Localization-Based Routing Protocols
. A vector-based forwarding (VBF) routing protocol
is proposed in literature .
Then, a secure multicast routing protocol
based on the trust model is presented to deal with multiple attacks (e.g., black attack, grey attack, slander attack) from malicious vehicular nodes.
In this paper, we modeled MAC layer routing protocol
for constructive energy exhaustion and throughput which would consume lesser energy than the existing protocol so as to inculcate the real time holder of the slot and non owner data for medical applications.
In Dynamic Source Routing protocol
(DSR) , each node contains a route cache and with new route the cache is updated.
The security of vulnerable domain is maintained by a securing routing protocol
. To avoid the impact of WHAs on the QoS of integrated network, a Secure Neighborhood Authenticated Strict priority Equal-cost multipath RIPv2 (SNAuth_SPERIPv2) distance vector routing protocol
is designed and for further enhancement of security in integrated network, integrate the secure distance vector routing protocol
with different layer security schemes.
So we considered the abstracted network formed by routing protocol
possessing time-spatial features and proposed "time-spatial" network model.
In the controlled mobility, the mobile element is guided based on the control of the routing protocol
. The movement of the mobile element is controlled based on some factors such as energy level, avoiding energy hole or hotspot problem , and connectivity, to achieve better results.
AODV is a reactive routing protocol
that searches for routes on demand.
During simulation it is considered that there are two paths that are discovered in the routing protocol
. Performance of protocol is tested using software NS2 (based on discrete event on the LINUX).
Currently there are a number of published survey papers regarding the routing protocol
The DYMO routing protocol
uses hop by hop routing mechanism, if A Node (source) need to send data to D Node (destination), (A) will flood the network by broadcast RREQ packet to all the other neighboring nodes in the network, (B) Node (intermediate node) broadcast received RREQ packet after adds itself to RREQ packet, if the node (D) receives the RREQ packet, it passes the RREP packet to the sender node A by unicast RREP packet.