Academic literature on the topic 'ADHOC ON-DEMAND DISTANCE VECTOR'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'ADHOC ON-DEMAND DISTANCE VECTOR.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "ADHOC ON-DEMAND DISTANCE VECTOR"

1

AmitMaheshbhai, Lathigara, and K. H. Wandra. "Adhoc On-demand Distance Vector: Energy Efficient Approach." International Journal of Computer Applications 102, no. 8 (September 18, 2014): 40–45. http://dx.doi.org/10.5120/17839-8725.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

G Patel, Vallabh, and Nishant P. Makwana. "Optimized Adhoc On demand Distance Vector (O-AODV)." International Journal of Engineering Trends and Technology 35, no. 1 (May 25, 2016): 12–18. http://dx.doi.org/10.14445/22315381/ijett-v35p203.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

dhao, A. P. Ja, and Dr D. N. Chaudhari. "Security Aware Adhoc on Demand Distance Vector Routing Protocol in Vehicular Adhoc Network." International Journal of Innovative Research in Computer and Communication Engineering 02, no. 12 (December 30, 2014): 7258–63. http://dx.doi.org/10.15680/ijircce.2014.0212019.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ganpat Joshi, Gurpreet Singh,. "A Novel Statistical Adhoc On-Demand Distance Vector Routing Protocol Technique is using for Preventing the Mobile Adhoc Network from Flooding Attack." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (April 5, 2021): 1753–65. http://dx.doi.org/10.17762/turcomat.v12i6.3779.

Full text
Abstract:
The Mobile Adhoc Networks are more vulnerable because in the (MANET) Mobile Adhoc Network all node works as data sink, transmitter, router. There is no centralized system in the Mobile Adhoc network, so the chances of the vulnerabilities are very high in the network. There are various security issues in the Mobile Adhoc Network. From the various attacks the flooding attacks are most difficult attacks that extremely affect in Mobile Adhoc Network. In this paper, a new statistical based technique is planned, which is used to discover the flooding attack in an positive approach than other approaches. In the planned of Statistical Ad-Hoc on Demand Distance Vector (SAODV) approach is used to detect malicious nodes in the Mobile Adhoc Network. In this technique, statistical threshold value is obtained from mean and variance. In this approach the value is utilize to locate the (RREQ) Route Request flooding attacker nodes in the Mobile Adhoc Network. The proposed method is capable because threshold values are calculated on the source of RREQs prepared by every node in the Mobile Addhoc Network. The simulation results clearly depict that the proposed approach has significant performance in the terms of throughput, delay, packet delivery ratio, and overhead.
APA, Harvard, Vancouver, ISO, and other styles
5

Veepin Kumar and Sanjay Singla. "A Performance Analysis of MANET Routing Protocols." international journal of engineering technology and management sciences 6, no. 6 (November 28, 2022): 173–80. http://dx.doi.org/10.46647/ijetms.2022.v06i06.027.

Full text
Abstract:
A group of mobile nodes creates an arrangement connected to a remote media, forming a dynamic topology. In adhoc networks, Any time a device sends data to another node, that node uses energy, and occasionally the data transmission will halt when all the power is used up. The difficulty with MANET is reducing the energy consumption of the network's intermediary devices so that the network is active during data transmission because Mobile Adhoc Network (MANET) devices are often power-driven. Then, using performance measurements, a performance analysis is carried out across several routing protocols, including Dynamic Source Routing (DSR), Ad-hoc On-Demand Multipath Distance Vector (AOMDV), Destination-Sequenced Distance-Vector Routing (DSDV), and Ad-hoc On-Demand Distance Vector (AODV). The performance analysis is done using the NS2.35 simulator.
APA, Harvard, Vancouver, ISO, and other styles
6

Mano, Reji, P. C. Kishore Raja, Christeena Joseph, and Radhika Baskar. "Hardware Implementation of Intrusion Detection System for Ad-Hoc Network." International Journal of Reconfigurable and Embedded Systems (IJRES) 5, no. 3 (November 1, 2016): 158. http://dx.doi.org/10.11591/ijres.v5.i3.pp158-164.

