Anonymity Set Location Privacy Scheme in Manet
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 30, Vol 3, Issue 3
Abstract
In hostile environments, the adversary can launch traffic analysis against intercept able routing information embedded in routing messages and data packets. The adversaries on tracing network routes and inferring the mobility pattern of nodes during the routing of packets may pose a serious threat to covert operations. Mobile Ad Hoc Networks (MANETs) use anonymous routing protocols that hide node identities and/or routes from outside observers in order to provide anonymity protection. The anonymous routing protocols can be applied to different network models with different mobility patterns. By means of route anonymity, adversaries cannot trace a packet flow back to its source or destination, either on the route or out of the route and no node has information about the real identities and locations of intermediate nodes in route. The various anonymous routing protocols are reviewed and performance of such protocols can be compared and evaluated using ns2 simulations of a well-known routing protocol to achieve better route anonymity.
Authors and Affiliations
T. Sathish
Land use/Land cover Mapping of IGNP Command Area in Bikaner District
The pressures on the natural resources have tremendously increased over years by man’s greed for commercialization and livelihood of local people. Devoid of regeneration, population and wide scale tree felling depleted...
ONLINE TEACHING MODULE IN WEB PROGRAMMING OF NAVAL STATE UNIVERSITY, NAVAL BILIRAN, PHILIPPINES
Information system is one of the very popular technological concepts being used for easy processing of transactions in different companies. Course Management System such as this is being used by different univ...
Wireless Networks Based Mine Detection Robot Using Embedded Systems
In the Real time Application the Detection and location of Bomb is highly essential in the field of Defense Applications. Considering the value of human life, the robot is allowed in the field to detect the bomb....
Use of Bovine Whey in the Manufacture of Handmade Paintings, Creating Added Value for the Benefit of the Agrarianfood Chain
Whey is the liquid from the coagulation of milk for cheese making. It is obtained after separation of casein and fat (Caballero and Acosta, 2008). There are two types of whey, the first process is called acid ferm...
A REVIEW ON ENCODING AND RECONSTUCTION OF ENCRYPTED IMAGES
This paper gives a scheme of encoding of encrypted greyscale images while transmission of images for security purpose. In the encryption phase, the original pixel values are masked by a modulo-256 addition with pseudora...