{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T12:18:11Z","timestamp":1762431491635,"version":"build-2065373602"},"reference-count":200,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2018,4,30]],"date-time":"2018-04-30T00:00:00Z","timestamp":1525046400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Informatics"],"abstract":"<jats:p>A mobile ad hoc network (MANET) is a self-configuring wireless network in which each node could act as a router, as well as a data source or sink. Its application areas include battlefields and vehicular and disaster areas. Many techniques applied to infrastructure-based networks are less effective in MANETs, with routing being a particular challenge. This paper presents a rigorous study into simulation techniques for evaluating routing solutions for MANETs with the aim of producing more realistic simulation models and thereby, more accurate protocol evaluations. MANET simulations require models that reflect the world in which the MANET is to operate. Much of the published research uses movement models, such as the random waypoint (RWP) model, with arbitrary world sizes and node counts. This paper presents a technique for developing more realistic simulation models to test and evaluate MANET protocols. The technique is animation, which is applied to a realistic scenario to produce a model that accurately reflects the size and shape of the world, node count, movement patterns, and time period over which the MANET may operate. The animation technique has been used to develop a battlefield model based on established military tactics. Trace data has been used to build a model of maritime movements in the Irish Sea. Similar world models have been built using the random waypoint movement model for comparison. All models have been built using the ns-2 simulator. These models have been used to compare the performance of three routing protocols: dynamic source routing (DSR), destination-sequenced distance-vector routing (DSDV), and ad hoc n-demand distance vector routing (AODV). The findings reveal that protocol performance is dependent on the model used. In particular, it is shown that RWP models do not reflect the performance of these protocols under realistic circumstances, and protocol selection is subject to the scenario to which it is applied. To conclude, it is possible to develop a range of techniques for modelling scenarios applicable to MANETs, and these simulation models could be utilised for the evaluation of routing protocols.<\/jats:p>","DOI":"10.3390\/informatics5020022","type":"journal-article","created":{"date-parts":[[2018,4,30]],"date-time":"2018-04-30T11:09:46Z","timestamp":1525086586000},"page":"22","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Building Realistic Mobility Models for Mobile Ad Hoc Networks"],"prefix":"10.3390","volume":"5","author":[{"given":"Adrian","family":"Pullin","sequence":"first","affiliation":[{"name":"School of Computing, Creative Technologies, Leeds Beckett University, Headingley Campus, Leeds LS6 3QS, UK"}]},{"given":"Colin","family":"Pattinson","sequence":"additional","affiliation":[{"name":"School of Computing, Creative Technologies, Leeds Beckett University, Headingley Campus, Leeds LS6 3QS, UK"}]},{"given":"Ah-Lian","family":"Kor","sequence":"additional","affiliation":[{"name":"School of Computing, Creative Technologies, Leeds Beckett University, Headingley Campus, Leeds LS6 3QS, UK"}]}],"member":"1968","published-online":{"date-parts":[[2018,4,30]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Pullin, A.J., and Pattinson, C. (2008, January 23\u201325). A Realistic Battlefield Model for the Evaluation of MANET. Proceedings of the Fifth Annual Conference on Wireless on Demand Network Systems and Services (WONS 2008), Garmisch-Partenkirchen, Germany.","DOI":"10.1109\/WONS.2008.4459359"},{"key":"ref_2","unstructured":"Pullin, A. (2014). Techniques for Building Realistic Simulation Models for Mobile Ad Hoc Network Research. [Ph.D. Thesis, Leeds Beckett University]."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Abramson, N. (1970). The Aloha System. AFIPS Conference Proceedings, AFIPS Press.","DOI":"10.1145\/1478462.1478502"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1145\/360248.360253","article-title":"Ethernet: Distributed Packet Switching for Local Computer Networks","volume":"19","author":"Metcalfe","year":"1976","journal-title":"Commun. ACM"},{"key":"ref_5","unstructured":"IEEE (2016, July 14). OFFICIAL IEEE 802.11 WORKING GROUP PROJECT TIMELINES, 2013. Retrieved from IEEE 802.11 Working Group. Available online: http:\/\/grouper.ieee.org\/groups\/802\/11\/Reports\/802.11_Timelines.htm."},{"key":"ref_6","unstructured":"ITU (2018, April 25). ITU Paves Way for Next-generation 4G Mobile Technologies, 2010. Geneva: ITU. Retrieved 01 19, 2013, from. Available online: http:\/\/www.itu.int\/net\/pressoffice\/press_releases\/2010\/40.aspx#.U3niMSgvCbc."},{"key":"ref_7","unstructured":"HuaWei (2016, June 30). 5G: A Technology Vision, 2013. Available online: http:\/\/www.huawei.com\/5gwhitepaper\/."},{"key":"ref_8","unstructured":"Badu Networks (2016, June 30). The Wireless Last Hop, 2016. Available online: http:\/\/badunetworks.com\/wp-content\/uploads\/2016\/02\/WLH.pdf."},{"key":"ref_9","unstructured":"Computerworld (2016, June 30). 10 Things You Need to Do to Manage Your Network Effectively, 2011. Available online: http:\/\/www.computerworld.com\/article\/2470688\/endpoint-security\/10-things-you-need-to-do-to-manage-your-network-effectively.html."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Imieli\u0144ski, T., and Korth, H.F. (1996). Dynamic Source Routing in Ad Hoc Networks. Mobile Computing, Kluwer Acdamic Publisher.","DOI":"10.1007\/b102605"},{"key":"ref_11","unstructured":"Cisco (2016, June 30). Mobile Ad Hoc Networking. Available online: http:\/\/www.cisco.com\/c\/en\/us\/products\/ios-nx-os-software\/mobile-ad-hoc-networking\/index.html."},{"key":"ref_12","unstructured":"IEEE (2016, June 30). IEEE 802.11\u2122: Wireless LANs, 2016. Available online: http:\/\/standards.ieee.org\/about\/get\/802\/802.11.html."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"317","DOI":"10.1016\/S1389-1286(03)00284-6","article-title":"Power-saving protocols for IEEE 802.11-based multi-hop ad hoc networks","volume":"43","author":"Tseng","year":"2003","journal-title":"Comput. Netw."},{"key":"ref_14","unstructured":"Gossain, H., Nandiraju, N., Anand, K., and Agrawal, D.P. (2004, January 16\u201318). Supporting MAC Layer Multicast in IEEE 802.11 based MANETs: Issues and Solutions. Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks (LCN\u201904), Tampa, FL, USA."},{"key":"ref_15","first-page":"54","article-title":"IEEE 802.11 Based MAC Improvements for MANET","volume":"2","author":"Dureja","year":"2010","journal-title":"IJCA Spec. Issue MANETs"},{"key":"ref_16","first-page":"358","article-title":"An Adaptive MAC 802.11 Protocol for MANET Using Exponential Algorithm","volume":"4","author":"Patheja","year":"2013","journal-title":"Int. J. Comput. Sci. Inf. Technol. IJCSIT."