Location Based Anonymous Routing Protocol for MANETS

نویسندگان

  • P. Dhivya
  • M. Rajakani
چکیده

Privacy is needed in ad hoc networks. In order to provide anonymous routing protocol in MANETs the location of source and destination can be concealed by using “notify and go” mechanism and broadcasting. In this paper, we address some of the issues arising in MANETs by using an anonymous routing protocol. Location Based Anonymous Routing Protocol partitions the network into zones for anonymity protection. The destination position is identified to separate the source node from destination node by clustering, which is needed by the packet forwarder to check whether it is separated from the destination. The packet which is forwarded from source to destination can be encrypted by using asymmetric encryption algorithm. Location Based Anonymous Routing Protocol forwards a packet to the neighbor to the destination through the randomly selected relay nodes. Thus, it provides anonymous protection to source, destination, and routes at a low cost. It takes advantage of geographic routing protocol and also provides reliable communication. For routing anonymity temporary destination can be randomly chosen in other zone and relay nodes are selected in the same zone to transfer the data to temporary destination. Owe to the vulnerable nature of the mobile ad hoc network, there are various security threats that disturb the development of it. Location Based Anonymous Routing Protocol also has strategies to effectively counter the intersection and timing attacks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Reactive Protocol for Privacy Preservation using Location-Based Efficient Routing in MANETs

Mobile Ad Hoc Networks (MANETs) use anonymous routing protocols that hide node identities and/or routes from outside observers in order to provide anonymity protection. However, existing anonymous routing protocols relying on either hop-by-hop encryption or redundant traffic, either incurs high cost or cannot provide full anonymity protection to data sources, destinations, and routes. The high ...

متن کامل

A Location Based Protocol for Anonymity Protection of Nodes and Routes at Low Cost

---Mobile Ad Hoc Networks (MANETs) use various anonymous routing protocols in order to provide security from outside observers. To offer high anonymity protection at low cost, An Anonymous Location Based Efficient Routing Protocol (ALERT) is proposed. ALERT dynamically partitions the network area into zones and randomly chooses the intermediate relay nodes to form a anonymous route. ALERT achie...

متن کامل

Secure Routing Protocol: Affection on MANETs Performance

In mobile ad hoc networks, the absence ofinfrastructure and the consequent absence of authorizationfacilities impede the usual practice of establishing a practicalcriterion to distinguishing nodes as trusted and distrusted.Since all nodes in the MANETs would be used as router inmulti-hop applications, secure routing protocols have vital rulein the security of the network. So evaluating the perf...

متن کامل

Comparative Performance Analysis of AODV,DSR, TORA and OLSR Routing Protocols in MANET Using OPNET

Mobile Ad Hoc Networks (MANETs) are receiving a significant interest and are becoming very popular in the world of wireless networks and telecommunication. MANETs consist of mobile nodes which can communicate with each other without any infrastructure or centralized administration. In MANETs, the movement of nodes is unpredictable and complex; thus making the routing of the packets challenging....

متن کامل

Trust Based Data Security and Secure Anonymous Routing For MANETs

For many applications of the mobile ad hoc networks (MANETs) deployed in adversary environments, anonymous communications with data confidentiality and integrity is important. A major requirement is to provide unidentifiability and unlinkability to the mobile nodes and their traffics.The existing protocols are vulnerable to security threats like global eavesdropper attacks, fake routing packets...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015