SlideShare a Scribd company logo
International Journal of Modern Engineering Research (IJMER)
              www.ijmer.com             Vol.3, Issue.2, March-April. 2013 pp-785-787      ISSN: 2249-6645


       Privacy Protection Using Unobservablity and Unlink ability against
                          Wormhole Attacks in Manet

                          N.Sugumar, 1 K.Jayarajan M.E, 2 R.Anbarasu, M.E3
                                                    1
                                                      Final Year M.E-CSE,
                              23
                                   Associate Professor Selvam College of Technology, Namakkal

ABSTRACT: An efficient privacy-preserving routing protocol USOR that achieves content un-observability by employing
anonymous key establishment based on group signature. The setup of USOR is simple: In privacy-preserving
communications can largely be divided into two categories: cryptosystem-based techniques and broadcasting-based
techniques. The cryptosystem-based techniques include mix-based systems and secure multiparty computation-based
systems, originating from mix net and DC-net respectively. Broadcasting based schemes provide communication privacy by
mixing the real messages with dummy packets so that it is infeasible for the adversaries to identify the real packets and track
the message source. First, an anonymous key establishment process is performed to construct secret session keys. Then an
unobservable route discovery process is executed to find a route to the destination. This process is done by establishing
session keys between two nodes. After verifying the signature between themselves, the anonymous key is established
between these two nodes which mean the two nodes establish this key without knowing who the other party is. It can
effectively prevent replay attacks and session key disclosure attack, and meanwhile, it achieves key confirmation for
established session keys. This key establishment protocol uses elliptic curve Diffie- Hellman (ECDH) key exchange to
replace Diffie-Hellman key exchange, and uses group signature to replace MAC code.In this protocol, both control packets
and data packets look random and indistinguishable from dummy packets for outside adversaries. Only valid nodes can
distinguish routing packets and data packets from dummy traffic with inexpensive symmetric decryption.

                                                        I. Introduction
     Mobile computing is human computer interaction by which a computer is expected to be transported during normal
usage. Mobile computing involves mobile communication, mobile hardware, and mobile software. Communication issues
include ad-hoc and infrastructure networks as well as communication properties, protocols, data formats and concrete
technologies.

Many types of mobile computers have been introduced
 Wearable Computer
 Personal Digital Assistant
 Smartphone
 Carputer
 UMPC

1.2 TECHNICAL AND LIMITATIONS OF MOBILE COMPUTING
1.2.1 Range & Bandwidth:
        Mobile Internet access is generally slower than direct cable connections, using technologies
suchas GPRS , 3G and 4G networks. These networks are usually available within range of commercial cell phone towers.
Higher speed wireless LANs are inexpensive but have very limited range.

1.2.2 Security Standards:
         When working mobile, one is dependent on public networks, requiring careful use of VPN. Security is a major
concern while concerning the mobile computing standards on the fleet. One can easily attack the VPN through a huge
number of networks interconnected through the line.

1.2.3 Power Consumption:
          When a power outlet or portable generator is not available, mobile computers must rely entirely on battery power.
Combined with the compact size of many mobile devices, this often means unusually expensive batteries must be used to
obtain the necessary battery life.

1.2.4 Transmission Interferences:
          Weather, terrain, and the range from the nearest signal point can all interfere with signal reception. Reception in
tunnels, some buildings, and rural areas is often poor.

1.2.5 Potential Health Hazards:
         People who use mobile devices while driving are often distracted from driving and are thus assumed more likely to
be involved in traffic accidents.[3] (While this may seem obvious, there is considerable discussion about whether banning

                                                          www.ijmer.com                                             785 | Page
International Journal of Modern Engineering Research (IJMER)
              www.ijmer.com             Vol.3, Issue.2, March-April. 2013 pp-785-787      ISSN: 2249-6645

mobile device use while driving reduces accidents or not.[4][5]) Cell phones may interfere with sensitive medical devices.
Questions concerning mobile phone radiation and health have been raised.

1.2.6 Human Interface with Device:
        Screens and keyboards tend to be small, which may make them hard to use. Alternate input methods such as speech
or handwriting recognition require training.

                                                   II. Related Work
2.1 Anonymous Network Model
        In this module, anonymous route is discovered between the nodes this information will not leak to others.This is
adopted using session key and broadcast key generation by means of Key Generation Center(KGC).This anonymous
connection is established by verifying signatures of the each node.

2.2 Secure Key Generation and Route Discovery Phase
         This phase is a privacy-preserving route discovery process based on the keys established in previous phase.Similar
to normal route discovery process, our discovery process also comprises of route request and route reply.The route request
messages flood throughout the whole network, while the route reply messages are sent backward to the source node
only.This performed based on the ID-based private key of every node.

2.3 Broadcast Key Distribution
          The broadcast key has been established among the nodes in the network. The key generated from the public key
generated for the group.This broadcast key act like a security issue where each node should get authenticated before it enters
into the network for communication.The BK will be shared among the neighbors in the zone.

2.4 Attacker Model
         For the collusion attacks, USOR still offers unobservability as promised. Though information disclosure is
unavoidable for colluding insiders, and the adversary knows some keys, the information that the colluding insiders can
obtain is largely restricted by USOR.For preventing the Sybil attacks, the centralized key server generates group signature
signing keys and ID-based keys for network nodes. Thus, it is impossible for the adversary to obtain other valid identities
except the compromised ones.

2.5 Performance Evaluation
         The sender computes the anonymity of RREQ packets. The sender anonymity is the obtained by calculating entropy
of probability distribution of possible sender of RREQ packets.The performance has been rated by comparing the results
from MASK. This results show that the error rate has been reduced.This system not only achieves anonymity,
unobservability, unlinkability but also prevents from Sybil attack and collusion attack.




                                                         www.ijmer.com                                             786 | Page
International Journal of Modern Engineering Research (IJMER)
                www.ijmer.com             Vol.3, Issue.2, March-April. 2013 pp-785-787      ISSN: 2249-6645

                                                       III. Conclusions
          The USOR offers unobservability as promised. Though information disclosure is unavoidable for colluding
insiders, and the adversary knows some keys, the information that the colluding insiders can obtain is largely restricted by
USOR. In the padded USOR, all packets including RREQ, RREP packets and other control packets are padded to 128 bytes.
Due to the packet padding, performance of the padded USOR is obviously downgraded, but the padded USOR still achieves
satisfactory performance: more than 85% delivery success and about 250ms delivery latency. And also it not only provides
strong privacy protection, it is also more resistant against attacks due to node compromise. Finally, achieves stronger privacy
protection than existing schemes like MASK.

                                                            References
[1]    Karim El Defrawy, Member, and Gene Tsudik, Senior Member“Privacy-preserving location-based on-demand routing in
       MANETs,” IEEE J. Sel. Areas Column., vol. 29, no. 10, pp. 1926–1934, 2011.
[2]    Andreas Pfitzmann, TU Dresden and Marit Hansen, ULD Kiel “Anonymity, Unlinkability, Undetectability,
       Unobservability,Pseudonymity, and Identity Management –A Consolidated Proposal for Terminology”Version v0.31 Feb. 15, 2008.
[3]    Jiejun Kong, Xiaoyan Hong” ANODR: ANonymous On Demand Routing with Untraceable Routes for Mobile Ad-hoc Networks”
       June 1–3, 2003.
[4]    Karim El Defrawy and Gene TsudiK“ALARM: Anonymous Location-Aided Routing in Suspicious MANETs“March 2007.
[5]    Reshmi Maulik and Nabendu Chaki “A Study on Wormhole Attacks in MANET ” ISSN 2150-7988 Volume 3 (2011) pp. 271-279.
[6]    Nadher MohammedAhmed AI-Safwani”The Effect of Eavesdropping and Wormhole Attacks on Mobile Adhoc Networks”2009.
[7]    Tanu Preet Singh, Shivani Dua and Vikrant Das” Energy-Efficient Routing Protocols In Mobile Ad-Hoc Networks” Volume 2, Issue
       1, January 2012.
[8]    Kortuem.G., Schneider. J., Preuitt.D, Thompson .T.G.C, F’ickas.S. Segall.Z. “When Peer toPeer comes Face-to-Face: Collaborative
       Peer-to-Peer Computing in Mobile Ad hoc Networks”, 1st International Conference on Peer-to-Peer Computing, August, Linkoping,
       Sweden, pp. 75-91 (2001)
[9]    Mangrulkar.R.S, Dr. Mohammad Atique, “Trust Based Secured Adhoc on Demand Distance Vector Routing Protocol for Mobile
       Adhoc Network” (2010)
[10]   Marc Branchaud, Scott Flinn,"x Trust: A Scalable Trust Management Infrastructure"
[11]   Menaka Pushpa.A M.E., “Trust Based Secure Routing in AODV Routing Protocol” (2009)
[12]   Sridhar, S., Baskaran, R.: Conviction Scheme for Classifying Misbehaving Nodes in Mobile Ad Hoc Networks in the proceedings of
       CCSIT 2012 published by Springer (LNICST) 2012
[13]   “TAODV: A Trusted AODV Routing protocol for Mobile ad hoc networks” (2009)




                                                             www.ijmer.com                                                787 | Page

More Related Content

What's hot

Pe2 a public encryption with two ack approach to
Pe2 a public encryption with two ack approach toPe2 a public encryption with two ack approach to
Pe2 a public encryption with two ack approach to
eSAT Publishing House
 
A Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksA Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor Networks
IJMER
 
A Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor NetworksA Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor Networks
IJERA Editor
 
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
IJCNCJournal
 
REAL-TIME MODE HOPPING OF BLOCK CIPHER ALGORITHMS FOR MOBILE STREAMING
REAL-TIME MODE HOPPING OF BLOCK CIPHER  ALGORITHMS FOR MOBILE STREAMINGREAL-TIME MODE HOPPING OF BLOCK CIPHER  ALGORITHMS FOR MOBILE STREAMING
REAL-TIME MODE HOPPING OF BLOCK CIPHER ALGORITHMS FOR MOBILE STREAMING
ijwmn
 
Q01813104114
Q01813104114Q01813104114
Q01813104114
IOSR Journals
 
Identifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities SurveyIdentifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities Survey
Clayton Hatathlie
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
G011123539
G011123539G011123539
G011123539
IOSR Journals
 
WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THRE...
WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THRE...WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THRE...
WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THRE...
cscpconf
 
Wireless sensor networks architecture security requirements security threats...
Wireless sensor networks  architecture security requirements security threats...Wireless sensor networks  architecture security requirements security threats...
Wireless sensor networks architecture security requirements security threats...
csandit
 
177 181
177 181177 181
Analysis of denial of service (dos) attacks in wireless sensor networks
Analysis of denial of service (dos) attacks in wireless sensor networksAnalysis of denial of service (dos) attacks in wireless sensor networks
Analysis of denial of service (dos) attacks in wireless sensor networks
eSAT Publishing House
 
Secured Intrusion Protection System through EAACK in MANETS
Secured Intrusion Protection System through EAACK in MANETSSecured Intrusion Protection System through EAACK in MANETS
Secured Intrusion Protection System through EAACK in MANETS
ijtsrd
 
By25450453
By25450453By25450453
By25450453
IJERA Editor
 
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORKCERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
ijwmn
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
JPINFOTECH JAYAPRAKASH
 
Distributed Intrusion Detection System for Wireless Sensor Networks
Distributed Intrusion Detection System for Wireless Sensor NetworksDistributed Intrusion Detection System for Wireless Sensor Networks
Distributed Intrusion Detection System for Wireless Sensor Networks
IOSR Journals
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ijwmn
 
Jt2416841691
Jt2416841691Jt2416841691
Jt2416841691
IJERA Editor
 

What's hot (20)

Pe2 a public encryption with two ack approach to
Pe2 a public encryption with two ack approach toPe2 a public encryption with two ack approach to
Pe2 a public encryption with two ack approach to
 
A Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor NetworksA Security Framework for Replication Attacks in Wireless Sensor Networks
A Security Framework for Replication Attacks in Wireless Sensor Networks
 
A Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor NetworksA Survey on Threats and Security schemes in Wireless Sensor Networks
A Survey on Threats and Security schemes in Wireless Sensor Networks
 
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
A NOVEL SECURITY PROTOCOL FOR WIRELESS SENSOR NETWORKS BASED ON ELLIPTIC CURV...
 
REAL-TIME MODE HOPPING OF BLOCK CIPHER ALGORITHMS FOR MOBILE STREAMING
REAL-TIME MODE HOPPING OF BLOCK CIPHER  ALGORITHMS FOR MOBILE STREAMINGREAL-TIME MODE HOPPING OF BLOCK CIPHER  ALGORITHMS FOR MOBILE STREAMING
REAL-TIME MODE HOPPING OF BLOCK CIPHER ALGORITHMS FOR MOBILE STREAMING
 
Q01813104114
Q01813104114Q01813104114
Q01813104114
 
Identifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities SurveyIdentifying Security Vulnerabilities Survey
Identifying Security Vulnerabilities Survey
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
G011123539
G011123539G011123539
G011123539
 
WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THRE...
WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THRE...WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THRE...
WIRELESS SENSOR NETWORKS – ARCHITECTURE, SECURITY REQUIREMENTS, SECURITY THRE...
 
Wireless sensor networks architecture security requirements security threats...
Wireless sensor networks  architecture security requirements security threats...Wireless sensor networks  architecture security requirements security threats...
Wireless sensor networks architecture security requirements security threats...
 
177 181
177 181177 181
177 181
 
Analysis of denial of service (dos) attacks in wireless sensor networks
Analysis of denial of service (dos) attacks in wireless sensor networksAnalysis of denial of service (dos) attacks in wireless sensor networks
Analysis of denial of service (dos) attacks in wireless sensor networks
 
Secured Intrusion Protection System through EAACK in MANETS
Secured Intrusion Protection System through EAACK in MANETSSecured Intrusion Protection System through EAACK in MANETS
Secured Intrusion Protection System through EAACK in MANETS
 
By25450453
By25450453By25450453
By25450453
 
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORKCERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
CERTIFICATELESS SCHEME BASED NTRU CRYPTOSYSTEM FOR AD-HOC UWB-IR NETWORK
 
Protecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropperProtecting location privacy in sensor networks against a global eavesdropper
Protecting location privacy in sensor networks against a global eavesdropper
 
Distributed Intrusion Detection System for Wireless Sensor Networks
Distributed Intrusion Detection System for Wireless Sensor NetworksDistributed Intrusion Detection System for Wireless Sensor Networks
Distributed Intrusion Detection System for Wireless Sensor Networks
 
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...ENHANCED THREE TIER SECURITY  ARCHITECTURE FOR WSN AGAINST MOBILE SINK  REPLI...
ENHANCED THREE TIER SECURITY ARCHITECTURE FOR WSN AGAINST MOBILE SINK REPLI...
 