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Cavilla, A.L., Baron, G., Hart, T.E., Litty, L., and de Lara, E. (2004, January 4\u20137). Simplified Simulation Models for Indoor MANET Evaluation are not Robust. Proceedings of the First Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (IEEE SECON 2004), Santa Clara, CA, USA.","DOI":"10.1109\/SAHCN.2004.1381964"},{"key":"ref_18","doi-asserted-by":"crossref","unstructured":"Munjal, A., Camp, T., and Navidi, W.C. (2010, January 12\u201315). Constructing rigorous MANET simulation scenarios with realistic mobility. Proceedings of the European Wireless Conference (EW), Lucca, Italy.","DOI":"10.1109\/EW.2010.5483539"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Sommer, C., Dietrich, I., and Dressler, F. (2007, January 1\u201311). Realistic Simulation of Network Protocols in VANET Scenarios. Proceedings of the IEEE Mobile Networking for Vehicular Environments, Anchorage, AK, USA.","DOI":"10.1109\/MOVE.2007.4300819"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Lan, K.C., and Chou, C.M. (2008, January 24). Realistic mobility models for Vehicular Ad hoc Network (VANET) simulations. Proceedings of the 8th International Conference on ITS Telecommunications (ITST 2008), Phuket, Thailand.","DOI":"10.1109\/ITST.2008.4740287"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Musolesi, M., and Mascolo, C. (2006, January 26). A Community Based Mobility Model for Ad Hoc Network Research. Proceedings of the REALMAN\u201906, Florence, Italy.","DOI":"10.1145\/1132983.1132990"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1016\/j.adhoc.2011.07.012","article-title":"Modeling human mobility in obstacle-constrained ad hoc networks","volume":"10","author":"Papageorgiou","year":"2012","journal-title":"Ad Hoc Netw."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1109\/PROC.1987.13702","article-title":"The DARPA Packet Radio Network Protocols","volume":"75","author":"Jubin","year":"1987","journal-title":"Proc. IEEE"},{"key":"ref_24","unstructured":"Perkins, C.E., and Bhagwat, P. (September, January 31). Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers. Proceedings of the conference on Communications Architectures, Protocols and Applications (SIGCOMM \u201894), London, UK."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Perkins, C., and Royer, E. (1999, January 25\u201326). Ad-hoc On-Demand Distance Vector Routing. Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications, New Orleans, LA, USA.","DOI":"10.1109\/MCSA.1999.749281"},{"key":"ref_26","first-page":"82","article-title":"Mobility models based performance evaluation of AOMDV routing protocol of MANET","volume":"3","author":"Singh","year":"2017","journal-title":"Int. J. Appl. Res."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Bianchi, A., Pizzutilo, S., and Vessio, G. (2014, January 29\u201331). Preliminary description of NACK-based ad-hoc On-demand Distance Vector routing protocol for MANETs. Proceedings of the 2014 9th International Conference on Software Engineering and Applications (ICSOFT-EA), Vienna, Austria.","DOI":"10.5220\/0005105305000505"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Bianchi, A., Pizzutilo, S., and Vessio, G. (2015, January 11\u201313). Comparing AODV and N-AODV Routing Protocols for Mobile Ad-hoc Networks. Proceedings of the 13th International Conference on Advances in Mobile Computing and Multimedia (MoMM 2015), Brussels, Belgium.","DOI":"10.1145\/2837126.2837129"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Bianchi, A., and Pizzutilo, S. (2010, January 20\u201325). Studying MANET through a Petri Net-based Model. Proceedings of the 2010 IEEE Second International Conference on Evolving Internet, Valencia, Spain.","DOI":"10.1109\/INTERNET.2010.44"},{"key":"ref_30","first-page":"29","article-title":"Suitability of Abstract State Machines for Discussing Mobile Ad-hoc Networks","volume":"1","author":"Bianchi","year":"2014","journal-title":"Glob. J. Adv. Softw. Eng."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Lalanne, F., and Maag, S. (2013, January 1\u20135). DataMonitor-A Formal Approach for Passively Testing a MANET Routing Protocol. Proceedings of the Wireless Communications and Mobile Computing Conference (IWCMC), Sardinia, Italy.","DOI":"10.1109\/IWCMC.2013.6583560"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Cavalli, A., Maag, S., de Oca, E.M., and Zaidi, F. (2009, January 9\u201313). A Formal Passive Testing Approach to test a MANET Routing Protocol. Proceedings of the IEEE International Conference on Pervasive Computing and Communications, PerCom, Galveston, TX, USA.","DOI":"10.1109\/PERCOM.2009.4912874"},{"key":"ref_33","unstructured":"Borger, E., and Stark, R.F. (2003). Abstract State Machines: A Method for High-Level System Design and Analysis, Springer."},{"key":"ref_34","unstructured":"Vessio, G. (2018, March 18). Reasoning about Properties with Abstract State Machines. Available online: http:\/\/www.disim.univaq.it\/staf2015\/wp-content\/uploads\/STAF15-DS_submission_1.pdf."},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Gaaloul, K., Schmidt, R., Nurcan, S., Guerreiro, S., and Ma, Q. Applying Predicate Abstraction to Abstract State Machines. Enterprise, Business-Process and Information Systems Modeling, Springer. CAISE 2015, Lecture Notes in Business Information Processing.","DOI":"10.1007\/978-3-319-19237-6"},{"key":"ref_36","unstructured":"IEFT (2018, April 25). (n.d.) MANET Status Page. Retrieved 09 30, 2013 from IEFT Tools. Available online: http:\/\/tools.ietf.org\/wg\/manet\/charters."},{"key":"ref_37","unstructured":"Antonakkais, M. (2016, July 14). Re: [manet] Real-Life Deployment of MANETs, 2007. Retrieved IEFT MANET Mailing List Archive. Available online: https:\/\/www.ietf.org\/mail-archive\/web\/manet\/current\/msg09031.html."},{"key":"ref_38","unstructured":"Buraiky, S. (2016, July 14). Re: [manet] MANET APPLICATION IN Business, 2008. Retrieved from IEFT MANET Mailing List Archive. Available online: http:\/\/www.ietf.org\/mail-archive\/web\/manet\/current\/msg10488.html."},{"key":"ref_39","unstructured":"Buddenberg, R. (2016, July 14). Re: [manet] Deployment Experience, 2011. Retrieved from IEFT MANET Mailing List Archive. Available online: http:\/\/www.ietf.org\/mail-archive\/web\/manet\/current\/msg11985.html."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"704","DOI":"10.1016\/j.csi.2013.12.005","article-title":"Mutual authentication in self organized VANETs","volume":"36","year":"2014","journal-title":"Comput. Stand. Interfaces"},{"key":"ref_41","unstructured":"Hoebeke, J., Moerman, I., Dhoedt, B., and Demeester, P. (2016, July 14). An Overview of Mobile Ad Hoc Networks: Applications and Challenges. Available online: http:\/\/cwi.unik.no\/images\/Manet_Overview.pdf."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1109\/MCOM.2007.343617","article-title":"Multihop Ad Hoc Networking: The Reality","volume":"45","author":"Conti","year":"2007","journal-title":"IEEE Commun. Mag."},{"key":"ref_43","unstructured":"Monarch Project (2016, July 14). Monarch Project, 2004. Available online: http:\/\/www.cs.cmu.edu\/~.\/dbj\/mobile.html."},{"key":"ref_44","first-page":"50","article-title":"Survey of Wireless MANET Application in Battlefield Operations","volume":"2","author":"Rajabhushanam","year":"2011","journal-title":"Int. J. Adv. Comput. Sci. Appl. IJACSA."},{"key":"ref_45","unstructured":"Atherton, A.D. (2016, July 14). Darpa Wants To Build A Better Battlefield Internet, 2013. Available online: http:\/\/www.popsci.com\/technology\/article\/2013-04\/darpa-wants-build-better-battlefield-internet."},{"key":"ref_46","unstructured":"Barker, D. (2016, July 14). (nd). Bringing Mobile Ad Hoc Networks to the Battlefield Using COTS Open Standards, EE Catalogue. Available online: http:\/\/www.xes-inc.com\/assets\/files_indexed\/145006_MANETMil-AeroGuide2012.pdf."},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Lu, X., Chen, Y.C., Leung, I., Xiong, Z., and Li\u00f2, P. (2008, January 10\u201312). A Novel Mobility Model from a Heterogeneous Military MANET Trace. Proceedings of the 7th International Conference (ADHOC-NOW 2008), Sophia Antipolis, France.","DOI":"10.1007\/978-3-540-85209-4_37"},{"key":"ref_48","unstructured":"Vegni, A.M., Biagi, M., and Cusani, R. (2013). Chapter 1: Smart Vehicles, Technologies and Main Applications in Vehicular Ad hoc Networks. InTech."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"12","DOI":"10.4236\/cn.2013.51B004","article-title":"Applications of VANETs: Present & Future","volume":"5","author":"Kumar","year":"2013","journal-title":"J. Commun. Netw."},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Aschenbruck, N., Ernst, R., Gerhards-Padilla, E., and Schwamborn, M. (2010, January 15\u201319). BonnMotion\u2014A Mobility Scenario Generation and Analysis Tool. Proceedings of the 3rd International ICST Conference on Simulation Tools and Techniques, Malaga, Spain.","DOI":"10.4108\/ICST.SIMUTOOLS2010.8684"},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"324","DOI":"10.1016\/j.adhoc.2005.12.003","article-title":"A survey on real-world implementations of mobile ad-hoc networks","volume":"5","author":"Kiess","year":"2007","journal-title":"Ad Hoc Netw."},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Maltz, D.A., Broch, J., and Johnson, D. (2016, July 14). Experiences Designing and Building a Multi-Hop Wireless Ad Hoc Network Testbed, 1999. Carnegie Mellon University, School of Computer Science. Available online: http:\/\/www.monarch.cs.rice.edu\/monarch-papers\/CMU-CS-99-116.ps.","DOI":"10.21236\/ADA368412"},{"key":"ref_53","unstructured":"Lundgren, H., Lundberg, D., Nielsen, J., Nordstrom, E., and Tschudin, C. (2002, January 17\u201321). A Large Scale Testbed for Reproducible Ad Hoc Protocol Evaluations. Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC\u201902), Orlando, FL, USA."},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Gray, R.S., Kotz, D., Newport, C.C., Dubrovsky, N., Fiske, A., Liu, J., Masone, C., McGrath, S., and Yuan, Y. (2004, January 4\u20136). Outdoor experimental comparison of four ad hoc routing algorithms. In Proceedings of the 7th ACM International Symposium on Modelling, Analysis and Simulation of Wireless and Mobile Systems, Venice, Italy.","DOI":"10.1145\/1023663.1023703"},{"key":"ref_55","unstructured":"Saha, A., To, K., Chaudhuri, S., Du, S., and Johnson, D. (2005, January 12\u201314). Physical Implementation and Evaluation of Ad Hoc Network Routing Protocols using Unmodified Simulation Models. Proceedings of the SIGCOM Asia Workshop, Beijing, China."},{"key":"ref_56","unstructured":"APE (2016, July 14). Ad Hoc Protocol Evaluation, 2002. Available online: http:\/\/apetestbed.sourceforge.net\/."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1016\/j.adhoc.2004.07.007","article-title":"Lessons from experimental MANET research","volume":"3","author":"Tschudin","year":"2005","journal-title":"Ad Hoc Netw."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1016\/j.adhoc.2008.05.002","article-title":"Experimentation-oriented platform for development and evaluation of MANET cross-layer protocols","volume":"7","author":"Noubir","year":"2009","journal-title":"Ad Hoc Netw."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"588","DOI":"10.1016\/j.jnca.2010.03.018","article-title":"Moving routing protocols to the user space in MANET middleware","volume":"33","author":"Lopez","year":"2010","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1016\/j.camwa.2011.07.035","article-title":"Performance comparison of OLSR and BATMAN routing protocols by a MANET testbed in stairs environment","volume":"63","author":"Kulla","year":"2012","journal-title":"Comput. Math. Appl."},{"key":"ref_61","unstructured":"Biaz, S., Miller, C., and Walstad, C. (, January June). Creating Virtually Mobile Nodes for Testing Ad hoc Routing Protocols. Proceedings of the 2005 International Conference on Wireless Networks (ICWN\u201905), Las Vegas, NV, USA."},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Hortelano, J., Cano, J.-C., Calafate, C.T., and Manzoni, P. (2009). Testing Applications in MANET Environments through Emulation. EURASIP J. Wirel. Commun. Netw., 2009.","DOI":"10.1155\/2009\/406979"},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Kim, Y., Taylor, K., Dunbar, C., Walker, B., and Mundur, P. (2011, January 28). Reality vs emulation: Running real mobility traces on a mobile wireless testbed hotplanet2011. Proceedings of the 3rd ACM International Workshop on MobiArch (HotPlanet \u201811), Bethesda, MD, USA.","DOI":"10.1145\/2000172.2000180"},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1109\/2.841785","article-title":"Advances in Network Simulation","volume":"33","author":"Breslau","year":"2000","journal-title":"Computer"},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Cavin, D., Sasson, Y., and Schiper, A. (2002). On the Accuracy of MANET Simulators. ACM POMC\u201902, ACM Press.","DOI":"10.1145\/584498.584499"},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/1096166.1096174","article-title":"MANET Simulation Studies: The Incredibles","volume":"9","author":"Kurkowski","year":"2005","journal-title":"ACM SIGMOBILE Mob. Comput. Commun. Rev."},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/MC.2006.242","article-title":"On the credibility of manet simulations","volume":"39","author":"Andel","year":"2006","journal-title":"Computer"},{"key":"ref_68","first-page":"1189","article-title":"A survey and comparative study of simulators for vehicular ad hoc networks (VANETs)","volume":"11","author":"Martinez","year":"2009","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_69","first-page":"1390","article-title":"Simulation of points of interest distribution in vehicular networks","volume":"88","author":"Rivas","year":"2012","journal-title":"Simul. Trans. Soc. Model. Simul. Int."