SlideShare a Scribd company logo
1 of 3
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 40
MLRT: AN MYSTERIOUS LOCATION BASED EFFICIENT ROUTING
PROTOCOL IN MANETS
Helensupriya M1
, Sebastin Christhu Raj A2
, Sharmila R3
1
PG Scholar, Dept of CSE, SJCET, Tamilnadu, India
2
PG Scholar, Dept of CSE, SJCET, Tamilnadu, India
3
Assistant Professor, Dept of CSE, SJCET, Tamilnadu, India
Abstract
Mysterious Location-based Efficient Routing Protocol (MLRT) is an anonymous routing protocol its play a vital role in Mobile Ad
hoc Networks (MANETs). MLRT provide a secure communication by hiding the node identities and preventing the traffic analysis
attacks from outside observers in order to provide a mysterious protection. It dynamically partition the network into subzones till
the sender and receiver are in different zones and the nodes in the zones are connected as intermediate relay nodes. It uses
random relay node selection is difficult for intruder detection and dynamically generating an unpredictable routing path for a
message. It maintains a time limit for message transmission due to security and control the time delay. MLRT offers mysterious
protection to sources, destinations and routes. It achieves better route anonymity protection and lower cost compared to other
anonymous routing protocols. It has a strategy to effectively solve the intersection attacks and avoid timing attacks because of its
non-fixed routing paths for a source and destination pair. Also MLRT mainly works on Greedy Perimeter Stateless Routing
(GPSR) algorithm.
.Key Words: Mysterious, routing protocol, mobile ad hoc networks, GPSR.
--------------------------------------------------------------------***----------------------------------------------------------------------
1. INTRODUCTION
Rapid development of MANET can be used in a wide
number of areas such as commerce, emergency services,
military, education, and entertainment. MANET is a self-
configuring network of mobile wireless devices. Devices in
a MANET can move either independently or as groups in
different directions. Therefore, network topology and links
between devices change frequently. Each device may
function as a relay and forward traffic destined for other
devices. MANETs may operate autonomously or may be
connected to other networks.
The existing anonymous routing protocols in MANETs can
be mainly classified into two categories: hop-by-hop
encryption [1] and redundant traffic [2] .Both the two
techniques are generate high cost and cannot provide a
mysterious protection to sources , destinations and routes.
Hop-by-Hop encryption technique is based on public key for
data encryption and decryption. Due to this redundant traffic
technique heavy traffic will be occurred in large data
transmission. Effects of the two techniques are no security,
high cost and heavy traffic. In addition, many approaches
cannot provide anonymity protections. For example
ALARM [3] cannot protect the location anonymity of
source and destination, SDDR [1] cannot provide route
anonymity, and ZAP [4] only focuses on destination
anonymity. To transfer the message from sender to receiver
in a security way and offer a mysterious protection at a low
cost propose a Mysterious Location-Based Efficient Routing
Protocol (MLRT).
Fig -1: System Architecture Design
The scope of the MLRT is that hide the node identities and
routes from outside observers in order to provide the
mysterious protection. It split the network into sub zones till
the sender and the receiver are in different zones and nodes
in the zones are connected as intermediate relay nodes
which form a non-traceable anonymous route. Each node
itself maintains a location server and randomly selects a
node in the zones as temporary destination and transmits the
message to a temporary destination that is closer to the
destination achieved by GPSR algorithm. There is a time
limit in the message transaction. The time limit will exceed
message will expire due to security and control the time
delay. MLRT offers full mysterious protection to sources,
destinations and routes. It achieves better route mysterious
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 41
protection and lower cost compared to other anonymous
routing protocols. Also MLRT mainly works on Greedy
Perimeter Stateless Routing (GPSR) [5] algorithm. MLRT
is comparison with other anonymity and geographic
routing protocols. In summary the contribution of this
paper includes:
1. Mysterious routing. MLRT provide a route
anonymity, identity, and location anonymity of
source and destination.
2. Low cost, Instead of hop-by-hop encryption and
redundant traffic, MLRT mainly uses
randomized routing of one message copy to
provide mysterious protection.
3. Resilience to intersection attacks and timing
attacks. MLRT has a strategy to effectively
solv e counter inter-section attacks. M L RT can
also avoid timing attacks because of its non-fixed
routing paths for a source-destination pair.
2. METHODOLOGY
2.1 MLRT Routing Algorithm
All the nodes register in the database with particular IP
address and registered successfully. The node registration is
for to identify all the correct users in the database, and for
the communication between the sender and the receiver, and
also give the security to data and protect to the data
transmission between the sender and the receiver. Node
registration is using the node name, internet protocol
address, port number and the node range for the security
purpose. Above process is for unique identify and the
malicious node should not attack the data in the source node.
The registered nodes are shall with a range of 1 to 500
because in that range it divide the whole network into zones.
And when the user enters the range according to the range
the zone folder is created and inside the zone folder the
nodes have been placed for the routing. Due to the process it
can provide full security to the message and the message
transmission between the nodes are safe and secure.
The MLRT routing in this paper it checks the sender and
receiver location. If the sender and receiver are in the same
zone means it will divide the zone into subzone due to
protection from the malicious users. If not same means
connected as an intermediate relay nodes. MLRT aim is
sender and receiver should be in the different zone. If the
zone of the sender and the receiver is zone2 means it will
divide the zone into zone2.1 likewise it divide the zone into
subzone.
2.2 Dynamic Pseudo Name
In MLRT pseudo name is generated in each node location
server. The pseudonym is generated randomly in each node.
Each node uses the dynamic pseudo name for node
identification. To prevent an attacker from re-computing
the pseudo name, the timestamp should be exact(e.g.
nanoseconds).Considering the network delay, the
attacker needs to compute, e.g.,105,times for one
packet per node. There may also be many nodes for an
attacker to listen, so the computing overhead is not
acceptable, and the success rate is low. To further
make it more difficult for an attacker to compute the
timestamp, increase the computation complexity by
using randomization for the timestamps. Specifically,
keep the precise of timestamp to a certain extent, say 1
second, and randomize, The digits within 1/10th.
Thus, the pseudonyms cannot be easily reproduced.
Also, every node maintains a routing table that keeps
it’s neighbor’s pseudonyms associated with their
locations. Source node signs to intermediate node by
the port number. If the IP address and the port number of
the sending node are correct means the location server
generate the pseudonym and send the pseudonym to the
particular address of the sender. And the sender again
resends the message with the pseudonym to the intermediate
node and the intermediate node not able to see the data. And
it acts as the random forwarder and sends the data to the
temporary destination. The pseudonym is stored in the
database and when the intermediate node send the
pseudonym to the source node means the sent pseudonym is
deleted in the database. And again that pseudonym will not
be generated. The above process is for security and the
malicious node cannot predict through which pseudonym
the message is transmitted that’s why it randomly generate
the pseudonym that process is to enhance more security to
the project and secure the data from the malicious attackers.
2.3 Location Server
In MLRT location servers play a significant role. Each node
itself handles a location server. When a node moves it will
periodically update its position to location server in the
range of 1to500. Location servers maintain routing
information and generate a dynamic pseudo name. In
location server contains information about random
forwarder and temporary destination zone.
2.4 Random Forwarder
The source node signs in the intermediate node by the port
number and if the port number is correct the intermediate
node sends the pseudonym name to the source node and the
source node again signs in with the message with the
pseudonym and select the random forwarder or the
intermediate node through greedy perimeter stateless routing
algorithm and selects the intermediate node through the
distance and intermediate node acts as the random forwarder
and repeat the same process and selects the temporary
destination through greedy perimeter stateless routing
algorithm and sends the message from the intermediate node
to the temporary destination. In the temporary destination it
selects the random forwarder through the greedy perimeter
algorithm, which give high priority to the node which is
nearer to the destination and the message is transmitted to
that node and give high priority to node the process
continues until the message reach the destination. Random
forwarder node should be hiding from malicious attackers to
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 42
achieve a security. The number of random forwarders
determines the length of the routing path in MLRT.
3. SYSTEM IMPLEMENTATION
3.1 Mysterious Protection and Strategies against Attacks
3.1.1 Mysterious Protection
It tells about the mysterious protection from the malicious
users and to protect the message from the attackers. In the
Intersection attack the registered nodes for a node registered
with IP address and its name and the port number that node
is a valid node. The network node can be identified through
the port number. Any unwanted malicious node with the
different node name and the different IP address can be
easily identified and it can prevent the message from the
malicious users. In timing attacks going to set the time to the
message source node set the message time for example say 1
second. It could get reply from its destination stating that
received the message successfully. If the reply has not yet
come after 1 second means it states that any malicious nodes
attacks the message the message will automatically expire
after 1 second to avoid the above type of attacks. If the
malicious node attacks the message with the particular time
means also the message should be drop that states that the
malicious node attacking the message. In the case also the
message should be dropped. It gives full security to the
message.
4. PERFORMANCE AND OUTPUT
The Previous work was long time process. In this work
developed using Java Swing. The Previous work caused
long time transmission process but the system developed
now has a very good user-friendly tool, which has a menu-
based interface, graphical interface for the end user. In
previous work every node separately maintains a location
server. So the cost will be high. In propose every node itself
maintain a location server. So the cost will be reduced.
Fig -2: Different Types of Packets Transmitted
5. CONCLUSION
MLRT is distinguished by its low cost and mysterious
protection for sources, destinations, and routes. It uses
dynamic zone partitions and random relay node selections to
make it difficult for an intruder to detect the two endpoints
and nodes en route. In addition, MLRT has an efficient
solution to counter intersection attacks and fight against
with timing attacks. It includes implementing a Time to live
(TTL) algorithm for security and control the time delay.
REFERENCES
[1]. Sk.Md.M. Rahman, M. Mambo, A. Inomata, and E.
Okamoto, “An Anonymous On-Demand Position-Based
Routing in Mobile Ad Hoc Networks,” Proc. Int’l
Symp. Applications on Internet (SAINT), 2006.
[2]. J.Raymond, “Traffic Analysis: Protocols, Attacks,
Design Issues, and Open Problems,
”Proc.Int’lWorkshop Designing Privacy Enhancing
Technologies: Design Issues in Anonymity and Un-
Observability (WDIAU),pp.10-29,2001.
[3]. K.E. Defrawy and G. Tsudik, “ALARM: Anonymous
Location-Aided Routing in Suspicious MANETs,”
Proc. IEEE Int’l Conf.Network Protocols (ICNP), 2007.
[4]. X. Wu, J. Liu, X. Hong, and E. Bertino, “Anonymous
Geo-Forwarding in MANETs through Location
Cloaking,” IEEE Trans.Parallel and Distributed
Systems, vol. 19, no. 10, pp. 1297-1309, Oct.2008.
[5]. Ratnasamy, B. Karp, R.Govindan, D.Estrin, L.Yin,
F.Yu and S.Shenker, “Data – Centric Storagein
Sensor nets with GHT, a Geographic Hash Table,
”Mobile Network Applications, vol.8, no.4, pp.427-
442,2003.
BIOGRAPHIES
Helensupriya M received the B.E
degree in CSE stream at Parisutham
Institute of Technology & Science
in 2012. And pursuing M.E degree
in CSE stream at St.Joseph’s
College of Engg & tech,
Thanjavur..Area of Interest is
Mobile Computing.
Sebastin Christhu Raj A received
the M.Sc degree in CS stream at
Bharathidasan University in 2010.
And pursuing M.E degree in CSE
stream at St.Joseph’s College of
Engg & tech, Thanjavur. He worked
as a Production Engineer in OKAY
SOFT & Devolepers Pvt.Ltd. Area
of Interest is Mobile Computing.
Sharmla R received B.E. Degree in
CSE stream at PREC, Thanjavur in
2006, and Done her M.E. Degree in
Prist University in 2009, She is
working as a Asst Prof in SJCET,
Thanjavur. She Presented papers in
National & International
Conferences, and also Published
some books.

More Related Content

What's hot

PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...ijsptm
 
Efficient security approaches in mobile ad hoc networks a survey
Efficient security approaches in mobile ad hoc networks a surveyEfficient security approaches in mobile ad hoc networks a survey
Efficient security approaches in mobile ad hoc networks a surveyeSAT Publishing House
 
Survey on dynamic source routing, attacks and counter measures in wireless se...
Survey on dynamic source routing, attacks and counter measures in wireless se...Survey on dynamic source routing, attacks and counter measures in wireless se...
Survey on dynamic source routing, attacks and counter measures in wireless se...eSAT Publishing House
 
Impact of black hole attack on aodv routing protocol
Impact of black hole attack on aodv routing protocolImpact of black hole attack on aodv routing protocol
Impact of black hole attack on aodv routing protocolZac Darcy
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...ijceronline
 
SRAAA – Secured Right Angled and Ant Search Hybrid Routing Protocol for MANETs
SRAAA – Secured Right Angled and Ant Search Hybrid Routing Protocol for MANETsSRAAA – Secured Right Angled and Ant Search Hybrid Routing Protocol for MANETs
SRAAA – Secured Right Angled and Ant Search Hybrid Routing Protocol for MANETsAM Publications,India
 
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...IJERD Editor
 
A new ids scheme against blackhole attack to enhance security in wireless net...
A new ids scheme against blackhole attack to enhance security in wireless net...A new ids scheme against blackhole attack to enhance security in wireless net...
A new ids scheme against blackhole attack to enhance security in wireless net...eSAT Journals
 
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...IJARIIE JOURNAL
 
Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...eSAT Publishing House
 
Blackhole attack in Manet
Blackhole attack in ManetBlackhole attack in Manet
Blackhole attack in ManetProf Ansari
 
A survey on trust based secure routing in manet
A survey on trust based secure routing in manetA survey on trust based secure routing in manet
A survey on trust based secure routing in manetcsandit
 
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANET
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANETPDS- A Profile based Detection Scheme for flooding attack in AODV based MANET
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANETijsptm
 

What's hot (16)

PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
PERUSAL OF INTRUSION DETECTION AND PREVENTION SYSTEM ON A MANET WITH BLACK HO...
 
Efficient security approaches in mobile ad hoc networks a survey
Efficient security approaches in mobile ad hoc networks a surveyEfficient security approaches in mobile ad hoc networks a survey
Efficient security approaches in mobile ad hoc networks a survey
 
Ijcatr04041022
Ijcatr04041022Ijcatr04041022
Ijcatr04041022
 
Survey on dynamic source routing, attacks and counter measures in wireless se...
Survey on dynamic source routing, attacks and counter measures in wireless se...Survey on dynamic source routing, attacks and counter measures in wireless se...
Survey on dynamic source routing, attacks and counter measures in wireless se...
 
Impact of black hole attack on aodv routing protocol
Impact of black hole attack on aodv routing protocolImpact of black hole attack on aodv routing protocol
Impact of black hole attack on aodv routing protocol
 
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 IJCER (www.ijceronline.com) International Journal of computational Engineeri... IJCER (www.ijceronline.com) International Journal of computational Engineeri...
IJCER (www.ijceronline.com) International Journal of computational Engineeri...
 
SRAAA – Secured Right Angled and Ant Search Hybrid Routing Protocol for MANETs
SRAAA – Secured Right Angled and Ant Search Hybrid Routing Protocol for MANETsSRAAA – Secured Right Angled and Ant Search Hybrid Routing Protocol for MANETs
SRAAA – Secured Right Angled and Ant Search Hybrid Routing Protocol for MANETs
 
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
Review on Detection & Prevention Methods for Black Hole Attack on AODV based ...
 
Ab26180184
Ab26180184Ab26180184
Ab26180184
 
A new ids scheme against blackhole attack to enhance security in wireless net...
A new ids scheme against blackhole attack to enhance security in wireless net...A new ids scheme against blackhole attack to enhance security in wireless net...
A new ids scheme against blackhole attack to enhance security in wireless net...
 
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
Survey paper on Detecting Blackhole Attack by different Approaches and its Co...
 
Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...
 
