Anonymity Protection in MANETs By Zone Partitioning
Journal Title: The International Journal of Technological Exploration and Learning - Year 2014, Vol 3, Issue 4
Abstract
Anonymous routing protocols play a vital role in MANETs in order to provide secure communications by concealing the identity of the nodes and avoiding traffic analysis assail from exterior observers. So, my project focuses on providing anonymity protection to data sources, destination and route, by concealing the node’s identity and location which means that it should be tough enough for other nodes to obtain its real identity and exact location of the sender and the receiver. Mobile Ad hoc Networks (MANETs) use anonymous routing protocol where as the earlier routing protocols concentrated on concealing the node identity and/or routes from outside observers by using hop-by-hop encryption method or redundant traffic in order to provide anonymity protection, but it was not that highly secure and it incurred much cost for encrypting each and every node and timing attack and intersection attack prevailed. So, the proposed algorithm i.e., an Anonymous Location Based Efficient Routing Protocol (ALERT) which uses hierarchical zone partitioning process to overcome all the aforementioned problems & also overcomes intersection & timing attacks and reduces the cost to a greater extent & enforcing higher security, ALERT offers anonymity protection to all the three i.e. source, destination & route anonymity which was not possible by earlier used protocols.
Authors and Affiliations
Shruti Mariappa Hosmani| M. Tech. Scholar, Department of CSE, VTU RO, PG Centre College, Gulbarga, India, Dr. Shubhangi D. C| Professor & HOD, Department of CSE, VTU RO, PG Centre College, Gulbarga, India, Shailaja. Shastri| Asst Professor, Department of CSE, PDA College of Engineering, Gulbarga, India
An Automated Traffic Accident Detection and Alarm Device
The purpose of this work is to find the vehicle where it is and also you can stop that vehicle means after sending a message block you vehicle to your system which is placed inside of vehicle will get hold down there...
Presentinga Hybrid Clustering Approach By UsingA Subset Of Initial Clusters
Data clustering means that grouping the samples in similar sets that the samples of every group (cluster) have the maximum similarity with each other and with the other groups have a maximum distance. Many methods ha...
Cognitive Development for Children’s of â€Hashu Advani School of Special Education†using Image Processing
Children who are deaf by birth usually find it difficult to speak because they cannot receive sound signals. To recover this ability, speech therapy of deaf children is practiced with the hope that they can speak norm...
EMD Techniques of Image Steganography
Exploiting Modification Direction (EMD) is a technique to hide secret data into digital images. This paper reviews different EMD techniques to hide the confidential data. The main idea of EMD is to embed secret data i...
Adaptive Non-Linear Bayesian Filter for ECG Denoising
The cycles of an electrocardiogram (ECG) signal contain three components P-wave, QRS complex and the T-wave. Noise is present in cardiograph as signals being measured in which biological resources (muscle contraction...