Abstract
Mobile Ad-Hoc Network (MANET) is a wireless network without infrastructure. Self-configurability and easy deployment feature of the MANET resulted in numerous applications in this modern era. Efficient routing protocols will make MANETs reliable. The open and dynamic operational environment of MANET makes it vulnerable to various network attacks. A common type of attacks targets at the underlying routing protocols. Malicious nodes have opportunities to modify or discard routing information or advertise fake routes to attract user data to go through themselves. The aim of the research is to prevent network using secure routing protocols and to study the performance of the secure network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Juwad, M.F., Al-Raweshidy, H.S.: Experimental Performance Comparisons between SAODV & AODV. In: IEEE Second Asia International Conference on Modelling & Simulation (2008)
Cerri, D., Ghioni, A.: Securing AODV: The A-SAODV Secure Routing Prototype. IEEE Communications Magazine (February 2008) 0163-6804/08 © 2008
Tsaur, W.-J., Pai, H.-T.: A New Security Scheme for On-Demand Source Routing in Mobile Ad Hoc Networks. In: IWCMC 2007, Honolulu, Hawaii, USA, August 12-16 (2007) Copyright 2007 ACM 978-1-59593-695-0/07/0008
Ali, M.H., Odah, M.K.: Simulation Study of 802.11b DCF using OPNET Simulator. Eng. & Tech. Journal 27(6), 1108–1117 (2009)
Lu, S., Li, L., Lam, K.Y., Jia, L.: SAODV: A MANET Routing Protocol that can Withstand Black Hole Attack. In: International Conference on Computational Intelligence and Security (2009)
Kushwah, V.S., Tapaswi, S.: Securing Nodes in MANETs Using Node Based Key Management Scheme. In: Proceeding of the IEEE Xplore 2010 International Conference on Advances in Computer Engineering– ACE 2010, Bangalore, India, June 21-22, pp. 228–231 (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Kushwah, V.S., Sharma, G. (2012). An Approach to Understand Secure MANET Routing Using OPNET. In: Das, V.V., Ariwa, E., Rahayu, S.B. (eds) Signal Processing and Information Technology. SPIT 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 62. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32573-1_33
Download citation
DOI: https://doi.org/10.1007/978-3-642-32573-1_33
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-32572-4
Online ISBN: 978-3-642-32573-1
eBook Packages: Computer ScienceComputer Science (R0)