๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

An efficient multiple-path routing protocol for ad hoc networks

โœ Scribed by Ming-Hong Jiang; Rong-Hong Jan; Chu-Fu Wang


Publisher
Elsevier Science
Year
2002
Tongue
English
Weight
183 KB
Volume
25
Category
Article
ISSN
0140-3664

No coin nor oath required. For personal study only.

โœฆ Synopsis


An ad hoc network is a cooperative engagement of a collection of mobile hosts that requires no intervening of any centralized access point or existing infrastructure. Each mobile host, operating as a specialized router, forwards packets from other mobile hosts. The possibility of fast movement of mobile hosts means network topologies may change frequently. Thus, applying traditional routing schemes to ad hoc networks is inappropriate. In this paper, we present an efยฎcient routing protocol called the multiple next hops (MNH) routing protocol, which is based on the ad hoc on-demand distance vector (AODV) routing protocol for ad hoc networks. The proposed MNH protocol establishes multiple paths for a route discovery procedure, thus conserving network bandwidth and reducing route reconstruction times when routing paths fail. Numerical experiments are given to show the effectiveness of the MNH routing protocol.


๐Ÿ“œ SIMILAR VOLUMES


Secure position-based routing protocol f
โœ Joo-Han Song; Vincent W.S. Wong; Victor C.M. Leung ๐Ÿ“‚ Article ๐Ÿ“… 2007 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 297 KB

In large and dense mobile ad hoc networks, position-based routing protocols can offer significant performance improvement over topology-based routing protocols by using location information to make forwarding decisions. However, there are several potential security issues for the development of posi

Efficient identity-based security scheme
โœ Muhammad Bohio; Ali Miri ๐Ÿ“‚ Article ๐Ÿ“… 2004 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 286 KB

Wireless ad hoc networks consist of nodes with no central administration and rely on the participating nodes to share network responsibilities. Such networks are more vulnerable to security attacks than conventional wireless networks. We propose two efficient security schemes for these networks that