SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 655
A COMPARITIVE STUDY OF EFFICIENT ANONYMOUS ROUTING
PROTOCOLS IN MANET
Anupriya Augustine1
, Jubin Sebastian E2
1
M. Tech Scholar, Dept. of Electronics and Communication, Vimal Jyothi Engineering College, Chemperi, Kannur
2
Assistant Professor, Dept. of Electronics and Communication, Vimal Jyothi Engineering College, Chemperi, Kannur
Abstract
Mobile Ad Hoc Network (MANET) is a type of wireless network without a fixed topology consist a set of self organized nodes which
are randomly, frequently and unpredictably mobile. MANET has a wide range of applications in civilian and military systems because
of its infrastructure less nature and rapid self configuration capability. MANET is an open environment and it is susceptible to many
security attacks due to dynamic topology and lack of centralized monitoring authority. Anonymous routing protocols conceal the
identities about the route, source and destination to provide security and privacy from intruder’s attacks. This paper provides an
overview of most efficient anonymous routing protocols in MANET and examines the security efficiency of these protocols. The
parameters consider for the comparative study of these protocols are the number of actual participating nodes in the network, latency
in packet transmission, packet delivery rate and the transmission cost. The protocols taken in to account include, AO2P, ALARM and
ALERT.
Keywords- Mobile Ad Hoc Networks, security, anonymity, routing protocols.
----------------------------------------------------------------------***---------------------------------------------------------------------
1. INTRODUCTION
Without fixed topology collection of mobile nodes forming an
instant network is called ad hoc network. In this network
nodes perform as both router and host simultaneously, it will
move out or join in the network freely. Ad hoc network does
not have any base infrastructures such as in the conventional
networks. In the computing industry the importance of
Wireless network is become very high. Wireless network are
adapted to enable mobility to a great extend. There are two
types of network, they are Infra-structured network and ad-hoc
network. In Infra-structured network have the network with
fixed and wired gateway. In ad hoc networks, where all
devices have equal status on a network and are free to
associate with any other ad hoc network devices in link range.
MANET is very attractive in tactical and military applications
because of rapidly deployable and self-organizing
configurability. Like tactical communications in a battlefield,
where the environment is unfavorable, but fast network
establishment self reconfiguration and security-sensitive
operations are absolutely essential. For providing security for
MANET so many anonymous [1] routing protocols are
developed.
2. ROUTING IN MANET
Routing protocols in MANET are divided in to three main
groups. They are reactive, proactive and hybrid routing
protocols. Depending on the mechanism used for routing
purposes, they are mainly included in to two categories, they
are hope by hope encryption and redundant traffic.
MANET Routing Protocols
Proactive or Reactive or Hybrid
Table driven On-demand
Fig 1.MANET Routing Protocols classification
2.1 Proactive or Table-Driven Routing Protocols
Proactive routing protocols also called table driven routing
protocols. In this type of protocols a table contains all the
latest and consistent information of all the nodes in the
network. Periodic information about the dynamics of the
nodes is updated in the table for an active network. Routing
table information is used for the data transmission in the
network. Protocols in this category experiences lower latency.
2.2 Reactive or On-Demand Routing Protocols
Another group of MANET routing protocol is reactive or on-
demand routing protocol. In this type the protocol establishes
a route if and only if a node wants to route data packets.
Route discovery process increases transmission latency in this
category of protocols.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 656
2.3 Hybrid Routing Protocols
The third class of MANET routing protocol is the hybrid
protocols. It combines the advantages of both proactive and
reactive routing protocols and reduces the limitations of these
two. Hybrid type reduces the traffic overhead in proactive and
transmission latency in reactive protocols.
3. ROUTING ATTACKS IN MANETS
Active cooperation of all the nodes is required to provide
routing between the source and destination in the network. Ad
hoc networks are vulnerable to different types of attacks due
to dynamic, distributed infrastructureless nature of MANETs,
and lack of centralized authority [2].
The attacks to be faced by MANETs are very high those to be
faced by the traditional wireless networks. MANETs are
susceptible to both passive eavesdrops as well as active
malicious attacks due to the accessibility of the wireless
channel to both the genuine user and attacker. The main
problem in the implementation of complex security algorithms
are the limited power backup and limited computational
capability of the individual nodes. Frequent network
reconfigurations because of the nodes mobility create more
chances for attacks.
Different types of attacks on MANET are passive and active
attacks.
In passive attack the attacker listens and taps the
communication between two nodes. Passive attacks are
adverse for the security and privacy of communication.
Operation of the communication channel is not disturbed by
the passive attacker. But the attacker explores some valuable
information about the communication channel. Topology of
the network or the relationship between the nodes is used by
the passive attacker to find out the network map. This can
create some active attacks in the network.
Active attacker can inject unwanted information in the
communication channel. It can also listen and modify the
information in that channel. Active attackers can replay,
modify or deletes some packets from the network. In a replay
attack, the attacker resends a packet that was already
transmitted. In modify attack, the attacker can modify the
active packets with unwanted information which causes
incorrect updates of the routing table. So the packets are
transmitted to wrong destinations. Active attacks create
network congestion problems.
The well known routing attacks in MANETs are discussed
below.
3.1 Flooding Attack:
It is also known as Routing Table Overflow. In this attack the
attacker node send more information to the network which
causes overflow of the routing tables.
3.2 Black Hole Attack:
In this attack, the attacker nodes reply false route information
for the route request. If the malicious route is established then
the current active route is routed through this new attacker
route and the data in the network may be misused or
discarded.
3.3 Wormhole Attack:
In this attack two attacking nodes cooperate between each
other. Capturing routing traffic is down by one attacker at one
point of the network and tunnels it to another point in the
network. A private high speed communication link is shared
between the two attackers. The network is selectively injected
the tunnel traffic by the attackers. Then the routes established
under the control over the wormhole link. The wormhole
attacks distort the topology of the network.
4. ANONYMOUS ROUTING PROTOCOLS
In the past years number of anonymous routing protocols are
proposed for MANET [3] - [15] the following four phases are
included most commonly.
For to providing anonymity to source destination and route
anonymous routing protocols are essential in MANET. The
attacker can try different path to hack the data between the
source and destination also able to find the identity of source
and destination. There are different anonymous routing
protocols are used in MANET to provide anonymity.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 657
4.1 AO2P: AD HOC On-Demand Position Based
Private Routing Protocol
Fig 2.Route discovery in MANET
In AO2P route discovery is done by using only the position of
the destination. Other information such as forwarding nodes
positions are hiding from the network. Real identities of
source, destination and forwarding nodes are confidential.
Date packet transmission uses the pseudo identifiers of the
source, destination and forwarding nodes.
Route is established by receiver contention scheme. In this
protocol receivers (node receiving the rreq message) are
included in different class. The receiver which is closer to the
destination is in the higher priority class. Highest priority
receiver is the destination node. A node in the network obtains
its position through GPS. Every node has a region around a
fixed center called virtual home region (VHR). Position
information of the node is updated to the servers in the VHR.
This distributed secure position service is named as
DISPOSER which improves the position security.
R-A02P is another method to provide more destination
anonymity. In this position of a reference point is used for
establishing the route instead of destination position.
4.2 Alarm: Anonymous Location Aided Routing
ALARM can solve a number of issues in MANET. ALARM
provides secure communication and privacy in both suspicious
and hostile networks with reasonable efficiency. The ALARM
[17] is a privacy preserving and secure link state based routing
protocol. Node anonymity and protection from tracking are
objectives of privacy. Security means nodes authentication
and integrity of locations secure data forwarding in ALARM
is by using the node’s current locations.
Identification of nodes at certain locations in ALARM is relies
on group signature to create pseudonyms. Security against
active and passive attacks and privacy features are provided by
ALARM. It is due to the integration of advanced
cryptographic techniques such as group signature in this
protocol which gives some features including authentication of
node, integrity of the data, untraceability and anonymity.
Group signature is another form of public key signature with
further privacy features. The group manager (GM) helps to
identify the nodes which are provided with the group
signature. This technique contributes additional security for
the MANET.
Initialization:
Group signature scheme is started by the GM. Group members
are the nodes that are active for that session. A private key is
generated by all the group members and this key is concealed
from other nodes. Group signature is produced from this
private key. Each node also creates a public key and is
revealed only for GM. Group public key is common to all
members in the group.
Operation:
a) Time duration is divided into slots having length T. A node
creates a temporary public private key pair, PK-TMPs and
SK-TM at the beginning of every time slot.
b) Location co-ordinates, public key, group signature and time
stamp of all the group members are contains in a location
announcement message (LAM). This LAM is broadcasted in
to the MANET. This procedure is shown in figure 3.
c) After receiving a LAM the node check this LAM is already
received or not. If it is received at the first time, node
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 658
authenticates the group signature and the time-stamp. If this is
valid, then the LAM is broadcasted again and collects all
current LAMs of each node in the network. A node
connectivity graph and geographical map can be made from
this information. It is shown in figure 4.
d) Communication between a node and a node at another
location is operated by first checking that whether there is a
node at that location. If a node is present, then the temporary
ID of the destination is obtained by transmitting a message to
the destination's current location. A session key is used to
encrypt the data and this session key is also encrypted under
the public key. The receiver node decrypts session key first
and then decrypts the message.
Fig 3.ALARM sender process
Fig 4.ALARM receiver process
4.3 Alert: Anonymous Location-Based Efficient
Routing Protocol
Route identity, source identity and destination identity are the
main goals of anonymous routing protocols. The existing hop
by hop encryption or redundant traffic concepts for providing
anonymity results high cost. Hierarchical partition is the main
technique used in ALERT [18]. The network is partitioned
dynamically in to vertical and horizontal zones in ALERT.
The algorithm used for data transmission is Greedy perimeter
stateless routing (GPSR). Different mobility models such as
random way point model and group mobility model can be
used for ALERT. Communication latency is reduced to a great
extend by using ALERT.
ALERT restricting a node’s visibility only to its neighbors.
Here the same initial and forwarded messages are created. So
an attacker cannot identify whether a node is a source or a
forwarding node. All this factors contributes to the
achievement of anonymity.
Another mechanism used in ALERT to provide anonymity is
the “notify and go”. In this a number of nodes send
information at the same time as the source sends packets. This
hides the source among other nodes and provides high
anonymity protection for the source. The number of nodes in
the destination zone provides destination anonymity. The
number of nodes in destination depends on the node density
and destination zone size. ALERT is also providing protection
from intersection attacks and timing attacks.
5. PERFORMANCE COMPARISON
The comparison of the three protocols are worked out based
on some parameters such as the number of actual participating
nodes, latency in packet transmission, packet delivery rate and
transmission cost.
5.1 Number of Participating Nodes in the Network:
ALARM and AO2P is based on the GPSR method. Next hop
in GPSR scheme is always the node which is nearest to the
destination. If such a node does not present, then GPSR
practice perimeter forwarding to find the next hop. ALARM
and AO2P uses the GPSR baseline for routing purposes.
ALERT generates different routes between each source and
destination pair since it produces many actual participating
nodes. The actual participating nodes in ALERT also include
the random forwarders. It contributes high routing anonymity
in ALERT. GPSR always proceeds through the shortest paths.
So the number of actual participating nodes is less compared
to ALERT.
Increased number of participating nodes in ALERT creates
more randomized routes between source and destination. So it
is very difficult to detect this routes and it provides great
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 659
anonymity for the route. When the node density increases,
shorter routes are easily obtained in GPSR. So the number of
actual participating nodes is almost steady with the increase in
node density. The GPSR routing paths in ALARM and AO2P
are easily identified by the attackers. This reveals that ALERT
provides more anonymity than the AO2P and ALARM.
5.2 Latency in Packet Transmission
Latency is defined as the time difference between the packet
transmission and receiving. Latency includes the time for both
routing and cryptography. ALARM and AO2P take the
shortest path for routing of packets. ALERT does not take the
GPSR mechanism. Even thought ALERT not establishing the
shortest path, the latency of ALERT is very much lower than
ALARM and AO2P. More routing hops are generated in
ALERT than AO2P and ALARM. But the latency in ALERT
is significantly lower than the other two. This is because of the
time needed for the public key encryption of ALARM and
AO2P. ALERT follows symmetric key encryption only once
which reduces the latency.
The transmission between two random forwarders in ALERT
is depends on GPSR, it helps to reduce the latency further
more. ALARM requires a periodic authentication of adjacent
nodes and AO2P requires an encryption in each node. This
process outweighs the low latency due to shortest path in
ALARM and AO2P.
AO2P has a contention phase and it increases the path length.
So AO2P has latency higher than ALARM. Increase in node
density decreases latency of ALARM, AO2P and ALERT.
Improved node density creates more relay nodes and shorter
paths. Latency of ALARM and AO2P can be reduced to an
extent by reducing the public key encryption operations.
5.3 Packet Delivery Rate:
Fraction of successfully delivered packets to a destination is
called the delivery rate. When the node moving speed
increases without the destination updates, the delivery rates
are reduced. In view of mobility of destination, the delivery
rates are reduced in all the protocols. ALERT has higher
delivery rates compared to AO2P and ALARM, as a result of
final local broadcast process.
5.4 Transmission Cost
The number of hops per packet is higher in ALERT than
ALARM and AO2P. Total routing hop counts divided by the
number of packets sent gives the number of hops per packet.
Routing path length of ALERT is higher than the shortest path
of AO2P and ALARM. It is because of the random node
selection of ALERT. Since compared to ALARM and AO2P,
ALERT has relatively more hop per packet. This slightly
increases the routing cost. Presence of more node density in
ALERT gives better route anonymity than AO2P and
ALARM. Increase in the routing cost of ALERT is avoidable
when considering the route anonymity than the other
protocols. Analysis of the hop by hop encryption based AO2P
method and the redundant traffic based ALARM method,
gives that ALERT having lower computing cost.
AO2P and ALARM is with equal number of hops per packet.
ALARM with id dissemination hops for providing anonymity
has higher number of hops per packet than others, and is
doubled than that of ALERT. ALARM with id dissemination
hops required periodical dissemination of node. This increases
the cost dramatically in ALARM than others.
In summary, ALERT achieves enhanced route anonymity than
ALARM and AO2P. ALERT has more number of actual
participating nodes and its random relay node selection boost
the anonymity. Transmission cost and latency in packet
transmission are lower in ALERT compared with the other
two. ALERT contributes better data delivery rate than
ALARM and AO2P.
Table 1.Summary of anonymous routing protocols comparison
Protocol Proactive/
Reactive
Routing
Mechanism
Topology/
Geographic
Single/
Multiple
route
Identity
anonymity
Location
anonymity
Route
anonymity
AO2P Reactive Hope by hope
encryption
Geographic Single Source,
Destination
Source,
Destination
No
ALARM Proactive Redundant
traffic
Topology Multiple Source,
Destination
Source No
ALERT Reactive Randomize Geographic Multiple Source,
Destination
Source,
Destination
Yes
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
__________________________________________________________________________________________
Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 660
6. CONCLUSIONS
MANET is a dynamic, infrastructurless and decentralizes
network. Due to these characters anonymous routing protocols
are required to provide a very high level of security in
MANET. Different techniques are used in anonymous
protocols to achieve the goal of anonymity. Well known,
efficient and latest anonymous routing protocols used in
MANET such as AO2P, ALARM and ALERT are examined
in this paper.
ALERT provides route anonymity, identity, and location
anonymity of source and destination more than AO2P and
ALARM. Rather than relying on hop-by-hop encryption and
redundant traffic, ALERT mainly uses randomized routing
and high node density to provide high anonymity. ALERT
have low transmission cost and latency in packet transmission
than the other two protocols. Improved data delivery rate
enhances the performance of ALERT.
The limitations of other protocols comparing with the ALERT
are, existing anonymous routing protocols generate a
significantly high cost, which exacerbates the resource
constraint problem in MANETs.
Currently complete anonymous protection of MANETs is not
achieved. So making changes in the existing protocols will
create a new anonymous protocol meeting all the requirements
of an anonymous protocol.
REFERENCES
[1] A. Pfitzmann and M. Hansen, “Anonymity,
Unlinkability, Undetectability, Unobservability,
Pseudonymity, and Identity Management - A
Consolidated Proposal for Terminology,” Tech. Rep.,
February 2008.
[2] J. Kong, X. Hong, M. Y. Sanadidi, and M. Gerla,
“Mobility Changes Anonymity: Mobile Ad Hoc
Networks Need Efficient Anonymous Routing,” in
ISCC, 2005, pp. 57–62.
[3] Y. Zhang, W. Liu, W. Lou, and Y. Fang, “MASK:
Anonymous Ondemand Routing in Mobile Ad Hoc
Networks,” IEEE Transactions on Wireless
Communications, no. 9, 2006.
[4] L. Yang, M. Jakobsson, and S. Wetzel, “Discount
Anonymous On Demand Routing for Mobile Ad Hoc
Networks,” SECURECOMM, vol. 6, 2006
[5] ] K. El-Khatib, L. Korba, R. Song, and G. Yee, “Secure
Dynamic Distributed Routing Algorithm for Ad Hoc
Wireless Networks,” ICPP Workshops, 2003, pp. 359–
366.
[6] A. Boukerche, K. El-Khatib, L. Xu, and L. Korba,
“SDAR: A Secure Distributed Anonymous Routing
Protocol for Wireless and Mobile Ad Hoc Networks,”
IEEE LCN ’04, 2004.
[7] B. Zhu, Z. Wan, M. S. Kankanhalli, F. Bao, and R. H.
Deng, “Anonymous Secure Routing in Mobile Ad-Hoc
Networks,” LCN ’04, 2004.
[8] R. Song, L. Korba, and G. Yee, “AnonDSR: Efficient
Anonymous Dynamic Source Routing for Mobile Ad-
hoc Networks,” SASN ’05, 2005, pp. 33–42.
[9] J. Kong and X. Hong, “ANODR: anonymous on
demand routing with untraceable routes for mobile ad-
hoc networks,” MobiHoc ’03, 2003.
[10] S. Seys and B. Preneel, “ARM: Anonymous Routing
Protocol for Mobile Ad hoc Networks,” AINA ’06,
2006.
[11] Jiejun Kong, Xiaoyan Hong, “An Anonymous On
Demand Routing Protocol with Untraceable Routes for
Mobile Ad-hoc Networks”, UCLA computer science
department technical report 030020.
[12] Karim El Defrawy and Gene Tsudik,” ALARM:
Anonymous Location-Aided Routing in Suspicious
MANETs”, IEEE Transactions on Wireless
Communications.
[13] Haiying Shen and Lianyu Zhao,” ALERT: An
Anonymous Location-Based Efficient Routing Protocol
in MANETs”, IEEE Transactions on Wireless
Communications.
[14] T. Camp, J. Boleng, and V. Davies, “A Survey of
Mobility Models for Ad Hoc Network Research,”
Wireless Communications and Mobile Computing, vol.
2, pp. 483-502, 2002.
[15] X. Hong, M. Gerla, G. Pei, and C.C. Chiang, “A Group
Mobility Model for Ad Hoc Wireless Networks,” Proc.
Second ACM Int’l Workshop Modeling, Analysis and
Simulation of Wireless and Mobile Systems (MSWiM),
1999.
[16] X.X. Wu and B. Bhargava, “AO2P: Ad Hoc On-
Demand Position-Based Private Routing Protocol,”
IEEE Transactions on Mobile Computing, vol. 4, no. 4,
pp. 335-348, July 2005.
[17] Gene Tsudik and Karim El Defrawy,” ALARM:
Anonymous Location-Aided Routing in Suspiciou
ANETs”, IEEE Transactions on Mobile Computing,
Volume: 10, Issue: 9,September 2011
[18] Haiying Shen and Lianyu Zhao, “ALERT: An
Anonymous Location-Based Efficient Routing Protocol
in MANETs”, IEEE Transactions on Mobile
Computing, Vol. 12, NO. 6, June 2013

More Related Content

What's hot

A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
cscpconf
 
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
Editor IJMTER
 
An ids scheme against black hole attack to secure aomdv routing in manet
An ids scheme against black hole attack to secure aomdv routing in manet An ids scheme against black hole attack to secure aomdv routing in manet
An ids scheme against black hole attack to secure aomdv routing in manet
pijans
 
Dt36717722
Dt36717722Dt36717722
Dt36717722
IJERA Editor
 
N0363079085
N0363079085N0363079085
N0363079085
ijceronline
 
Attacks on mobile ad hoc networks
Attacks on mobile ad hoc networksAttacks on mobile ad hoc networks
Attacks on mobile ad hoc networksZdravko Danailov
 
Flooding attack manet
Flooding attack manetFlooding attack manet
Flooding attack manetMeena S Pandi
 
Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)
Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)
Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)
IRJET Journal
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
theijes
 
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSPERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
IJNSA Journal
 
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
IOSR Journals
 

What's hot (14)

A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
A SYMMETRIC TOKEN ROUTING FOR SECURED COMMUNICATION OF MANET
 
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATIONSECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
SECURE ADHOC ROUTING PROTOCOL FOR PRIVACY RESERVATION
 
1705 1708
1705 17081705 1708
1705 1708
 
An ids scheme against black hole attack to secure aomdv routing in manet
An ids scheme against black hole attack to secure aomdv routing in manet An ids scheme against black hole attack to secure aomdv routing in manet
An ids scheme against black hole attack to secure aomdv routing in manet
 
Dt36717722
Dt36717722Dt36717722
Dt36717722
 
N0363079085
N0363079085N0363079085
N0363079085
 
Attacks on mobile ad hoc networks
Attacks on mobile ad hoc networksAttacks on mobile ad hoc networks
Attacks on mobile ad hoc networks
 
Flooding attack manet
Flooding attack manetFlooding attack manet
Flooding attack manet
 
Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)
Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)
Security Issues & Challenging Attributes in Mobile Ad-Hoc Networks (MANET)
 
IJMNDI.2015.069218
IJMNDI.2015.069218IJMNDI.2015.069218
IJMNDI.2015.069218
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKSPERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
PERFORMANCE ANALYSIS OF ROUTING PROTOCOLS IN MANET UNDER MALICIOUS ATTACKS
 
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
Energy Efficient and Secure, Trusted network discovery for Wireless Sensor Ne...
 
E0432933
E0432933E0432933
E0432933
 

Viewers also liked

Security attacks and solutions in vehicular ad hoc networks a survey
Security attacks and solutions in vehicular ad hoc networks a surveySecurity attacks and solutions in vehicular ad hoc networks a survey
Security attacks and solutions in vehicular ad hoc networks a survey
pijans
 
Active vibration control of smart piezo cantilever beam using pid controller
Active vibration control of smart piezo cantilever beam using pid controllerActive vibration control of smart piezo cantilever beam using pid controller
Active vibration control of smart piezo cantilever beam using pid controller
eSAT Publishing House
 
A novel dual point clamper for low-rigidity plate
A novel dual point clamper for low-rigidity plateA novel dual point clamper for low-rigidity plate
A novel dual point clamper for low-rigidity plate
eSAT Publishing House
 
Application of stochastic modeling in geomagnetism
Application of stochastic modeling in geomagnetismApplication of stochastic modeling in geomagnetism
Application of stochastic modeling in geomagnetism
eSAT Publishing House
 
Comparison of symmetrical and asymmetrical cascaded
Comparison of symmetrical and asymmetrical cascadedComparison of symmetrical and asymmetrical cascaded
Comparison of symmetrical and asymmetrical cascaded
eSAT Publishing House
 
Fpga implementation of race control algorithm for full bridge prcp converter
Fpga implementation of race control algorithm for full bridge prcp converterFpga implementation of race control algorithm for full bridge prcp converter
Fpga implementation of race control algorithm for full bridge prcp converter
eSAT Publishing House
 
Development and validation of eevc wg17 lower
Development and validation of eevc wg17 lowerDevelopment and validation of eevc wg17 lower
Development and validation of eevc wg17 lower
eSAT Publishing House
 
Face detection for video summary using enhancement based fusion strategy
Face detection for video summary using enhancement based fusion strategyFace detection for video summary using enhancement based fusion strategy
Face detection for video summary using enhancement based fusion strategy
eSAT Publishing House
 
Toxicity immobilization of refinery sludge containing
Toxicity immobilization of refinery sludge containingToxicity immobilization of refinery sludge containing
Toxicity immobilization of refinery sludge containing
eSAT Publishing House
 
Hybrid fingerprint matching algorithm for high accuracy and reliability
Hybrid fingerprint matching algorithm for high accuracy and reliabilityHybrid fingerprint matching algorithm for high accuracy and reliability
Hybrid fingerprint matching algorithm for high accuracy and reliability
eSAT Publishing House
 
Performance analysis on multihop transmission using
Performance analysis on multihop transmission usingPerformance analysis on multihop transmission using
Performance analysis on multihop transmission using
eSAT Publishing House
 
Appraisal of airport roundabout on the antoa road,
Appraisal of airport roundabout on the antoa road,Appraisal of airport roundabout on the antoa road,
Appraisal of airport roundabout on the antoa road,
eSAT Publishing House
 
Design parameters to obtain al2 o3 nanofluid to enhance
Design parameters to obtain al2 o3 nanofluid to enhanceDesign parameters to obtain al2 o3 nanofluid to enhance
Design parameters to obtain al2 o3 nanofluid to enhance
eSAT Publishing House
 
Power efficient and high throughput of fir filter using block least mean squa...
Power efficient and high throughput of fir filter using block least mean squa...Power efficient and high throughput of fir filter using block least mean squa...
Power efficient and high throughput of fir filter using block least mean squa...
eSAT Publishing House
 
Planning of intermediate transport system for bengaluru metropolitan city to ...
Planning of intermediate transport system for bengaluru metropolitan city to ...Planning of intermediate transport system for bengaluru metropolitan city to ...
Planning of intermediate transport system for bengaluru metropolitan city to ...
eSAT Publishing House
 
New methodologies for cultural heritage
New methodologies for cultural heritageNew methodologies for cultural heritage
New methodologies for cultural heritage
eSAT Publishing House
 
Counter based design of dpll for wireless communication
Counter based design of dpll for wireless communicationCounter based design of dpll for wireless communication
Counter based design of dpll for wireless communication
eSAT Publishing House
 
An optimized approach to voice translation on mobile phones
An optimized approach to voice translation on mobile phonesAn optimized approach to voice translation on mobile phones
An optimized approach to voice translation on mobile phones
eSAT Publishing House
 
Analysis of data transmission in wireless lan for 802.11
Analysis of data transmission in wireless lan for 802.11Analysis of data transmission in wireless lan for 802.11
Analysis of data transmission in wireless lan for 802.11
eSAT Publishing House
 

Viewers also liked (20)

JAVA Real time
JAVA Real timeJAVA Real time
JAVA Real time
 
Security attacks and solutions in vehicular ad hoc networks a survey
Security attacks and solutions in vehicular ad hoc networks a surveySecurity attacks and solutions in vehicular ad hoc networks a survey
Security attacks and solutions in vehicular ad hoc networks a survey
 
Active vibration control of smart piezo cantilever beam using pid controller
Active vibration control of smart piezo cantilever beam using pid controllerActive vibration control of smart piezo cantilever beam using pid controller
Active vibration control of smart piezo cantilever beam using pid controller
 
A novel dual point clamper for low-rigidity plate
A novel dual point clamper for low-rigidity plateA novel dual point clamper for low-rigidity plate
A novel dual point clamper for low-rigidity plate
 
Application of stochastic modeling in geomagnetism
Application of stochastic modeling in geomagnetismApplication of stochastic modeling in geomagnetism
Application of stochastic modeling in geomagnetism
 
Comparison of symmetrical and asymmetrical cascaded
Comparison of symmetrical and asymmetrical cascadedComparison of symmetrical and asymmetrical cascaded
Comparison of symmetrical and asymmetrical cascaded
 
Fpga implementation of race control algorithm for full bridge prcp converter
Fpga implementation of race control algorithm for full bridge prcp converterFpga implementation of race control algorithm for full bridge prcp converter
Fpga implementation of race control algorithm for full bridge prcp converter
 
Development and validation of eevc wg17 lower
Development and validation of eevc wg17 lowerDevelopment and validation of eevc wg17 lower
Development and validation of eevc wg17 lower
 
Face detection for video summary using enhancement based fusion strategy
Face detection for video summary using enhancement based fusion strategyFace detection for video summary using enhancement based fusion strategy
Face detection for video summary using enhancement based fusion strategy
 
Toxicity immobilization of refinery sludge containing
Toxicity immobilization of refinery sludge containingToxicity immobilization of refinery sludge containing
Toxicity immobilization of refinery sludge containing
 
Hybrid fingerprint matching algorithm for high accuracy and reliability
Hybrid fingerprint matching algorithm for high accuracy and reliabilityHybrid fingerprint matching algorithm for high accuracy and reliability
Hybrid fingerprint matching algorithm for high accuracy and reliability
 
Performance analysis on multihop transmission using
Performance analysis on multihop transmission usingPerformance analysis on multihop transmission using
Performance analysis on multihop transmission using
 
Appraisal of airport roundabout on the antoa road,
Appraisal of airport roundabout on the antoa road,Appraisal of airport roundabout on the antoa road,
Appraisal of airport roundabout on the antoa road,
 
Design parameters to obtain al2 o3 nanofluid to enhance
Design parameters to obtain al2 o3 nanofluid to enhanceDesign parameters to obtain al2 o3 nanofluid to enhance
Design parameters to obtain al2 o3 nanofluid to enhance
 
Power efficient and high throughput of fir filter using block least mean squa...
Power efficient and high throughput of fir filter using block least mean squa...Power efficient and high throughput of fir filter using block least mean squa...
Power efficient and high throughput of fir filter using block least mean squa...
 
Planning of intermediate transport system for bengaluru metropolitan city to ...
Planning of intermediate transport system for bengaluru metropolitan city to ...Planning of intermediate transport system for bengaluru metropolitan city to ...
Planning of intermediate transport system for bengaluru metropolitan city to ...
 
New methodologies for cultural heritage
New methodologies for cultural heritageNew methodologies for cultural heritage
New methodologies for cultural heritage
 
Counter based design of dpll for wireless communication
Counter based design of dpll for wireless communicationCounter based design of dpll for wireless communication
Counter based design of dpll for wireless communication
 
An optimized approach to voice translation on mobile phones
An optimized approach to voice translation on mobile phonesAn optimized approach to voice translation on mobile phones
An optimized approach to voice translation on mobile phones
 
Analysis of data transmission in wireless lan for 802.11
Analysis of data transmission in wireless lan for 802.11Analysis of data transmission in wireless lan for 802.11
Analysis of data transmission in wireless lan for 802.11
 

Similar to A comparitive study of efficient anonymous routing protocols in manet

Credit risk value based detection of multiple selfish node attacks in cogniti...
Credit risk value based detection of multiple selfish node attacks in cogniti...Credit risk value based detection of multiple selfish node attacks in cogniti...
Credit risk value based detection of multiple selfish node attacks in cogniti...
eSAT Publishing House
 
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor NetworksIRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET Journal
 
Impact analysis of epda and ipda attack with increasing node mobility in data...
Impact analysis of epda and ipda attack with increasing node mobility in data...Impact analysis of epda and ipda attack with increasing node mobility in data...
Impact analysis of epda and ipda attack with increasing node mobility in data...
eSAT Journals
 
Impact analysis of epda and ipda attack with increasing
Impact analysis of epda and ipda attack with increasingImpact analysis of epda and ipda attack with increasing
Impact analysis of epda and ipda attack with increasing
eSAT Publishing House
 
A comprehensive review on performance of aodv and dsdv protocol using manhatt...
A comprehensive review on performance of aodv and dsdv protocol using manhatt...A comprehensive review on performance of aodv and dsdv protocol using manhatt...
A comprehensive review on performance of aodv and dsdv protocol using manhatt...
eSAT Publishing House
 
A comprehensive review on performance of aodv and dsdv protocol using manhatt...
A comprehensive review on performance of aodv and dsdv protocol using manhatt...A comprehensive review on performance of aodv and dsdv protocol using manhatt...
A comprehensive review on performance of aodv and dsdv protocol using manhatt...
eSAT Journals
 
IRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETSIRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET Journal
 
Fpga based highly reliable fault tolerant approach for network on chip (noc)
Fpga based highly reliable fault tolerant approach for network on chip (noc)Fpga based highly reliable fault tolerant approach for network on chip (noc)
Fpga based highly reliable fault tolerant approach for network on chip (noc)
eSAT Publishing House
 
Ds35676681
Ds35676681Ds35676681
Ds35676681
IJERA Editor
 
A comprehensive review on performance of aodv protocol for wormhole attack
A comprehensive review on performance of aodv protocol for wormhole attackA comprehensive review on performance of aodv protocol for wormhole attack
A comprehensive review on performance of aodv protocol for wormhole attack
eSAT Publishing House
 
Adopting hybrid cryptography technique for reduction of network overhead in m...
Adopting hybrid cryptography technique for reduction of network overhead in m...Adopting hybrid cryptography technique for reduction of network overhead in m...
Adopting hybrid cryptography technique for reduction of network overhead in m...
eSAT Journals
 
Discovering adaptive wireless sensor network using
Discovering adaptive wireless sensor network using Discovering adaptive wireless sensor network using
Discovering adaptive wireless sensor network using
eSAT Journals
 
Discovering adaptive wireless sensor network using β synchronizer
Discovering adaptive wireless sensor network using β synchronizerDiscovering adaptive wireless sensor network using β synchronizer
Discovering adaptive wireless sensor network using β synchronizer
eSAT Publishing House
 
Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...
eSAT Publishing House
 
A Survey on Secured Routing In AD HOC Networks for Various Attacks
A Survey on Secured Routing In AD HOC Networks for Various AttacksA Survey on Secured Routing In AD HOC Networks for Various Attacks
A Survey on Secured Routing In AD HOC Networks for Various Attacks
IRJET Journal
 
A study and comparison of olsr, aodv and zrp routing
A study and comparison of olsr, aodv and zrp routingA study and comparison of olsr, aodv and zrp routing
A study and comparison of olsr, aodv and zrp routing
eSAT Publishing House
 
Security in ad hoc networks
Security in ad hoc networksSecurity in ad hoc networks
Security in ad hoc networks
eSAT Publishing House
 
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
eSAT Journals
 
Performance investigation of re shuffling packet attack on transport layer pr...
Performance investigation of re shuffling packet attack on transport layer pr...Performance investigation of re shuffling packet attack on transport layer pr...
Performance investigation of re shuffling packet attack on transport layer pr...
eSAT Journals
 
Performance investigation of re shuffling packet
Performance investigation of re shuffling packetPerformance investigation of re shuffling packet
Performance investigation of re shuffling packet
eSAT Publishing House
 

Similar to A comparitive study of efficient anonymous routing protocols in manet (20)

Credit risk value based detection of multiple selfish node attacks in cogniti...
Credit risk value based detection of multiple selfish node attacks in cogniti...Credit risk value based detection of multiple selfish node attacks in cogniti...
Credit risk value based detection of multiple selfish node attacks in cogniti...
 
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor NetworksIRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
IRJET-A Review Paper on Energy Efficient Technique of Wireless Sensor Networks
 
Impact analysis of epda and ipda attack with increasing node mobility in data...
Impact analysis of epda and ipda attack with increasing node mobility in data...Impact analysis of epda and ipda attack with increasing node mobility in data...
Impact analysis of epda and ipda attack with increasing node mobility in data...
 
Impact analysis of epda and ipda attack with increasing
Impact analysis of epda and ipda attack with increasingImpact analysis of epda and ipda attack with increasing
Impact analysis of epda and ipda attack with increasing
 
A comprehensive review on performance of aodv and dsdv protocol using manhatt...
A comprehensive review on performance of aodv and dsdv protocol using manhatt...A comprehensive review on performance of aodv and dsdv protocol using manhatt...
A comprehensive review on performance of aodv and dsdv protocol using manhatt...
 
A comprehensive review on performance of aodv and dsdv protocol using manhatt...
A comprehensive review on performance of aodv and dsdv protocol using manhatt...A comprehensive review on performance of aodv and dsdv protocol using manhatt...
A comprehensive review on performance of aodv and dsdv protocol using manhatt...
 
IRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETSIRJET-A Review Paper on Secure Routing Technique for MANETS
IRJET-A Review Paper on Secure Routing Technique for MANETS
 
Fpga based highly reliable fault tolerant approach for network on chip (noc)
Fpga based highly reliable fault tolerant approach for network on chip (noc)Fpga based highly reliable fault tolerant approach for network on chip (noc)
Fpga based highly reliable fault tolerant approach for network on chip (noc)
 
Ds35676681
Ds35676681Ds35676681
Ds35676681
 
A comprehensive review on performance of aodv protocol for wormhole attack
A comprehensive review on performance of aodv protocol for wormhole attackA comprehensive review on performance of aodv protocol for wormhole attack
A comprehensive review on performance of aodv protocol for wormhole attack
 
Adopting hybrid cryptography technique for reduction of network overhead in m...
Adopting hybrid cryptography technique for reduction of network overhead in m...Adopting hybrid cryptography technique for reduction of network overhead in m...
Adopting hybrid cryptography technique for reduction of network overhead in m...
 
Discovering adaptive wireless sensor network using
Discovering adaptive wireless sensor network using Discovering adaptive wireless sensor network using
Discovering adaptive wireless sensor network using
 
Discovering adaptive wireless sensor network using β synchronizer
Discovering adaptive wireless sensor network using β synchronizerDiscovering adaptive wireless sensor network using β synchronizer
Discovering adaptive wireless sensor network using β synchronizer
 
Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...Efficient distributed detection of node replication attacks in mobile sensor ...
Efficient distributed detection of node replication attacks in mobile sensor ...
 
A Survey on Secured Routing In AD HOC Networks for Various Attacks
A Survey on Secured Routing In AD HOC Networks for Various AttacksA Survey on Secured Routing In AD HOC Networks for Various Attacks
A Survey on Secured Routing In AD HOC Networks for Various Attacks
 
A study and comparison of olsr, aodv and zrp routing
A study and comparison of olsr, aodv and zrp routingA study and comparison of olsr, aodv and zrp routing
A study and comparison of olsr, aodv and zrp routing
 
Security in ad hoc networks
Security in ad hoc networksSecurity in ad hoc networks
Security in ad hoc networks
 
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
A study and comparison of olsr, aodv and zrp routing protocols in ad hoc netw...
 
Performance investigation of re shuffling packet attack on transport layer pr...
Performance investigation of re shuffling packet attack on transport layer pr...Performance investigation of re shuffling packet attack on transport layer pr...
Performance investigation of re shuffling packet attack on transport layer pr...
 
Performance investigation of re shuffling packet
Performance investigation of re shuffling packetPerformance investigation of re shuffling packet
Performance investigation of re shuffling packet
 

More from eSAT Publishing House

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
eSAT Publishing House
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
eSAT Publishing House
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
eSAT Publishing House
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
eSAT Publishing House
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
eSAT Publishing House
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
eSAT Publishing House
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
eSAT Publishing House
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
eSAT Publishing House
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
eSAT Publishing House
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
eSAT Publishing House
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
eSAT Publishing House
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
eSAT Publishing House
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
eSAT Publishing House
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
eSAT Publishing House
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
eSAT Publishing House
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
eSAT Publishing House
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
eSAT Publishing House
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
eSAT Publishing House
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
eSAT Publishing House
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
eSAT Publishing House
 

More from eSAT Publishing House (20)

Likely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnamLikely impacts of hudhud on the environment of visakhapatnam
Likely impacts of hudhud on the environment of visakhapatnam
 
Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...Impact of flood disaster in a drought prone area – case study of alampur vill...
Impact of flood disaster in a drought prone area – case study of alampur vill...
 
Hudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnamHudhud cyclone – a severe disaster in visakhapatnam
Hudhud cyclone – a severe disaster in visakhapatnam
 
Groundwater investigation using geophysical methods a case study of pydibhim...
Groundwater investigation using geophysical methods  a case study of pydibhim...Groundwater investigation using geophysical methods  a case study of pydibhim...
Groundwater investigation using geophysical methods a case study of pydibhim...
 
Flood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, indiaFlood related disasters concerned to urban flooding in bangalore, india
Flood related disasters concerned to urban flooding in bangalore, india
 
Enhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity buildingEnhancing post disaster recovery by optimal infrastructure capacity building
Enhancing post disaster recovery by optimal infrastructure capacity building
 
Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...Effect of lintel and lintel band on the global performance of reinforced conc...
Effect of lintel and lintel band on the global performance of reinforced conc...
 
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
Wind damage to trees in the gitam university campus at visakhapatnam by cyclo...
 
Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...Wind damage to buildings, infrastrucuture and landscape elements along the be...
Wind damage to buildings, infrastrucuture and landscape elements along the be...
 
Shear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a reviewShear strength of rc deep beam panels – a review
Shear strength of rc deep beam panels – a review
 
Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...Role of voluntary teams of professional engineers in dissater management – ex...
Role of voluntary teams of professional engineers in dissater management – ex...
 
Risk analysis and environmental hazard management
Risk analysis and environmental hazard managementRisk analysis and environmental hazard management
Risk analysis and environmental hazard management
 
Review study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear wallsReview study on performance of seismically tested repaired shear walls
Review study on performance of seismically tested repaired shear walls
 
Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...Monitoring and assessment of air quality with reference to dust particles (pm...
Monitoring and assessment of air quality with reference to dust particles (pm...
 
Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...Low cost wireless sensor networks and smartphone applications for disaster ma...
Low cost wireless sensor networks and smartphone applications for disaster ma...
 
Coastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of indiaCoastal zones – seismic vulnerability an analysis from east coast of india
Coastal zones – seismic vulnerability an analysis from east coast of india
 
Can fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structuresCan fracture mechanics predict damage due disaster of structures
Can fracture mechanics predict damage due disaster of structures
 
Assessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildingsAssessment of seismic susceptibility of rc buildings
Assessment of seismic susceptibility of rc buildings
 
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
A geophysical insight of earthquake occurred on 21 st may 2014 off paradip, b...
 
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
Effect of hudhud cyclone on the development of visakhapatnam as smart and gre...
 

Recently uploaded

The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
BrazilAccount1
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
karthi keyan
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
BrazilAccount1
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
Pipe Restoration Solutions
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
AJAYKUMARPUND1
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
Robbie Edward Sayers
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
R&R Consult
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
AhmedHussein950959
 

Recently uploaded (20)

The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
English lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdfEnglish lab ppt no titlespecENG PPTt.pdf
English lab ppt no titlespecENG PPTt.pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
CME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional ElectiveCME397 Surface Engineering- Professional Elective
CME397 Surface Engineering- Professional Elective
 
AP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specificAP LAB PPT.pdf ap lab ppt no title specific
AP LAB PPT.pdf ap lab ppt no title specific
 
The Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdfThe Benefits and Techniques of Trenchless Pipe Repair.pdf
The Benefits and Techniques of Trenchless Pipe Repair.pdf
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
Pile Foundation by Venkatesh Taduvai (Sub Geotechnical Engineering II)-conver...
 
ethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.pptethical hacking-mobile hacking methods.ppt
ethical hacking-mobile hacking methods.ppt
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxCFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptx
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
ASME IX(9) 2007 Full Version .pdf
ASME IX(9)  2007 Full Version       .pdfASME IX(9)  2007 Full Version       .pdf
ASME IX(9) 2007 Full Version .pdf
 

A comparitive study of efficient anonymous routing protocols in manet

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 655 A COMPARITIVE STUDY OF EFFICIENT ANONYMOUS ROUTING PROTOCOLS IN MANET Anupriya Augustine1 , Jubin Sebastian E2 1 M. Tech Scholar, Dept. of Electronics and Communication, Vimal Jyothi Engineering College, Chemperi, Kannur 2 Assistant Professor, Dept. of Electronics and Communication, Vimal Jyothi Engineering College, Chemperi, Kannur Abstract Mobile Ad Hoc Network (MANET) is a type of wireless network without a fixed topology consist a set of self organized nodes which are randomly, frequently and unpredictably mobile. MANET has a wide range of applications in civilian and military systems because of its infrastructure less nature and rapid self configuration capability. MANET is an open environment and it is susceptible to many security attacks due to dynamic topology and lack of centralized monitoring authority. Anonymous routing protocols conceal the identities about the route, source and destination to provide security and privacy from intruder’s attacks. This paper provides an overview of most efficient anonymous routing protocols in MANET and examines the security efficiency of these protocols. The parameters consider for the comparative study of these protocols are the number of actual participating nodes in the network, latency in packet transmission, packet delivery rate and the transmission cost. The protocols taken in to account include, AO2P, ALARM and ALERT. Keywords- Mobile Ad Hoc Networks, security, anonymity, routing protocols. ----------------------------------------------------------------------***--------------------------------------------------------------------- 1. INTRODUCTION Without fixed topology collection of mobile nodes forming an instant network is called ad hoc network. In this network nodes perform as both router and host simultaneously, it will move out or join in the network freely. Ad hoc network does not have any base infrastructures such as in the conventional networks. In the computing industry the importance of Wireless network is become very high. Wireless network are adapted to enable mobility to a great extend. There are two types of network, they are Infra-structured network and ad-hoc network. In Infra-structured network have the network with fixed and wired gateway. In ad hoc networks, where all devices have equal status on a network and are free to associate with any other ad hoc network devices in link range. MANET is very attractive in tactical and military applications because of rapidly deployable and self-organizing configurability. Like tactical communications in a battlefield, where the environment is unfavorable, but fast network establishment self reconfiguration and security-sensitive operations are absolutely essential. For providing security for MANET so many anonymous [1] routing protocols are developed. 2. ROUTING IN MANET Routing protocols in MANET are divided in to three main groups. They are reactive, proactive and hybrid routing protocols. Depending on the mechanism used for routing purposes, they are mainly included in to two categories, they are hope by hope encryption and redundant traffic. MANET Routing Protocols Proactive or Reactive or Hybrid Table driven On-demand Fig 1.MANET Routing Protocols classification 2.1 Proactive or Table-Driven Routing Protocols Proactive routing protocols also called table driven routing protocols. In this type of protocols a table contains all the latest and consistent information of all the nodes in the network. Periodic information about the dynamics of the nodes is updated in the table for an active network. Routing table information is used for the data transmission in the network. Protocols in this category experiences lower latency. 2.2 Reactive or On-Demand Routing Protocols Another group of MANET routing protocol is reactive or on- demand routing protocol. In this type the protocol establishes a route if and only if a node wants to route data packets. Route discovery process increases transmission latency in this category of protocols.
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 656 2.3 Hybrid Routing Protocols The third class of MANET routing protocol is the hybrid protocols. It combines the advantages of both proactive and reactive routing protocols and reduces the limitations of these two. Hybrid type reduces the traffic overhead in proactive and transmission latency in reactive protocols. 3. ROUTING ATTACKS IN MANETS Active cooperation of all the nodes is required to provide routing between the source and destination in the network. Ad hoc networks are vulnerable to different types of attacks due to dynamic, distributed infrastructureless nature of MANETs, and lack of centralized authority [2]. The attacks to be faced by MANETs are very high those to be faced by the traditional wireless networks. MANETs are susceptible to both passive eavesdrops as well as active malicious attacks due to the accessibility of the wireless channel to both the genuine user and attacker. The main problem in the implementation of complex security algorithms are the limited power backup and limited computational capability of the individual nodes. Frequent network reconfigurations because of the nodes mobility create more chances for attacks. Different types of attacks on MANET are passive and active attacks. In passive attack the attacker listens and taps the communication between two nodes. Passive attacks are adverse for the security and privacy of communication. Operation of the communication channel is not disturbed by the passive attacker. But the attacker explores some valuable information about the communication channel. Topology of the network or the relationship between the nodes is used by the passive attacker to find out the network map. This can create some active attacks in the network. Active attacker can inject unwanted information in the communication channel. It can also listen and modify the information in that channel. Active attackers can replay, modify or deletes some packets from the network. In a replay attack, the attacker resends a packet that was already transmitted. In modify attack, the attacker can modify the active packets with unwanted information which causes incorrect updates of the routing table. So the packets are transmitted to wrong destinations. Active attacks create network congestion problems. The well known routing attacks in MANETs are discussed below. 3.1 Flooding Attack: It is also known as Routing Table Overflow. In this attack the attacker node send more information to the network which causes overflow of the routing tables. 3.2 Black Hole Attack: In this attack, the attacker nodes reply false route information for the route request. If the malicious route is established then the current active route is routed through this new attacker route and the data in the network may be misused or discarded. 3.3 Wormhole Attack: In this attack two attacking nodes cooperate between each other. Capturing routing traffic is down by one attacker at one point of the network and tunnels it to another point in the network. A private high speed communication link is shared between the two attackers. The network is selectively injected the tunnel traffic by the attackers. Then the routes established under the control over the wormhole link. The wormhole attacks distort the topology of the network. 4. ANONYMOUS ROUTING PROTOCOLS In the past years number of anonymous routing protocols are proposed for MANET [3] - [15] the following four phases are included most commonly. For to providing anonymity to source destination and route anonymous routing protocols are essential in MANET. The attacker can try different path to hack the data between the source and destination also able to find the identity of source and destination. There are different anonymous routing protocols are used in MANET to provide anonymity.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 657 4.1 AO2P: AD HOC On-Demand Position Based Private Routing Protocol Fig 2.Route discovery in MANET In AO2P route discovery is done by using only the position of the destination. Other information such as forwarding nodes positions are hiding from the network. Real identities of source, destination and forwarding nodes are confidential. Date packet transmission uses the pseudo identifiers of the source, destination and forwarding nodes. Route is established by receiver contention scheme. In this protocol receivers (node receiving the rreq message) are included in different class. The receiver which is closer to the destination is in the higher priority class. Highest priority receiver is the destination node. A node in the network obtains its position through GPS. Every node has a region around a fixed center called virtual home region (VHR). Position information of the node is updated to the servers in the VHR. This distributed secure position service is named as DISPOSER which improves the position security. R-A02P is another method to provide more destination anonymity. In this position of a reference point is used for establishing the route instead of destination position. 4.2 Alarm: Anonymous Location Aided Routing ALARM can solve a number of issues in MANET. ALARM provides secure communication and privacy in both suspicious and hostile networks with reasonable efficiency. The ALARM [17] is a privacy preserving and secure link state based routing protocol. Node anonymity and protection from tracking are objectives of privacy. Security means nodes authentication and integrity of locations secure data forwarding in ALARM is by using the node’s current locations. Identification of nodes at certain locations in ALARM is relies on group signature to create pseudonyms. Security against active and passive attacks and privacy features are provided by ALARM. It is due to the integration of advanced cryptographic techniques such as group signature in this protocol which gives some features including authentication of node, integrity of the data, untraceability and anonymity. Group signature is another form of public key signature with further privacy features. The group manager (GM) helps to identify the nodes which are provided with the group signature. This technique contributes additional security for the MANET. Initialization: Group signature scheme is started by the GM. Group members are the nodes that are active for that session. A private key is generated by all the group members and this key is concealed from other nodes. Group signature is produced from this private key. Each node also creates a public key and is revealed only for GM. Group public key is common to all members in the group. Operation: a) Time duration is divided into slots having length T. A node creates a temporary public private key pair, PK-TMPs and SK-TM at the beginning of every time slot. b) Location co-ordinates, public key, group signature and time stamp of all the group members are contains in a location announcement message (LAM). This LAM is broadcasted in to the MANET. This procedure is shown in figure 3. c) After receiving a LAM the node check this LAM is already received or not. If it is received at the first time, node
