SlideShare a Scribd company logo
1 of 30
HIDING NODE IDENTITIES
USING MLERT PROTOCOL IN
MOBILE AD-HOC NETWORKs
Under the Guidance of Presented By
Mr. S.Chinnadurai. M.Tech., Dhivya.T
Asst. Professor 814312405005
Dept of CSE. ME-CSE(II year).
OVERVIEW
๏ƒผProblem Statement
๏ƒผAbstract
๏ƒผLiterature Survey
๏ƒผExisting System
๏ƒผDisadvantages
๏ƒผProposed System
๏ƒผAdvantages
๏ƒผModules
๏ƒผModule Description
๏ƒผScreen Shots
๏ƒผReferences
PROBLEM STATEMENT
๏‚— Existing routing protocols in MANET, does not provide good anonymity
protection for the nodes in the network.
๏‚— A Mysterious Location based Enhanced Routing proTocol is used.
ABSTRACT
MANETs use anonymous routing protocols that hide node locations from
attackers. It relies on either hop-by hop encryption or redundant traffic. It
generates high cost and cannot provide full protection to data. In order to
transfer messages with low cost and high anonymity protection a Mysterious
Location based Enhanced Routing proTocol (MLERT) is used.
LITERATURE SURVEY
AN ANONYMOUS ON-DEMAND POSITION-BASED
ROUTING (AODPR) IN MANETs
TECHNIQUE:
๏‚— AODPR protocol is used to prevent the traffic analysis and maintain anonymity of
destination node.
DRAWBACKS:
๏‚— Fails to provide security for route nodes.
๏‚— Attackers can change the temporary id and retrieve the data.
A SCALABLE LOCATION MANAGEMENT SCHEME IN
MOBILE AD-HOC NETWORKS
TECHNIQUE:
๏‚— DLM (Distributed Location Management) is designed.
DRAWBACK:
๏‚— It hides only the location of source and destination.
๏‚— Generates high cost.
ALARM: ANONYMOUS LOCATION-AIDED ROUTING IN
SUSPICIOUS MANETS
TECHNIQUE:
๏‚— An anonymous routing framework ALARM is designed to achieve node
authentication and privacy.
DRAWBACK:
๏‚— It fails to hide the source and destination nodes.
๏‚— Details of sender or receiver node will be updated.
TRAFFIC ANALYSIS: PROTOCOLS, ATTACKS, DESIGN
ISSUES AND OPEN PROBLEMS
TECHNIQUES:
๏‚— Intersection attacks.
๏‚— Timing attacks.
DRAWBACK:
๏‚— Possibilities of channel jamming.
ANONYMOUS SECURE ROUTING IN MOBILE AD-
HOC NETWORKS
TECHNIQUES:
๏‚— Anonymous Secure Routing (ASR) protocol is used to provide additional properties
on anonymity such as identity anonymity and location privacy.
DRAWBACK:
๏‚— Low efficiency.
๏‚— Unable to repair the broken routes.
EXISTING SYSTEM
๏‚— Hop by hop encryption mode used to protect the privacy.
๏‚— Redundant traffic.
DISADVANTAGES
๏‚— Unable to give complete security.
๏‚— More complexity.
๏‚— Limited resource is a problem in MANETs.
๏‚— Imposes higher requirement of routing efficiency.
PROPOSED SYSTEM
๏‚— MLERT- Mysterious Location based Enhanced Routing proTocol.
๏‚— GPSR Algorithm.
๏‚— AES Algorithm
๏‚— TTL algorithm.
ADVANTAGES
๏‚— Provides route anonymity, and location anonymity of source and destination.
๏‚— It is flexible to intersection attacks and timing attacks.
๏‚— Uses randomized routing of one message.
SYSTEM ARCHITECTURE
MODULES
๏‚— Node Registration
๏‚— The MLERT Routing
๏‚— Dynamic Pseudonym
๏‚— Anonymity Protection
๏‚— Random Forwarder