Full text
Abstract:
<p>New technologies have been developed in wireless adhoc network need more security. To widespread the adhoc networks we turn in the attention of wireless hand held device mobile phones communicate with short distance using wireless lan card or Bluetooth. The performance of mobile phone are improved greatly for last few years .so security is more important for mobile networks In this paper hardware implementation of single hop ad-hoc network is implemented and analysed using microcontroller. The protocol implemented in this paper is primarily based on, Ad hoc On-Demand Distance Vector routing. We adopt On Demand Distance Vector routing solely based on source routing and “On Demand” process, so each packet does not have to transmit any periodic routing information. We implemented intrusion detection system with five different nodes and the performance parameters like packet delivery ratio, throughput, delay are computed with attacker and without attacker and on demand distance vector routing protocols is proposed to implement in hardware using Zigbee</p>
APA, Harvard, Vancouver, ISO, and other styles
7

Soundararajan, S., B. R. Tapas Bapu, C. Kotteeswaran, S. Venkatasubramanian, P. J. Sathish Kumar, and Ahmed Mudassar Ali. "Modified Adhoc On-Demand Distance Vector for Trust Evaluation And Attack Detection." Intelligent Automation & Soft Computing 36, no. 2 (2023): 1227–40. http://dx.doi.org/10.32604/iasc.2023.025752.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Sultana, Jeenat, and Tasnuva Ahmed. "Elliptic Curve Cryptography Based Data Transmission against Blackhole Attack in MANET." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 6 (December 1, 2018): 4412. http://dx.doi.org/10.11591/ijece.v8i6.pp4412-4422.

Full text
Abstract:
Mobile nodes roaming around in the hostile environment of mobile adhoc network (MANET) play the role of router as well as terminal. While acting as a router, a node needs to choose a reliable routing protocol. Besides, an encryption algorithm is needed to secure data to be conveyed through the unfriendly atmosphere while acting as a terminal. We have implemented Elliptic Curve Cryptography (ECC) along with Adhoc On Demand Multipath Distance Vector (AOMDV) routing protocol to secure data transmission against blackhole attack in a MANET. ECC, a public key cryptography that works on discrete logarithm problem with a much smaller key size, has been used to encrypt data packets at source node before transmission. We have used AOMDV, a reliable routing protocol compared to its parent protocol, Adhoc On Demand Distance Vector (AODV), with a multipath extension, for routing. The encrypted packets transferring between nodes via AOMDV, has been proved secured against blackhole attack. The performance of the secured protocol has been analyzed in terms of different performance metrics and in terms of varying number of blackhole attacker nodes.
APA, Harvard, Vancouver, ISO, and other styles
9

Gupta, Ekta, and Akhilesh Tiwari. "BPAODV: Black Hole Prevention Using Trust Adhoc on Demand Distance Vector Routing Protocol." International Journal of Future Generation Communication and Networking 7, no. 6 (December 31, 2014): 103–18. http://dx.doi.org/10.14257/ijfgcn.2014.7.6.11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Patel, Manoj, Dr Maneesh Shrivastava, and Kavita Deshmukh. "Simulation And Auditing Of Network Security Based On Probabilistic Neural Network Approach." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 3, no. 1 (August 1, 2012): 91–94. http://dx.doi.org/10.24297/ijct.v3i1b.2746.

Full text
Abstract:
: Probabilistic Neural Network approach used for mobile adhoc network is more efficient way to estimate the network security. In this paper, we are using an Adhoc On Demand Distance Vector (AODV) protocol based mobile adhoc network. In our Proposed Method we are considering the multiple characteristics of nodes. In this we use all the parameter that is necessary in AODV. For simulation purpose we use the probabilistic neural network approach that gives more efficient and accurate results as comparison to the clustering algorithm in the previous systems was used. The performance of PNN (probabilistic neural network) approach is improved for identifying the particular attack like as wormholes, black holes and selfish
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "ADHOC ON-DEMAND DISTANCE VECTOR"

1

Miško, Lukáš. "Optimalizace směrování v protokolu Ad hoc On-Demand Distance Vector." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-413102.

Full text
Abstract:
This thesis contains a theoretical basis for MANET networks. The main focus of the thesis is principles of these networks, their routing protocols and especially on Ad hoc On-Demand Distance Vector (AODV), implementation of this protocol and implementation of new mechanis for peer selection. Thesis contains ETX metric basic and implementation of this metric to AODV protocol. There is a demonstration of simulation of AODV protocol and simulation of AODV-ETX protocol. Simulations are run in Network Simulator 3. AODV and AODV-ETX comparasion are included in thesis.
APA, Harvard, Vancouver, ISO, and other styles
2

Balagam, Satya. "Enhancement of ad hoc On-Demand Distance Vector protocol security using Secure Message Transmission." Thesis, Wichita State University, 2011. http://hdl.handle.net/10057/5160.

Full text
Abstract:
The ad hoc on-demand distance vector (AODV) routing protocol offers quick adaptation to dynamic link changes, incurs low processing and memory overhead, has a low initial setup while connecting to networks, and determines unicast routes to destinations within the ad hoc network. This routing protocol allows for efficient and reliable discovery of routes. Although the connection setup delay is lower for the AODV protocol compared to other ad hoc routing protocols, such as the dynamic source routing (DSR) protocol and destination sequenced distance vector (DSDV) protocol, the AODV routing protocol involves a heavy control overload and delay while finding the routes in adverse conditions, such as the presence of malicious nodes in the network or connection failures due to network congestion. This thesis studies the secure message transmission (SMT) protocol, which safeguards data transmission against arbitrary malicious behavior of other nodes and evaluates its performance over the AODV routing protocol. The analysis of the performance of the AODV routing protocol in combination with the SMT protocol was done by considering a scenario of mobile ad hoc networks under adverse conditions, with half of the nodes acting maliciously and dropping both data and control packets. The AODV routing protocol in combination with the SMT protocol imposes up to 46% less routing overhead, delivering up to 17% more data packets, with a throughput of 12% more and end-to-end delays that are up to 24% lower than those of the native AODV routing protocols in the scenarios considered. Thus the AODV routing protocol performs well with the SMT protocol, and is reliable. The NS-2 network simulator was utilized to compare performances. The advantages of the proposed approach of using the AODV routing protocol together with the SMT protocol are more apparent in the presence of malicious nodes in the network.
Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical Engineering and Computer Science.
APA, Harvard, Vancouver, ISO, and other styles
3

Jayakeerthy, Arunkumar Thippur Lim Alvin S. "Query-localized route repair mechanism for ad-hoc on-demand distance vector routing algorithm." Auburn, Ala, 2009. http://hdl.handle.net/10415/1608.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zahary, Ammar Thabit. "Improving routing performance of multipath ad hoc on-demand distance vector in mobile add hoc networks." Thesis, De Montfort University, 2008. http://hdl.handle.net/2086/4277.

