Multimodal security enforcement framework for wireless ad hoc networks
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
Performance analysis of routing protocols for vehicle safety communications on the freeway
ASID'09 Proceedings of the 3rd international conference on Anti-Counterfeiting, security, and identification in communication
A review of routing protocols for mobile ad hoc networks
WSEAS TRANSACTIONS on COMMUNICATIONS
Standardisation advancements in the area of routing for mobile ad-hoc networks
The Journal of Supercomputing
Experimental evaluation of a wireless community mesh network
Proceedings of the 16th ACM international conference on Modeling, analysis & simulation of wireless and mobile systems
Proceedings of the 6th International ICST Conference on Simulation Tools and Techniques
Safeguarding ad hoc networks with a self-organized membership control system
Computer Networks: The International Journal of Computer and Telecommunications Networking
Performance Enhanced AODV Routing Protocol Security in Mobile Ad-Hoc Networks
International Journal of Technology Diffusion
Hi-index | 0.00 |
Several routing protocols have been proposed in recent years for possible deployment of mobile ad hoc networks (MANETs) in military, government and commercial applications. In this paper, we review these protocols with a particular focus on security aspects. The protocols differ in terms of routing methodologies and the information used to make routing decisions. Four representative routing protocols are chosen for analysis and evaluation including: Ad Hoc on demand Distance Vector routing (AODV), Dynamic Source Routing (DSR), Optimized Link State Routing (OLSR) and Temporally Ordered Routing Algorithm (TORA). Secure ad hoc networks have to meet five security requirements: confidentiality, integrity, authentication, non-repudiation and availability. The analyses of the secure versions of the proposed protocols are discussed with respect to the above security requirements.