MODULE DESCRIPTION
NODE REGISTRATION:
๏‚— All nodes are registered in the database with proper ip address and port number.
๏‚— This process is to identify the correct user in the database.
๏‚— Provides security to the data.
๏‚— Protect data transmission between sender and receiver.
THE MLERT ROUTING:
๏‚— MLERT features a dynamic and unpredictable routing path.
๏‚— Hierarchical zone partition of network is done.
๏‚— Choose an intermediate relay node.
DYNAMIC PSEUDONYM:
๏‚— A source node S sends a request to a destination node D and the destination
responds with data.
๏‚— Each node in the network uses a dynamic pseudonym as its node identifier rather
than using its real MAC address.
ANONYMITY PROTECTION:
๏‚— Intersection attack and timing attacks are resolved.
๏‚— TTL algorithm is implemented to overcome those attacks.
RANDOM FORWARDER:
๏‚— The partition pattern in ALERT varies depending on the randomly selected TDs.
๏‚— The order of horizontal and vertical division provides a better anonymity
protection.
SCREENSHOTS
NODE REGISTRATION
TOPOLOGY CREATION
ZONE PARTITION
FORWARDING MESSAGE
REFERENCES
[1]. A.R. Beresford and F. Stajano, โ€œMix Zones: User Privacy in Location-Aware Services,โ€ Proc. IEEE Second Ann.
Conf. Pervasive Computing and Comm. Workshops (PERCOMW), 2004.
[2]. K.E. Defrawy and G. Tsudik, โ€œALARM: Anonymous Location-Aided Routing in Suspicious MANETs,โ€ Proc.
IEEE Intโ€™l Conf.Network Protocols (ICNP), 2007.
[3]. Y.C. Hu, D.B. Johnson, and A. Perrig, โ€œSEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad
Hoc Networks,โ€ Proc. IEEE Workshop Mobile Computing Systems and Applications (WMCSA), 2002.
[4]. M.F. Mokbel, C.-Y. Chow, and W.G. Aref, โ€œThe New Casper: Query Processing for Location Services without
Compromising Privacy,โ€ Proc. 32nd Intโ€™l Conf. Very Large Databases (VLDB), 2006
[5]. N.R.Potlapally, S. Ravi, A. Raghunathan, and N.K. Jha, โ€œAnalyzing the Energy Consumption of Security
Protocols,โ€ Proc. Intโ€™l Symp. Low Power Electronics and Design (ISLPED), 2003.
[6]. Sk.Md.M. Rahman, M. Mambo, A. Inomata, and E. Okamoto, โ€œAn Anonymous On-Demand Position-Based
Routing in Mobile Ad Hoc Networks,โ€ Proc. Intโ€™l Symp. Applications on Internet (SAINT), 2006.
[7]. L. Sweeney, โ€œk-Anonymity: A Model for Protecting Privacy,โ€ Intโ€™l J. Uncertainty Fuzziness Knowledge-Based
Systems, vol. 10, no. 5,pp. 557-570, 2002.
[8]. X. Wu, โ€œAO2P: Ad Hoc On-Demand Position-Based Private Routing Protocol,โ€ IEEE Trans. Mobile Computing,
vol. 4, no. 4, pp. 335-348, July/Aug. 2005.
[9]. X. Wu, J. Liu, X. Hong, and E. Bertino, โ€œAnonymous Geo-Forwarding in MANETs through Location Cloaking,โ€
IEEE Trans. Parallel and Distributed Systems, vol. 19, no. 10, pp. 1297-1309, Oct.2008.
[10]. Y. Xue, B. Li, and K. Nahrstedt, โ€œA Scalable Location Management Scheme in Mobile Ad-Hoc Networks,โ€
technical report, 2001.
[11]. Haiying Shen and Lianyu Zhao, โ€œALERT: An Anonymous Location-Based Efficient Routing Protocol in
MANETsโ€ vol. 12, no. 6, June 2013.
THANK YOU

