Localization-Based
Routing Protocols. A vector-based forwarding (VBF)
routing protocol is proposed in literature [14].
Then, a secure multicast
routing protocol based on the trust model is presented to deal with multiple attacks (e.g., black attack, grey attack, slander attack) from malicious vehicular nodes.
In this paper, we modeled MAC layer
routing protocol for constructive energy exhaustion and throughput which would consume lesser energy than the existing protocol so as to inculcate the real time holder of the slot and non owner data for medical applications.
In Dynamic Source
Routing protocol (DSR) [6], each node contains a route cache and with new route the cache is updated.
The security of vulnerable domain is maintained by a securing
routing protocol. To avoid the impact of WHAs on the QoS of integrated network, a Secure Neighborhood Authenticated Strict priority Equal-cost multipath RIPv2 (SNAuth_SPERIPv2) distance vector
routing protocol is designed and for further enhancement of security in integrated network, integrate the secure distance vector
routing protocol with different layer security schemes.
So we considered the abstracted network formed by
routing protocol possessing time-spatial features and proposed "time-spatial" network model.
In the controlled mobility, the mobile element is guided based on the control of the
routing protocol. The movement of the mobile element is controlled based on some factors such as energy level, avoiding energy hole or hotspot problem [20], and connectivity, to achieve better results.
AODV is a reactive
routing protocol that searches for routes on demand.
During simulation it is considered that there are two paths that are discovered in the
routing protocol. Performance of protocol is tested using software NS2 (based on discrete event on the LINUX).
Currently there are a number of published survey papers regarding the
routing protocol in UWSNs[2,10,12-19].
The DYMO
routing protocol uses hop by hop routing mechanism, if A Node (source) need to send data to D Node (destination), (A) will flood the network by broadcast RREQ packet to all the other neighboring nodes in the network, (B) Node (intermediate node) broadcast received RREQ packet after adds itself to RREQ packet, if the node (D) receives the RREQ packet, it passes the RREP packet to the sender node A by unicast RREP packet.