Rapid development of Mobile Ad Hoc Networks
(MANETs) has stimulated numerous wireless applications that
can be used in a wide number of areas such as commerce,
emergency services, military, education, and entertainment.
Mobile Ad Hoc Networks (MANETs) use anonymous routing
protocols that hide node identities and/or routes from outside
observers in order to provide anonymity protection. To offer high
anonymity protection at a low cost, we propose a Multipathbased
Anonymous Routing proTocol (MART) in MANETs. This
protocol uses multipath routing to route packets through multiple
paths, which form a non-traceable anonymous route. In addition,
it hides the data initiator/receiver among many
initiators/receivers to strengthen source and destination
anonymity protection. Thus, it offers anonymity protection to
sources, destinations and routes. It also effectively counters
intersection and timing attacks. The protocol is simulated using
Network Simulator-2 and performance of the protocol is
evaluated based on the average throughput and end to end delay.
Published In : IJCAT Journal Volume 1, Issue 5
Date of Publication : 30 June 2014
Pages : 162 - 169
Figures : 02
Tables : 01
Publication Link : MART: Multipath-Based Anonymous Routing Protocol
in MANETs
[1] J. Kong, X. Hong, and M. Gerla, “ANODR:
Anonymous on Demand Routing Protocol with
Untraceable Routes for Mobile Ad-Hoc Networks,”
Proc. ACM MobiHoc, pp. 291-302, 2003.
[2] I. Aad, C. Castelluccia, and J. Hubaux, “Packet Coding
for Strong Anonymity in Ad Hoc Networks,” Proc.
Securecomm and Workshops, 2006.
[3] Y.-C. Hu, A. Perrig, and D.B. Johnson, “Ariadne: A
Secure On- Demand Routing Protocol for Ad Hoc
Networks,” Wireless Networks, vol. 11, pp. 21-38,
2005.
[4] Y. Zhang, W. Liu, and W. Luo, “Anonymous
Communications in Mobile Ad Hoc Networks,” Proc.
IEEE INFOCOM, 2005.
[5] X. Wu, J. Liu, X. Hong, and E. Bertino, “Anonymous
Geo- Forwarding in MANETs through Location
Cloaking,” IEEE Trans. Parallel and Distributed
Systems, vol. 19, no. 10, pp. 1297-1309, Oct. 2008.
[6] Haiying Shen and Lianyu Zhao, “ALERT: An
Anonymous Location-Based Efficient Routing
Protocol in MANETs,” in Proceedings of the June
2013 IEEE Transactions on Mobile Computing.
[7] L. Yang, M. Jakobsson, and S. Wetzel, “Discount
Anonymous On Demand Routing for Mobile Ad Hoc
Networks,” Proc. Securecomm and Workshops, 2006.
[8] R. Rivest, “The MD5 Message-Digest Algorithm”,
MIT Laboratory for Computer Science and RSA Data
Security, Inc.April 1992.
[9] SHA1 Algorithm, Designed by the United States
National Security Agency, is a U.S. Federal
Information Processing Standard published by the
United States NIST.
[10] Mahesh K. Marina and Samir R. Das, “Ad hoc Ondemand
Multipath Distance Vector routing”, Wireless
Communications and Mobile computing. Published
online in Wiley InterScience.
[11] Rakesh Kumar, Piush Verma, Yaduvir Singh, “Mobile
Ad Hoc Networks and Its Routing Protocols”,
International Journal of Computer, Information Science
and Engineering Vol:7 No:8, 2013.