Abstract

Notice of Violation of IEEE Publication Principles<br><br>"A Performance Comparison of Routing Protocols for Security Issue in Wireless Mobile Ad Hoc Networks"<br> by Rakesh Kumar Jha, Suresh V. Limkar, Dr. Upena D. Dalal<br> in the 3rd International Conference on Emerging Trends in Engineering and Technology (ICETET), 2010, pp. 825 - 830<br><br> After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.<br><br> This paper contains significant portions of original text from the papers cited below. The original text was copied without attribution (including appropriate references to the original author(s) and/or paper title) and without permission.<br><br> Due to the nature of this violation, reasonable effort should be made to remove all past references to this paper, and future references should be made to the following articles:<br><br> "Security in Mobile Ad Hoc Networks: Challenges and Solutions"<br> by Hao Yang, Haiyun Luo, Fan Ye, Songwu Lu, Lixia Zhang<br> in IEEE Wireless Communications Vol. 11 Issue 1, 2005, pp.38 - 47<br><br>"ZRP versus DSR and TORA: A comprehensive survey on ZRP performance"<br> by Spilio Giannoulis, Christos Antonopoulos, Evangelos Topalis, Stavros Koubias<br> in the 10th IEEE Conference on Emerging Technologies and Factory Automation (EFTA), 2005, pp. 1017 - 1024<br><br> <br/> Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed Infrastructure Dynamic Source Routing (DSR) for mobile Ad Hoc network. It is a reactive source routing protocol for mobile IP network. Temporally-Ordered Routing Algorithm (TORA) routing protocol is for mobile ad hoc networks. It can be made to operate in both reactive and proactive modes. It uses IMEP for link status and neighbor Connectivity sensing. Internet MANET Encapsulation Protocol (IMEP) is used for link status and neighbor connectivity sensing. It is used by the TORA routing protocol. One main challenge in design of these networks is their vulnerability to security attacks. In this paper, we study the threats an ad hoc network faces and the security goals to be achieved. We present and examine analytical simulation results for the routing protocols DSR and TORA network performance, using the well known network simulator OPNET 10.0.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call