Jt2416841691
Jt2416841691Jt2416841691
Jt2416841691
 

Viewers also liked

Analysis and Improved Operation of PEBB Based 5-Level Voltage Source Convert...
Analysis and Improved Operation of PEBB Based 5-Level  Voltage Source Convert...Analysis and Improved Operation of PEBB Based 5-Level  Voltage Source Convert...
Analysis and Improved Operation of PEBB Based 5-Level Voltage Source Convert...
IJMER
 
In Multi-Hop Routing identifying trusted paths through TARF in Wireless sens...
In Multi-Hop Routing identifying trusted paths through TARF in  Wireless sens...In Multi-Hop Routing identifying trusted paths through TARF in  Wireless sens...
In Multi-Hop Routing identifying trusted paths through TARF in Wireless sens...
IJMER
 
Da31456462
Da31456462Da31456462
Da31456462
IJMER
 
Remote Access and Dual Authentication for Cloud Storage
Remote Access and Dual Authentication for Cloud StorageRemote Access and Dual Authentication for Cloud Storage
Remote Access and Dual Authentication for Cloud Storage
IJMER
 
Illustration Clamor Echelon Evaluation via Prime Piece Psychotherapy
Illustration Clamor Echelon Evaluation via Prime Piece PsychotherapyIllustration Clamor Echelon Evaluation via Prime Piece Psychotherapy
Illustration Clamor Echelon Evaluation via Prime Piece Psychotherapy
IJMER
 
Conversion of Artificial Neural Networks (ANN) To Autonomous Neural Networks
Conversion of Artificial Neural Networks (ANN) To Autonomous Neural NetworksConversion of Artificial Neural Networks (ANN) To Autonomous Neural Networks
Conversion of Artificial Neural Networks (ANN) To Autonomous Neural Networks
IJMER
 
Bh2420282109
Bh2420282109Bh2420282109
Bh2420282109
IJMER
 
Minimization of Shrinkage Porosity in A Sand Casting Process By Simulation I...
Minimization of Shrinkage Porosity in A Sand Casting Process  By Simulation I...Minimization of Shrinkage Porosity in A Sand Casting Process  By Simulation I...
Minimization of Shrinkage Porosity in A Sand Casting Process By Simulation I...
IJMER
 
A Review of Issues in Environmentally Conscious Manufacturing and Product Re...
A Review of Issues in Environmentally Conscious Manufacturing  and Product Re...A Review of Issues in Environmentally Conscious Manufacturing  and Product Re...
A Review of Issues in Environmentally Conscious Manufacturing and Product Re...
IJMER
 
Modelling Nozzle throat as Rocket exhaust
Modelling Nozzle throat as Rocket exhaustModelling Nozzle throat as Rocket exhaust
Modelling Nozzle throat as Rocket exhaust
IJMER
 
F04013437
F04013437F04013437
F04013437
IJMER
 
g∗S-closed sets in topological spaces
g∗S-closed sets in topological spacesg∗S-closed sets in topological spaces
g∗S-closed sets in topological spaces
IJMER
 
Fuzzy Rule Based Model for Optimal Reservoir Releases
Fuzzy Rule Based Model for Optimal Reservoir ReleasesFuzzy Rule Based Model for Optimal Reservoir Releases
Fuzzy Rule Based Model for Optimal Reservoir Releases
IJMER
 
Au2419291933
Au2419291933Au2419291933
Au2419291933
IJMER
 
Lossy Transmission Lines Terminated by Parallel Connected RC-Loads and in Ser...
Lossy Transmission Lines Terminated by Parallel Connected RC-Loads and in Ser...Lossy Transmission Lines Terminated by Parallel Connected RC-Loads and in Ser...
Lossy Transmission Lines Terminated by Parallel Connected RC-Loads and in Ser...
IJMER
 
Earthquake Resistant Design of Low-Rise Open Ground Storey Framed Building
Earthquake Resistant Design of Low-Rise Open Ground Storey  Framed BuildingEarthquake Resistant Design of Low-Rise Open Ground Storey  Framed Building
Earthquake Resistant Design of Low-Rise Open Ground Storey Framed Building
IJMER
 
Au2640944101
Au2640944101Au2640944101
Au2640944101
IJMER
 
Helicopter Flapping Under Dynamic Stall
Helicopter Flapping Under Dynamic StallHelicopter Flapping Under Dynamic Stall
Helicopter Flapping Under Dynamic Stall
IJMER
 
Big Bang–Big Crunch Optimization Algorithm for the Maximum Power Point Track...
Big Bang–Big Crunch Optimization Algorithm for the Maximum  Power Point Track...Big Bang–Big Crunch Optimization Algorithm for the Maximum  Power Point Track...
Big Bang–Big Crunch Optimization Algorithm for the Maximum Power Point Track...
IJMER
 
Managing Business Analysis for Agile Development
Managing Business Analysis for Agile DevelopmentManaging Business Analysis for Agile Development
Managing Business Analysis for Agile Development
IJMER
 

Viewers also liked (20)

Analysis and Improved Operation of PEBB Based 5-Level Voltage Source Convert...
Analysis and Improved Operation of PEBB Based 5-Level  Voltage Source Convert...Analysis and Improved Operation of PEBB Based 5-Level  Voltage Source Convert...
Analysis and Improved Operation of PEBB Based 5-Level Voltage Source Convert...
 
In Multi-Hop Routing identifying trusted paths through TARF in Wireless sens...
In Multi-Hop Routing identifying trusted paths through TARF in  Wireless sens...In Multi-Hop Routing identifying trusted paths through TARF in  Wireless sens...
In Multi-Hop Routing identifying trusted paths through TARF in Wireless sens...
 
Da31456462
Da31456462Da31456462
Da31456462
 
Remote Access and Dual Authentication for Cloud Storage
Remote Access and Dual Authentication for Cloud StorageRemote Access and Dual Authentication for Cloud Storage
Remote Access and Dual Authentication for Cloud Storage
 
Illustration Clamor Echelon Evaluation via Prime Piece Psychotherapy
Illustration Clamor Echelon Evaluation via Prime Piece PsychotherapyIllustration Clamor Echelon Evaluation via Prime Piece Psychotherapy
Illustration Clamor Echelon Evaluation via Prime Piece Psychotherapy
 
Conversion of Artificial Neural Networks (ANN) To Autonomous Neural Networks
Conversion of Artificial Neural Networks (ANN) To Autonomous Neural NetworksConversion of Artificial Neural Networks (ANN) To Autonomous Neural Networks
Conversion of Artificial Neural Networks (ANN) To Autonomous Neural Networks
 
Bh2420282109
Bh2420282109Bh2420282109
Bh2420282109
 
Minimization of Shrinkage Porosity in A Sand Casting Process By Simulation I...
Minimization of Shrinkage Porosity in A Sand Casting Process  By Simulation I...Minimization of Shrinkage Porosity in A Sand Casting Process  By Simulation I...
Minimization of Shrinkage Porosity in A Sand Casting Process By Simulation I...
 
A Review of Issues in Environmentally Conscious Manufacturing and Product Re...
A Review of Issues in Environmentally Conscious Manufacturing  and Product Re...A Review of Issues in Environmentally Conscious Manufacturing  and Product Re...
A Review of Issues in Environmentally Conscious Manufacturing and Product Re...
 
Modelling Nozzle throat as Rocket exhaust
Modelling Nozzle throat as Rocket exhaustModelling Nozzle throat as Rocket exhaust
Modelling Nozzle throat as Rocket exhaust
 
F04013437
F04013437F04013437
F04013437
 
g∗S-closed sets in topological spaces
g∗S-closed sets in topological spacesg∗S-closed sets in topological spaces
g∗S-closed sets in topological spaces
 
Fuzzy Rule Based Model for Optimal Reservoir Releases
Fuzzy Rule Based Model for Optimal Reservoir ReleasesFuzzy Rule Based Model for Optimal Reservoir Releases
Fuzzy Rule Based Model for Optimal Reservoir Releases
 
Au2419291933
Au2419291933Au2419291933
Au2419291933
 
Lossy Transmission Lines Terminated by Parallel Connected RC-Loads and in Ser...
Lossy Transmission Lines Terminated by Parallel Connected RC-Loads and in Ser...Lossy Transmission Lines Terminated by Parallel Connected RC-Loads and in Ser...
Lossy Transmission Lines Terminated by Parallel Connected RC-Loads and in Ser...
 
Earthquake Resistant Design of Low-Rise Open Ground Storey Framed Building
Earthquake Resistant Design of Low-Rise Open Ground Storey  Framed BuildingEarthquake Resistant Design of Low-Rise Open Ground Storey  Framed Building
Earthquake Resistant Design of Low-Rise Open Ground Storey Framed Building
 
Au2640944101
Au2640944101Au2640944101
Au2640944101
 
Helicopter Flapping Under Dynamic Stall
Helicopter Flapping Under Dynamic StallHelicopter Flapping Under Dynamic Stall
Helicopter Flapping Under Dynamic Stall
 
Big Bang–Big Crunch Optimization Algorithm for the Maximum Power Point Track...
Big Bang–Big Crunch Optimization Algorithm for the Maximum  Power Point Track...Big Bang–Big Crunch Optimization Algorithm for the Maximum  Power Point Track...
Big Bang–Big Crunch Optimization Algorithm for the Maximum Power Point Track...
 
Managing Business Analysis for Agile Development
Managing Business Analysis for Agile DevelopmentManaging Business Analysis for Agile Development
Managing Business Analysis for Agile Development
 

Similar to Bf32785787

Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its Security
IJERA Editor
 
Data Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor NetworkData Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor Network
IJCI JOURNAL
 
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORKPREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
IJNSA Journal
 
A Survey of Security Approaches for Wireless Adhoc Networks
A Survey of Security Approaches for Wireless Adhoc NetworksA Survey of Security Approaches for Wireless Adhoc Networks
A Survey of Security Approaches for Wireless Adhoc Networks
International Journal for management Science and Technology - https://www.ijmst.com/
 
50120140507012
5012014050701250120140507012
50120140507012
IAEME Publication
 
76201924
7620192476201924
76201924
IJRAT
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
IJTET Journal
 
JCC_2015120915212763
JCC_2015120915212763JCC_2015120915212763
JCC_2015120915212763
Zia ul haq Arain
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
ijceronline
 
Security Technique and Congestion Avoidance in Mesh Network
Security Technique and Congestion Avoidance in Mesh NetworkSecurity Technique and Congestion Avoidance in Mesh Network
Security Technique and Congestion Avoidance in Mesh Network
ijtsrd
 
Dr2645024509
Dr2645024509Dr2645024509
Dr2645024509
IJMER
 
HIDING NODE IDENTITIES USING MLERT PROTOCOL IN MOBILE AD-HOC NETWORKs
HIDING NODE IDENTITIES USING MLERT PROTOCOL IN MOBILE AD-HOC NETWORKsHIDING NODE IDENTITIES USING MLERT PROTOCOL IN MOBILE AD-HOC NETWORKs
HIDING NODE IDENTITIES USING MLERT PROTOCOL IN MOBILE AD-HOC NETWORKs
DhivyaT22
 
