Mobile Ad Hoc Networks (MANETs) use
anonymous routing protocols that hide node identities and/or
routes from outside observers in order to provide anonymity
protection. However, existing anonymous routing protocols
relying on either hop-by-hop encryption or redundant traffic,
either incurs high cost or cannot provide full anonymity
protection to data sources, destinations, and routes. The high
cost adds to the inherent resource constraint problem in
MANETs especially in multimedia wireless applications. To
offer high anonymity protection at a low cost, Anonymous
Location-based Efficient Routing protocol (ALERT) is proposed.
ALERT partitions the network field into zones and randomly
chooses nodes in zones as intermediate relay nodes, which form
a non-traceable anonymous route and offers anonymity
protection to sources, destinations, and routes.
Published In : IJCAT Journal Volume 1, Issue 6
Date of Publication : 31 July 2014
Pages : 288 - 295
Figures :06
Tables : --
Publication Link : A Reactive Protocol for Privacy Preservation using
Location-Based Efficient Routing in MANETs
Anonymous Location Based Efficient Routing Protocol is
implemented using Network Simulation (NS2) tool.
Initially, the nodes are deployed and configured in a
predefined topography. Later, Network area will be partitioned with respect to destination position and sender
position which groups the set of nodes called mobile node
and relay node zones. Based on the zone distance in the
network, node types get initialized. Node types are Node
type 0- Mobile node (source node) zone, Node type 1-
Relay node zone, Node type 2- Destination node. In order
to provide source, route and destination anonymity, the
sender packets are encrypted (DES algorithm) by using
polynomial key generated using the combination of
sender, relay and destination identities by the RSA
algorithm. Our implemented method (ALERT) is
compared with the existing methods (ALARM and GPSR)
Comparison is based on the performance metrics such as
packet delivery ratio and end to end delay. Using X-graph
tool in Network Simulator (NS2), the simulation results
are shown graphically. Results indicate that our
implemented method (ALERT) has a higher packet
delivery ratio and lower end to end delay compared to the
existing method (ALARM and GPSR).
[1] K. E. Defrawy and G. Tsudik, “ALARM: Anonymous
Location- Aided Routing in Suspicious MANETs,”
Proc. IEEE Int’l Conf. Network Protocols (ICNP),
2007.
[2] X. Wu, J. Liu, X. Hong, and E. Bertino, “Anonymous
Geo- Forwarding in MANETs through Location
Cloaking,” IEEE Trans. Parallel and Distributed
Systems, vol. 19, no. 10, pp. 1297-1309, Oct.2008.
[3] X. Wu, “AO2P: AdHoc On-Demand Position-Based
Private Routing Protocol,” IEEE Trans. Mobile
Computing, vol. 4, no. 4, pp. 335-348, July/Aug. 2005.
[4] S. Ratnasamy, B. Karp, S. Shenker, D. Estrin, R.
Govindan, 1 L. Yin, and F. Yu, “Data-Centric Storage
in Sensornets with GHT, a Geographic Hash Table,”
Mobile Network Applications, vol. 8, no. 4, pp. 427-
442, 2003.
[5] Sk. Md. M. Rahman, M. Mambo, A. Inomata and E.
Okamoto. “An Anonymous On-Demand Position-Based
Routing in Mobile Ad Hoc Networks,” Proc. Int’l
Symp. Applications on Internet (SAINT) 2006.
[6] V. Pathak, D. Yao and L. Iftode. “Securing Location
Aware Services over VANET Using Geographical
Secure Path Routing,” Proc. IEEE Int’l Conf. Vehicular
Electronics and safety (ICVES), 2008.
[7] Z. Zhi and Y.K. Choong. “Anonymizing Geographic Ad
Hoc Routing for Preserving Location Privacy,” Proc.
Third Int’l Workshop Mobile Distributed Computing
(ICDCSW), 2005.
[8] S. Ratnasamy, B. Karp, S. Shenker, D. Estrin, R.
Govindan, L. Yin, and F. Yu, “Data-Centric Storage in
Sensornets with GHT, a Geographic Hash Table,”
Mobile Network Applications, vol. 8, no. 4, pp. 427-
442, 2003.
[9] L. Zhao and H. Shen, “ALERT: Anonymous Location
Based Efficient Routing Protocol in MANETs,” Proc.
Int’l Conf. Parallel Processing (ICPP), 2013.