Full text
Abstract:
The aim of this research is to improve routing fault tolerance in Mobile Ad hoc Networks (MANETs) by optimising mUltipath routing in a well-studied reactive and single path routing protocol known as Ad hoc On-demand Distance Vector (AODV). The research also aims to prove the effect of varying waiting time of Route Reply (RREP) procedure and utilising the concept of efficient routes on the performance of multipath extensions to AODV. Two novel multipath routing approaches are developed in this thesis as new extensions to AODV to optimise routing overhead by improving Route Discovery Process (RDP) and Route Maintenance Process (RMP) of multipath AODV. The first approach is a Iinkdisjoint multipath extension called 'Thresho)d efficient Routes in multipath AODV' (TRAODV) that optimises routing packets ~verhead by improving the RDP of AODV which is achieved by detecting the waiting time required for RREP procedure to receive a threshold number of efficient routes. The second approach is also a link-disjoint mUltipath extension called 'On-demand Route maintenance in Multipath AoDv' (ORMAD) which is an extension to TRAODV that optimises routing packets and delay overhead by improving the RMP of TRAODV. ORMAD applies the concepts of threshold waiting time and efficient routes to both phases RDP and RMP. It also applies RMP only to efficient routes which are selected in the RDP and when a route fails, it invokes a local repair procedure between upstream and downstream nodes of the broken link. This mechanism produces a set of alternative subroutes with less number of hops which enhances route efficiency and consequently minimises the routing overhead. TRAODV and ORMAD are implemented and evaluated against two existing multipath extensions to,AODV protocol and two traditional multipath protocols. The existing extensions to AODV used in the evaluation are a well-known protocol called Ad hoc On-demand Multipath Distance Vector (AOMDV) and a recent extension called Multiple Route AODV (MRAODV) protocol which is extended in this thesis to the new approach TRAODV while the traditional multipath protocols used in the evaluation are Dynamic Source Routing (DSR) and Temporally Ordered Routing Algorithm (TORA). Protocols are implemented using NS2 and evaluated under the same simulation environment in terms of four performance metrics; packet delivery fraction, average end-to-end delay, routing packets overhead, and throughput. Simulation results of TRAODV evaluation show that the average number of routes stored in a routing table of MRAODV protocol is always larger than the average number of routes in TRAODV. Simulation results show that TRAODV reduces the overall routing packets overhead compared to both extensions AOMDV and MRAODV, especially for large network size and high mobility. A vital drawback of TRAODV is that its performance is reduced compared to AOMDV and MRAODV in terms of average end-to-end delay. Additionally, TORA still outperforms TRAODV and the other extensions to AODV in terms of routing packets overhead. In order to overcome the drawbacks of TRAODV, ORMAD is developed by improving the RDP of TRAODV. The performance of ORMAD is evaluated against RREP waiting time using the idea of utilising the efficient routes in both phases RDP and RMP. Simulation results of ORMAD show that the performance is affected by varying the two RREP waiting times of both RDP and RMP in different scenarios. As shown by the simulation results, applying the short and long waiting times in both phases tends to less performance in terms of routing packets overhead while applying the moderate waiting times tends to better performance. ORMAD enhances routing packets overhead and the average end-to-end delay compared to TRAODV, especially in high mobility scenarios. ORMAD has the closest performance to TORA protocol in terms of routing packets overhead compared to ~M~a~M~OW . Relevant concepts are formalised for ORMAD approach and conducted as an analytical model in this thesis involving the\vhole process of multipath routing in AODV extensions. ORMAD analytical model describes how the two phases RDP and RMP interact with each other with regard to two performance metrics; total number of detected routes and Route Efficiency.
APA, Harvard, Vancouver, ISO, and other styles
5

Sama, Aravind Reddy. "AOD²V : Ad Hoc On Demand and Delay Constrained Distance Vector Routing for mobile sensor/actor networks /." Available to subscribers only, 2008. http://proquest.umi.com/pqdweb?did=1619624051&sid=12&Fmt=2&clientId=1509&RQT=309&VName=PQD.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Theriot, Tyrone P. "Simulation and performance analysis of the AD HOC On-Demand Distance Vector Routing Protocol for tactical mobile ad hoc networks." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA388021.

Full text
Abstract:
Thesis (M.S. in Electrical Engineering) Naval Postgraduate School, Dec. 2000.
Thesis advisor(s): Tummala, Murali. "December 2000." Includes bibliographical references (p. 81-82). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
7

El, Moutia Abdallah. "Energy-aware Ad Hoc on-demand distance vector routing protocol and optimizing the blocking problem induced in wireless Ad Hoc networks." FIU Digital Commons, 2004. http://digitalcommons.fiu.edu/etd/3124.