Security in ad hoc networks
Security in ad hoc networksSecurity in ad hoc networks
Security in ad hoc networks
eSAT Publishing House
 
Data Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor NetworkData Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor Network
Editor IJCATR
 
Security in MANET based on PKI using fuzzy function
Security in MANET based on PKI using fuzzy functionSecurity in MANET based on PKI using fuzzy function
Security in MANET based on PKI using fuzzy function
IOSR Journals
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANET
Sunita Sahu
 
An Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
An Encryption Algorithm To Evaluate Performance Of V2v Communication In VanetAn Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
An Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
ijcisjournal
 
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKS
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKSSECURITY CONCERNS IN WIRELESS SENSOR NETWORKS
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKS
IAEME Publication
 
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKS
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKSSECURITY CONCERNS IN WIRELESS SENSOR NETWORKS
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKS
IAEME Publication
 
AACT: Anonymous and Accountable communication topology for Wireless Mesh Net...
AACT: Anonymous and Accountable communication topology  for Wireless Mesh Net...AACT: Anonymous and Accountable communication topology  for Wireless Mesh Net...
AACT: Anonymous and Accountable communication topology for Wireless Mesh Net...
IOSR Journals
 

Similar to Bf32785787 (20)

Protocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its SecurityProtocols for Wireless Sensor Networks and Its Security
Protocols for Wireless Sensor Networks and Its Security
 
Data Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor NetworkData Security via Public-Key Cryptography in Wireless Sensor Network
Data Security via Public-Key Cryptography in Wireless Sensor Network
 
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORKPREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK
 
A Survey of Security Approaches for Wireless Adhoc Networks
A Survey of Security Approaches for Wireless Adhoc NetworksA Survey of Security Approaches for Wireless Adhoc Networks
A Survey of Security Approaches for Wireless Adhoc Networks
 
50120140507012
5012014050701250120140507012
50120140507012
 
76201924
7620192476201924
76201924
 
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
Certain Investigations on Security Issues in Smart Grid over Wireless Communi...
 
JCC_2015120915212763
JCC_2015120915212763JCC_2015120915212763
JCC_2015120915212763
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Security Technique and Congestion Avoidance in Mesh Network
Security Technique and Congestion Avoidance in Mesh NetworkSecurity Technique and Congestion Avoidance in Mesh Network
Security Technique and Congestion Avoidance in Mesh Network
 
Dr2645024509
Dr2645024509Dr2645024509
Dr2645024509
 
HIDING NODE IDENTITIES USING MLERT PROTOCOL IN MOBILE AD-HOC NETWORKs
HIDING NODE IDENTITIES USING MLERT PROTOCOL IN MOBILE AD-HOC NETWORKsHIDING NODE IDENTITIES USING MLERT PROTOCOL IN MOBILE AD-HOC NETWORKs
HIDING NODE IDENTITIES USING MLERT PROTOCOL IN MOBILE AD-HOC NETWORKs
 
Security in ad hoc networks
Security in ad hoc networksSecurity in ad hoc networks
Security in ad hoc networks
 
Data Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor NetworkData Transfer Security solution for Wireless Sensor Network
Data Transfer Security solution for Wireless Sensor Network
 
Security in MANET based on PKI using fuzzy function
Security in MANET based on PKI using fuzzy functionSecurity in MANET based on PKI using fuzzy function
Security in MANET based on PKI using fuzzy function
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANET
 
An Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
An Encryption Algorithm To Evaluate Performance Of V2v Communication In VanetAn Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
An Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanet
 
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKS
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKSSECURITY CONCERNS IN WIRELESS SENSOR NETWORKS
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKS
 
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKS
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKSSECURITY CONCERNS IN WIRELESS SENSOR NETWORKS
SECURITY CONCERNS IN WIRELESS SENSOR NETWORKS
 
AACT: Anonymous and Accountable communication topology for Wireless Mesh Net...
AACT: Anonymous and Accountable communication topology  for Wireless Mesh Net...AACT: Anonymous and Accountable communication topology  for Wireless Mesh Net...
AACT: Anonymous and Accountable communication topology for Wireless Mesh Net...
 

More from IJMER

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
IJMER
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
IJMER
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
IJMER
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
IJMER
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
IJMER
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
IJMER
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
IJMER
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
IJMER
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
IJMER
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
IJMER
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
IJMER
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
IJMER
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
IJMER
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
IJMER
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
IJMER
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
IJMER
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
IJMER
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
IJMER
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
IJMER
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
IJMER
 

More from IJMER (20)

A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...A Study on Translucent Concrete Product and Its Properties by Using Optical F...
A Study on Translucent Concrete Product and Its Properties by Using Optical F...
 
Developing Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed DelintingDeveloping Cost Effective Automation for Cotton Seed Delinting
Developing Cost Effective Automation for Cotton Seed Delinting
 
Study & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja FibreStudy & Testing Of Bio-Composite Material Based On Munja Fibre
Study & Testing Of Bio-Composite Material Based On Munja Fibre
 
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
Hybrid Engine (Stirling Engine + IC Engine + Electric Motor)
 
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
Fabrication & Characterization of Bio Composite Materials Based On Sunnhemp F...
 
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
Geochemistry and Genesis of Kammatturu Iron Ores of Devagiri Formation, Sandu...
 