More Related Content

Similar to HIDING NODE IDENTITIES USING MLERT PROTOCOL IN MOBILE AD-HOC NETWORKs

Iaetsd key reconstruction and clustering opponent nodes in minimum cost
Iaetsd key reconstruction and clustering opponent nodes in minimum costIaetsd key reconstruction and clustering opponent nodes in minimum cost
Iaetsd key reconstruction and clustering opponent nodes in minimum cost
Iaetsd Iaetsd
ย 

Similar to HIDING NODE IDENTITIES USING MLERT PROTOCOL IN MOBILE AD-HOC NETWORKs (20)

Analyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSNAnalyze and Detect Packet Loss for Data Transmission in WSN
Analyze and Detect Packet Loss for Data Transmission in WSN
ย 
Ids presentation
Ids presentationIds presentation
Ids presentation
ย 
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
Data Security and Data Dissemination of Distributed Data in Wireless Sensor N...
ย 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
ย 
Iaetsd key reconstruction and clustering opponent nodes in minimum cost
Iaetsd key reconstruction and clustering opponent nodes in minimum costIaetsd key reconstruction and clustering opponent nodes in minimum cost
Iaetsd key reconstruction and clustering opponent nodes in minimum cost
ย 
Security threats in manets a review
Security threats in manets a reviewSecurity threats in manets a review
Security threats in manets a review
ย 
Mitigation of sink hole attack in manet using aco
Mitigation of sink hole attack in manet using acoMitigation of sink hole attack in manet using aco
Mitigation of sink hole attack in manet using aco
ย 
E0942531
E0942531E0942531
E0942531
ย 
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...Migrating packet dropping in mobile ad hoc network based on modified ack-base...
Migrating packet dropping in mobile ad hoc network based on modified ack-base...
ย 
Routing security in ad hoc wireless network
Routing security in ad hoc wireless networkRouting security in ad hoc wireless network
Routing security in ad hoc wireless network
ย 
SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
SEAD: Source Encrypted Authentic Data for Wireless Sensor NetworksSEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
SEAD: Source Encrypted Authentic Data for Wireless Sensor Networks
ย 
Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.Source location privacy in wireless sensor networks using data mules.
Source location privacy in wireless sensor networks using data mules.
ย 
E42043640
E42043640E42043640
E42043640
ย 
Presentation1
Presentation1Presentation1
Presentation1
ย 
Reliable and Efficient Routing in WLAN
Reliable and Efficient Routing in WLANReliable and Efficient Routing in WLAN
Reliable and Efficient Routing in WLAN
ย 
EAASR: Enhanced AASR Protocol to Reduce Traffic and Eliminate the Malicious N...
EAASR: Enhanced AASR Protocol to Reduce Traffic and Eliminate the Malicious N...EAASR: Enhanced AASR Protocol to Reduce Traffic and Eliminate the Malicious N...
EAASR: Enhanced AASR Protocol to Reduce Traffic and Eliminate the Malicious N...
ย 
Manet
ManetManet
Manet
ย 
Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...
Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...
Performance Analysis of DSR, STAR, ZRP Routing Protocols for a Dynamic Ad-Hoc...
ย 
Jf3416691674
Jf3416691674Jf3416691674
Jf3416691674
ย 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANET
ย 

Recently uploaded

Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar โ‰ผ๐Ÿ” Delhi door step de...
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar  โ‰ผ๐Ÿ” Delhi door step de...Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar  โ‰ผ๐Ÿ” Delhi door step de...
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar โ‰ผ๐Ÿ” Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
ย 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
ย 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
SUHANI PANDEY
ย 

Recently uploaded (20)

NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
ย 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
ย 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
ย 
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar โ‰ผ๐Ÿ” Delhi door step de...
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar  โ‰ผ๐Ÿ” Delhi door step de...Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar  โ‰ผ๐Ÿ” Delhi door step de...
Call Now โ‰ฝ 9953056974 โ‰ผ๐Ÿ” Call Girls In New Ashok Nagar โ‰ผ๐Ÿ” Delhi door step de...
ย 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
ย 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
ย 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ย 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
ย 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
ย 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
ย 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
ย 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
ย 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
ย 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
ย 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
ย 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
ย 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
ย 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
ย 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
ย 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
ย 