Full text
Abstract:
The purpose of this thesis was to investigate some of the issues related to routing and medium access control protocol in ad hoc networks. In routing protocol, the goal is to tackle the power consumption problem and to present a case for using new cost energy-aware metric for Ad Hoc On-Demand Distance Vector (AODV). The idea of the new cost metric is to be able to avoid routes with a low energy capacity. By using this approach, high efficiency in energy consumption can be achieved in Ad-Hoc networks. The second goal of this thesis was to investigate the blocking problem induced by Request-to-Send/Clear-to-Send (RTS/CTS) mechanism in detail and provide a solution to overcome that problem. To do so, a new parameter is proposed by which the Medium Access control (MAC) protocol will decide when to switch between RTS/CTS mechanism (the 4-way-handshaking) and the Basic Access method (the 2-way-handshaking) in order to reduce the effect of the blocking problem in Ad Hoc networks.
APA, Harvard, Vancouver, ISO, and other styles
8

Aymak, Onur. "Ad Hoc Packet Routing Simulation And Tactical Picture Display Tool For Navy." Master's thesis, METU, 2004. http://etd.lib.metu.edu.tr/upload/2/12605266/index.pdf.

Full text
Abstract:
The importance of communication is vital in wartime. The capability of having all the position information of the allied and enemy forces in a single Tactical Information Display System (TIDS), maintains a great advantage for deciding what to do before the enemy reacts. A Naval Information Distributing System (NIDS) is developed for building an effective communication infrastructure between the war ships. In the designed network, besides the mobile platforms (ships), some fixed platforms (land stations) are used to transfer the information coming from these mobile platforms to all the other platforms. To demonstrate the performance and effectiveness of the Naval Information Distribution System, a discrete event simulation model is developed on a Geographic Information System. The goal of this thesis is to describe and experimentally evaluate an effective and feasible information sharing and routing system for Navy.
APA, Harvard, Vancouver, ISO, and other styles
9

Peng, Wendi Surveying &amp Spatial Information Systems Faculty of Engineering UNSW. "Roles of factors in simulation of parking guidance and information systems." Publisher:University of New South Wales. Surveying & Spatial Information Systems, 2008. http://handle.unsw.edu.au/1959.4/42788.

Full text
Abstract:
The Parking Guidance and Information (PGI) system is an important application of Intelligent Transport System (ITS), which has been shown to be an effect service for traffic information and parking management. The roadside Variable Message Sign (VMS) board has been the usual media for the publication of parking information in early PGI systems, and its performance over the years has been studied via simulations and questionnaire surveys. However, survey results show significant discrepancies across various traffic networks in different areas. More recently, parking information services have become available on other media such as mobile and in-vehicle devices. In contrast to VMS-based systems, PGI systems based on new media, especially the in-vehicle class of devices, have not been studied separately. This thesis aims to conduct research into the performance of PGI systems based on invehicle devices, by simulating and comparing a VMS-based PGI system with a Vehicle On-Board Device (VOBD)-based PGI system. A specially designed simulator utilising a routing algorithm known as the Ad hoc On-Demand Distance Vector (AODV) routing protocol in computer networks, has been created in MATLAB. The simulation minimises the influence of specific structures of traffic networks that may be found in some networks, but not others. This is done by simulating a grid-based road network where the capacities of parking stations and their geographic distribution are randomly allocated within specific zones, and the parking demand in each run of simulations is variable load. The results of simulations, including the information reliability, reduction of travel time, demand on on-street parking and the utilisation rates of parking stations, are analysed for multiple scenarios where the compliance rate, the information update policy and the strategy of human behaviour are varied. The analyses reveal a significant advantage of VOBD-based PGI systems over VMS-based PGI systems in terms of the quality of information and the reduction of travel time. At the same time, the analyses highlight the limitations of a PGI system when the demand and supply of parking stations is not appropriately balanced.
APA, Harvard, Vancouver, ISO, and other styles
10

ARORA, JATIN. "ENERGY PRESERVING ADHOC ON-DEMAND DISTANCE VECTOR." Thesis, 2014. http://dspace.dtu.ac.in:8080/jspui/handle/repository/15460.

