References
[1]. Vincent D. Park and M. Scott Corson. (2001).
"Temporally-Ordered Routing Algorithm (TORA) version 4:
Functional specification". Internet-Draft, draft-ietfmanet-
TORA-spec- 04.txt, (DOI:10.5120/1018-59).
[2]. Jha, R. K., Limkar, S. V., & Dalal, D. U. (2010). A
Performance Comparison of Routing Protocols (DSR and
TORA) for Security Issue In MANET (Mobile Ad Hoc Networks).
IJCA Special Issue on MANETs (2), pp.78-83. Chicago.
[3]. Royer, E. M., & Toh, C. K. (1999). A review of current
routing protocols for ad hoc mobile wireless networks.
Personal Communications, IEEE, 6(2), 46-55. Chicago.
[4]. Perkins, C.E.; Royer, E.M., (1999). "Ad-hoc on-demand
distance vector routing," Mobile Computing Systems and
Applications, 1999. Proceedings. WMCSA '99. Second IEEE
Workshop on, Vol., No., pp.90,100, 25-26 doi: 10.1109/
MCSA. 749281
[5]. David B. Johnson and David A. Maltz, (1996). "Dynamic
Source Routing in Ad Hoc Wireless Networks", in Mobile
Computing, edited by Tomasz Imielinski and Hank Korth,
Chapter 5, pp. 153-181, Kluwer Academic Publishers,
Invited paper.
[6]. J. Broch et al, (1998). "A Performance Comparison of
Multi-Hop Wireless Ad-hoc Network Routing Protocols,"
Proceedings of the MOBICOM'98, pp. 85-97.
[7]. Royer, Elizabeth M., and Chai-Keong Toh. (1999). "A
review of current routing protocols for ad hoc mobile
wireless networks." Personal Communications, IEEE 6.2 : 46-
55.
[8]. Basagni, S., Chlamtac, I., & Syrotiuk, V. R. (1999).
Dynamic source routing for ad hoc networks using the
global positioning system. In Wireless Communications and Networking Conference, WCNC. 1999 IEEE (pp. 301-
305). IEEE.
[9]. Basagni, S., Chlamtac, I., Farago, A., Syrotiuk, V. R., &
Talebi, R. (1999). Route selection in mobile multimedia ad
hoc networks. In Mobile Multimedia Communications,
1999.(MoMuC'99) IEEE International Workshop on (pp. 97-
103). IEEE.
[10]. Park, Vincent Douglas, and M. Scott Corson. (1997).
"A highly adaptive distributed routing algorithm for mobile wireless networks." INFOCOM'97. Sixteenth Annual Joint
Conference of the IEEE Computer and Communications
Societies. Driving the Information Revolution., Proceedings
IEEE. Vol. 3. IEEE.
[11]. Subburaj, V., & Chitra, K. (2012). Mobile node
dynamism using particle swarm optimization to fight
against vulnerability exploitations. International Journal of
Computer Applications, 41(13), pp.1-4.