},{"key":"ref_70","first-page":"3","article-title":"On the Different Forms of Spanning Tree-based Broadcast Topologies for Mobile Ad hoc Networks","volume":"4","author":"Meghanathan","year":"2013","journal-title":"Int. J. Comb. Optim. Probl. Inform."},{"key":"ref_71","first-page":"241","article-title":"Survey on Simulation Tools for Mobile Ad-Hoc Networks","volume":"2","author":"Mallapur","year":"2012","journal-title":"Int. J. Comput. Netw. Wirel. Commun. IJCNWC."},{"key":"ref_72","doi-asserted-by":"crossref","unstructured":"Kumar, A., Kaushik, S., Sharma, R., and Raj, P. (2012, January 14\u201315). Simulators for Wireless Networks: A Comparative Study. Proceedings of the 2012 IEEE International Conference on Computing Sciences (ICCS), Phagwara, India.","DOI":"10.1109\/ICCS.2012.65"},{"key":"ref_73","first-page":"203","article-title":"Detail Comparison of Network Simulators","volume":"5","author":"Kabir","year":"2014","journal-title":"Int. J. Sci. Eng. Res."},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1016\/j.entcs.2005.12.025","article-title":"An Overview of MANETs Simulation","volume":"150","author":"Hogie","year":"2006","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"ref_75","doi-asserted-by":"crossref","unstructured":"Broch, J., Maltz, D.A., Johnson, D.B., Hu, Y.-C., and Jetcheva, J. (1998, January 25\u201330). A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. Proceedings of the Fourth Annual ACM\/IEEE International Conference on Mobile Computing and Networking (MobiCom\u201998), Dallas, TX, USA.","DOI":"10.1145\/288235.288256"},{"key":"ref_76","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1109\/98.904895","article-title":"Performance comparison of two on-demand routing protocols for ad hoc networks","volume":"8","author":"Perkins","year":"2001","journal-title":"IEEE Pers. Commun."},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"483","DOI":"10.1002\/wcm.72","article-title":"A Survey of MANET Routing Protocols in Mobility Models","volume":"2","author":"Camp","year":"2002","journal-title":"Wirel. Commun. Mob. Comput."},{"key":"ref_78","doi-asserted-by":"crossref","unstructured":"Song, L., and Kotz, D.F. (2007, January 14). Evaluating Opportunistic Routing Protocols with Large Realistic Contact Traces. Proceedings of the Second ACM workshop on Challenged Networks (CHANTS 2007), Montreal, QC, Canada.","DOI":"10.1145\/1287791.1287799"},{"key":"ref_79","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1016\/j.simpat.2011.11.004","article-title":"On the accuracy of physical layer modelling within wireless network simulators","volume":"22","author":"Bazzi","year":"2012","journal-title":"Simul. Model. Pract. Theory"},{"key":"ref_80","first-page":"19","article-title":"Impact of Node Mobility on MANET Routing Protocols Models","volume":"5","author":"Divecha","year":"2007","journal-title":"J. Digital Inf. Manag."},{"key":"ref_81","unstructured":"Johnson, D.B., and Maltz, D.A. (2016, July 14). Dynamic Source Routing in Ad Hoc Wireless Networks, 2007. Available online: http:\/\/www.cs.colorado.edu\/~rhan\/CSCI_7143_Fall_2007\/Papers\/Johnson96_DSR.pdf."},{"key":"ref_82","doi-asserted-by":"crossref","first-page":"2456","DOI":"10.1109\/TVT.2010.2045014","article-title":"Design and Performance of Secure Geocast for Vehicular Communication","volume":"59","author":"Festag","year":"2010","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_83","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1016\/j.adhoc.2012.04.009","article-title":"Improving path duration in high mobility vehicular ad hoc networks","volume":"11","author":"Oliveira","year":"2013","journal-title":"Ad Hoc Netw."},{"key":"ref_84","doi-asserted-by":"crossref","first-page":"833","DOI":"10.1016\/j.asoc.2012.10.024","article-title":"An evolutionary computation approach for optimizing connectivity in disaster response scenarios","volume":"13","author":"Reina","year":"2013","journal-title":"Appl. Soft Comput."},{"key":"ref_85","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1007\/s12652-012-0113-3","article-title":"Modelling and assessing ad hoc networks in disaster scenarios","volume":"4","author":"Reina","year":"2013","journal-title":"J. Ambient Intell. Hum. Comput."},{"key":"ref_86","doi-asserted-by":"crossref","first-page":"3795","DOI":"10.1016\/j.comnet.2012.08.017","article-title":"RIVER: A reliable inter-vehicular routing protocol for vehicular ad hoc networks","volume":"56","author":"Bernsen","year":"2012","journal-title":"Comput. Netw."},{"key":"ref_87","first-page":"137","article-title":"Investigation of Network Simulation Tools and Comparison Study: NS3 vs NS2","volume":"5","author":"Patel","year":"2015","journal-title":"J. Netw. Commun. Emerg. Technol. JNCET"},{"key":"ref_88","first-page":"608","article-title":"Comparative Study of Network Simulator: NS2 and NS3","volume":"6","author":"Katkar","year":"2016","journal-title":"Int. J. Adv. Res. Comput. Sci. Softw. Eng."},{"key":"ref_89","first-page":"291","article-title":"A Detailed Analogy of Network Simulators\u2014NS1, NS2, NS3 and NS4","volume":"3","author":"Saluja","year":"2017","journal-title":"Int. J. Future Revolut. Comput. Sci. Commun. Eng."},{"key":"ref_90","unstructured":"Ns 3 Simulations (2018, April 13). (nd). NS3 Manet Simulation. Available online: http:\/\/ns3simulation.com\/ns3-manet-simulation\/."},{"key":"ref_91","first-page":"1","article-title":"Performance Analysis of AODV & OLSR for MANET","volume":"2","author":"Midha","year":"2013","journal-title":"Int. J. Eng. Res. Tech. (IJERT)"},{"key":"ref_92","doi-asserted-by":"crossref","unstructured":"Rajankumar, P., Nimisha, P., and Kamboj, P. (2014, January 5\u20137). A Comparative Study and Simulation of AODV MANET Routing Protocol in NS2 & NS3. Proceedings of the IEEE International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India.","DOI":"10.1109\/IndiaCom.2014.6828091"},{"key":"ref_93","first-page":"17","article-title":"Performance Comparison of Routing Protocols of MANET in Real World Scenario using NS3","volume":"99","author":"Singla","year":"2014","journal-title":"Int. J. Comput. Appl. (0975-8887)"},{"key":"ref_94","first-page":"62","article-title":"A Comparative Performance Analysis of Routing Protocols in MANET using NS3 Simulator","volume":"4","author":"Jha","year":"2015","journal-title":"Int. J. Comput. Netw. Inf. Secur."},{"key":"ref_95","first-page":"560","article-title":"Performance Evaluation of AODV and DSDV using NS-3","volume":"6","author":"Kaur","year":"2016","journal-title":"Int. J. Innov. Eng. Technol."},{"key":"ref_96","first-page":"187","article-title":"Performance Comparison and Evaluation of the Routing Protocols for MANETs Using NS3","volume":"5","author":"Mai","year":"2017","journal-title":"J. Electr. Eng."},{"key":"ref_97","first-page":"179","article-title":"Packet Receiving Rate Analysis in Various Manet Protocols Using NS-3","volume":"116","author":"Karanati","year":"2017","journal-title":"Int. J. Pure Appl. Math."},{"key":"ref_98","doi-asserted-by":"crossref","first-page":"704","DOI":"10.1016\/j.comcom.2010.11.002","article-title":"Trace-based mobility modeling for multi-hop wireless networks","volume":"34","author":"Aschenbruck","year":"2011","journal-title":"Comput. Commun."