• DocumentCode
    2296741
  • Title

    Notice of Violation of IEEE Publication Principles
    A Performance Comparison of Routing Protocols for Security Issue in Wireless Mobile Ad Hoc Networks

  • Author

    Jha, R.K. ; Limkar, S.V. ; Dalal, U.D.

  • Author_Institution
    Dept. of Electron. & Commun. Eng., SVNIT, Surat, India
  • fYear
    2010
  • fDate
    19-21 Nov. 2010
  • Firstpage
    825
  • Lastpage
    830
  • Abstract
    Notice of Violation of IEEE Publication Principles

    "A Performance Comparison of Routing Protocols for Security Issue in Wireless Mobile Ad Hoc Networks"
    by Rakesh Kumar Jha, Suresh V. Limkar, Dr. Upena D. Dalal
    in the 3rd International Conference on Emerging Trends in Engineering and Technology (ICETET), 2010, pp. 825 - 830

    After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE\´s Publication Principles.

    This paper contains significant portions of original text from the papers cited below. The original text was copied without attribution (including appropriate references to the original author(s) and/or paper title) and without permission.

    Due to the nature of this violation, reasonable effort should be made to remove all past references to this paper, and future references should be made to the following articles:

    "Security in Mobile Ad Hoc Networks: Challenges and Solutions"
    by Hao Yang, Haiyun Luo, Fan Ye, Songwu Lu, Lixia Zhang
    in IEEE Wireless Communications Vol. 11 Issue 1, 2005, pp.38 - 47

    "ZRP versus DSR and TORA: A comprehensive survey on ZRP performance"
    by Spilio Giannoulis, Christos Antonopoulos, Evangelos Topalis, Stavros Koubias
    in the 10th IEEE Conference on Emerging Technologies and Factory Automation (EFTA), 2005, pp. 1017 - 1024

    Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed Infrastructure Dynamic Source Routing (DSR) for mobile Ad Hoc network. It is a reactive source routing protocol for mobile IP network. Temporally-Ordered Routing Algorithm (TORA) routing protocol is for mobile ad hoc networks. It can be made to operate in both reactive and proactive modes. It uses IMEP for link status and neighbor Connectivity sensing. Internet MANET Encapsulation Protocol (IMEP) is used for link status and neighbor co- nectivity sensing. It is used by the TORA routing protocol. One main challenge in design of these networks is their vulnerability to security attacks. In this paper, we study the threats an ad hoc network faces and the security goals to be achieved. We present and examine analytical simulation results for the routing protocols DSR and TORA network performance, using the well known network simulator OPNET 10.0.
  • Keywords
    IP networks; Internet; mobile ad hoc networks; routing protocols; telecommunication security; OPNET 10.0; infrastructure dynamic source routing; internet MANET encapsulation protocol; link status; mobile IP network; neighbor connectivity sensing; reactive source routing protocol; security issue; temporally-ordered routing algorithm routing protocol; wireless mobile ad hoc networks; Ad hoc networks; Mobile computing; Routing; Routing protocols; Security; Wireless communication; DSR; Mobile Ad Hoc Networks; SIP-Proxy; Security; TORA;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Emerging Trends in Engineering and Technology (ICETET), 2010 3rd International Conference on
  • Conference_Location
    Goa
  • ISSN
    2157-0477
  • Print_ISBN
    978-1-4244-8481-2
  • Type

    conf

  • DOI
    10.1109/ICETET.2010.140
  • Filename
    5698441