Cart (Loading....) | Create Account
Close category search window

Notice of Violation of IEEE Publication Principles
A Performance Comparison of Routing Protocols for Security Issue in Wireless Mobile Ad Hoc Networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Jha, R.K. ; Dept. of Electron. & Commun. Eng., SVNIT, Surat, India ; Limkar, S.V. ; Dalal, U.D.

Notice of Violation of IEEE Publication Principles

"A Performance Comparison of Routing Protocols for Security Issue in Wireless Mobile Ad Hoc Networks"
by Rakesh Kumar Jha, Suresh V. Limkar, Dr. Upena D. Dalal
in the 3rd International Conference on Emerging Trends in Engineering and Technology (ICETET), 2010, pp. 825 - 830

After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.

This paper contains significant portions of original text from the papers cited below. The original text was copied without attribution (including appropriate references to the original author(s) and/or paper title) and without permission.

Due to the nature of this violation, reasonable effort should be made to remove all past references to this paper, and future references should be made to the following articles:

"Security in Mobile Ad Hoc Networks: Challenges and Solutions"
by Hao Yang, Haiyun Luo, Fan Ye, Songwu Lu, Lixia Zhang
in IEEE Wireless Communications Vol. 11 Issue 1, 2005, pp.38 - 47

"ZRP versus DSR and TORA: A comprehensive survey on ZRP performance"
by Spilio Giannoulis, Christos Antonopoulos, Evangelos Topalis, Stavros Koubias
in the 10th IEEE Conference on Emerging Technologies and Factory Automation (EFTA), 2005, pp. 1017 - 1024

Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed Infrastructure Dynamic Source Routing (DSR) for mobile Ad Hoc network. It is a reactive source routing protocol for mobile IP network. Temporally-Ordered Routing Algorithm (TORA) routing protocol is for mobile ad hoc networks. It can be made to operate in both reactive and proactive modes. It uses IMEP for link status and neighbor Connectivity sensing. Internet MANET Encapsulation Protocol (IMEP) is used for link status and neighbor c- nnectivity sensing. It is used by the TORA routing protocol. One main challenge in design of these networks is their vulnerability to security attacks. In this paper, we study the threats an ad hoc network faces and the security goals to be achieved. We present and examine analytical simulation results for the routing protocols DSR and TORA network performance, using the well known network simulator OPNET 10.0.

Published in:

Emerging Trends in Engineering and Technology (ICETET), 2010 3rd International Conference on

Date of Conference:

19-21 Nov. 2010

Need Help?

IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.