Blackhole attack in Manet
Blackhole attack in ManetBlackhole attack in Manet
Blackhole attack in Manet
 
A survey on trust based secure routing in manet
A survey on trust based secure routing in manetA survey on trust based secure routing in manet
A survey on trust based secure routing in manet
 
1705 1708
1705 17081705 1708
1705 1708
 
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANET
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANETPDS- A Profile based Detection Scheme for flooding attack in AODV based MANET
PDS- A Profile based Detection Scheme for flooding attack in AODV based MANET
 

Viewers also liked

Recent developments in iris based biometric
Recent developments in iris based biometricRecent developments in iris based biometric
Recent developments in iris based biometriceSAT Publishing House
 
Automated system to detect rf leakage from microwave oven using raspberry pi
Automated system to detect rf leakage from microwave oven using raspberry piAutomated system to detect rf leakage from microwave oven using raspberry pi
Automated system to detect rf leakage from microwave oven using raspberry pieSAT Publishing House
 
A novel dual point clamper for low-rigidity plate
A novel dual point clamper for low-rigidity plateA novel dual point clamper for low-rigidity plate
A novel dual point clamper for low-rigidity plateeSAT Publishing House
 
Personal identification using multibiometrics score level fusion
Personal identification using multibiometrics score level fusionPersonal identification using multibiometrics score level fusion
Personal identification using multibiometrics score level fusioneSAT Publishing House
 
Effect of prism height on strength of reinforced hollow concrete block masonry
Effect of prism height on strength of reinforced hollow concrete block masonryEffect of prism height on strength of reinforced hollow concrete block masonry
Effect of prism height on strength of reinforced hollow concrete block masonryeSAT Publishing House
 
New methodologies for cultural heritage
New methodologies for cultural heritageNew methodologies for cultural heritage
New methodologies for cultural heritageeSAT Publishing House
 
Sdci scalable distributed cache indexing for cache consistency for mobile env...
Sdci scalable distributed cache indexing for cache consistency for mobile env...Sdci scalable distributed cache indexing for cache consistency for mobile env...
Sdci scalable distributed cache indexing for cache consistency for mobile env...eSAT Publishing House
 
Impact resistance capacity of a green ultra high performance hybrid fibre rei...
Impact resistance capacity of a green ultra high performance hybrid fibre rei...Impact resistance capacity of a green ultra high performance hybrid fibre rei...
Impact resistance capacity of a green ultra high performance hybrid fibre rei...eSAT Publishing House
 
Design and implementation of a fuzzy based tsunami warning system
Design and implementation of a fuzzy based tsunami warning systemDesign and implementation of a fuzzy based tsunami warning system
Design and implementation of a fuzzy based tsunami warning systemeSAT Publishing House
 
Studies on mechanical, wear and corrosion properties
Studies on mechanical, wear and corrosion propertiesStudies on mechanical, wear and corrosion properties
Studies on mechanical, wear and corrosion propertieseSAT Publishing House
 
Taguchi optimization for efficient extraction of a natural dye from bougainvi...
Taguchi optimization for efficient extraction of a natural dye from bougainvi...Taguchi optimization for efficient extraction of a natural dye from bougainvi...
Taguchi optimization for efficient extraction of a natural dye from bougainvi...eSAT Publishing House
 
Performance of high pressure coolant on tool wear
Performance of high pressure coolant on tool wearPerformance of high pressure coolant on tool wear
Performance of high pressure coolant on tool weareSAT Publishing House
 
Fuzzy logic methodology for short term load forecasting
Fuzzy logic methodology for short term load forecastingFuzzy logic methodology for short term load forecasting
Fuzzy logic methodology for short term load forecastingeSAT Publishing House
 
New study on friction in a mom total hip prosthesis with balls in self direct...
New study on friction in a mom total hip prosthesis with balls in self direct...New study on friction in a mom total hip prosthesis with balls in self direct...
New study on friction in a mom total hip prosthesis with balls in self direct...eSAT Publishing House
 
Product aspect ranking using domain dependent and domain independent review
Product aspect ranking using domain dependent and domain independent reviewProduct aspect ranking using domain dependent and domain independent review
Product aspect ranking using domain dependent and domain independent revieweSAT Publishing House
 
Design and development of non server peer 2 peer secure communication using j...
Design and development of non server peer 2 peer secure communication using j...Design and development of non server peer 2 peer secure communication using j...
Design and development of non server peer 2 peer secure communication using j...eSAT Publishing House
 
Gsm based patient monitoring system in nicu
Gsm based patient monitoring system in nicuGsm based patient monitoring system in nicu
Gsm based patient monitoring system in nicueSAT Publishing House
 
Performance analysis on multihop transmission using
Performance analysis on multihop transmission usingPerformance analysis on multihop transmission using
Performance analysis on multihop transmission usingeSAT Publishing House
 
Exploring the preferred temperature on occupants thermal comfort in the humid...
Exploring the preferred temperature on occupants thermal comfort in the humid...Exploring the preferred temperature on occupants thermal comfort in the humid...
Exploring the preferred temperature on occupants thermal comfort in the humid...eSAT Publishing House
 

Viewers also liked (20)

Recent developments in iris based biometric
Recent developments in iris based biometricRecent developments in iris based biometric
Recent developments in iris based biometric
 
Automated system to detect rf leakage from microwave oven using raspberry pi
Automated system to detect rf leakage from microwave oven using raspberry piAutomated system to detect rf leakage from microwave oven using raspberry pi
Automated system to detect rf leakage from microwave oven using raspberry pi
 
A novel dual point clamper for low-rigidity plate
A novel dual point clamper for low-rigidity plateA novel dual point clamper for low-rigidity plate
A novel dual point clamper for low-rigidity plate
 
Personal identification using multibiometrics score level fusion
Personal identification using multibiometrics score level fusionPersonal identification using multibiometrics score level fusion
Personal identification using multibiometrics score level fusion
 
Effect of prism height on strength of reinforced hollow concrete block masonry
Effect of prism height on strength of reinforced hollow concrete block masonryEffect of prism height on strength of reinforced hollow concrete block masonry
Effect of prism height on strength of reinforced hollow concrete block masonry
 
New methodologies for cultural heritage
New methodologies for cultural heritageNew methodologies for cultural heritage
New methodologies for cultural heritage
 
Sdci scalable distributed cache indexing for cache consistency for mobile env...
Sdci scalable distributed cache indexing for cache consistency for mobile env...Sdci scalable distributed cache indexing for cache consistency for mobile env...
Sdci scalable distributed cache indexing for cache consistency for mobile env...
 
Impact resistance capacity of a green ultra high performance hybrid fibre rei...
Impact resistance capacity of a green ultra high performance hybrid fibre rei...Impact resistance capacity of a green ultra high performance hybrid fibre rei...
Impact resistance capacity of a green ultra high performance hybrid fibre rei...
 
Design and implementation of a fuzzy based tsunami warning system
Design and implementation of a fuzzy based tsunami warning systemDesign and implementation of a fuzzy based tsunami warning system
Design and implementation of a fuzzy based tsunami warning system
 
Studies on mechanical, wear and corrosion properties
Studies on mechanical, wear and corrosion propertiesStudies on mechanical, wear and corrosion properties
Studies on mechanical, wear and corrosion properties
 
Taguchi optimization for efficient extraction of a natural dye from bougainvi...
Taguchi optimization for efficient extraction of a natural dye from bougainvi...Taguchi optimization for efficient extraction of a natural dye from bougainvi...
Taguchi optimization for efficient extraction of a natural dye from bougainvi...
 
Performance of high pressure coolant on tool wear
Performance of high pressure coolant on tool wearPerformance of high pressure coolant on tool wear
Performance of high pressure coolant on tool wear
 
Fuzzy logic methodology for short term load forecasting
Fuzzy logic methodology for short term load forecastingFuzzy logic methodology for short term load forecasting
Fuzzy logic methodology for short term load forecasting
 
A study on wind speed distributions
A study on wind speed distributionsA study on wind speed distributions
A study on wind speed distributions
 
New study on friction in a mom total hip prosthesis with balls in self direct...
New study on friction in a mom total hip prosthesis with balls in self direct...New study on friction in a mom total hip prosthesis with balls in self direct...
New study on friction in a mom total hip prosthesis with balls in self direct...
 
Product aspect ranking using domain dependent and domain independent review
Product aspect ranking using domain dependent and domain independent reviewProduct aspect ranking using domain dependent and domain independent review
Product aspect ranking using domain dependent and domain independent review
 
Design and development of non server peer 2 peer secure communication using j...
Design and development of non server peer 2 peer secure communication using j...Design and development of non server peer 2 peer secure communication using j...
Design and development of non server peer 2 peer secure communication using j...
 
Gsm based patient monitoring system in nicu
Gsm based patient monitoring system in nicuGsm based patient monitoring system in nicu
Gsm based patient monitoring system in nicu
 
Performance analysis on multihop transmission using
Performance analysis on multihop transmission usingPerformance analysis on multihop transmission using
Performance analysis on multihop transmission using
 
Exploring the preferred temperature on occupants thermal comfort in the humid...
Exploring the preferred temperature on occupants thermal comfort in the humid...Exploring the preferred temperature on occupants thermal comfort in the humid...
Exploring the preferred temperature on occupants thermal comfort in the humid...
 

Similar to Mlrt an mysterious location based efficient routing protocol in manets

Discovering adaptive wireless sensor network using
Discovering adaptive wireless sensor network using Discovering adaptive wireless sensor network using
Discovering adaptive wireless sensor network using eSAT Journals
 
Discovering adaptive wireless sensor network using β synchronizer
Discovering adaptive wireless sensor network using β synchronizerDiscovering adaptive wireless sensor network using β synchronizer
Discovering adaptive wireless sensor network using β synchronizereSAT Publishing House
 
Advisedly delayed packet attack on tcp based mobile ad-hoc networks
Advisedly delayed packet attack on tcp based mobile ad-hoc networksAdvisedly delayed packet attack on tcp based mobile ad-hoc networks
Advisedly delayed packet attack on tcp based mobile ad-hoc networkseSAT Journals
 
Advisedly delayed packet attack on tcp based mobile
Advisedly delayed packet attack on tcp based mobileAdvisedly delayed packet attack on tcp based mobile
Advisedly delayed packet attack on tcp based mobileeSAT Publishing House
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS ijasuc
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS ijasuc
 
Collective approach for manets to support packet loss and delay sensitive app...
Collective approach for manets to support packet loss and delay sensitive app...Collective approach for manets to support packet loss and delay sensitive app...
Collective approach for manets to support packet loss and delay sensitive app...eSAT Publishing House
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)theijes
 
An enhancing security for mobile sinks by providing location privacy in wsn
An enhancing security for mobile sinks by providing location privacy in wsnAn enhancing security for mobile sinks by providing location privacy in wsn
An enhancing security for mobile sinks by providing location privacy in wsneSAT Publishing House
 
Paper id 311201512
Paper id 311201512Paper id 311201512
Paper id 311201512IJRAT
 
Performance investigation of re shuffling packet attack on transport layer pr...
Performance investigation of re shuffling packet attack on transport layer pr...Performance investigation of re shuffling packet attack on transport layer pr...
Performance investigation of re shuffling packet attack on transport layer pr...eSAT Journals
 
Performance investigation of re shuffling packet
Performance investigation of re shuffling packetPerformance investigation of re shuffling packet
Performance investigation of re shuffling packeteSAT Publishing House
 
Prevention against new cell counting attack against tor network
Prevention against new cell counting attack against tor networkPrevention against new cell counting attack against tor network
Prevention against new cell counting attack against tor networkeSAT Journals
 
