A Novel Routing Protocol for Providing Anonymity in MANET
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 10, Issue 2
Abstract
Mobile Ad Hoc Networks (MANETs) using anonymous routing protocols hidden node identity and external routes having anonymity protection. Anonymous routing protocols use either hop-by-by hop encryption or redundant traffic, which generates more cost or without providing full anonymity protection to the data source and destination. It has more cost and increase for naturally resource constraint problem in MANETs particularly in multimedia wireless applications. High anonymity protection at a lower cost, we propose an unsigned Location-based competent Routing protocol. It dynamically partitions the network field into different zones and randomly chooses nodes in various zones as intermediate relay nodes, it also non traceable. It's based on counter intersection and timing attacks. It performs better route anonymity. It has self configuring infrastructure less networks. In future, the Random forwarder node replication attack will be also eliminated. To consider this attack, set up server will assign the key for each random forwarder node is generated by using the polynomial bivariate key generation scheme. The key wrapping algorithm used to protect the key from the adversary. In this paper, one way hash chain algorithm is used for key wrapping.
Authors and Affiliations
Vignesh S , Sudhakar K
A Novel Routing Protocol for Providing Anonymity in MANET
Mobile Ad Hoc Networks (MANETs) using anonymous routing protocols hidden node identity and external routes having anonymity protection. Anonymous routing protocols use either hop-by-by hop encryption or redundant traffic...
Energy Based Optimal Relaying in Heterogeneous Radio Access Networks
Due to recent trends in mobile communication system, much attention has be given to heterogeneous networks in which a mobile equipment is able to access multiple networks that are present in a locality. Here each random...
Secured Packet Hiding Technique for Packet Jamming Attacks
Wireless networks are built upon a shared medium that makes it easy for adversaries to launch jamming-style attacks. Jamming attacks can severely interfere with the normal operation of Networks and, consequently, mechani...
Cluster Based Secure Data Broadcast of CLAODV Protocol for MANET
Ad-hoc Networks are using multicast protocol to broadcast the messages. Multicast authentication in ad-hoc networks are very challenging based on below mentioned multiple factors such as nodes have limited computing, ban...
Effect of Principle Component Analysis and Support Vector Machine in Software Fault Prediction
Machine Learning (ML) approaches have a great impact in fault prediction. Demand for producing quality assured software in an organization has been rapidly increased during the last few years. This leads to increase in d...