LEADER 02319oam 2200445zu 450 001 9910140990203321 005 20241212220101.0 010 $a9780769542461 010 $a0769542468 024 7 $a10.1109/ICETET17767.2010 035 $a(CKB)2670000000089051 035 $a(SSID)ssj0000527924 035 $a(PQKBManifestationID)12188243 035 $a(PQKBTitleCode)TC0000527924 035 $a(PQKBWorkID)10527142 035 $a(PQKB)11619355 035 $a(NjHacI)992670000000089051 035 $a(EXLCZ)992670000000089051 100 $a20160829d2010 uy 101 0 $aeng 135 $aur||||||||||| 181 $ctxt 182 $cc 183 $acr 200 10$a2010 3rd International Conference on Emerging Trends in Engineering and Technology 210 31$a[Place of publication not identified]$cI E E E$d2010 215 $a1 online resource $cillustrations 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a9781424484812 311 08$a1424484812 330 $aMobile Ad-hoc Networks (MANETs) allow wireless nodes to form a network without requiring a fixed Infrastructure Dynamic Source Routing (DSR) for mobile Ad Hoc network. It is a reactive source routing protocol for mobile IP network. Temporally-Ordered Routing Algorithm (TORA) routing protocol is for mobile ad hoc networks. It can be made to operate in both reactive and proactive modes. It uses IMEP for link status and neighbor Connectivity sensing. Internet MANET Encapsulation Protocol (IMEP) is used for link status and neighbor connectivity sensing. It is used by the TORA routing protocol. One main challenge in design of these networks is their vulnerability to security attacks. We study the threats an ad hoc network faces and the security goals to be achieved. We present and examine analytical simulation results for the routing protocols DSR and TORA network performance, using the well known network simulator OPNET 10. 0. 606 $aEngineering$xTechnological innovations$vCongresses 615 0$aEngineering$xTechnological innovations 676 $a620 702 $aIEEE Staff 801 0$bPQKB 906 $aPROCEEDING 912 $a9910140990203321 996 $a2010 3rd International Conference on Emerging Trends in Engineering and Technology$92400329 997 $aUNINA