},{"key":"ref_99","doi-asserted-by":"crossref","unstructured":"Krug, S., Siracusa, M.F., Schellenberg, S., Begerow, P., Seitz, J., Finke, T., and Schroeder, J. (2014, January 19). Movement Patterns for Mobile Networks in Disaster Scenarios. Proceedings of the IEEE 15th International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM), Sydney, NSW, Australia.","DOI":"10.1109\/WoWMoM.2014.6918914"},{"key":"ref_100","doi-asserted-by":"crossref","unstructured":"Helgason, O., Kouyoumdjieva, S.T., and Karlsson, G. (2010, January 3\u20135). Does Mobility Matter?. Proceedings of the 2010 Seventh International Conference on Wireless On-demand Network Systems and Services (WONS), Kranjska Gora, Slovenia.","DOI":"10.1109\/WONS.2010.5437138"},{"key":"ref_101","doi-asserted-by":"crossref","unstructured":"Nikolaidis, I., and Wu, K. (2010). Towards Modeling Realistic Mobility for Performance Evaluations in MANET. Ad-Hoc, Mobile and Wireless Networks, Springer. ADHOC-NOW 2010, Lecture Notes in Computer Science.","DOI":"10.1007\/978-3-642-14785-2"},{"key":"ref_102","doi-asserted-by":"crossref","first-page":"773","DOI":"10.1016\/j.peva.2009.07.009","article-title":"Modeling mobility in disaster area scenarios","volume":"66","author":"Aschenbruck","year":"2009","journal-title":"Perform. Eval."},{"key":"ref_103","doi-asserted-by":"crossref","unstructured":"Nelson, S.C., Harris, A.F., and Kravets, R. (2007, January 14). Event-driven, role-based mobility in disaster recovery networks. Proceedings of the second ACM workshop on Challenged Networks (CHANTS 2007), Montreal, QC, Canada.","DOI":"10.1145\/1287791.1287798"},{"key":"ref_104","first-page":"54","article-title":"Mobility Modeling in Mobile Ad Hoc Networks with Environment-Aware","volume":"1","author":"Lu","year":"2006","journal-title":"J. Netw."},{"key":"ref_105","doi-asserted-by":"crossref","unstructured":"Karnadi, F.K., Mo, Z.H., and Lan, K.C. (2007, January 11\u201315). Rapid Generation of Realistic Mobility Models for VANET. Proceedings of the 2007 IEEE Wireless Communications and Networking Conference (WCNC), Kowloon, China.","DOI":"10.1109\/WCNC.2007.467"},{"key":"ref_106","doi-asserted-by":"crossref","unstructured":"Ekman, F., Ker\u00e4nen, A., Karvo, J., and Ott, J. (2008, January 26). Working Day Movement Model. Proceedings of the 1st ACM SIGMOBILE Workshop on Mobility Models (MobilityModels 2008), Hong Kong, China.","DOI":"10.1145\/1374688.1374695"},{"key":"ref_107","doi-asserted-by":"crossref","first-page":"5220","DOI":"10.3390\/s130405220","article-title":"Identifying the Key Factors Affecting Warning Message Dissemination in VANET Real Urban Scenarios","volume":"13","author":"Fogue","year":"2013","journal-title":"Sensors"},{"key":"ref_108","doi-asserted-by":"crossref","first-page":"223","DOI":"10.4103\/0256-4602.98864","article-title":"A Review of Techniques for the Analysis of Simulation Output","volume":"29","author":"Zafar","year":"2012","journal-title":"IETE Tech. Rev."},{"key":"ref_109","doi-asserted-by":"crossref","first-page":"1217","DOI":"10.1016\/j.comcom.2012.03.007","article-title":"Mitigating the impact of node mobility using mobile backbone for heterogeneous MANETs","volume":"35","author":"Xia","year":"2012","journal-title":"Comput. Commun."},{"key":"ref_110","first-page":"35","article-title":"An Effect of Route Caching Scheme in DSR for Vehicular Adhoc Networks","volume":"4","author":"Kori","year":"2012","journal-title":"Int. J. Comput. Sci. Eng."},{"key":"ref_111","doi-asserted-by":"crossref","unstructured":"Alshanyour, A., and Baroudi, U. A Simulation Study: The Impact of Random and Realistic Mobility Models on the Performance of Bypass-AODV in Ad Hoc Wireless Networks. EURASIP J. Wirel. Commun. Netw., 2010.","DOI":"10.1155\/2010\/239370"},{"key":"ref_112","first-page":"3493","article-title":"Effect of Realistic Vehicular Traces on the Performance of Broadcasting Techniques in Vehicular Ad Hoc Networks","volume":"4","author":"Das","year":"2012","journal-title":"Res. J. Appl. Sci. Eng. Technol."},{"key":"ref_113","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1023\/B:MONE.0000031592.23792.1c","article-title":"Performance Evaluation of Routing Protocols for Ad Hoc Wireless Networks","volume":"9","author":"Boukerche","year":"2004","journal-title":"Mob. Netw. Appl."},{"key":"ref_114","first-page":"44","article-title":"Analysis and Optimization of Dynamic Source Routing Protocol for Wireless Mobile Ad Hoc Networks","volume":"4","author":"Uzoh","year":"2012","journal-title":"IUP J. Telecommun."},{"key":"ref_115","first-page":"120","article-title":"Comparative Performance Exploration of AODV, DSDV & DSR Routing Protocol in Cluster Based VANET Environment","volume":"4","author":"Sharma","year":"2012","journal-title":"Int. J. Adv. Eng. Technol. IJAET"},{"key":"ref_116","doi-asserted-by":"crossref","unstructured":"Rani, N., Sharma, P., and Sharma, P. (2012). Performance Comparison of Various Routing Protocols in Different Mobility Models. Int. J. Ad-Hoc Sens. Ubiquitous Comput. IJASUC, 3.","DOI":"10.5121\/ijasuc.2012.3408"},{"key":"ref_117","unstructured":"Zhou, B., Xu, K., and Gerla, M. (November, January 31). Group and swarm mobility models for ad hoc network scenarios using virtual tracks. Proceedings of the 2004 IEEE Military Communications Conference (MILCOM04), Monterey, CA, USA."},{"key":"ref_118","doi-asserted-by":"crossref","unstructured":"Seah, W., Lee, F., Mock, K., Ng, E., and Kwek, M. (2006, January 25\u201328). Mobility modeling of rush hour traffic for multihop routing in mobile wireless networks. Proceedings of the IEEE Vehicular Technology Society Fall 2006, Montreal, QC, Canada.","DOI":"10.1109\/VTCF.2006.434"},{"key":"ref_119","unstructured":"nS2 (2016, July 14). (nd). User Information. Available online: http:\/\/nsnam.sourceforge.net\/wiki\/index.php\/User_Information."},{"key":"ref_120","first-page":"31","article-title":"Best Selection of Mobility Model for MANET Using NS-2","volume":"6","author":"Aljebori","year":"2013","journal-title":"Orient. J. Comput. Sci. Technol."},{"key":"ref_121","first-page":"40","article-title":"Evaluation of Varying Mobility Models & Network Loads on DSDV Protocol of MANETs","volume":"1","author":"Agrawal","year":"2009","journal-title":"Int. J. Comput. Sci. Eng. (IJCSE)"},{"key":"ref_122","first-page":"161","article-title":"Metric driven mobility modeling in Tactical Networks","volume":"10","author":"Ray","year":"2013","journal-title":"J. Def. Model. Simul. Appl. Methodol. Technol."},{"key":"ref_123","doi-asserted-by":"crossref","first-page":"414","DOI":"10.4103\/0256-4602.103175","article-title":"The Impact of Mobility Models on the Performance of Mobile Ad Hoc Network Routing Protocol","volume":"29","author":"Zuhairi","year":"2012","journal-title":"IETE Tech. Rev."},{"key":"ref_124","first-page":"1624","article-title":"A simulation based QoS review of multipath routing protocols for MANET","volume":"4","author":"Periyasamy","year":"2012","journal-title":"Int. J. Adv. Netw. Appl."