SlideShare a Scribd company logo
1 of 5
ALERT: An Anonymous Location-Based Efficient Routing
Protocol in MANETs
ABSTRACT:
Mobile Ad Hoc Networks (MANETs) use anonymous routing protocols that hide
node identities and/or routes from outside observers in order to provide anonymity
protection. However, existing anonymous routing protocols relying on either hop-
by-hop encryption or redundant traffic either generate high cost or cannot provide
full anonymity protection to data sources, destinations, and routes. The high cost
exacerbates the inherent resource constraint problem in MANETs especially in
multimedia wireless applications. To offer high anonymity protection at a low cost,
we propose an Anonymous Location-based Efficient Routing protocol (ALERT).
ALERT dynamically partitions the network field into zones and randomly chooses
nodes in zones as intermediate relay nodes, which form a nontraceable anonymous
route. In addition, it hides the data initiator/receiver among many
initiators/receivers to strengthen source and destination anonymity protection.
Thus, ALERT offers anonymity protection to sources, destinations, and routes. It
also has strategies to effectively counter intersection and timing attacks. We
theoretically analyze ALERT in terms of anonymity and efficiency. Experimental
results exhibit consistency with the theoretical analysis, and show that ALERT
achieves better route anonymity protection and lower cost compared to other
anonymous routing protocols. Also, ALERT achieves comparable routing
efficiency to the GPSR geographical routing protocol.
EXISTING SYSTEM:
Anonymous routing protocols are crucial in MANETs to provide secure
communications by hiding node identities and preventing traffic analysis attacks
from outside observers. Anonymity in MANETs includes identity and location
anonymity of data sources (i.e., senders) and destinations (i.e., recipients), as well
as route anonymity. “Identity and location anonymity of sources and destinations”
means it is hard if possible for other nodes to obtain the real identities and exact
locations of the sources and destinations. For route anonymity, adversaries, either
enroute or out of the route, cannot trace a packet flow back to its source or
destination, and no node have information about the real identities and locations of
intermediate nodes enroute. Also, in order to dissociate the relationship between
source and destination (i.e., relationship unobservability, it is important to form an
anonymous path between the two endpoints and ensure that nodes en route do not
know where the endpoints are, especially in MANETs where location devices may
be equipped.
DISADVANTAGES OF EXISTING SYSTEM:
 The current approaches are limited by focusing on enforcing anonymity at a
heavy cost to precious resources because public-key-based encryption and high
traffic generate significantly high cost.
 Many approaches cannot provide all of the aforementioned anonymity
protections
 ALARM cannot protect the location anonymity of source and destination,
SDDR cannot provide route anonymity, and ZAP only focuses on destination
anonymity
 Existing anonymous routing protocols generate a significantly high cost, which
exacerbates the resource constraint problem in MANETs. In a MANET
employing a high-cost anonymous routing in a battlefield, a low quality of
service in voice and video data transmission due to depleted resources may lead
to disastrous delay in military operations.
PROPOSED SYSTEM:
In order to provide high anonymity protection (for sources, destination, and route)
with low cost, we propose an Anonymous Location-based and Efficient Routing
proTocol (ALERT). ALERT dynamically partitions a network field into zones and
randomly chooses nodes in zones as intermediate relay nodes, which form a
nontraceable anonymous route. Specifically, in each routing step, a data sender or
forwarder partitions the network field in order to separate itself and the destination
into two zones. It then randomly chooses a node in the other zone as the next relay
node and uses the GPSR algorithm to send the data to the relay node. In the last
step, the data is broadcasted to k nodes in the destination zone, providing k-
anonymity to the destination. In addition, ALERT has a strategy to hide the data
initiator among a number of initiators to strengthen the anonymity protection of the
source. ALERT is also resilient to intersection attacks and timing attacks. We
theoretically analyzed ALERT in terms of anonymity and efficiency. We also
conducted experiments to evaluate the performance of ALERT in comparison with
other anonymity and geographic routing protocols.
ADVANTAGES OF PROPOSED SYSTEM:
 ALERT provides route anonymity, identity, and location anonymity of
source and destination
 Rather than relying on hop-by-hop encryption and redundant traffic, ALERT
mainly uses randomized routing of one message copy to provide anonymity
protection.
 ALERT can also avoid timing attacks because of its nonfixed routing paths
for a source destination pair.
 We conducted comprehensive experiments to evaluate ALERT’s
performance in comparison with other anonymous protocols
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
System : Pentium IV 2.4 GHz.
Hard Disk : 40 GB.
Monitor : 15 inch VGA Colour.
Mouse : Logitech Mouse.
Ram : 512 MB
Keyboard : Standard Keyboard
SOFTWARE REQUIREMENTS:-
 Operating System : LINUX
 Tool : Network Simulator-2
 Front End : OTCL (Object Oriented Tool Command
Language)
REFERENCE:
Haiying Shen,Member, IEEE, and Lianyu Zhao, Student Member, IEEE “ALERT:
An Anonymous Location-Based Efficient Routing Protocol in MANETs”- IEEE
TRANSACTIONS ON MOBILE COMPUTING, VOL. 12, NO. 6, JUNE 2013.

More Related Content

What's hot

A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETspijans
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetIJTET Journal
 
Comparative study of multipath extensions of aodv
Comparative study of multipath extensions of aodvComparative study of multipath extensions of aodv
Comparative study of multipath extensions of aodveSAT Journals
 
Comparative study of multipath extensions of aodv
Comparative study of multipath extensions of aodvComparative study of multipath extensions of aodv
Comparative study of multipath extensions of aodveSAT Publishing House
 
Secure and reliable routing protocols
Secure and reliable routing protocolsSecure and reliable routing protocols
Secure and reliable routing protocolsDevdutta Chakrabarti
 
A Literature Survey of MANET
A Literature Survey of MANETA Literature Survey of MANET
A Literature Survey of MANETIRJET Journal
 
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK cscpconf
 
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...ijceronline
 
Securing Data Communication for Node Anonymization Using Location Information
Securing Data Communication for Node Anonymization Using  Location InformationSecuring Data Communication for Node Anonymization Using  Location Information
Securing Data Communication for Node Anonymization Using Location InformationIJMER
 
Comparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeComparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeIJMER
 
QoS Issues in MANET: A Comparative Study over Different Routing Protocols
QoS Issues in MANET: A Comparative Study over Different Routing ProtocolsQoS Issues in MANET: A Comparative Study over Different Routing Protocols
QoS Issues in MANET: A Comparative Study over Different Routing Protocolsrahulmonikasharma
 
Paper id 311201512
Paper id 311201512Paper id 311201512
Paper id 311201512IJRAT
 
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...ijceronline
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ijasuc
 
Node clone detection using a stable overlay network
Node clone detection using a stable overlay network Node clone detection using a stable overlay network
Node clone detection using a stable overlay network IJECEIAES
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Networkijsrd.com
 

What's hot (20)

A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETsA SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
A SURVEY OF ENHANCED ROUTING PROTOCOLS FOR MANETs
 
Routing in vanet
Routing in vanetRouting in vanet
Routing in vanet
 
Ant
AntAnt
Ant
 
Opportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in ManetOpportunistic Data Forwarding in Manet
Opportunistic Data Forwarding in Manet
 
Comparative study of multipath extensions of aodv
Comparative study of multipath extensions of aodvComparative study of multipath extensions of aodv
Comparative study of multipath extensions of aodv
 
Comparative study of multipath extensions of aodv
Comparative study of multipath extensions of aodvComparative study of multipath extensions of aodv
Comparative study of multipath extensions of aodv
 
Secure and reliable routing protocols
Secure and reliable routing protocolsSecure and reliable routing protocols
Secure and reliable routing protocols
 
A Literature Survey of MANET
A Literature Survey of MANETA Literature Survey of MANET
A Literature Survey of MANET
 
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK
MOBILITY AWARE ROUTING PROTOCOL IN AD-HOC NETWORK
 
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
Performance Analysis of Ad-hoc on Demand Distance Vector Routing (AODV) and D...
 
Securing Data Communication for Node Anonymization Using Location Information
Securing Data Communication for Node Anonymization Using  Location InformationSecuring Data Communication for Node Anonymization Using  Location Information
Securing Data Communication for Node Anonymization Using Location Information
 
Comparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep modeComparing: Routing Protocols on Basis of sleep mode
Comparing: Routing Protocols on Basis of sleep mode
 
QoS Issues in MANET: A Comparative Study over Different Routing Protocols
QoS Issues in MANET: A Comparative Study over Different Routing ProtocolsQoS Issues in MANET: A Comparative Study over Different Routing Protocols
QoS Issues in MANET: A Comparative Study over Different Routing Protocols
 
Paper id 311201512
Paper id 311201512Paper id 311201512
Paper id 311201512
 
black hole attack
black hole attackblack hole attack
black hole attack
 
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
Comparative Performance Evaluation of Ad-hoc on Demand Distance Vector Routin...
 
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
ANALYSIS OF PROACTIVE AND REACTIVE MANET ROUTING PROTOCOLS UNDER SELECTED TCP...
 
Node clone detection using a stable overlay network
Node clone detection using a stable overlay network Node clone detection using a stable overlay network
Node clone detection using a stable overlay network
 
Study of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless NetworkStudy of Attacks and Routing Protocol in Wireless Network
Study of Attacks and Routing Protocol in Wireless Network
 
Routing protocols in Vanet
Routing protocols in VanetRouting protocols in Vanet
Routing protocols in Vanet
 

Viewers also liked

Adaptive position update for geographic routing in mobile ad hoc networks
Adaptive position update for geographic routing in mobile ad hoc networksAdaptive position update for geographic routing in mobile ad hoc networks
Adaptive position update for geographic routing in mobile ad hoc networksJPINFOTECH JAYAPRAKASH
 
Face to-face proximity estimation using bluetooth on smartphones
Face to-face proximity estimation using bluetooth on smartphonesFace to-face proximity estimation using bluetooth on smartphones
Face to-face proximity estimation using bluetooth on smartphonesJPINFOTECH JAYAPRAKASH
 
Opportunistic manets mobility can make up for low transmission power
Opportunistic manets mobility can make up for low transmission powerOpportunistic manets mobility can make up for low transmission power
Opportunistic manets mobility can make up for low transmission powerJPINFOTECH JAYAPRAKASH
 
Moses supporting and enforcing security profiles on smartphones
Moses supporting and enforcing security profiles on smartphonesMoses supporting and enforcing security profiles on smartphones
Moses supporting and enforcing security profiles on smartphonesJPINFOTECH JAYAPRAKASH
 
Sort a self o rganizing trust model for peer-to-peer systems
Sort a self o rganizing trust model for peer-to-peer systemsSort a self o rganizing trust model for peer-to-peer systems
Sort a self o rganizing trust model for peer-to-peer systemsJPINFOTECH JAYAPRAKASH
 
Crowdsourced trace similarity with smartphones
Crowdsourced trace similarity with smartphonesCrowdsourced trace similarity with smartphones
Crowdsourced trace similarity with smartphonesJPINFOTECH JAYAPRAKASH
 
Dynamic personalized recommendation on sparse data
Dynamic personalized recommendation on sparse dataDynamic personalized recommendation on sparse data
Dynamic personalized recommendation on sparse dataJPINFOTECH JAYAPRAKASH
 
Eaack—a secure intrusion detection system for manets
Eaack—a secure intrusion detection system for manetsEaack—a secure intrusion detection system for manets
Eaack—a secure intrusion detection system for manetsJPINFOTECH JAYAPRAKASH
 
Modeling the pairwise key predistribution scheme in the presence of unreliabl...
Modeling the pairwise key predistribution scheme in the presence of unreliabl...Modeling the pairwise key predistribution scheme in the presence of unreliabl...
Modeling the pairwise key predistribution scheme in the presence of unreliabl...JPINFOTECH JAYAPRAKASH
 
Error tolerant resource allocation and payment minimization for cloud system
Error tolerant resource allocation and payment minimization for cloud systemError tolerant resource allocation and payment minimization for cloud system
Error tolerant resource allocation and payment minimization for cloud systemJPINFOTECH JAYAPRAKASH
 
Spoc a secure and privacy preserving opportunistic computing framework for mo...
Spoc a secure and privacy preserving opportunistic computing framework for mo...Spoc a secure and privacy preserving opportunistic computing framework for mo...
Spoc a secure and privacy preserving opportunistic computing framework for mo...JPINFOTECH JAYAPRAKASH
 
Relay selection for geographical forwarding in sleep wake cycling wireless se...
Relay selection for geographical forwarding in sleep wake cycling wireless se...Relay selection for geographical forwarding in sleep wake cycling wireless se...
Relay selection for geographical forwarding in sleep wake cycling wireless se...JPINFOTECH JAYAPRAKASH
 
A proxy based approach to continuous location-based spatial queries in mobile...
A proxy based approach to continuous location-based spatial queries in mobile...A proxy based approach to continuous location-based spatial queries in mobile...
A proxy based approach to continuous location-based spatial queries in mobile...JPINFOTECH JAYAPRAKASH
 

Viewers also liked (14)

Adaptive position update for geographic routing in mobile ad hoc networks
Adaptive position update for geographic routing in mobile ad hoc networksAdaptive position update for geographic routing in mobile ad hoc networks
Adaptive position update for geographic routing in mobile ad hoc networks
 
Face to-face proximity estimation using bluetooth on smartphones
Face to-face proximity estimation using bluetooth on smartphonesFace to-face proximity estimation using bluetooth on smartphones
Face to-face proximity estimation using bluetooth on smartphones
 
Opportunistic manets mobility can make up for low transmission power
Opportunistic manets mobility can make up for low transmission powerOpportunistic manets mobility can make up for low transmission power
Opportunistic manets mobility can make up for low transmission power
 
Moses supporting and enforcing security profiles on smartphones
Moses supporting and enforcing security profiles on smartphonesMoses supporting and enforcing security profiles on smartphones
Moses supporting and enforcing security profiles on smartphones
 
Sort a self o rganizing trust model for peer-to-peer systems
Sort a self o rganizing trust model for peer-to-peer systemsSort a self o rganizing trust model for peer-to-peer systems
Sort a self o rganizing trust model for peer-to-peer systems
 
Crowdsourced trace similarity with smartphones
Crowdsourced trace similarity with smartphonesCrowdsourced trace similarity with smartphones
Crowdsourced trace similarity with smartphones
 
Dynamic personalized recommendation on sparse data
Dynamic personalized recommendation on sparse dataDynamic personalized recommendation on sparse data
Dynamic personalized recommendation on sparse data
 
Eaack—a secure intrusion detection system for manets
Eaack—a secure intrusion detection system for manetsEaack—a secure intrusion detection system for manets
Eaack—a secure intrusion detection system for manets
 
Modeling the pairwise key predistribution scheme in the presence of unreliabl...
Modeling the pairwise key predistribution scheme in the presence of unreliabl...Modeling the pairwise key predistribution scheme in the presence of unreliabl...
Modeling the pairwise key predistribution scheme in the presence of unreliabl...
 
Error tolerant resource allocation and payment minimization for cloud system
Error tolerant resource allocation and payment minimization for cloud systemError tolerant resource allocation and payment minimization for cloud system
Error tolerant resource allocation and payment minimization for cloud system
 
Spoc a secure and privacy preserving opportunistic computing framework for mo...
Spoc a secure and privacy preserving opportunistic computing framework for mo...Spoc a secure and privacy preserving opportunistic computing framework for mo...
Spoc a secure and privacy preserving opportunistic computing framework for mo...
 
Relay selection for geographical forwarding in sleep wake cycling wireless se...
Relay selection for geographical forwarding in sleep wake cycling wireless se...Relay selection for geographical forwarding in sleep wake cycling wireless se...
Relay selection for geographical forwarding in sleep wake cycling wireless se...
 
2013 IEEE PROJECT TITLES FOR CSE
2013 IEEE PROJECT TITLES FOR CSE2013 IEEE PROJECT TITLES FOR CSE
2013 IEEE PROJECT TITLES FOR CSE
 
A proxy based approach to continuous location-based spatial queries in mobile...
A proxy based approach to continuous location-based spatial queries in mobile...A proxy based approach to continuous location-based spatial queries in mobile...
A proxy based approach to continuous location-based spatial queries in mobile...
 

Similar to Alert an anonymous location based efficient routing protocol in mane ts

Survey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in ManetsSurvey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in ManetsEditor IJCATR
 
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSLOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSIJARIIT
 
ENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKS
ENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKSENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKS
ENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKSpharmaindexing
 
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...IJNSA Journal
 
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...IRJET Journal
 
Enhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETEnhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETcscpconf
 
Secure Routing for MANET in Adversarial Environment
Secure Routing for MANET in Adversarial EnvironmentSecure Routing for MANET in Adversarial Environment
Secure Routing for MANET in Adversarial EnvironmentIJCERT
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS ijasuc
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS ijasuc
 
DESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKS
DESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKSDESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKS
DESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKScscpconf
 
Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992Editor IJARCET
 
Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992Editor IJARCET
 
secureandreliableroutingprotocols-160617064034.pdf
secureandreliableroutingprotocols-160617064034.pdfsecureandreliableroutingprotocols-160617064034.pdf
secureandreliableroutingprotocols-160617064034.pdfNajafAli87
 
Secure and Reliable Data Routing in Wireless Sensor Network
Secure and Reliable Data Routing in Wireless Sensor NetworkSecure and Reliable Data Routing in Wireless Sensor Network
Secure and Reliable Data Routing in Wireless Sensor Networkdbpublications
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”Alexander Decker
 

Similar to Alert an anonymous location based efficient routing protocol in mane ts (20)

Mphasisintern
MphasisinternMphasisintern
Mphasisintern
 
Survey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in ManetsSurvey on Efficient and Secure Anonymous Communication in Manets
Survey on Efficient and Secure Anonymous Communication in Manets
 
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKSLOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
LOAD BALANCING AND PROVIDING SECURITY USING RSA IN WIRELESS SENSOR NETWORKS
 
SZRP.pdf
SZRP.pdfSZRP.pdf
SZRP.pdf
 
ENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKS
ENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKSENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKS
ENERGY CONSUMPTION AND LOCALITY OF SENSOR NETWORKS
 
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
TRIDNT: THE TRUST-BASED ROUTING PROTOCOL WITH CONTROLLED DEGREE OF NODE SELFI...
 
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
Privacy Preserving and Detection Techniques for Malicious Packet Dropping in ...
 
Ad-HOc presentation
Ad-HOc presentationAd-HOc presentation
Ad-HOc presentation
 
B43040610
B43040610B43040610
B43040610
 
Enhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANETEnhanced Secure Routing Model for MANET
Enhanced Secure Routing Model for MANET
 
Secure Routing for MANET in Adversarial Environment
Secure Routing for MANET in Adversarial EnvironmentSecure Routing for MANET in Adversarial Environment
Secure Routing for MANET in Adversarial Environment
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
 
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
SECURED GREEDY PERIMETER STATELESS ROUTING FOR WIRELESS SENSOR NETWORKS
 
DESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKS
DESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKSDESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKS
DESIGN OF A SCHEME FOR SECURE ROUTING IN MOBILE AD HOC NETWORKS
 
Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992
 
Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992Volume 2-issue-6-1987-1992
Volume 2-issue-6-1987-1992
 
secureandreliableroutingprotocols-160617064034.pdf
secureandreliableroutingprotocols-160617064034.pdfsecureandreliableroutingprotocols-160617064034.pdf
secureandreliableroutingprotocols-160617064034.pdf
 
J0935461
J0935461J0935461
J0935461
 
Secure and Reliable Data Routing in Wireless Sensor Network
Secure and Reliable Data Routing in Wireless Sensor NetworkSecure and Reliable Data Routing in Wireless Sensor Network
Secure and Reliable Data Routing in Wireless Sensor Network
 
“Reducing packet loss in manet”
“Reducing packet loss in manet”“Reducing packet loss in manet”
“Reducing packet loss in manet”
 

Recently uploaded

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxShobhayan Kirtania
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 

Recently uploaded (20)

Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
The byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptxThe byproduct of sericulture in different industries.pptx
The byproduct of sericulture in different industries.pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 

