Академический Документы
Профессиональный Документы
Культура Документы
DEVICES
Output: Next face to be traversed Fnext Output: Packet routed from source to destination node
V. REFERENCES
[1] Robust Position based routing for wireless ad-hoc
networks, Kousha Moaveninejad, Wen-Zhan Song,
Xiang-Yang Li, Elsevier Science, Illinois Institute of
4. Parameters - Simulation for multiple sources and Technology
single sink under varying burst rate [2] Face Routing in Wireless Ad-hoc Networks,
Xiaoyang Guan, Graduate Department of Computer
Source Packet Packet Idle Packet Science University of Toronto, Copyright 2009 by
Xiaoyang Guan
Node size Burst Time Rate [3] Prevention of Impersonation Attack in wireless
mobile ad-hoc networks, Latha Tamilselvan and Dr.
(kB) (s) (s) (k) V. Sankaranarayanan, IJCSNS International Journal
of Computer Science and Network Security, VOL.7
1 200 2 2 200 No.3, March 2007
[4] On Delivery Guarantees of Face and Combined
9 200 4 2 200 Greedy-Face Routing in Ad Hoc and Sensor
7 200 6 2 200 Networks, Hannes Frey, Ivan Stojmenovic,
MobiCom’06, September 23–26, 2006, Los Angeles,
California, USA.
[5] Real Time Intrusion Detection for Ad-hoc
networks, Ioanna Stamouli, University of Dublin,
September 2003.
[6] Young-Jin Kim, Ramesh Govindan, Brad Karp,
and Scott Shenker. On the pitfalls of geographic face
routing. In Third ACM/SIGMOBILE International
Workshop on Foundation of Mobile Computing,
DIAL-M-POMC, 2005.