Full text
Abstract:
Wireless devices use has been increased drastically in the last decade. To provide communication between the node which are mobile in nature and using wireless network some protocols were developed to provide faster transmission between the nodes in the network. But most of them lack in conserving the energy of the nodes to maximize the network lifetime. Energy is the main constraint in a wireless network. Each network device is running on the battery which is always limited source of energy. Hence the routing protocol should take energy of nodes as a valuable metric to perform routing which results in maximum network lifetime. Several protocols were already developed for routing in Mobile Adhoc Network (MANET) in this dissertation we enhance the Adhoc On-Demand Distance Vector (AODV) and Distance Sequenced Distance Vector (DSDV) which is widely used for routing in MANET’s. This dissertation improves AODV, DSDV protocol to optimize the routing which preserves energy to increase the network lifetime.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "ADHOC ON-DEMAND DISTANCE VECTOR"

1

QoS Analysis of AdHoc On-Demand Distance Vector Routing Protocol: Theory and Experimental Analysis by TigerHATS. Germany: LAP Lambert Academic Publishing, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Simulation and Performance Analysis of the AD HOC On-Demand Distance Vector Routing Protocol for Tactical Mobile AD HOC Networks. Storming Media, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "ADHOC ON-DEMAND DISTANCE VECTOR"

1

Vinoth Kumar, V., and S. Ramamoorthy. "Secure Adhoc On-Demand Multipath Distance Vector Routing in MANET." In Proceedings of the International Conference on Computing and Communication Systems, 49–63. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-6890-4_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Amin, Noorul, Nizamuddin, and Abdelmuttlib Ibrahim. "ECAODV: Enhanced Classified Ad-Hoc on Demand Distance Vector Routing Protocol." In Communications in Computer and Information Science, 92–100. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-28962-0_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sachan, Preeti, and Pabitra Mohan Khilar. "Authenticated Routing for Ad-Hoc On-Demand Distance Vector Routing Protocol." In Advances in Network Security and Applications, 364–73. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22540-6_35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Naidu, P. Priya, and Meenu Chawla. "Enhanced Ad Hoc on Demand Distance Vector Local Repair Trial for MANET." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 325–34. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27308-7_36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lin, Deyu, and Xiaojing Meng. "Optimization and Realization of Ad Hoc On-Demand Distance Vector Routing Based on NS2." In Communications in Computer and Information Science, 531–37. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34038-3_73.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ali, Sara. "An Enhanced Virtual Private Network Authenticated Ad Hoc On-Demand Distance Vector Routing." In Learning and Analytics in Intelligent Systems, 190–97. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-24322-7_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Khimsara, Siddharth, Kashyap K. R. Kambhatla, June Hwang, Sunil Kumar, and John D. Matyjas. "AM-AOMDV: Adaptive Multi-metric Ad-Hoc On-Demand Multipath Distance Vector Routing." In Ad Hoc Networks, 884–95. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-11723-7_61.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ács, Gergely, Levente Buttyán, and István Vajda. "Provable Security of On-Demand Distance Vector Routing in Wireless Ad Hoc Networks." In Security and Privacy in Ad-hoc and Sensor Networks, 113–27. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11601494_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Soni, Brijesh, Biplab Kumar Sarkar, and Arjun Rajput. "Improvising the Ad hoc on Demand Distance Vector Routing Protocol When Nodes or Links Fails." In Proceedings of All India Seminar on Biomedical Engineering 2012 (AISOBE 2012), 285–92. India: Springer India, 2012. http://dx.doi.org/10.1007/978-81-322-0970-6_32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Goyal, Monika, Deepak Goyal, and Sandeep Kumar. "Dragon-AODV: Efficient Ad Hoc On-Demand Distance Vector Routing Protocol Using Dragon Fly Algorithm." In Advances in Intelligent Systems and Computing, 181–91. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-0751-9_17.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "ADHOC ON-DEMAND DISTANCE VECTOR"

