MART: Multipath-Based Anonymous Routing Protocol in MANETs  
  Authors : Thejaswi D T

 

Rapid development of Mobile Ad Hoc Networks (MANETs) has stimulated numerous wireless applications that can be used in a wide number of areas such as commerce, emergency services, military, education, and entertainment. Mobile Ad Hoc Networks (MANETs) use anonymous routing protocols that hide node identities and/or routes from outside observers in order to provide anonymity protection. To offer high anonymity protection at a low cost, we propose a Multipathbased Anonymous Routing proTocol (MART) in MANETs. This protocol uses multipath routing to route packets through multiple paths, which form a non-traceable anonymous route. In addition, it hides the data initiator/receiver among many initiators/receivers to strengthen source and destination anonymity protection. Thus, it offers anonymity protection to sources, destinations and routes. It also effectively counters intersection and timing attacks. The protocol is simulated using Network Simulator-2 and performance of the protocol is evaluated based on the average throughput and end to end delay.

 

Published In : IJCAT Journal Volume 1, Issue 5

Date of Publication : 30 June 2014

Pages : 162 - 169

Figures : 02

Tables : 01

Publication Link : MART: Multipath-Based Anonymous Routing Protocol in MANETs

 

 

 

Thejaswi D.T : B.E. Information Science 2009, M.Tech Computer Science and Engineering 2014. Worked as a Trainee Engineer in ABB GISL, Bangalore, from 2009 to 2010. Worked as a Lecturer in Computer Science and Engineering Department of Canara Engineering College, Benjanapadav, Mangalorefrom 2010 to 2011.

 

 

 

 

 

 

 

MANET

Multipath Routing

Source Anonymity

Destination Anonymity

Route anonymity

The Multipath-based Anonymous Routing protocol (MART) provides an anonymous routing technique that produces efficient results in accomplishing the aforementioned anonymity of source, destination and route, using the concept of multipath routing, that is traditionally used for the purpose of load balancing and fault tolerance in networks. The basic usage of multipath routing is overridden to achieve the purpose of the protocol. AOMDV [10] protocol is used to achieve multipath routing, used specifically for route anonymity, thus forming non-traceable route. The source and destination anonymity achieved using hash algorithms and MD5 [8]. The analysis shows good result. The proposed system depends on the existing multipath protocol AOMDV [10]. The dependency on AOMDV [10] incurs overhead of route request and route response. Thus the future work would be to focus on an independent or a dedicated multipath protocol for achieving source, destination and route anonymity. Another concentration would be to use a higher and still more efficient algorithm instead of SHA-1 [9] hash algorithm.better your paper looks, the better the Journal looks. Thanks for your cooperation and contribution.

 

 

 

 

 

 

 

 

 

[1] J. Kong, X. Hong, and M. Gerla, “ANODR: Anonymous on Demand Routing Protocol with Untraceable Routes for Mobile Ad-Hoc Networks,” Proc. ACM MobiHoc, pp. 291-302, 2003.

[2] I. Aad, C. Castelluccia, and J. Hubaux, “Packet Coding for Strong Anonymity in Ad Hoc Networks,” Proc. Securecomm and Workshops, 2006.

[3] Y.-C. Hu, A. Perrig, and D.B. Johnson, “Ariadne: A Secure On- Demand Routing Protocol for Ad Hoc Networks,” Wireless Networks, vol. 11, pp. 21-38, 2005.

[4] Y. Zhang, W. Liu, and W. Luo, “Anonymous Communications in Mobile Ad Hoc Networks,” Proc. IEEE INFOCOM, 2005.

[5] X. Wu, J. Liu, X. Hong, and E. Bertino, “Anonymous Geo- Forwarding in MANETs through Location Cloaking,” IEEE Trans. Parallel and Distributed Systems, vol. 19, no. 10, pp. 1297-1309, Oct. 2008.

[6] Haiying Shen and Lianyu Zhao, “ALERT: An Anonymous Location-Based Efficient Routing Protocol in MANETs,” in Proceedings of the June 2013 IEEE Transactions on Mobile Computing.

[7] L. Yang, M. Jakobsson, and S. Wetzel, “Discount Anonymous On Demand Routing for Mobile Ad Hoc Networks,” Proc. Securecomm and Workshops, 2006.

[8] R. Rivest, “The MD5 Message-Digest Algorithm”, MIT Laboratory for Computer Science and RSA Data Security, Inc.April 1992.

[9] SHA1 Algorithm, Designed by the United States National Security Agency, is a U.S. Federal Information Processing Standard published by the United States NIST.

[10] Mahesh K. Marina and Samir R. Das, “Ad hoc Ondemand Multipath Distance Vector routing”, Wireless Communications and Mobile computing. Published online in Wiley InterScience.

[11] Rakesh Kumar, Piush Verma, Yaduvir Singh, “Mobile Ad Hoc Networks and Its Routing Protocols”, International Journal of Computer, Information Science and Engineering Vol:7 No:8, 2013.