Security Management and Simulation for Mobile Ad hoc Networks
dc.contributor.author | Al-Bayatti, Ali Hilal | en |
dc.contributor.author | Al-Bayatti, H. M. | en |
dc.date.accessioned | 2012-08-14T11:25:48Z | |
dc.date.available | 2012-08-14T11:25:48Z | |
dc.date.issued | 2011 | |
dc.description.abstract | This chapter provides a detailed description of a framework for designing, analyzing, deploying, and enforcing high level security management for Mobile Ad Hoc Networks (MANETs). The framework, which can be used by researchers, academics, security administrators, network designers, and post-graduate students, is designed and simulated using the object oriented Network Simulator-2 (NS-2). In this chapter, the authors also provide a full illustration of how to design and implement a secure MANET, while maintaining the security essentials using NS-2. Then, they describe the characteristics, applications, design, coding style, advantages/disadvantages, and implementation of the NS-2 simulator. Finally, this chapter provides a description of the future trend NS-3, which is the “eventual replacement” of NS-2. | en |
dc.identifier.citation | Al-Bayatti, A.H. and Al-Bayatti, H.M. (2011) Security Management and Simulation for Mobile Ad hoc Networks (MANET). In: Al-Bahadili H (Ed) Simulation in Computer Network Design and Modelling: Use and Analysis, pp 297-314, IGI Global | en |
dc.identifier.doi | https://doi.org/10.4018/978-1-4666-0191-8.ch014 | |
dc.identifier.issn | 9781466601918 | |
dc.identifier.uri | http://hdl.handle.net/2086/6828 | |
dc.language.iso | en | en |
dc.publisher | IGI Global | en |
dc.researchgroup | Software Technology Research Laboratory (STRL) | en |
dc.researchinstitute | Cyber Technology Institute (CTI) | en |
dc.title | Security Management and Simulation for Mobile Ad hoc Networks | en |
dc.type | Book chapter | en |
Files
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 3.18 KB
- Format:
- Item-specific license agreed upon to submission
- Description: