Skip to main content

An Approach to Understand Secure MANET Routing Using OPNET

  • Conference paper
Book cover Signal Processing and Information Technology (SPIT 2011)

Abstract

Mobile Ad-Hoc Network (MANET) is a wireless network without infrastructure. Self-configurability and easy deployment feature of the MANET resulted in numerous applications in this modern era. Efficient routing protocols will make MANETs reliable. The open and dynamic operational environment of MANET makes it vulnerable to various network attacks. A common type of attacks targets at the underlying routing protocols. Malicious nodes have opportunities to modify or discard routing information or advertise fake routes to attract user data to go through themselves. The aim of the research is to prevent network using secure routing protocols and to study the performance of the secure network.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Juwad, M.F., Al-Raweshidy, H.S.: Experimental Performance Comparisons between SAODV & AODV. In: IEEE Second Asia International Conference on Modelling & Simulation (2008)

    Google Scholar 

  2. Cerri, D., Ghioni, A.: Securing AODV: The A-SAODV Secure Routing Prototype. IEEE Communications Magazine (February 2008) 0163-6804/08 © 2008

    Google Scholar 

  3. Tsaur, W.-J., Pai, H.-T.: A New Security Scheme for On-Demand Source Routing in Mobile Ad Hoc Networks. In: IWCMC 2007, Honolulu, Hawaii, USA, August 12-16 (2007) Copyright 2007 ACM 978-1-59593-695-0/07/0008

    Google Scholar 

  4. Ali, M.H., Odah, M.K.: Simulation Study of 802.11b DCF using OPNET Simulator. Eng. & Tech. Journal 27(6), 1108–1117 (2009)

    Google Scholar 

  5. Lu, S., Li, L., Lam, K.Y., Jia, L.: SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack. In: International Conference on Computational Intelligence and Security (2009)

    Google Scholar 

  6. Kushwah, V.S., Tapaswi, S.: Securing Nodes in MANETs Using Node Based Key Management Scheme. In: Proceeding of the IEEE Xplore 2010 International Conference on Advances in Computer Engineering– ACE 2010, Bangalore, India, June 21-22, pp. 228–231 (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Kushwah, V.S., Sharma, G. (2012). An Approach to Understand Secure MANET Routing Using OPNET. In: Das, V.V., Ariwa, E., Rahayu, S.B. (eds) Signal Processing and Information Technology. SPIT 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 62. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32573-1_33

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-32573-1_33

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-32572-4

  • Online ISBN: 978-3-642-32573-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics