Security Management and Simulation for Mobile Ad hoc Networks

dc.contributor.authorAl-Bayatti, Ali Hilalen
dc.contributor.authorAl-Bayatti, H. M.en
dc.date.accessioned2012-08-14T11:25:48Z
dc.date.available2012-08-14T11:25:48Z
dc.date.issued2011
dc.description.abstractThis chapter provides a detailed description of a framework for designing, analyzing, deploying, and enforcing high level security management for Mobile Ad Hoc Networks (MANETs). The framework, which can be used by researchers, academics, security administrators, network designers, and post-graduate students, is designed and simulated using the object oriented Network Simulator-2 (NS-2). In this chapter, the authors also provide a full illustration of how to design and implement a secure MANET, while maintaining the security essentials using NS-2. Then, they describe the characteristics, applications, design, coding style, advantages/disadvantages, and implementation of the NS-2 simulator. Finally, this chapter provides a description of the future trend NS-3, which is the “eventual replacement” of NS-2.en
dc.identifier.citationAl-Bayatti, A.H. and Al-Bayatti, H.M. (2011) Security Management and Simulation for Mobile Ad hoc Networks (MANET). In: Al-Bahadili H (Ed) Simulation in Computer Network Design and Modelling: Use and Analysis, pp 297-314, IGI Globalen
dc.identifier.doihttps://doi.org/10.4018/978-1-4666-0191-8.ch014
dc.identifier.issn9781466601918
dc.identifier.urihttp://hdl.handle.net/2086/6828
dc.language.isoenen
dc.publisherIGI Globalen
dc.researchgroupSoftware Technology Research Laboratory (STRL)en
dc.researchinstituteCyber Technology Institute (CTI)en
dc.titleSecurity Management and Simulation for Mobile Ad hoc Networksen
dc.typeBook chapteren

Files

License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
3.18 KB
Format:
Item-specific license agreed upon to submission
Description: