Author :
Jha, R.K. ; Limkar, S.V. ; Dalal, U.D.
Author_Institution :
Dept. of Electron. & Commun. Eng., SVNIT, Surat, India
Abstract :
Notice of Violation of IEEE Publication Principles
"A Performance Comparison of Routing Protocols for Security Issue in Wireless Mobile Ad Hoc Networks"
by Rakesh Kumar Jha, Suresh V. Limkar, Dr. Upena D. Dalal
in the 3rd International Conference on Emerging Trends in Engineering and Technology (ICETET), 2010, pp. 825 - 830
After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE\´s Publication Principles.
This paper contains significant portions of original text from the papers cited below. The original text was copied without attribution (including appropriate references to the original author(s) and/or paper title) and without permission.
Due to the nature of this violation, reasonable effort should be made to remove all past references to this paper, and future references should be made to the following articles:
"Security in Mobile Ad Hoc Networks: Challenges and Solutions"
by Hao Yang, Haiyun Luo, Fan Ye, Songwu Lu, Lixia Zhang
in IEEE Wireless Communications Vol. 11 Issue 1, 2005, pp.38 - 47
"ZRP versus DSR and TORA: A comprehensive survey on ZRP performance"
by Spilio Giannoulis, Christos Antonopoulos, Evangelos Topalis, Stavros Koubias
in the 10th IEEE Conference on Emerging Technologies and Factory Automation (EFTA), 2005, pp. 1017 - 1024
Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed Infrastructure Dynamic Source Routing (DSR) for mobile Ad Hoc network. It is a reactive source routing protocol for mobile IP network. Temporally-Ordered Routing Algorithm (TORA) routing protocol is for mobile ad hoc networks. It can be made to operate in both reactive and proactive modes. It uses IMEP for link status and neighbor Connectivity sensing. Internet MANET Encapsulation Protocol (IMEP) is used for link status and neighbor co- nectivity sensing. It is used by the TORA routing protocol. One main challenge in design of these networks is their vulnerability to security attacks. In this paper, we study the threats an ad hoc network faces and the security goals to be achieved. We present and examine analytical simulation results for the routing protocols DSR and TORA network performance, using the well known network simulator OPNET 10.0.
Keywords :
IP networks; Internet; mobile ad hoc networks; routing protocols; telecommunication security; OPNET 10.0; infrastructure dynamic source routing; internet MANET encapsulation protocol; link status; mobile IP network; neighbor connectivity sensing; reactive source routing protocol; security issue; temporally-ordered routing algorithm routing protocol; wireless mobile ad hoc networks; Ad hoc networks; Mobile computing; Routing; Routing protocols; Security; Wireless communication; DSR; Mobile Ad Hoc Networks; SIP-Proxy; Security; TORA;