Prevention against new cell counting attack against tor network
Prevention against new cell counting attack against tor networkPrevention against new cell counting attack against tor network
Prevention against new cell counting attack against tor networkeSAT Publishing House
 
A comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manetA comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in maneteSAT Publishing House
 
A Study of Secure Efficient Ad hoc Distance Vector Routing Protocols for MANETs
A Study of Secure Efficient Ad hoc Distance Vector Routing Protocols for MANETsA Study of Secure Efficient Ad hoc Distance Vector Routing Protocols for MANETs
A Study of Secure Efficient Ad hoc Distance Vector Routing Protocols for MANETsIJMER
 
Analysis of zone routing protocol in manet
Analysis of zone routing protocol in manetAnalysis of zone routing protocol in manet
Analysis of zone routing protocol in maneteSAT Journals
 
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)eSAT Journals
 
Implementation of dynamic source routing (dsr) in
Implementation of dynamic source routing (dsr) inImplementation of dynamic source routing (dsr) in
Implementation of dynamic source routing (dsr) ineSAT Publishing House
 
QoS Issues in MANET: A Comparative Study over Different Routing Protocols
QoS Issues in MANET: A Comparative Study over Different Routing ProtocolsQoS Issues in MANET: A Comparative Study over Different Routing Protocols
QoS Issues in MANET: A Comparative Study over Different Routing Protocolsrahulmonikasharma
 

Similar to Mlrt an mysterious location based efficient routing protocol in manets (20)

Discovering adaptive wireless sensor network using
Discovering adaptive wireless sensor network using Discovering adaptive wireless sensor network using
Discovering adaptive wireless sensor network using
 
Discovering adaptive wireless sensor network using β synchronizer
Discovering adaptive wireless sensor network using β synchronizerDiscovering adaptive wireless sensor network using β synchronizer
Discovering adaptive wireless sensor network using β synchronizer
 
Advisedly delayed packet attack on tcp based mobile ad-hoc networks
Advisedly delayed packet attack on tcp based mobile ad-hoc networksAdvisedly delayed packet attack on tcp based mobile ad-hoc networks
Advisedly delayed packet attack on tcp based mobile ad-hoc networks
 
Advisedly delayed packet attack on tcp based mobile
Advisedly delayed packet attack on tcp based mobileAdvisedly delayed packet attack on tcp based mobile
Advisedly delayed packet attack on tcp based mobile
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
 
Collective approach for manets to support packet loss and delay sensitive app...
Collective approach for manets to support packet loss and delay sensitive app...Collective approach for manets to support packet loss and delay sensitive app...
Collective approach for manets to support packet loss and delay sensitive app...
 
The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)The International Journal of Engineering and Science (IJES)
The International Journal of Engineering and Science (IJES)
 
An enhancing security for mobile sinks by providing location privacy in wsn
An enhancing security for mobile sinks by providing location privacy in wsnAn enhancing security for mobile sinks by providing location privacy in wsn
An enhancing security for mobile sinks by providing location privacy in wsn
 
Paper id 311201512
Paper id 311201512Paper id 311201512
Paper id 311201512
 
Performance investigation of re shuffling packet attack on transport layer pr...
Performance investigation of re shuffling packet attack on transport layer pr...Performance investigation of re shuffling packet attack on transport layer pr...
Performance investigation of re shuffling packet attack on transport layer pr...
 
Performance investigation of re shuffling packet
Performance investigation of re shuffling packetPerformance investigation of re shuffling packet
Performance investigation of re shuffling packet
 
Prevention against new cell counting attack against tor network
Prevention against new cell counting attack against tor networkPrevention against new cell counting attack against tor network
Prevention against new cell counting attack against tor network
 
Prevention against new cell counting attack against tor network
Prevention against new cell counting attack against tor networkPrevention against new cell counting attack against tor network
Prevention against new cell counting attack against tor network
 
A comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manetA comparitive study of efficient anonymous routing protocols in manet
A comparitive study of efficient anonymous routing protocols in manet
 
A Study of Secure Efficient Ad hoc Distance Vector Routing Protocols for MANETs
A Study of Secure Efficient Ad hoc Distance Vector Routing Protocols for MANETsA Study of Secure Efficient Ad hoc Distance Vector Routing Protocols for MANETs
A Study of Secure Efficient Ad hoc Distance Vector Routing Protocols for MANETs
 
Analysis of zone routing protocol in manet
Analysis of zone routing protocol in manetAnalysis of zone routing protocol in manet
Analysis of zone routing protocol in manet
 
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)
Implementation of dynamic source routing (dsr) in mobile ad hoc network (manet)
 
Implementation of dynamic source routing (dsr) in
Implementation of dynamic source routing (dsr) inImplementation of dynamic source routing (dsr) in
Implementation of dynamic source routing (dsr) in
 
QoS Issues in MANET: A Comparative Study over Different Routing Protocols
QoS Issues in MANET: A Comparative Study over Different Routing ProtocolsQoS Issues in MANET: A Comparative Study over Different Routing Protocols
QoS Issues in MANET: A Comparative Study over Different Routing Protocols
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnameSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnameSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaeSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingeSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a revieweSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard managementeSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallseSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaeSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structureseSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingseSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfKamal Acharya
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesPrabhanshu Chaturvedi
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdfKamal Acharya
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 

Recently uploaded (20)

MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Glass Ceramics: Processing and Properties
Glass Ceramics: Processing and PropertiesGlass Ceramics: Processing and Properties
Glass Ceramics: Processing and Properties
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 

Mlrt an mysterious location based efficient routing protocol in manets

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 40 MLRT: AN MYSTERIOUS LOCATION BASED EFFICIENT ROUTING PROTOCOL IN MANETS Helensupriya M1 , Sebastin Christhu Raj A2 , Sharmila R3 1 PG Scholar, Dept of CSE, SJCET, Tamilnadu, India 2 PG Scholar, Dept of CSE, SJCET, Tamilnadu, India 3 Assistant Professor, Dept of CSE, SJCET, Tamilnadu, India Abstract Mysterious Location-based Efficient Routing Protocol (MLRT) is an anonymous routing protocol its play a vital role in Mobile Ad hoc Networks (MANETs). MLRT provide a secure communication by hiding the node identities and preventing the traffic analysis attacks from outside observers in order to provide a mysterious protection. It dynamically partition the network into subzones till the sender and receiver are in different zones and the nodes in the zones are connected as intermediate relay nodes. It uses random relay node selection is difficult for intruder detection and dynamically generating an unpredictable routing path for a message. It maintains a time limit for message transmission due to security and control the time delay. MLRT offers mysterious protection to sources, destinations and routes. It achieves better route anonymity protection and lower cost compared to other anonymous routing protocols. It has a strategy to effectively solve the intersection attacks and avoid timing attacks because of its non-fixed routing paths for a source and destination pair. Also MLRT mainly works on Greedy Perimeter Stateless Routing (GPSR) algorithm. .Key Words: Mysterious, routing protocol, mobile ad hoc networks, GPSR. --------------------------------------------------------------------***---------------------------------------------------------------------- 1. INTRODUCTION Rapid development of MANET can be used in a wide number of areas such as commerce, emergency services, military, education, and entertainment. MANET is a self- configuring network of mobile wireless devices. Devices in a MANET can move either independently or as groups in different directions. Therefore, network topology and links between devices change frequently. Each device may function as a relay and forward traffic destined for other devices. MANETs may operate autonomously or may be connected to other networks. The existing anonymous routing protocols in MANETs can be mainly classified into two categories: hop-by-hop encryption [1] and redundant traffic [2] .Both the two techniques are generate high cost and cannot provide a mysterious protection to sources , destinations and routes. Hop-by-Hop encryption technique is based on public key for data encryption and decryption. Due to this redundant traffic technique heavy traffic will be occurred in large data transmission. Effects of the two techniques are no security, high cost and heavy traffic. In addition, many approaches cannot provide anonymity protections. For example ALARM [3] cannot protect the location anonymity of source and destination, SDDR [1] cannot provide route anonymity, and ZAP [4] only focuses on destination anonymity. To transfer the message from sender to receiver in a security way and offer a mysterious protection at a low cost propose a Mysterious Location-Based Efficient Routing Protocol (MLRT). Fig -1: System Architecture Design The scope of the MLRT is that hide the node identities and routes from outside observers in order to provide the mysterious protection. It split the network into sub zones till the sender and the receiver are in different zones and nodes in the zones are connected as intermediate relay nodes which form a non-traceable anonymous route. Each node itself maintains a location server and randomly selects a node in the zones as temporary destination and transmits the message to a temporary destination that is closer to the destination achieved by GPSR algorithm. There is a time limit in the message transaction. The time limit will exceed message will expire due to security and control the time delay. MLRT offers full mysterious protection to sources, destinations and routes. It achieves better route mysterious
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 41 protection and lower cost compared to other anonymous routing protocols. Also MLRT mainly works on Greedy Perimeter Stateless Routing (GPSR) [5] algorithm. MLRT is comparison with other anonymity and geographic routing protocols. In summary the contribution of this paper includes: 1. Mysterious routing. MLRT provide a route anonymity, identity, and location anonymity of source and destination. 2. Low cost, Instead of hop-by-hop encryption and redundant traffic, MLRT mainly uses randomized routing of one message copy to provide mysterious protection. 3. Resilience to intersection attacks and timing attacks. MLRT has a strategy to effectively solv e counter inter-section attacks. M L RT can also avoid timing attacks because of its non-fixed routing paths for a source-destination pair. 2. METHODOLOGY 2.1 MLRT Routing Algorithm All the nodes register in the database with particular IP address and registered successfully. The node registration is for to identify all the correct users in the database, and for the communication between the sender and the receiver, and also give the security to data and protect to the data transmission between the sender and the receiver. Node registration is using the node name, internet protocol address, port number and the node range for the security purpose. Above process is for unique identify and the malicious node should not attack the data in the source node. The registered nodes are shall with a range of 1 to 500 because in that range it divide the whole network into zones. And when the user enters the range according to the range the zone folder is created and inside the zone folder the nodes have been placed for the routing. Due to the process it can provide full security to the message and the message transmission between the nodes are safe and secure. The MLRT routing in this paper it checks the sender and receiver location. If the sender and receiver are in the same zone means it will divide the zone into subzone due to protection from the malicious users. If not same means connected as an intermediate relay nodes. MLRT aim is sender and receiver should be in the different zone. If the zone of the sender and the receiver is zone2 means it will divide the zone into zone2.1 likewise it divide the zone into subzone. 