CFP last date
20 January 2025
Reseach Article

A Performance Comparison of Routing Protocols(DSR and TORA) for Security Issue In MANET(Mobile Ad Hoc Networks)

Published on None 2010 by Rakesh Kumar Jha, Suresh V. Limkar, Dr. Upena D. Dalal
Mobile Ad-hoc Networks
Foundation of Computer Science USA
MANETS - Number 2
None 2010
Authors: Rakesh Kumar Jha, Suresh V. Limkar, Dr. Upena D. Dalal
a5a5205e-d6f5-4bcf-a57e-8191a7d78db5

Rakesh Kumar Jha, Suresh V. Limkar, Dr. Upena D. Dalal . A Performance Comparison of Routing Protocols(DSR and TORA) for Security Issue In MANET(Mobile Ad Hoc Networks). Mobile Ad-hoc Networks. MANETS, 2 (None 2010), 78-83.

@article{
author = { Rakesh Kumar Jha, Suresh V. Limkar, Dr. Upena D. Dalal },
title = { A Performance Comparison of Routing Protocols(DSR and TORA) for Security Issue In MANET(Mobile Ad Hoc Networks) },
journal = { Mobile Ad-hoc Networks },
issue_date = { None 2010 },
volume = { MANETS },
number = { 2 },
month = { None },
year = { 2010 },
issn = 0975-8887,
pages = { 78-83 },
numpages = 6,
url = { /specialissues/manets/number2/1018-59/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 Mobile Ad-hoc Networks
%A Rakesh Kumar Jha
%A Suresh V. Limkar
%A Dr. Upena D. Dalal
%T A Performance Comparison of Routing Protocols(DSR and TORA) for Security Issue In MANET(Mobile Ad Hoc Networks)
%J Mobile Ad-hoc Networks
%@ 0975-8887
%V MANETS
%N 2
%P 78-83
%D 2010
%I International Journal of Computer Applications
Abstract

Mobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed Infrastructure.Dynamic Source Routing (DSR) for mobile Ad Hoc network. It is a reactive source routing protocol for mobile IP network. Temporally-Ordered Routing Algorithm (TORA) routing protocol is for mobile ad hoc networks. It can be made to operate in both reactive and proactive modes. It uses IMEP for link status and neighbor Connectivity sensing. Internet MANET Encapsulation Protocol (IMEP) is used for link status and neighbor connectivity sensing. It is used by the TORA routing protocol. One main challenge in design of these networks is their vulnerability to security attacks. In this paper, we study the threats an ad hoc network faces and the security goals to be achieved. We present and examine analytical simulation results for the routing protocols DSR and TORA network performance, using the well known network simulator OPNET 10. 0

References
  1. D. Johnson, D. Maltz and Yih-Chun Hu. "The Dynamic Source Routing Protocol for Mobile Ad HocNetworks,"http://www.ietf.org/internet-drafts/draftietfmanet-DSR-09.txt,IETF Internet draft, Apr. 2003.
  2. David B. Johnson and David A. Maltz. "Dynamic source routing for ad hoc wireless networks". In Mobile Computing, edited by Tomasz Imielinski and Hank Korth, chapter 5, pages 153-181. Kluwer Academic Publishers, 1996.
  3. Vincent D. Park and M. Scott Corson. "Temporally-Ordered Routing Algorithm (TORA) version 4: Functional specification". Internet-Draft, draft-ietfmanet-TORA-spec-04.txt, July 2001.
  4. Vincent D. Park and M. Scott Corson. "A performance Comparison of TORA and Ideal Link State routing." In Proceedings of IEEE Symposium on Computers and Communication '98, June 1998.
  5. Y. Zhang and W. Lee, “Intrusion Detection in Wireless Ad-Hoc Networks,” in The Sixth Annual ACM/IEEE Conference on Mobile Computing and Networking, Boston, MA, USA, Aug. 2000.
  6. Rakesh Kumar Jha and Dr Upena Dalal “Security Comparison of Wired and Wireless Network with Firewall and Virtual Private Network (VPN)” International Conference on Recent Trends in Information, Telecommunication and Computing, IEEE Xplore,kerela,March 2010.
  7. Yi Wang et.al, “Cluster based Location - Aware routing Protocol for Large Scale Heterogeneous MANET”, in Proceeding of the Second International Multi symposium on Computer and Computational Sciences, IEEE Computer Society, 2007, pp.366-373.
  8. S. Ahmed and M. S. Alam, “Performance Evaluation of Important Ad-hoc Nnetwork Protocols",Proceedings of EURASIP Journal on Wireless Communications and Networking Volume 2006, Issue 2 (April 2006), pp- 42 – 42
  9. Mohammed Bouhorma, H. Bentaouit and A.BoudhirA “Performance Comparasion of ad-hoc routing protocols AODV and DSR” , Multimedia Computing and Systems, 2009. ICMCS '09. International Conference on,pages 511-514,April 2009
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Ad Hoc Networks Security DSR TORA SIP-Proxy