Anonymity Protection in MANETs By Zone Partitioning
Journal Title: The International Journal of Technological Exploration and Learning - Year 2014, Vol 3, Issue 4
Abstract
Anonymous routing protocols play a vital role in MANETs in order to provide secure communications by concealing the identity of the nodes and avoiding traffic analysis assail from exterior observers. So, my project focuses on providing anonymity protection to data sources, destination and route, by concealing the node’s identity and location which means that it should be tough enough for other nodes to obtain its real identity and exact location of the sender and the receiver. Mobile Ad hoc Networks (MANETs) use anonymous routing protocol where as the earlier routing protocols concentrated on concealing the node identity and/or routes from outside observers by using hop-by-hop encryption method or redundant traffic in order to provide anonymity protection, but it was not that highly secure and it incurred much cost for encrypting each and every node and timing attack and intersection attack prevailed. So, the proposed algorithm i.e., an Anonymous Location Based Efficient Routing Protocol (ALERT) which uses hierarchical zone partitioning process to overcome all the aforementioned problems & also overcomes intersection & timing attacks and reduces the cost to a greater extent & enforcing higher security, ALERT offers anonymity protection to all the three i.e. source, destination & route anonymity which was not possible by earlier used protocols.
Authors and Affiliations
Shruti Mariappa Hosmani| M. Tech. Scholar, Department of CSE, VTU RO, PG Centre College, Gulbarga, India, Dr. Shubhangi D. C| Professor & HOD, Department of CSE, VTU RO, PG Centre College, Gulbarga, India, Shailaja. Shastri| Asst Professor, Department of CSE, PDA College of Engineering, Gulbarga, India
A Design Of A Low Power Delay Buffer Using Ring Counter Addressing Schemes
This work presents circuit design of a low-power delay buffer. The proposed delay buffer uses several new techniques to reduce its power consumption. Since delay buffers are accessed sequentially, it adopts a ring-cou...
An Overview and Analysis of Private and Public Key DNA Cryptography
with the growth of technological advancements, the threats dealt by a user grow exponentially. Hence security has become a critical issue in data storage and transmission. As traditional cryptographic systems are now...
Adaptive Non-Linear Bayesian Filter for ECG Denoising
The cycles of an electrocardiogram (ECG) signal contain three components P-wave, QRS complex and the T-wave. Noise is present in cardiograph as signals being measured in which biological resources (muscle contraction...
Hierarchical Organization of Data Centre to Improve Quality of Services (QoS)
The cloud computing has become the buzz topic in today IT industry because it provides services at lower cost and high availability of services and supports the sharing of hardware and software simultaneously with mu...
Analysis of Mobile Marketing in Airports
The availability of new airport applications help passengers manage their time at the airport in an efficient way, inasmuch as these applications provide real-time information. The results of this study confirm the fa...