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 658 authenticates the group signature and the time-stamp. If this is valid, then the LAM is broadcasted again and collects all current LAMs of each node in the network. A node connectivity graph and geographical map can be made from this information. It is shown in figure 4. d) Communication between a node and a node at another location is operated by first checking that whether there is a node at that location. If a node is present, then the temporary ID of the destination is obtained by transmitting a message to the destination's current location. A session key is used to encrypt the data and this session key is also encrypted under the public key. The receiver node decrypts session key first and then decrypts the message. Fig 3.ALARM sender process Fig 4.ALARM receiver process 4.3 Alert: Anonymous Location-Based Efficient Routing Protocol Route identity, source identity and destination identity are the main goals of anonymous routing protocols. The existing hop by hop encryption or redundant traffic concepts for providing anonymity results high cost. Hierarchical partition is the main technique used in ALERT [18]. The network is partitioned dynamically in to vertical and horizontal zones in ALERT. The algorithm used for data transmission is Greedy perimeter stateless routing (GPSR). Different mobility models such as random way point model and group mobility model can be used for ALERT. Communication latency is reduced to a great extend by using ALERT. ALERT restricting a node’s visibility only to its neighbors. Here the same initial and forwarded messages are created. So an attacker cannot identify whether a node is a source or a forwarding node. All this factors contributes to the achievement of anonymity. Another mechanism used in ALERT to provide anonymity is the “notify and go”. In this a number of nodes send information at the same time as the source sends packets. This hides the source among other nodes and provides high anonymity protection for the source. The number of nodes in the destination zone provides destination anonymity. The number of nodes in destination depends on the node density and destination zone size. ALERT is also providing protection from intersection attacks and timing attacks. 5. PERFORMANCE COMPARISON The comparison of the three protocols are worked out based on some parameters such as the number of actual participating nodes, latency in packet transmission, packet delivery rate and transmission cost. 5.1 Number of Participating Nodes in the Network: ALARM and AO2P is based on the GPSR method. Next hop in GPSR scheme is always the node which is nearest to the destination. If such a node does not present, then GPSR practice perimeter forwarding to find the next hop. ALARM and AO2P uses the GPSR baseline for routing purposes. ALERT generates different routes between each source and destination pair since it produces many actual participating nodes. The actual participating nodes in ALERT also include the random forwarders. It contributes high routing anonymity in ALERT. GPSR always proceeds through the shortest paths. So the number of actual participating nodes is less compared to ALERT. Increased number of participating nodes in ALERT creates more randomized routes between source and destination. So it is very difficult to detect this routes and it provides great
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 659 anonymity for the route. When the node density increases, shorter routes are easily obtained in GPSR. So the number of actual participating nodes is almost steady with the increase in node density. The GPSR routing paths in ALARM and AO2P are easily identified by the attackers. This reveals that ALERT provides more anonymity than the AO2P and ALARM. 5.2 Latency in Packet Transmission Latency is defined as the time difference between the packet transmission and receiving. Latency includes the time for both routing and cryptography. ALARM and AO2P take the shortest path for routing of packets. ALERT does not take the GPSR mechanism. Even thought ALERT not establishing the shortest path, the latency of ALERT is very much lower than ALARM and AO2P. More routing hops are generated in ALERT than AO2P and ALARM. But the latency in ALERT is significantly lower than the other two. This is because of the time needed for the public key encryption of ALARM and AO2P. ALERT follows symmetric key encryption only once which reduces the latency. The transmission between two random forwarders in ALERT is depends on GPSR, it helps to reduce the latency further more. ALARM requires a periodic authentication of adjacent nodes and AO2P requires an encryption in each node. This process outweighs the low latency due to shortest path in ALARM and AO2P. AO2P has a contention phase and it increases the path length. So AO2P has latency higher than ALARM. Increase in node density decreases latency of ALARM, AO2P and ALERT. Improved node density creates more relay nodes and shorter paths. Latency of ALARM and AO2P can be reduced to an extent by reducing the public key encryption operations. 5.3 Packet Delivery Rate: Fraction of successfully delivered packets to a destination is called the delivery rate. When the node moving speed increases without the destination updates, the delivery rates are reduced. In view of mobility of destination, the delivery rates are reduced in all the protocols. ALERT has higher delivery rates compared to AO2P and ALARM, as a result of final local broadcast process. 5.4 Transmission Cost The number of hops per packet is higher in ALERT than ALARM and AO2P. Total routing hop counts divided by the number of packets sent gives the number of hops per packet. Routing path length of ALERT is higher than the shortest path of AO2P and ALARM. It is because of the random node selection of ALERT. Since compared to ALARM and AO2P, ALERT has relatively more hop per packet. This slightly increases the routing cost. Presence of more node density in ALERT gives better route anonymity than AO2P and ALARM. Increase in the routing cost of ALERT is avoidable when considering the route anonymity than the other protocols. Analysis of the hop by hop encryption based AO2P method and the redundant traffic based ALARM method, gives that ALERT having lower computing cost. AO2P and ALARM is with equal number of hops per packet. ALARM with id dissemination hops for providing anonymity has higher number of hops per packet than others, and is doubled than that of ALERT. ALARM with id dissemination hops required periodical dissemination of node. This increases the cost dramatically in ALARM than others. In summary, ALERT achieves enhanced route anonymity than ALARM and AO2P. ALERT has more number of actual participating nodes and its random relay node selection boost the anonymity. Transmission cost and latency in packet transmission are lower in ALERT compared with the other two. ALERT contributes better data delivery rate than ALARM and AO2P. Table 1.Summary of anonymous routing protocols comparison Protocol Proactive/ Reactive Routing Mechanism Topology/ Geographic Single/ Multiple route Identity anonymity Location anonymity Route anonymity AO2P Reactive Hope by hope encryption Geographic Single Source, Destination Source, Destination No ALARM Proactive Redundant traffic Topology Multiple Source, Destination Source No ALERT Reactive Randomize Geographic Multiple Source, Destination Source, Destination Yes
  • 6. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 __________________________________________________________________________________________ Volume: 03 Special Issue: 07 | May-2014, Available @ http://www.ijret.org 660 6. CONCLUSIONS MANET is a dynamic, infrastructurless and decentralizes network. Due to these characters anonymous routing protocols are required to provide a very high level of security in MANET. Different techniques are used in anonymous protocols to achieve the goal of anonymity. Well known, efficient and latest anonymous routing protocols used in MANET such as AO2P, ALARM and ALERT are examined in this paper. ALERT provides route anonymity, identity, and location anonymity of source and destination more than AO2P and ALARM. Rather than relying on hop-by-hop encryption and redundant traffic, ALERT mainly uses randomized routing and high node density to provide high anonymity. ALERT have low transmission cost and latency in packet transmission than the other two protocols. Improved data delivery rate enhances the performance of ALERT. The limitations of other protocols comparing with the ALERT are, existing anonymous routing protocols generate a significantly high cost, which exacerbates the resource constraint problem in MANETs. Currently complete anonymous protection of MANETs is not achieved. So making changes in the existing protocols will create a new anonymous protocol meeting all the requirements of an anonymous protocol. REFERENCES [1] A. Pfitzmann and M. Hansen, “Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management - A Consolidated Proposal for Terminology,” Tech. Rep., February 2008. [2] J. Kong, X. Hong, M. Y. Sanadidi, and M. Gerla, “Mobility Changes Anonymity: Mobile Ad Hoc Networks Need Efficient Anonymous Routing,” in ISCC, 2005, pp. 57–62. [3] Y. Zhang, W. Liu, W. Lou, and Y. Fang, “MASK: Anonymous Ondemand Routing in Mobile Ad Hoc Networks,” IEEE Transactions on Wireless Communications, no. 9, 2006. [4] L. Yang, M. Jakobsson, and S. Wetzel, “Discount Anonymous On Demand Routing for Mobile Ad Hoc Networks,” SECURECOMM, vol. 6, 2006 [5] ] K. El-Khatib, L. Korba, R. Song, and G. Yee, “Secure Dynamic Distributed Routing Algorithm for Ad Hoc Wireless Networks,” ICPP Workshops, 2003, pp. 359– 366. [6] A. Boukerche, K. El-Khatib, L. Xu, and L. Korba, “SDAR: A Secure Distributed Anonymous Routing Protocol for Wireless and Mobile Ad Hoc Networks,” IEEE LCN ’04, 2004. [7] B. Zhu, Z. Wan, M. S. Kankanhalli, F. Bao, and R. H. Deng, “Anonymous Secure Routing in Mobile Ad-Hoc Networks,” LCN ’04, 2004. [8] R. Song, L. Korba, and G. Yee, “AnonDSR: Efficient Anonymous Dynamic Source Routing for Mobile Ad- hoc Networks,” SASN ’05, 2005, pp. 33–42. [9] J. Kong and X. Hong, “ANODR: anonymous on demand routing with untraceable routes for mobile ad- hoc networks,” MobiHoc ’03, 2003. [10] S. Seys and B. Preneel, “ARM: Anonymous Routing Protocol for Mobile Ad hoc Networks,” AINA ’06, 2006. [11] Jiejun Kong, Xiaoyan Hong, “An Anonymous On Demand Routing Protocol with Untraceable Routes for Mobile Ad-hoc Networks”, UCLA computer science department technical report 030020. [12] Karim El Defrawy and Gene Tsudik,” ALARM: Anonymous Location-Aided Routing in Suspicious MANETs”, IEEE Transactions on Wireless Communications. [13] Haiying Shen and Lianyu Zhao,” ALERT: An Anonymous Location-Based Efficient Routing Protocol in MANETs”, IEEE Transactions on Wireless Communications. [14] T. Camp, J. Boleng, and V. Davies, “A Survey of Mobility Models for Ad Hoc Network Research,” Wireless Communications and Mobile Computing, vol. 2, pp. 483-502, 2002. [15] X. Hong, M. Gerla, G. Pei, and C.C. Chiang, “A Group Mobility Model for Ad Hoc Wireless Networks,” Proc. Second ACM Int’l Workshop Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM), 1999. [16] X.X. Wu and B. Bhargava, “AO2P: Ad Hoc On- Demand Position-Based Private Routing Protocol,” IEEE Transactions on Mobile Computing, vol. 4, no. 4, pp. 335-348, July 2005. [17] Gene Tsudik and Karim El Defrawy,” ALARM: Anonymous Location-Aided Routing in Suspiciou ANETs”, IEEE Transactions on Mobile Computing, Volume: 10, Issue: 9,September 2011 [18] Haiying Shen and Lianyu Zhao, “ALERT: An Anonymous Location-Based Efficient Routing Protocol in MANETs”, IEEE Transactions on Mobile Computing, Vol. 12, NO. 6, June 2013