References
- C. E. Perkins, E. Belding-Royer, and S. Das. "Ad hoc on-demand distance vector (AODV) routing," IETF Internet RFC 3561, July 2003.
- D. B. Johnson, D. A. Maltz, and Y. Hu, Dynamic source routing protocol for mobile ad hoc networks (DSR), April 2003. IETF Internet Draft, draft-ietf-manet-dsr-09.txt.
- C. E. Perkins and P. Bhagwat, "Highly Dynamic Destination Sequenced Distance-Vector Routing (DSDV) for mobile computers," in Proc. Of the ACM SIGCOMM'94 Conference on communication Architectures. Protocols and Applications, pp.223-244, August, 1994.
- E. Nordstrom. (2004) AODV implementation on Linux. AODV-UU. [Online]. Available: http:// sourceforge.net/projects/aodvuu/ (last accessed on April 7, 2013).
- S. Das, C. E. Perkins, and M. Elizabeth. Royer. "Performance comparison of two on-demand routing protocols for ad hoc networks." Proc. of INFOCOM, pp. 3-12, March 2000.
- E. M. Royer, C. E Perkins, "An implementation study of the AODV routing protocol", Wireless Communications and Networking Conference, 2000, pp.1003-1008.
- Dept. of Computer Systems, Uppsala University (Sweden). "E: Ad hoc Protocol Evaluation Test-bed". http://apetestbed.sourceforge.net. (last accessed on April 4, 2013).
- E. Borgia. "Experimental evaluation of ad hoc routing protocols." Proc. of Pervasive Computing and Communications Workshops, pp. 232-236, March 2005.
- H. Lundgren, D. Lundberg, J. Nielsen, E. Nordstrm, and C. F. Tschudin, "A Large-scale Testbed for Reproducible Ad hoc protocol Evaluations," in IEEE Wireless Communications and Networking Conference 2002 (WCNC), March 2002.
- I. D. Chakeres, "AODV-UCSB Implementation from University of California Santa Barbara," http://moment.cs.ucsb.edu/AODV/aodv.html (last accessed on April 4, 2013).
- L. Klein-Berndt, "Kernel AODV from National Institute of Standard and Technology (NIST)," http://w3.antd.nist.gov/wctg/aodv_kernel/.
- V. Kawadia, Y. Zhang, and B. Gupta, "System Services for Implementing Ad-Hoc Routing: Architecture, Implementation and experiences," in Proceedings of MobiSys, San Francisco, CA, June 2003, pp.99-112.
- T. K. Song, J. J. Kang, H. S. Ahn, "A flooding Scheme Based on Packet Reception Counts for Ad Hoc Networks", The journal of the Institute of Webcasting, Internet and Telecommunication, vol.11 no.2, 2011.
- Y. C. Hwang, J. I. Kim, J. S. Kim, "Malicious Node Detection Mechanism of Consideration compromised Node in MANET", The journal of Korean Institute of Information Technology, vol.7 no.5, 2009.
Cited by
- An Ad-hoc Routing Protocol for High-speed Multimedia Traffic Based on Path Quality and Bandwidth Estimation in Wireless Ad Hoc Networks vol.13, pp.6, 2013, https://doi.org/10.7236/JIIBC.2013.13.6.203