2.2 Dynamic Pseudo Name In MLRT pseudo name is generated in each node location server. The pseudonym is generated randomly in each node. Each node uses the dynamic pseudo name for node identification. To prevent an attacker from re-computing the pseudo name, the timestamp should be exact(e.g. nanoseconds).Considering the network delay, the attacker needs to compute, e.g.,105,times for one packet per node. There may also be many nodes for an attacker to listen, so the computing overhead is not acceptable, and the success rate is low. To further make it more difficult for an attacker to compute the timestamp, increase the computation complexity by using randomization for the timestamps. Specifically, keep the precise of timestamp to a certain extent, say 1 second, and randomize, The digits within 1/10th. Thus, the pseudonyms cannot be easily reproduced. Also, every node maintains a routing table that keeps it’s neighbor’s pseudonyms associated with their locations. Source node signs to intermediate node by the port number. If the IP address and the port number of the sending node are correct means the location server generate the pseudonym and send the pseudonym to the particular address of the sender. And the sender again resends the message with the pseudonym to the intermediate node and the intermediate node not able to see the data. And it acts as the random forwarder and sends the data to the temporary destination. The pseudonym is stored in the database and when the intermediate node send the pseudonym to the source node means the sent pseudonym is deleted in the database. And again that pseudonym will not be generated. The above process is for security and the malicious node cannot predict through which pseudonym the message is transmitted that’s why it randomly generate the pseudonym that process is to enhance more security to the project and secure the data from the malicious attackers. 2.3 Location Server In MLRT location servers play a significant role. Each node itself handles a location server. When a node moves it will periodically update its position to location server in the range of 1to500. Location servers maintain routing information and generate a dynamic pseudo name. In location server contains information about random forwarder and temporary destination zone. 2.4 Random Forwarder The source node signs in the intermediate node by the port number and if the port number is correct the intermediate node sends the pseudonym name to the source node and the source node again signs in with the message with the pseudonym and select the random forwarder or the intermediate node through greedy perimeter stateless routing algorithm and selects the intermediate node through the distance and intermediate node acts as the random forwarder and repeat the same process and selects the temporary destination through greedy perimeter stateless routing algorithm and sends the message from the intermediate node to the temporary destination. In the temporary destination it selects the random forwarder through the greedy perimeter algorithm, which give high priority to the node which is nearer to the destination and the message is transmitted to that node and give high priority to node the process continues until the message reach the destination. Random forwarder node should be hiding from malicious attackers to
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 03 Issue: 03 | Mar-2014, Available @ http://www.ijret.org 42 achieve a security. The number of random forwarders determines the length of the routing path in MLRT. 3. SYSTEM IMPLEMENTATION 3.1 Mysterious Protection and Strategies against Attacks 3.1.1 Mysterious Protection It tells about the mysterious protection from the malicious users and to protect the message from the attackers. In the Intersection attack the registered nodes for a node registered with IP address and its name and the port number that node is a valid node. The network node can be identified through the port number. Any unwanted malicious node with the different node name and the different IP address can be easily identified and it can prevent the message from the malicious users. In timing attacks going to set the time to the message source node set the message time for example say 1 second. It could get reply from its destination stating that received the message successfully. If the reply has not yet come after 1 second means it states that any malicious nodes attacks the message the message will automatically expire after 1 second to avoid the above type of attacks. If the malicious node attacks the message with the particular time means also the message should be drop that states that the malicious node attacking the message. In the case also the message should be dropped. It gives full security to the message. 4. PERFORMANCE AND OUTPUT The Previous work was long time process. In this work developed using Java Swing. The Previous work caused long time transmission process but the system developed now has a very good user-friendly tool, which has a menu- based interface, graphical interface for the end user. In previous work every node separately maintains a location server. So the cost will be high. In propose every node itself maintain a location server. So the cost will be reduced. Fig -2: Different Types of Packets Transmitted 5. CONCLUSION MLRT is distinguished by its low cost and mysterious protection for sources, destinations, and routes. It uses dynamic zone partitions and random relay node selections to make it difficult for an intruder to detect the two endpoints and nodes en route. In addition, MLRT has an efficient solution to counter intersection attacks and fight against with timing attacks. It includes implementing a Time to live (TTL) algorithm for security and control the time delay. REFERENCES [1]. Sk.Md.M. Rahman, M. Mambo, A. Inomata, and E. Okamoto, “An Anonymous On-Demand Position-Based Routing in Mobile Ad Hoc Networks,” Proc. Int’l Symp. Applications on Internet (SAINT), 2006. [2]. J.Raymond, “Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems, ”Proc.Int’lWorkshop Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Un- Observability (WDIAU),pp.10-29,2001. [3]. K.E. Defrawy and G. Tsudik, “ALARM: Anonymous Location-Aided Routing in Suspicious MANETs,” Proc. IEEE Int’l Conf.Network Protocols (ICNP), 2007. [4]. X. Wu, J. Liu, X. Hong, and E. Bertino, “Anonymous Geo-Forwarding in MANETs through Location Cloaking,” IEEE Trans.Parallel and Distributed Systems, vol. 19, no. 10, pp. 1297-1309, Oct.2008. [5]. Ratnasamy, B. Karp, R.Govindan, D.Estrin, L.Yin, F.Yu and S.Shenker, “Data – Centric Storagein Sensor nets with GHT, a Geographic Hash Table, ”Mobile Network Applications, vol.8, no.4, pp.427- 442,2003. BIOGRAPHIES Helensupriya M received the B.E degree in CSE stream at Parisutham Institute of Technology & Science in 2012. And pursuing M.E degree in CSE stream at St.Joseph’s College of Engg & tech, Thanjavur..Area of Interest is Mobile Computing. Sebastin Christhu Raj A received the M.Sc degree in CS stream at Bharathidasan University in 2010. And pursuing M.E degree in CSE stream at St.Joseph’s College of Engg & tech, Thanjavur. He worked as a Production Engineer in OKAY SOFT & Devolepers Pvt.Ltd. Area of Interest is Mobile Computing. Sharmla R received B.E. Degree in CSE stream at PREC, Thanjavur in 2006, and Done her M.E. Degree in Prist University in 2009, She is working as a Asst Prof in SJCET, Thanjavur. She Presented papers in National & International Conferences, and also Published some books.