1

Mangrulkar, R. S., and Mohammad Atique. "Trust based secured adhoc On demand Distance Vector Routing protocol for mobile adhoc network." In 2010 Sixth International Conference on Wireless Communication and Sensor Networks (WCSN). IEEE, 2010. http://dx.doi.org/10.1109/wcsn.2010.5712310.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Alkhamisi, Abrar Omar, and Seyed M. Buhari. "Trusted Secure Adhoc On-demand Multipath Distance Vector Routing in MANET." In 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA). IEEE, 2016. http://dx.doi.org/10.1109/aina.2016.105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pawar, Mahesh, Narayan Patidar, Kashif Khan, Shuja Kashif Khan, and Ausaf Umar Khan. "Congestion Avoidance Mechanism in Adhoc On-Demand Distance Vector Routing Protocol for Mobile AdHoc Networks." In 2022 International Conference on Electronics and Renewable Systems (ICEARS). IEEE, 2022. http://dx.doi.org/10.1109/icears53579.2022.9752198.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Nancharaiah, B., and B. Chandra Mohan. "Modified Ant Colony Optimization to enhance MANET routing in Adhoc on demand Distance Vector." In 2014 2nd International Conference on Business and Information Management (ICBIM). IEEE, 2014. http://dx.doi.org/10.1109/icbim.2014.6970938.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Khan, Ausaf Umar, Manish Devendra Chawhan, Milind Madhukar Mushrif, and Bhumika Neole. "Performance Analysis of Adhoc On-demand Distance Vector Protocol under the influence of Black-Hole, Gray-Hole and Worm-Hole Attacks in Mobile Adhoc Network." In 2021 5th International Conference on Intelligent Computing and Control Systems (ICICCS). IEEE, 2021. http://dx.doi.org/10.1109/iciccs51141.2021.9432072.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Robba, Andrea, and Piero Maestrini. "Routing in Mobile Ad-hoc Networks: the Virtual Distance Vector Protocol." In 2007 IEEE Internatonal Conference on Mobile Adhoc and Sensor Systems. IEEE, 2007. http://dx.doi.org/10.1109/mobhoc.2007.4428601.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Nithya, S., G. A. Kumar, and P. Adhavan. "Destination-sequenced distance vector routing (DSDV) using clustering approach in mobile adhoc network." In 2012 International Conference on Radar, Communication and Computing (ICRCC 2012). IEEE, 2012. http://dx.doi.org/10.1109/icrcc.2012.6450604.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Perkins, C. E., and E. M. Royer. "Ad-hoc on-demand distance vector routing." In Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications. IEEE, 1999. http://dx.doi.org/10.1109/mcsa.1999.749281.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kumar, K. B. Senthil, R. Tarun, A. K. Sowparnika, and P. M. Sasi. "Hybrid on Demand Multipath Distance Vector Routing Protocol." In 2015 International Conference on Developments of E-Systems Engineering (DeSE). IEEE, 2015. http://dx.doi.org/10.1109/dese.2015.39.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ali, Mona Sayed Mohmmed, Ghassan M. T. Abdalla, and Mohammed Ali Hamad Abbas. "Modified Ad hoc On-Demand Distance Vector (MAODV)Protocol." In 2018 International Conference on Computer, Control, Electrical, and Electronics Engineering (ICCCEEE). IEEE, 2018. http://dx.doi.org/10.1109/iccceee.2018.8515831.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "ADHOC ON-DEMAND DISTANCE VECTOR"

1

Perkins, C., E. Belding-Royer, and S. Das. Ad hoc On-Demand Distance Vector (AODV) Routing. RFC Editor, July 2003. http://dx.doi.org/10.17487/rfc3561.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography