{"title":"移动自组网路由协议研究进展","authors":"G. Mohandas, S. Silas, S. Sam","doi":"10.1109/IMAC4S.2013.6526467","DOIUrl":null,"url":null,"abstract":"The Mobile Ad hoc Networks (MANET) are networks with self-configuring capacity of mobile devices interconnected by wireless links. During the last few years, research in various aspects of MANETs has been prominent, prompted mainly by military, disaster relief, and law enforcement scenarios. An instinctive footstep is to take up such location-based operation to MANETS. In various applications, including military and law enforcement, node identities are not virtually as helpful as node locations. In suspicious MANETs, nodes do not even trust each other; hence identities must be concealed. This paper attempts to contribute a study and comparison on routing protocols in mobile adhoc networks.","PeriodicalId":403064,"journal":{"name":"2013 International Mutli-Conference on Automation, Computing, Communication, Control and Compressed Sensing (iMac4s)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"50","resultStr":"{\"title\":\"Survey on routing protocols on mobile adhoc networks\",\"authors\":\"G. Mohandas, S. Silas, S. Sam\",\"doi\":\"10.1109/IMAC4S.2013.6526467\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Mobile Ad hoc Networks (MANET) are networks with self-configuring capacity of mobile devices interconnected by wireless links. During the last few years, research in various aspects of MANETs has been prominent, prompted mainly by military, disaster relief, and law enforcement scenarios. An instinctive footstep is to take up such location-based operation to MANETS. In various applications, including military and law enforcement, node identities are not virtually as helpful as node locations. In suspicious MANETs, nodes do not even trust each other; hence identities must be concealed. This paper attempts to contribute a study and comparison on routing protocols in mobile adhoc networks.\",\"PeriodicalId\":403064,\"journal\":{\"name\":\"2013 International Mutli-Conference on Automation, Computing, Communication, Control and Compressed Sensing (iMac4s)\",\"volume\":\"120 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-03-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"50\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 International Mutli-Conference on Automation, Computing, Communication, Control and Compressed Sensing (iMac4s)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IMAC4S.2013.6526467\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 International Mutli-Conference on Automation, Computing, Communication, Control and Compressed Sensing (iMac4s)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IMAC4S.2013.6526467","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Survey on routing protocols on mobile adhoc networks
The Mobile Ad hoc Networks (MANET) are networks with self-configuring capacity of mobile devices interconnected by wireless links. During the last few years, research in various aspects of MANETs has been prominent, prompted mainly by military, disaster relief, and law enforcement scenarios. An instinctive footstep is to take up such location-based operation to MANETS. In various applications, including military and law enforcement, node identities are not virtually as helpful as node locations. In suspicious MANETs, nodes do not even trust each other; hence identities must be concealed. This paper attempts to contribute a study and comparison on routing protocols in mobile adhoc networks.