Mobile Ad-hoc Networking with AODV: A Review.

RH Jhaveri, NM Patel - International Journal of Next …, 2015 - search.ebscohost.com
Abstract Mobile Ad-hoc Networks (MANETs) are becoming a promising and popular way to
carry out ubiquitous computing in numerous vital applications. Unique characteristics of …

Systematic review on modification to the ad-hoc on-demand distance vector routing discovery mechanics

I Alameri, J Komarkova, T Al-Hadhrami, A Lotfi - PeerJ Computer Science, 2022 - peerj.com
Mobile ad-hoc networks (MANETs) and wireless mesh networks (WMNs) are used in a
variety of research areas, including the military, industry, healthcare, agriculture, the Internet …

Modelling and verifying the AODV routing protocol

R van Glabbeek, P Höfner, M Portmann, WL Tan - Distributed Computing, 2016 - Springer
This paper presents a formal specification of the Ad hoc On-demand Distance Vector
(AODV) routing protocol using AWN (Algebra for Wireless Networks), a recent process …

A process algebra for wireless mesh networks used for modelling, verifying and analysing AODV

A Fehnker, R Van Glabbeek, P Höfner, A McIver… - arXiv preprint arXiv …, 2013 - arxiv.org
We propose AWN (Algebra for Wireless Networks), a process algebra tailored to the
modelling of Mobile Ad hoc Network (MANET) and Wireless Mesh Network (WMN) …

ORGMA: Reliable opportunistic routing with gradient forwarding for MANETs

D Kang, HS Kim, C Joo, S Bahk - Computer Networks, 2018 - Elsevier
For decades, numerous routing protocols have been designed to serve unicast traffic in
wireless ad hoc networks. However, these routing protocols still provide limited performance …

Performance evaluation of an AODV-based routing protocol implementation by using a novel in-field WSN diagnosis tool

G Mujica, J Portilla, T Riesgo - Microprocessors and Microsystems, 2015 - Elsevier
Abstract The Wireless Sensor Network research field has been growing and becoming more
mature during the last decade since novel technologies and research lines have emerged …

MP-MID: Multi-Protocol Oriented Middleware-level Intrusion Detection method for wireless sensor networks

Q Guo, X Li, G Xu, Z Feng - Future Generation Computer Systems, 2017 - Elsevier
It is very difficult to detect intrusions in wireless sensor networks (WSN), because of its
dynamic network topology and diverse routing protocols. Traditional Intrusion Detection …

A timed process algebra for wireless networks with an application in routing

E Bres, R van Glabbeek, P Höfner - … on Programming, ESOP 2016, Held as …, 2016 - Springer
This paper proposes a timed process algebra for wireless networks, an extension of the
Algebra for Wireless Networks. It combines treatments of local broadcast, conditional unicast …

Formal analysis of proactive, distributed routing

M Kamali, P Höfner, M Kamali, L Petre - … 2015, York, UK, September 7-11 …, 2015 - Springer
As (network) software is such an omnipresent component of contemporary mission-critical
systems, formal analysis is required to provide the necessary certification or at least formal …

Towards a rigorous analysis of AODVv2 (DYMO)

S Edenhofer, P Höfner - 2012 20th IEEE International …, 2012 - ieeexplore.ieee.org
Dynamic MANET On-demand (AODVv2) routing, formerly known as DYMO, is a routing
protocol especially designed for wireless, multi hop networks. AODVv2 determines routes in …