Alert an anonymous location based efficient routing protocol in mane ts

  • 1. ALERT: An Anonymous Location-Based Efficient Routing Protocol in MANETs ABSTRACT: Mobile Ad Hoc Networks (MANETs) use anonymous routing protocols that hide node identities and/or routes from outside observers in order to provide anonymity protection. However, existing anonymous routing protocols relying on either hop- by-hop encryption or redundant traffic either generate high cost or cannot provide full anonymity protection to data sources, destinations, and routes. The high cost exacerbates the inherent resource constraint problem in MANETs especially in multimedia wireless applications. To offer high anonymity protection at a low cost, we propose an Anonymous Location-based Efficient Routing protocol (ALERT). ALERT dynamically partitions the network field into zones and randomly chooses nodes in zones as intermediate relay nodes, which form a nontraceable anonymous route. In addition, it hides the data initiator/receiver among many initiators/receivers to strengthen source and destination anonymity protection. Thus, ALERT offers anonymity protection to sources, destinations, and routes. It also has strategies to effectively counter intersection and timing attacks. We theoretically analyze ALERT in terms of anonymity and efficiency. Experimental results exhibit consistency with the theoretical analysis, and show that ALERT achieves better route anonymity protection and lower cost compared to other
  • 2. anonymous routing protocols. Also, ALERT achieves comparable routing efficiency to the GPSR geographical routing protocol. EXISTING SYSTEM: Anonymous routing protocols are crucial in MANETs to provide secure communications by hiding node identities and preventing traffic analysis attacks from outside observers. Anonymity in MANETs includes identity and location anonymity of data sources (i.e., senders) and destinations (i.e., recipients), as well as route anonymity. “Identity and location anonymity of sources and destinations” means it is hard if possible for other nodes to obtain the real identities and exact locations of the sources and destinations. For route anonymity, adversaries, either enroute or out of the route, cannot trace a packet flow back to its source or destination, and no node have information about the real identities and locations of intermediate nodes enroute. Also, in order to dissociate the relationship between source and destination (i.e., relationship unobservability, it is important to form an anonymous path between the two endpoints and ensure that nodes en route do not know where the endpoints are, especially in MANETs where location devices may be equipped. DISADVANTAGES OF EXISTING SYSTEM:
  • 3.  The current approaches are limited by focusing on enforcing anonymity at a heavy cost to precious resources because public-key-based encryption and high traffic generate significantly high cost.  Many approaches cannot provide all of the aforementioned anonymity protections  ALARM cannot protect the location anonymity of source and destination, SDDR cannot provide route anonymity, and ZAP only focuses on destination anonymity  Existing anonymous routing protocols generate a significantly high cost, which exacerbates the resource constraint problem in MANETs. In a MANET employing a high-cost anonymous routing in a battlefield, a low quality of service in voice and video data transmission due to depleted resources may lead to disastrous delay in military operations. PROPOSED SYSTEM: In order to provide high anonymity protection (for sources, destination, and route) with low cost, we propose an Anonymous Location-based and Efficient Routing proTocol (ALERT). ALERT dynamically partitions a network field into zones and randomly chooses nodes in zones as intermediate relay nodes, which form a nontraceable anonymous route. Specifically, in each routing step, a data sender or forwarder partitions the network field in order to separate itself and the destination into two zones. It then randomly chooses a node in the other zone as the next relay
  • 4. node and uses the GPSR algorithm to send the data to the relay node. In the last step, the data is broadcasted to k nodes in the destination zone, providing k- anonymity to the destination. In addition, ALERT has a strategy to hide the data initiator among a number of initiators to strengthen the anonymity protection of the source. ALERT is also resilient to intersection attacks and timing attacks. We theoretically analyzed ALERT in terms of anonymity and efficiency. We also conducted experiments to evaluate the performance of ALERT in comparison with other anonymity and geographic routing protocols. ADVANTAGES OF PROPOSED SYSTEM:  ALERT provides route anonymity, identity, and location anonymity of source and destination  Rather than relying on hop-by-hop encryption and redundant traffic, ALERT mainly uses randomized routing of one message copy to provide anonymity protection.  ALERT can also avoid timing attacks because of its nonfixed routing paths for a source destination pair.  We conducted comprehensive experiments to evaluate ALERT’s performance in comparison with other anonymous protocols SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:
  • 5. System : Pentium IV 2.4 GHz. Hard Disk : 40 GB. Monitor : 15 inch VGA Colour. Mouse : Logitech Mouse. Ram : 512 MB Keyboard : Standard Keyboard SOFTWARE REQUIREMENTS:-  Operating System : LINUX  Tool : Network Simulator-2  Front End : OTCL (Object Oriented Tool Command Language) REFERENCE: Haiying Shen,Member, IEEE, and Lianyu Zhao, Student Member, IEEE “ALERT: An Anonymous Location-Based Efficient Routing Protocol in MANETs”- IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 12, NO. 6, JUNE 2013.