},{"key":"ref_125","doi-asserted-by":"crossref","unstructured":"Yoon, J., Liu, M., and Nobel, B. (April, January 30). Random Waypoints Considered Harmful. Proceedings of the Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE INFOCOM 2003), San Francisco, CA, USA.","DOI":"10.1109\/INFCOM.2003.1208967"},{"key":"ref_126","doi-asserted-by":"crossref","first-page":"573","DOI":"10.1016\/S0167-739X(00)00040-6","article-title":"A java based simulator for ad-hoc networks","volume":"17","author":"Sanchez","year":"2001","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_127","unstructured":"Royer, E.M., Melliar-Smith, P.M., and Moser, L.E. (2001, January 11\u201314). An analysis of the optimum node density for ad hoc mobile networks. Proceedings of the IEEE International Conference on Communications, Helsinki, Finland."},{"key":"ref_128","unstructured":"Haas, Z.J. (1997, January 12\u201316). A New Routing Protocol for the Reconfigurable Wireless Networks. Proceedings of the 6th IEEE International Conference on Universal Personal Communications, San Diego, CA, USA, USA."},{"key":"ref_129","doi-asserted-by":"crossref","first-page":"718","DOI":"10.1109\/TNET.2003.815301","article-title":"Predictive distance-based mobility management for Multidimensional PCS Networks","volume":"11","author":"Liang","year":"2003","journal-title":"IEEE\/ACM Trans. In Netw."},{"key":"ref_130","doi-asserted-by":"crossref","first-page":"1633","DOI":"10.1016\/j.jnca.2012.03.008","article-title":"Mobility prediction in mobile wireless networks","volume":"35","author":"Torkestani","year":"2012","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_131","doi-asserted-by":"crossref","first-page":"998","DOI":"10.1016\/j.adhoc.2010.09.002","article-title":"Modelling Mobility: A Discrete Revolution","volume":"9","author":"Clementi","year":"2011","journal-title":"Ad Hoc Netw."},{"key":"ref_132","doi-asserted-by":"crossref","unstructured":"Cano, J.C., Calafate, C., Manzoni, P., and Toh, C.K. (2007, January 5\u20137). Modeling of mobility and groups in inter-vehicular MANET-based networks. Proceedings of the 2nd International Symposium on Wireless Pervasive Computing (ISWPC \u201807), San Juan, Puerto Rico.","DOI":"10.1109\/ISWPC.2007.342625"},{"key":"ref_133","first-page":"18","article-title":"Performance Comparison of MANET Protocols Based on Manhattan Grid Mobility Model","volume":"2","author":"Jayakumar","year":"2008","journal-title":"J. Mob. Commun."},{"key":"ref_134","unstructured":"Bai, F., Sadagopan, N., and Helmy, A. (April, January 30). Important: A framework to systematically analyze the impact of mobility on performance of routing protocols for adhoc networks. Proccedings of the Twenty-Second Annual Joint Conference of the IEEE Computer and Communications \uff08IEEE INFOCOM\uff09, San Francisco, CA, USA."},{"key":"ref_135","doi-asserted-by":"crossref","unstructured":"Blakely, K., and Lowekamp, B. (2004, January 1). A structured group mobility model for the simulation of mobile ad hoc networks. Proceedings of the International Conference on Mobile Computer Networks, Philadelphia, PA, USA.","DOI":"10.1145\/1023783.1023805"},{"key":"ref_136","unstructured":"CRAWDAD (2018, April 25). Retrieved from CRAWDAD. Available online: http:\/\/crawdad.cs.dartmouth.edu\/."},{"key":"ref_137","unstructured":"Helmy, A. (2016, July 14). (n.d.). MobiLib: Community-wide Library of Mobility and Wireless Networks Measurements. Retrieved from MobiLib. Available online: http:\/\/www.cise.ufl.edu\/~helmy\/MobiLib.htm."},{"key":"ref_138","doi-asserted-by":"crossref","first-page":"451","DOI":"10.4304\/jcm.7.6.451-457","article-title":"Vehicular Testbeds\u2014Model Validation before Large Scale Deployment","volume":"7","author":"Gerla","year":"2012","journal-title":"J. Commun."},{"key":"ref_139","unstructured":"Citeulike (2016, July 14). (nd). CiteULike Group: CRAWDAD library. Available online: http:\/\/www.citeulike.org\/group\/5303\/library."},{"key":"ref_140","doi-asserted-by":"crossref","unstructured":"Chipara, O., Griswold, W.G., Plymoth, A.N., Huang, R., Liu, F., Johansson, P., Rao, R., Chan, T.C., and Buono, C. (2012, January 25\u201329). WIISARD: A measurement study of network properties and protocol reliability during an emergency response. Proceedings of the 10th International Conference on Mobile Systems, Applications, and Services (MobiSys \u201812), Low Wood Bay, Lake District, UK.","DOI":"10.1145\/2307636.2307674"},{"key":"ref_141","unstructured":"Zhu, X., Bai, Y., Yang, W., Peng, Y., and Bi, C. (2012, January 15\u201317). SAME: A students\u2019 daily activity mobility model for campus delay-tolerant networks. Proceedings of the 18th Asia-Pacific Conference on Communications (APCC 2012), Jeju Island, Korea."},{"key":"ref_142","doi-asserted-by":"crossref","unstructured":"Mehta, P., and Voisard, A. (2012, January 6). Analysis of User Mobility Data Sources for Multi-User Context Modeling. Proceedings of the 1st ACM SIGSPATIAL International Workshop on Crowdsourced and Volunteered Geographic Information (ACM SIGSPATIAL GEOCROWD \u201912), Redondo Beach, CA, USA.","DOI":"10.1145\/2442952.2442955"},{"key":"ref_143","doi-asserted-by":"crossref","unstructured":"Jetcheva, J., Hu, Y.-C., Pal, S., Amit, C., Saha, K., and Johnson, D.B. (2003, January 9\u201310). Design and Evaluation of a Metropolitan Area Multitier Wireless Ad Hoc Network Architecture. Proceedings of the 5th IEEE Workshop on Mobile Computing Syst. & Applications (WMCSA 2003), Monterey, CA, USA.","DOI":"10.1109\/MCSA.2003.1240765"},{"key":"ref_144","doi-asserted-by":"crossref","unstructured":"Maeda, K., Sato, K., Konishi, K., Yamasaki, A., Uchiyama, A., Yamaguchi, H., Yasumoto, K., and Higashino, T. (2005, January 10\u201313). Getting Urban Pedestrian Flow from Simple Observation: Realistic Mobility Generation in Wireless Network Simulation. Proceedings of the 8th ACM\/IEEE International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM 2005), Montr\u00e9al, QC, Canada.","DOI":"10.1145\/1089444.1089471"},{"key":"ref_145","first-page":"1072","article-title":"A Metropolitan Taxi Mobility Model from Real GPS Traces","volume":"18","author":"Huang","year":"2012","journal-title":"J. Univ. Comput. Sci."},{"key":"ref_146","doi-asserted-by":"crossref","unstructured":"Munjal, A., Camp, T., and Aschenbruck, N. (2012). Changing Trends in Modeling Mobility. J. Electr. Comput. Eng., 2012.","DOI":"10.1155\/2012\/372572"},{"key":"ref_147","doi-asserted-by":"crossref","first-page":"3032","DOI":"10.1016\/j.comnet.2011.05.010","article-title":"Routing protocols in ad hoc networks: A survey","volume":"55","author":"Boukerche","year":"2011","journal-title":"Comput. Netw."