A Reactive Protocol for Privacy Preservation using Location-Based Efficient Routing in MANETs  
  Authors : Shwetha. R; Dr. B. G. Prasad

 

Mobile Ad Hoc Networks (MANETs) use anonymous routing protocols that hide node identities and/or routes from outside observers in order to provide anonymity protection. However, existing anonymous routing protocols relying on either hop-by-hop encryption or redundant traffic, either incurs high cost or cannot provide full anonymity protection to data sources, destinations, and routes. The high cost adds to the inherent resource constraint problem in MANETs especially in multimedia wireless applications. To offer high anonymity protection at a low cost, Anonymous Location-based Efficient Routing protocol (ALERT) is proposed. ALERT partitions the network field into zones and randomly chooses nodes in zones as intermediate relay nodes, which form a non-traceable anonymous route and offers anonymity protection to sources, destinations, and routes.

 

Published In : IJCAT Journal Volume 1, Issue 6

Date of Publication : 31 July 2014

Pages : 288 - 295

Figures :06

Tables : --

Publication Link : A Reactive Protocol for Privacy Preservation using Location-Based Efficient Routing in MANETs

 

 

 

R. Shwetha : B.E in Computer Science in the year 2008, MTech (pursuing) Computer Science & Engineering in B.N.M Institute of Technology. Previously worked as lecturer in Government Polytechnic for Women (2009-2010) and Brindavan College of Engineering (2010-2012).

Dr. B. G. Prasad Ph.D : currently working as Professor & Head of Department in CSE at B.N.M Institute of Technology. He has over 25 years of academic experience in Computer Science. Has published 24 journals / conference papers. His areas of interest encompass Computer Networks, Image Processing, CBIR, Operating Systems and Computer Vision.

 

 

 

 

 

 

 

anonymity

Mobile Ad Hoc Networks

routing protocol

geographic routing

Anonymous Location Based Efficient Routing Protocol is implemented using Network Simulation (NS2) tool. Initially, the nodes are deployed and configured in a predefined topography. Later, Network area will be partitioned with respect to destination position and sender position which groups the set of nodes called mobile node and relay node zones. Based on the zone distance in the network, node types get initialized. Node types are Node type 0- Mobile node (source node) zone, Node type 1- Relay node zone, Node type 2- Destination node. In order to provide source, route and destination anonymity, the sender packets are encrypted (DES algorithm) by using polynomial key generated using the combination of sender, relay and destination identities by the RSA algorithm. Our implemented method (ALERT) is compared with the existing methods (ALARM and GPSR) Comparison is based on the performance metrics such as packet delivery ratio and end to end delay. Using X-graph tool in Network Simulator (NS2), the simulation results are shown graphically. Results indicate that our implemented method (ALERT) has a higher packet delivery ratio and lower end to end delay compared to the existing method (ALARM and GPSR).

 

 

 

 

 

 

 

 

 

[1] K. E. Defrawy and G. Tsudik, “ALARM: Anonymous Location- Aided Routing in Suspicious MANETs,” Proc. IEEE Int’l Conf. Network Protocols (ICNP), 2007.

[2] X. Wu, J. Liu, X. Hong, and E. Bertino, “Anonymous Geo- Forwarding in MANETs through Location Cloaking,” IEEE Trans. Parallel and Distributed Systems, vol. 19, no. 10, pp. 1297-1309, Oct.2008.

[3] X. Wu, “AO2P: AdHoc On-Demand Position-Based Private Routing Protocol,” IEEE Trans. Mobile Computing, vol. 4, no. 4, pp. 335-348, July/Aug. 2005.

[4] S. Ratnasamy, B. Karp, S. Shenker, D. Estrin, R. Govindan, 1 L. Yin, and F. Yu, “Data-Centric Storage in Sensornets with GHT, a Geographic Hash Table,” Mobile Network Applications, vol. 8, no. 4, pp. 427- 442, 2003.

[5] Sk. Md. M. Rahman, M. Mambo, A. Inomata and E. Okamoto. “An Anonymous On-Demand Position-Based Routing in Mobile Ad Hoc Networks,” Proc. Int’l Symp. Applications on Internet (SAINT) 2006.

[6] V. Pathak, D. Yao and L. Iftode. “Securing Location Aware Services over VANET Using Geographical Secure Path Routing,” Proc. IEEE Int’l Conf. Vehicular Electronics and safety (ICVES), 2008.

[7] Z. Zhi and Y.K. Choong. “Anonymizing Geographic Ad Hoc Routing for Preserving Location Privacy,” Proc. Third Int’l Workshop Mobile Distributed Computing (ICDCSW), 2005.

[8] S. Ratnasamy, B. Karp, S. Shenker, D. Estrin, R. Govindan, L. Yin, and F. Yu, “Data-Centric Storage in Sensornets with GHT, a Geographic Hash Table,” Mobile Network Applications, vol. 8, no. 4, pp. 427- 442, 2003.

[9] L. Zhao and H. Shen, “ALERT: Anonymous Location Based Efficient Routing Protocol in MANETs,” Proc. Int’l Conf. Parallel Processing (ICPP), 2013.