Escolar Documentos
Profissional Documentos
Cultura Documentos
AbstractMobile Ad Hoc Networks (MANETs) use routing protocols that are anonymous and provides hiding of crucial node identities and
routes, so that outside observers cannot trace the route and also the crucial nodes, in this way it provides better protection. There are many
existing anonymous routing protocols which rely on either hop-by-hop encryption or redundant traffic. Both the methods used are highly costly
and also they don't generate full anonymity protection to the nodes or routers and also the source and destination. As the cost is high while using
this anonymity protection categories it creates problem in the resource constraints in MANETs especially in multimedia wireless applications
high cost exacerbates the intrinsic resource constraint problem are seen in MANETs especially in wireless multimedia applications. To provide
protection at low cost, an Advanced Location-based Efficient Routing in MANET (ALER).It dynamically partitions the network field into
different zones and it randomly chooses nodes in zones as intermediate relay nodes, these relay nodes forms a non-traceable anonymous route,
not only that the proposed protocol also helps in hiding the sender and the destination also very efficiently. It also has strategies to effectively
counter intersection, timing attacks. In this routing technique it has tried to overcome the Sybil attack issues which were not solved by the
routing technique. It has prevented the Sybil attack entirely by having forwarding nodes check source routes for loops.
_________________________________________________*****_________________________________________________
IV. CONCLUSION
Existing anonymous routing techniques either rely on hop-by-
hop encryption or redundant traffic, both of them have a
negative approach as it generate high cost. Not only that some
of the existing protocols fail to provide complete protection to
the network as some provide anonymity only to either source
Figure 2: Architecture of Proposed System
or destination nodes. Due to which complete protection of the
C. Strategies Against Attacks network becomes a failure. But when a comparison is made
ALER offers identity and location anonymity of the source between ALER technique and other existing ones,ALER is
and destination, as well as route anonymity. Unlike geographic distinguished by others as it provides low cost and the
routing] which always takes the shortest path, ALER makes anonymity protection is provided to the complete network
the route between a source and destination pair difficult to from sender to the destination and also to the route the
discover by randomly and dynamically selecting the relay network follows. It uses a unique method of partitioning the
nodes.It makes it difficult for an intruder to observe a zones in a dynamic hierarchical way which makes difficult to
statistical pattern of transmission occurring between the source the outsiders to detect the route followed by the network and
and the receiver by providing different routes. The also the two end points i.e. the sender and the destination.
mechanisms called notify and go is incorporated by ALER, ALER includes a packet rather than the position, which
which prevents an intruder from identifying which node within provides high protection in anonymity to the source and
the source neighborhood has initiated packets.ALER prevents destination zones. ALER has characteristics to strengthen the
an malicious node from interrupting the data packets or anonymity by hiding the sender and the destination among a
undermining any vulnerable nodes in the route. In ALER, it is number of senders/receivers.The given system has also
difficult for the rivals to predict the route as the routes between presented a novel approach on avoiding Sybil attack by having
two communicating nodes are constantly changing. forwarding nodes check source routes for loops. This helps to
Using timing attacks intruders can identify the packets avoid the Sybil attack and also reduce the network lifetime and
transmitted between the sender and the destination by using energy consumption level of nodes. For the improvement of
packet departure and arrival times. This results in finding out MANET there many possibilities and still many works are in
the sender and destination nodes. Avoiding the exhibition of progression phases.
interaction between communication nodes is a way to counter
timing attacks [1].In ALER it uses two different mechanisms
to cope up with this situation. The first one is called as notify
335
IJRITCC | July 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169
Volume: 5 Issue: 7 331 336
_______________________________________________________________________________________
REFERENCES
[1] L. Zhao and H. Shen, ALERT: An Anonymous Location-
Based Efficient Routing Protocol in MANETs,
Programmed random occurrence International Conference
Parallel Processing (ICPP), 2013.
[2] Eugene Y. Vassermaand Nicholas Hopper Kansas State
University University of Minnesota Vampire
attacks:Draining life from wireless ad-hoc sensor networks,
Mobile (Volume: 12, Issue: 2),20 December 2012.
[3] PriyankaGoyal, VintiParmar, Rahul Rishi, MANET:
Vulnerabilities, challenges, Attacks, Application,
International Journal of Computational Engineering
&Management IJCEM, Vol. 11, January 2011.
[4] K.E. Defrawy and G. Tsudik, ALARM: Anonymous
Location-Aided Routing in Suspicious MANETs,
Programmed random occurrence IEEE International
Conference Network Protocols (ICNP), 2009.
[5] X. Wu, AO2P: Ad Hoc On-Demand Position-Based
Private Routing Protocol, IEEE Trans. Mobile Computing,
vol. 4, no. 4,pp. 335-348, July/Aug. 2005.
[6] Z. Zhi and Y.K. Choong, Anonymizing Geographic Ad
Hoc Routing for Preserving Location Privacy, Proc. Third
Intl Workshop Mobile Distributed Computing (ICDCSW),
2005.
[7] K. El-Khatib, L. Korba, R. Song, and G. Yee, Anonymous
Secure Routing in Mobile Ad-Hoc Networks,Programmed
random occurrence International ConferenceParallel
Processing Workshops (ICPPW), 2003.
[8] L. Sweeney, k-Anonymity: A Model for Protecting
Privacy, International Journal Uncertainity Fuzziness
Knowledge-Based Systems, vol. 10, no. 5,pp. 557-570,
2002.
336
IJRITCC | July 2017, Available @ http://www.ijritcc.org
_______________________________________________________________________________________