},{"key":"ref_148","first-page":"370","article-title":"A Survey on Energy Efficient Routing Protocols for MANET","volume":"6","author":"Yuvaraj","year":"2013","journal-title":"Int. J. Adv. Eng. Technol. IJAET"},{"key":"ref_149","doi-asserted-by":"crossref","first-page":"685","DOI":"10.1016\/j.jnca.2012.12.023","article-title":"Position-based routing in vehicular networks: A survey","volume":"36","author":"Bilal","year":"2013","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_150","doi-asserted-by":"crossref","first-page":"500","DOI":"10.1007\/s11036-012-0427-6","article-title":"A Beacon-Less Geographic Multipath Routing Protocol for Ad Hoc Networks","volume":"18","author":"Dong","year":"2013","journal-title":"Mob. Netw. Appl."},{"key":"ref_151","doi-asserted-by":"crossref","first-page":"2290","DOI":"10.1109\/TVT.2012.2237556","article-title":"A Loose-Virtual-Clustering-Based Routing for Power Heterogeneous MANETs","volume":"62","author":"Zhao","year":"2013","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_152","unstructured":"Network Simulators (2016, July 14). AWK Scripts for NS2 to process data from Trace Files, 2013. Available online: http:\/\/www.nsnam.com\/2013\/03\/awk-scripts-for-ns2-to-process-data.html."},{"key":"ref_153","unstructured":"Sadasivam, K., Changrani, V., and Yang, T. (2005, January 27\u201330). Scenario based performance evaluation of secure routing in MANETs. Proceedings of the 2nd International Workshop on Mobile Ad Hoc Networks and Interoperability Issues MANETII\u201905, Las Vegas, NV, USA."},{"key":"ref_154","doi-asserted-by":"crossref","unstructured":"Naumov, V., Baumann, R., and Gross, T. (2006, January 22\u201325). An Evaluation of Inter Vehicle Ad Hoc Networks Based on Realistic Vehicular Traces. Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2006), Florence, Italy.","DOI":"10.1145\/1132905.1132918"},{"key":"ref_155","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/j.eij.2011.04.001","article-title":"Evaluation comparison of some ad hoc networks routing protocols","volume":"12","author":"Radwan","year":"2011","journal-title":"Egypt. Inform. J."},{"key":"ref_156","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1049\/iet-ifs.2012.0244","article-title":"Link quality-based cache replacement technique in mobile ad hoc network","volume":"7","author":"Dhanapal","year":"2013","journal-title":"IET Inf. Secur."},{"key":"ref_157","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1007\/s11633-013-0696-y","article-title":"Development and Verification of Simulation Model Based on Real MANET Experiments for Transport Layer Protocols (UDP and TCP)","volume":"10","author":"Kamal","year":"2013","journal-title":"Int. J. Autom. Comput."},{"key":"ref_158","unstructured":"Farrimond, B., Parkinson, L., and Pogson, F. (2001., January 22\u201324). Teaching with Dynamic Maps on the Web. Proceedings of the BITE 2001, Conference for Information Technology in Higher Education, Eindhoven, The Netherlands."},{"key":"ref_159","unstructured":"Anderson, J., Dunning, A., and Fraser, M. (2003). Modelling History with XML. DRH 2001 and 2002 Selected Papers from the Digital Resources for the Humanities Conferences 2001 and 2002, Office for Humanities Communication."},{"key":"ref_160","unstructured":"Chellappa Doss, R., Jennings, A., and Shenoy, N. (2004, January 8\u201310). A Review of Current Mobility Prediction Techniques for Ad Hoc Networks. Proceedings of the 4th IASTED International multi-conference Wireless and Optical Communications, Banff, AB, Canada."},{"key":"ref_161","unstructured":"Bai, F., and Helmy, A. (2016, July 14). Chapter 1: A Survey of Mobility Models in Wireless Ad Hoc and Sensor Networks, 2004. Available online: http:\/\/www.cise.ufl.edu\/~helmy\/papers\/Survey-Mobility-Chapter-1.pdf."},{"key":"ref_162","doi-asserted-by":"crossref","unstructured":"Jayakumar, G., and Ganapathi, G. (2008). Reference Point Group Mobility and Random Waypoint Models in Performance Evaluation of MANET Routing Protocols. J. Comput. Syst. Netw. Commun., 2008.","DOI":"10.1155\/2008\/860364"},{"key":"ref_163","first-page":"526","article-title":"Design an Energy Efficient DSDV Routing Protocol for Mobile Ad Hoc Network","volume":"5","author":"Amamd","year":"2012","journal-title":"Int. J. Adv. Eng. Technol."},{"key":"ref_164","first-page":"1260","article-title":"Provide a Method to Prediction of Nodes Movement to Optimize Routing Algorithms in Ad Hoc Networks","volume":"4","author":"Jahani","year":"2012","journal-title":"Int. J. Comput. Sci. Eng."},{"key":"ref_165","doi-asserted-by":"crossref","unstructured":"Perkins, C., and Belding-Royer, E. Ad hoc On-Demand Distance Vector (AODV) Routing, 2003. Available online: https:\/\/dl.acm.org\/citation.cfm?id=RFC3561. IETF.","DOI":"10.17487\/rfc3561"},{"key":"ref_166","unstructured":"Ryu, B., Andersen, T., and Elbatt, T. (2003, January 6\u20139). Multi-tier mobile ad hoc routing. Proceedings of the IEEE Vehicular Technology Conference, Orlando, FL, USA."},{"key":"ref_167","unstructured":"Choi, J.M., and Ko, Y.B. (2004, January 25\u201328). A Performance Evaluation for Ad Hoc Routing Protocols in Realistic Military Scenarios. Proceedings of the 9th International Conference on Cellular and Intelligent Communications (CIC2004), Seoul, Korea."},{"key":"ref_168","unstructured":"Hsu, J., Bhatia, S., Takai, M., Bagrodia, R., and Acriche, M. (November, January 31). Performance of Mobile Ad Hoc Networking Routing Protocols in Large Scale Scenarios. Proceedings of IEEE Military Communications Conference (MILCOM), Monterey, CA, USA."},{"key":"ref_169","unstructured":"US Army (2016, July 14). FM 71-100\u2014Division Operations. Washington DC, USA, 1996, Available online: http:\/\/www.globalsecurity.org\/military\/library\/policy\/army\/fm\/71-100\/ref.htm."},{"key":"ref_170","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1016\/j.pmcj.2005.01.002","article-title":"From battlefields to urban grids: New research challenges in ad hoc wireless networks","volume":"1","author":"Gerla","year":"2005","journal-title":"Pervasive Mob. Comput."},{"key":"ref_171","doi-asserted-by":"crossref","unstructured":"Hong, X., Gerla, M., Pei, G., and Chiang, C.-C. (1999, January 20). A group mobility model for ad hoc wireless networks. Proceedings of the International Workshop on Modeling Analysis and Simulation of Wireless and Mobile Systems (MSWiM), Seattle, Washington, DC, USA.","DOI":"10.1145\/313237.313248"},{"key":"ref_172","first-page":"88","article-title":"A survey of group merge and split mobility models","volume":"2","author":"Sacko","year":"2007","journal-title":"Ubiquitous Comput. Commun. J."},{"key":"ref_173","first-page":"14","article-title":"Two-Level ZigBee-4G Design for Secure and Efficient Communications in the Resources Constrained Military Environment","volume":"7","author":"Szczodrak","year":"2007","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"key":"ref_174","first-page":"101","article-title":"Improving Multi-path AODV by Utilizing All Available Paths for a Small Tactical Network","volume":"2","author":"Deepshikha","year":"2014","journal-title":"Int. J. Eng. Tech. Res. (IJETR)"},{"key":"ref_175","doi-asserted-by":"crossref","unstructured":"Kuiper, E., and Nadjm-Tehrani, S. (2006, January 29\u201331). Mobility Models for UAV group reconnaissance applications. Proceedings of the International Conference on Wireless and Mobile Communications (ICWMC), Bucharest, Romania.","DOI":"10.1109\/ICWMC.2006.63"},{"key":"ref_176","unstructured":"Kiwior, D., and Lam, L. (2016, July 14). Routing protocol performance over intermittent links, 2007. MITRE Technical Paper. MITRE. Available online: http:\/\/www.mitre.org\/work\/tech_papers\/tech_papers_07\/07_0778\/07_0778.pdf."