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
Experimental Investigation on Characteristic Study of the Carbon Steel C45 in...
 
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
Non linear analysis of Robot Gun Support Structure using Equivalent Dynamic A...
 
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works SimulationStatic Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
Static Analysis of Go-Kart Chassis by Analytical and Solid Works Simulation
 
High Speed Effortless Bicycle
High Speed Effortless BicycleHigh Speed Effortless Bicycle
High Speed Effortless Bicycle
 
Integration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise ApplicationsIntegration of Struts & Spring & Hibernate for Enterprise Applications
Integration of Struts & Spring & Hibernate for Enterprise Applications
 
Microcontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation SystemMicrocontroller Based Automatic Sprinkler Irrigation System
Microcontroller Based Automatic Sprinkler Irrigation System
 
On some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological SpacesOn some locally closed sets and spaces in Ideal Topological Spaces
On some locally closed sets and spaces in Ideal Topological Spaces
 
Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...Intrusion Detection and Forensics based on decision tree and Association rule...
Intrusion Detection and Forensics based on decision tree and Association rule...
 
Natural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine LearningNatural Language Ambiguity and its Effect on Machine Learning
Natural Language Ambiguity and its Effect on Machine Learning
 
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcessEvolvea Frameworkfor SelectingPrime Software DevelopmentProcess
Evolvea Frameworkfor SelectingPrime Software DevelopmentProcess
 
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded CylindersMaterial Parameter and Effect of Thermal Load on Functionally Graded Cylinders
Material Parameter and Effect of Thermal Load on Functionally Graded Cylinders
 
Studies On Energy Conservation And Audit
Studies On Energy Conservation And AuditStudies On Energy Conservation And Audit
Studies On Energy Conservation And Audit
 
An Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDLAn Implementation of I2C Slave Interface using Verilog HDL
An Implementation of I2C Slave Interface using Verilog HDL
 
Discrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One PreyDiscrete Model of Two Predators competing for One Prey
Discrete Model of Two Predators competing for One Prey
 

Bf32785787

  • 1. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.3, Issue.2, March-April. 2013 pp-785-787 ISSN: 2249-6645 Privacy Protection Using Unobservablity and Unlink ability against Wormhole Attacks in Manet N.Sugumar, 1 K.Jayarajan M.E, 2 R.Anbarasu, M.E3 1 Final Year M.E-CSE, 23 Associate Professor Selvam College of Technology, Namakkal ABSTRACT: An efficient privacy-preserving routing protocol USOR that achieves content un-observability by employing anonymous key establishment based on group signature. The setup of USOR is simple: In privacy-preserving communications can largely be divided into two categories: cryptosystem-based techniques and broadcasting-based techniques. The cryptosystem-based techniques include mix-based systems and secure multiparty computation-based systems, originating from mix net and DC-net respectively. Broadcasting based schemes provide communication privacy by mixing the real messages with dummy packets so that it is infeasible for the adversaries to identify the real packets and track the message source. First, an anonymous key establishment process is performed to construct secret session keys. Then an unobservable route discovery process is executed to find a route to the destination. This process is done by establishing session keys between two nodes. After verifying the signature between themselves, the anonymous key is established between these two nodes which mean the two nodes establish this key without knowing who the other party is. It can effectively prevent replay attacks and session key disclosure attack, and meanwhile, it achieves key confirmation for established session keys. This key establishment protocol uses elliptic curve Diffie- Hellman (ECDH) key exchange to replace Diffie-Hellman key exchange, and uses group signature to replace MAC code.In this protocol, both control packets and data packets look random and indistinguishable from dummy packets for outside adversaries. Only valid nodes can distinguish routing packets and data packets from dummy traffic with inexpensive symmetric decryption. I. Introduction Mobile computing is human computer interaction by which a computer is expected to be transported during normal usage. Mobile computing involves mobile communication, mobile hardware, and mobile software. Communication issues include ad-hoc and infrastructure networks as well as communication properties, protocols, data formats and concrete technologies. Many types of mobile computers have been introduced  Wearable Computer  Personal Digital Assistant  Smartphone  Carputer  UMPC 1.2 TECHNICAL AND LIMITATIONS OF MOBILE COMPUTING 1.2.1 Range & Bandwidth: Mobile Internet access is generally slower than direct cable connections, using technologies suchas GPRS , 3G and 4G networks. These networks are usually available within range of commercial cell phone towers. Higher speed wireless LANs are inexpensive but have very limited range. 1.2.2 Security Standards: When working mobile, one is dependent on public networks, requiring careful use of VPN. Security is a major concern while concerning the mobile computing standards on the fleet. One can easily attack the VPN through a huge number of networks interconnected through the line. 1.2.3 Power Consumption: When a power outlet or portable generator is not available, mobile computers must rely entirely on battery power. Combined with the compact size of many mobile devices, this often means unusually expensive batteries must be used to obtain the necessary battery life. 1.2.4 Transmission Interferences: Weather, terrain, and the range from the nearest signal point can all interfere with signal reception. Reception in tunnels, some buildings, and rural areas is often poor. 1.2.5 Potential Health Hazards: People who use mobile devices while driving are often distracted from driving and are thus assumed more likely to be involved in traffic accidents.[3] (While this may seem obvious, there is considerable discussion about whether banning www.ijmer.com 785 | Page
  • 2. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.3, Issue.2, March-April. 2013 pp-785-787 ISSN: 2249-6645 mobile device use while driving reduces accidents or not.[4][5]) Cell phones may interfere with sensitive medical devices. Questions concerning mobile phone radiation and health have been raised. 1.2.6 Human Interface with Device: Screens and keyboards tend to be small, which may make them hard to use. Alternate input methods such as speech or handwriting recognition require training. II. Related Work 2.1 Anonymous Network Model In this module, anonymous route is discovered between the nodes this information will not leak to others.This is adopted using session key and broadcast key generation by means of Key Generation Center(KGC).This anonymous connection is established by verifying signatures of the each node. 2.2 Secure Key Generation and Route Discovery Phase This phase is a privacy-preserving route discovery process based on the keys established in previous phase.Similar to normal route discovery process, our discovery process also comprises of route request and route reply.The route request messages flood throughout the whole network, while the route reply messages are sent backward to the source node only.This performed based on the ID-based private key of every node. 2.3 Broadcast Key Distribution The broadcast key has been established among the nodes in the network. The key generated from the public key generated for the group.This broadcast key act like a security issue where each node should get authenticated before it enters into the network for communication.The BK will be shared among the neighbors in the zone. 2.4 Attacker Model For the collusion attacks, USOR still offers unobservability as promised. Though information disclosure is unavoidable for colluding insiders, and the adversary knows some keys, the information that the colluding insiders can obtain is largely restricted by USOR.For preventing the Sybil attacks, the centralized key server generates group signature signing keys and ID-based keys for network nodes. Thus, it is impossible for the adversary to obtain other valid identities except the compromised ones. 2.5 Performance Evaluation The sender computes the anonymity of RREQ packets. The sender anonymity is the obtained by calculating entropy of probability distribution of possible sender of RREQ packets.The performance has been rated by comparing the results from MASK. This results show that the error rate has been reduced.This system not only achieves anonymity, unobservability, unlinkability but also prevents from Sybil attack and collusion attack. www.ijmer.com 786 | Page
  • 3. International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.3, Issue.2, March-April. 2013 pp-785-787 ISSN: 2249-6645 III. Conclusions The USOR offers unobservability as promised. Though information disclosure is unavoidable for colluding insiders, and the adversary knows some keys, the information that the colluding insiders can obtain is largely restricted by USOR. In the padded USOR, all packets including RREQ, RREP packets and other control packets are padded to 128 bytes. Due to the packet padding, performance of the padded USOR is obviously downgraded, but the padded USOR still achieves satisfactory performance: more than 85% delivery success and about 250ms delivery latency. And also it not only provides strong privacy protection, it is also more resistant against attacks due to node compromise. Finally, achieves stronger privacy protection than existing schemes like MASK. References [1] Karim El Defrawy, Member, and Gene Tsudik, Senior Member“Privacy-preserving location-based on-demand routing in MANETs,” IEEE J. Sel. Areas Column., vol. 29, no. 10, pp. 1926–1934, 2011. [2] Andreas Pfitzmann, TU Dresden and Marit Hansen, ULD Kiel “Anonymity, Unlinkability, Undetectability, Unobservability,Pseudonymity, and Identity Management –A Consolidated Proposal for Terminology”Version v0.31 Feb. 15, 2008. [3] Jiejun Kong, Xiaoyan Hong” ANODR: ANonymous On Demand Routing with Untraceable Routes for Mobile Ad-hoc Networks” June 1–3, 2003. [4] Karim El Defrawy and Gene TsudiK“ALARM: Anonymous Location-Aided Routing in Suspicious MANETs“March 2007. [5] Reshmi Maulik and Nabendu Chaki “A Study on Wormhole Attacks in MANET ” ISSN 2150-7988 Volume 3 (2011) pp. 271-279. [6] Nadher MohammedAhmed AI-Safwani”The Effect of Eavesdropping and Wormhole Attacks on Mobile Adhoc Networks”2009. [7] Tanu Preet Singh, Shivani Dua and Vikrant Das” Energy-Efficient Routing Protocols In Mobile Ad-Hoc Networks” Volume 2, Issue 1, January 2012. [8] Kortuem.G., Schneider. J., Preuitt.D, Thompson .T.G.C, F’ickas.S. Segall.Z. “When Peer toPeer comes Face-to-Face: Collaborative Peer-to-Peer Computing in Mobile Ad hoc Networks”, 1st International Conference on Peer-to-Peer Computing, August, Linkoping, Sweden, pp. 75-91 (2001) [9] Mangrulkar.R.S, Dr. Mohammad Atique, “Trust Based Secured Adhoc on Demand Distance Vector Routing Protocol for Mobile Adhoc Network” (2010) [10] Marc Branchaud, Scott Flinn,"x Trust: A Scalable Trust Management Infrastructure" [11] Menaka Pushpa.A M.E., “Trust Based Secure Routing in AODV Routing Protocol” (2009) [12] Sridhar, S., Baskaran, R.: Conviction Scheme for Classifying Misbehaving Nodes in Mobile Ad Hoc Networks in the proceedings of CCSIT 2012 published by Springer (LNICST) 2012 [13] “TAODV: A Trusted AODV Routing protocol for Mobile ad hoc networks” (2009) www.ijmer.com 787 | Page