Anonymity Set Location Privacy Scheme in Manet

Abstract

 In hostile environments, the adversary can launch traffic analysis against intercept able routing information embedded in routing messages and data packets. The adversaries on tracing network routes and inferring the mobility pattern of nodes during the routing of packets may pose a serious threat to covert operations. Mobile Ad Hoc Networks (MANETs) use anonymous routing protocols that hide node identities and/or routes from outside observers in order to provide anonymity protection. The anonymous routing protocols can be applied to different network models with different mobility patterns. By means of route anonymity, adversaries cannot trace a packet flow back to its source or destination, either on the route or out of the route and no node has information about the real identities and locations of intermediate nodes in route. The various anonymous routing protocols are reviewed and performance of such protocols can be compared and evaluated using ns2 simulations of a well-known routing protocol to achieve better route anonymity.

Authors and Affiliations

T. Sathish

Keywords

Related Articles

LITERATURE SURVEY ON WORMHOLE ATTACK

Security plays an important role in Mobile Ad Hoc Network when data transmission is performed within un - trusted wireless scenario. Various attacks like Black hole, Wormhole, Gray hole and many more have been ident...

 Design and Implementation of Printed Monopole Antenna for ISM Band

 Monopole antennas have several advantages but for their narrow bandwidth. Broadband planar monopole antennas have all the advantages of the monopole in terms of their cost, and ease of fabrication besides, yieldin...

 MOTOR LUBRICANT OIL DURATION RATE MODELING

 The paper is trying to give information about motor lubricant oil its grades according to relatively international standard. The paper suggested that due to poor oil personnel experience in Sudan lubricant oil choo...

AVAILABILITY ANALYSIS OF A TWO - UNIT CENTRIFUGE SYSTEM CONSIDERING THE HALT STATE ON OCCURRENCE OF MINOR/MAJOR FAULT

This paper deals with a centrifuge system consisting two identical unit cold standby considering major/minor fault. It is assumed that system leads to partial failed state on occurrence of a minor fault...

 ACCELEROMETER BASED DIGITAL PEN FOR HANDWRITTEN DIGIT AND GESTURE RECOGNITION

 In the today’s world of fast changing technology, there is also rapid development of computer technology. Human computer interaction commonly known as HCI, technique is one of that which becomes an indispensable c...

Download PDF file
  • EP ID EP143207
  • DOI -
  • Views 84
  • Downloads 0

How To Cite

T. Sathish (30).  Anonymity Set Location Privacy Scheme in Manet. International Journal of Engineering Sciences & Research Technology, 3(3), 1093-1097. https://europub.co.uk/articles/-A-143207