A Novel Routing Protocol for Providing Anonymity in MANET
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2014, Vol 10, Issue 2
Abstract
Mobile Ad Hoc Networks (MANETs) using anonymous routing protocols hidden node identity and external routes having anonymity protection. Anonymous routing protocols use either hop-by-by hop encryption or redundant traffic, which generates more cost or without providing full anonymity protection to the data source and destination. It has more cost and increase for naturally resource constraint problem in MANETs particularly in multimedia wireless applications. High anonymity protection at a lower cost, we propose an unsigned Location-based competent Routing protocol. It dynamically partitions the network field into different zones and randomly chooses nodes in various zones as intermediate relay nodes, it also non traceable. It's based on counter intersection and timing attacks. It performs better route anonymity. It has self configuring infrastructure less networks. In future, the Random forwarder node replication attack will be also eliminated. To consider this attack, set up server will assign the key for each random forwarder node is generated by using the polynomial bivariate key generation scheme. The key wrapping algorithm used to protect the key from the adversary. In this paper, one way hash chain algorithm is used for key wrapping.
Authors and Affiliations
Vignesh S , Sudhakar K
LWRP: Low Power Consumption Weighting Replacement Policy using Buffer Memory
As the performance gap between memory and processors has increased, then it leads to the poor performance. Efficient virtual memory can overcome this problem. And the efficiency of virtual memory depends on the replaceme...
An Efficient Speaker Diarization using Privacy Preserving Audio Features Based of Speech/Non Speech Detection
Privacy-sensitive audio features for speaker diarization in multiparty conversations: i.e., a set of audio features having low linguistic information for speaker diarization in a single and multiple distant microphone sc...
Cluster Chain Based Relay Nodes Assignment
Wireless sensor Networks are very famous these days due to their coverage and enormous benefits. Clustering the sensor nodes efficiently and dynamically with least energy consumption is the current issue in front of rese...
Improved Authentication and Integrity Verification in Wireless Sensor Networks
In an unprotected environment of Wireless Sensor Network, the authentication scheme for multicast secure communication has to be designed with limited usage of resources and computation. Wireless Sensor Network are diver...
Hadoop Mapreduce Framework in Big Data Analytics
As Hadoop is a Substantial scale, open source programming system committed to adaptable, disseminated, information concentrated processing. Hadoop [1] Mapreduce is a programming structure for effectively composing requis...