},{"key":"ref_177","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1007\/s10846-013-9959-7","article-title":"Networking Models in Flying Ad-Hoc Networks (FANETs): Concepts and Challenges","volume":"74","author":"Sahingoz","year":"2014","journal-title":"J. Intell. Robot. Syst."},{"key":"ref_178","unstructured":"Jahnke, M., Wenzel, A., Klein, G., Aschenbruck, N., Gerhards-Padilla, E., Ebinger, P., and Karsch, S. (2008, January 13\u201314). MITE\u2014MANET Intrusion Detection for Tactical Environments. Proceedings of the NATO\/RTO Research Symposium on Information Assurance for Emerging and Future Military Systems (RSY IST-076), Ljubliana, Slovenia."},{"key":"ref_179","doi-asserted-by":"crossref","first-page":"117","DOI":"10.5121\/ijwmn.2011.3609","article-title":"MAC Layer Performance: Study and Analysis for Different Mobility Conditions in WSN","volume":"3","author":"Pandey","year":"2011","journal-title":"Int. J. Wirel. Mob. Netw. (IJWMN)"},{"key":"ref_180","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1016\/j.adhoc.2012.05.009","article-title":"Optimal trajectory determination of a single moving beacon for efficient localization in a mobile ad-hoc network","volume":"11","author":"Miles","year":"2013","journal-title":"Ad Hoc Netw."},{"key":"ref_181","unstructured":"NATO (2016, July 14). Guide to Modelling & Simulation (M&S) for NATO Network-Enabled Capability (\u201cM&S for NNEC\u201d), 2012. North Atlantic Treaty Organisation (NATO). Available online: http:\/\/ftp.rta.nato.int\/public\/\/PubFullText\/RTO\/TR\/RTO-TR-MSG-062\/\/\/$$TR-MSG-062-ALL.pdf."},{"key":"ref_182","doi-asserted-by":"crossref","unstructured":"Vijayavani, G.R., and Prema, G. (2012, January 23\u201325). Performance Comparison of MANET Routing Protocols with Mobility Model derived based on Realistic mobility pattern of Mobile Nodes. Proceedings of the 2012 IEEE International Conference on Advanced Communication Control and Computing Technologies (ICACCCT), Ramanathapuram, India.","DOI":"10.1109\/ICACCCT.2012.6320729"},{"key":"ref_183","unstructured":"US Army (2002). Urban Combat Skills, Combined Arms Operations in Urban Terrain, Field Manual No. 3-06.11."},{"key":"ref_184","unstructured":"Taylor, P. (2002, July 24). Six Days That Shook Britain. The Guardian. Available online: https:\/\/www.theguardian.com\/uk\/2002\/jul\/24\/military.features11."},{"key":"ref_185","unstructured":"CMU Monarch Project (1999). The CMU Monarch Project\u2019s Wireless and Mobility Extensions to ns, Computer Science Department, Carnegie Mellon University."},{"key":"ref_186","unstructured":"ns-2 (2016, July 14). (n.d.). Main_Page. Available online: http:\/\/nsnam.isi.edu\/nsnam\/index.php\/Main_Page."},{"key":"ref_187","doi-asserted-by":"crossref","unstructured":"Yoon, J., Noble, B., Liu, M., and Kim, M. (2006, January 19\u201322). Building realistic mobility models from course-grained traces. Proceedings of the 4th International Conference on Mobile Systems, applications and services, Uppsala, Sweden.","DOI":"10.1145\/1134680.1134699"},{"key":"ref_188","doi-asserted-by":"crossref","unstructured":"Sridhar, K., Hao, S., Chan, M., and Ananda, A. (2006, January 2\u20134). EGRESS: Environment for generating realistic scenarios for simulations. Proceedings of the Tenth IEEE International Symposium on Distributed Simulation and Real-Time Applications (DS-RT \u201906), Terremolinos, Spain.","DOI":"10.1109\/DS-RT.2006.16"},{"key":"ref_189","doi-asserted-by":"crossref","unstructured":"Johansson, P., Larsson, T., Hedman, N., Mielczarek, B., and Degermark, M. (1999, January 15\u201319). Scenario-based performance analysis of routing protocols for mobile ad-hoc networks. Proceedings of the 5th Annual ACM\/IEEE International Conference on Mobile Computing and Networking, Seattle, Washington, USA.","DOI":"10.1145\/313451.313535"},{"key":"ref_190","unstructured":"International Maritime Organisation (2008, April 28). (nd). AIS Transponders. Available online: http:\/\/www.imo.org\/OurWork\/Safety\/Navigation\/Pages\/AIS.aspx."},{"key":"ref_191","unstructured":"International Maritime Organisation (2008, April 28). Guidelines for the Onboard Operational Use of Shipborne Automatic Identification Systems (AIS), 2003. Available online: http:\/\/www.imo.org\/OurWork\/Safety\/Navigation\/Documents\/227.pdf."},{"key":"ref_192","unstructured":"NASA Marine Instruments (2016, July 14). (nd). NASA Marine Instruments. Available online: http:\/\/www.nasamarine.com."},{"key":"ref_193","unstructured":"COAA (2013, February 19). (nd). Ship Plotter. Available online: http:\/\/www.coaa.co.uk\/shipplotter.htm."},{"key":"ref_194","unstructured":"McConnell (2013, February 19). (nd). ShipAIS. Available online: http:\/\/www.shipais.com."},{"key":"ref_195","unstructured":"Marine Traffic (2013, March 12). (nd). Live Ship Maps-AIS. Available online: http:\/\/www.marinetraffic.com\/ais\/."},{"key":"ref_196","unstructured":"Maritime & Coastguard Agency (2018, April 25). (n.d.). MCA-Home. Retrieved 02 19, 2013, from MCA, Home, Available online: http:\/\/www.dft.gov.uk\/mca\/."},{"key":"ref_197","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1109\/MCOM.2016.7378437","article-title":"Performance Evaluation Methods in Ad Hoc and Wireless Sensor Networks: A Literature Study","volume":"54","author":"Papadopoulos","year":"2016","journal-title":"IEEE Commun. Mag."},{"key":"ref_198","unstructured":"nS3 (2016, July 14). (nd). nS-3. Available online: https:\/\/www.nsnam.org\/."},{"key":"ref_199","first-page":"3085","article-title":"A study of comparison of Network Simulator -3 and Network Simulator -2","volume":"3","author":"Chaudhary","year":"2012","journal-title":"Int. J. Comput. Sci. Inf. Technol."},{"key":"ref_200","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1109\/MWC.2013.6590054","article-title":"MANET Protocol Simulations Considered Harmful: The Case For Benchmarking","volume":"20","author":"Hiranandani","year":"2013","journal-title":"IEEE Wirel. Commun."}],"container-title":["Informatics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2227-9709\/5\/2\/22\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T15:02:42Z","timestamp":1760194962000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2227-9709\/5\/2\/22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,30]]},"references-count":200,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2018,6]]}},"alternative-id":["informatics5020022"],"URL":"https:\/\/doi.org\/10.3390\/informatics5020022","relation":{},"ISSN":["2227-9709"],"issn-type":[{"type":"electronic","value":"2227-9709"}],"subject":[],"published":{"date-parts":[[2018,4,30]]}}}