐Bae, and Nitin H. Vaidya. "Location‐Aided Routing (LAR) in mobile ad hoc networks." Wireless networks 6.4 (2000): 307-321.

[3]   Usman, Muhammad, et al. "QASEC: A secured data communication scheme for mobile Ad-hoc networks." Future Generation Computer Systems (2018).

[4]   Sultan, Mohamad T., and Khaled N. Yasen. "Homomorphic Encryption Implementation to Ensure Data Security In Cloud Computing." Journal Of Theoretical & Applied Information Technology 96.7 (2018).

[5]   Abolhasan, Mehran, Tadeusz Wysocki, and Eryk Dutkiewicz. "A review of routing protocols for mobile ad hoc networks." Ad hoc networks 2.1 (2004): 1-22.

[6]   Rosati, Stefano, et al. "Dynamic routing for flying ad hoc networks." IEEE Transactions on Vehicular Technology 65.3 (2016): 1690-1700.

[7]   Hinds, Alex, et al. "A review of routing protocols for mobile ad-hoc networks (manet)." International journal of information and education technology 3.1 (2013): 1.

[8]   Pei, Guangyu, Mario Gerla, and Tsu-Wei Chen. "Fisheye state routing: A routing scheme for ad hoc wireless networks." 2000 IEEE International Conference on Communications. ICC 2000. Global Convergence Through Communications. Conference Record. Vol. 1. IEEE, 2000.

[9]   Mohseni, Shima, et al. "Comparative review study of reactive and proactive routing protocols in MANETs." 4th IEEE International Conference on Digital Ecosystems and Technologies. IEEE, 2010.

[10] Perkins, Charles, Elizabeth Belding-Royer, and Samir Das. Ad hoc on-demand distance vector (AODV) routing. No. RFC 3561. 2003.

[11] Gupta, Prakhar, et al. "Reliability Factor Based AODV Protocol: Prevention of Black Hole Attack in MANET." Smart Innovations in Communication and Computational Sciences. Springer, Singapore, 2019. 271-279.

[12] Sangi, Abdur Rashid, et al. "Cognitive AODV routing protocol with novel channel-route failure detection." Multimedia Tools and Applications (2019): 1-18.

[13] Yang, Xueqin, et al. "Improved ZRP Routing Protocol Based on Clustering." Procedia computer science 131 (2018): 992-1000.

[14] Bendale, Lubdha M., Roshani L. Jain, and Gayatri D. Patil. "Study of Various Routing Protocols in Mobile Ad-Hoc Networks." International Journal of Scientific Research in Network Security and Communication 6.01 (2018): 1-5.

[15] Haas, Zygmunt J., Marc R. Pearlman, and Prince Samar. "The zone routing protocol (ZRP) for ad hoc networks." (2002).

[16] Bettstetter, Christian, Giovanni Resta, and Paolo Santi. "The node distribution of the random waypoint mobility model for wireless ad hoc networks." IEEE Transactions on mobile computing 2.3 (2003): 257-269.

[17] Issariyakul, Teerawat, and Ekram Hossain. "Introduction to Network Simulator 2 (NS2)." Introduction to Network Simulator NS2. Springer, Boston, MA, 2009. 1-18.