HIDING NODE IDENTITIES USING MLERT PROTOCOL IN MOBILE AD-HOC NETWORKs

  • 1. HIDING NODE IDENTITIES USING MLERT PROTOCOL IN MOBILE AD-HOC NETWORKs Under the Guidance of Presented By Mr. S.Chinnadurai. M.Tech., Dhivya.T Asst. Professor 814312405005 Dept of CSE. ME-CSE(II year).
  • 2. OVERVIEW ๏ƒผProblem Statement ๏ƒผAbstract ๏ƒผLiterature Survey ๏ƒผExisting System ๏ƒผDisadvantages ๏ƒผProposed System ๏ƒผAdvantages ๏ƒผModules ๏ƒผModule Description ๏ƒผScreen Shots ๏ƒผReferences
  • 3. PROBLEM STATEMENT ๏‚— Existing routing protocols in MANET, does not provide good anonymity protection for the nodes in the network. ๏‚— A Mysterious Location based Enhanced Routing proTocol is used.
  • 4. ABSTRACT MANETs use anonymous routing protocols that hide node locations from attackers. It relies on either hop-by hop encryption or redundant traffic. It generates high cost and cannot provide full protection to data. In order to transfer messages with low cost and high anonymity protection a Mysterious Location based Enhanced Routing proTocol (MLERT) is used.
  • 6. AN ANONYMOUS ON-DEMAND POSITION-BASED ROUTING (AODPR) IN MANETs TECHNIQUE: ๏‚— AODPR protocol is used to prevent the traffic analysis and maintain anonymity of destination node. DRAWBACKS: ๏‚— Fails to provide security for route nodes. ๏‚— Attackers can change the temporary id and retrieve the data.
  • 7. A SCALABLE LOCATION MANAGEMENT SCHEME IN MOBILE AD-HOC NETWORKS TECHNIQUE: ๏‚— DLM (Distributed Location Management) is designed. DRAWBACK: ๏‚— It hides only the location of source and destination. ๏‚— Generates high cost.
  • 8. ALARM: ANONYMOUS LOCATION-AIDED ROUTING IN SUSPICIOUS MANETS TECHNIQUE: ๏‚— An anonymous routing framework ALARM is designed to achieve node authentication and privacy. DRAWBACK: ๏‚— It fails to hide the source and destination nodes. ๏‚— Details of sender or receiver node will be updated.
  • 9. TRAFFIC ANALYSIS: PROTOCOLS, ATTACKS, DESIGN ISSUES AND OPEN PROBLEMS TECHNIQUES: ๏‚— Intersection attacks. ๏‚— Timing attacks. DRAWBACK: ๏‚— Possibilities of channel jamming.
  • 10. ANONYMOUS SECURE ROUTING IN MOBILE AD- HOC NETWORKS TECHNIQUES: ๏‚— Anonymous Secure Routing (ASR) protocol is used to provide additional properties on anonymity such as identity anonymity and location privacy. DRAWBACK: ๏‚— Low efficiency. ๏‚— Unable to repair the broken routes.
  • 11. EXISTING SYSTEM ๏‚— Hop by hop encryption mode used to protect the privacy. ๏‚— Redundant traffic.
  • 12. DISADVANTAGES ๏‚— Unable to give complete security. ๏‚— More complexity. ๏‚— Limited resource is a problem in MANETs. ๏‚— Imposes higher requirement of routing efficiency.
  • 13. PROPOSED SYSTEM ๏‚— MLERT- Mysterious Location based Enhanced Routing proTocol. ๏‚— GPSR Algorithm. ๏‚— AES Algorithm ๏‚— TTL algorithm.
  • 14. ADVANTAGES ๏‚— Provides route anonymity, and location anonymity of source and destination. ๏‚— It is flexible to intersection attacks and timing attacks. ๏‚— Uses randomized routing of one message.
  • 16. MODULES ๏‚— Node Registration ๏‚— The MLERT Routing ๏‚— Dynamic Pseudonym ๏‚— Anonymity Protection ๏‚— Random Forwarder
  • 17. MODULE DESCRIPTION NODE REGISTRATION: ๏‚— All nodes are registered in the database with proper ip address and port number. ๏‚— This process is to identify the correct user in the database. ๏‚— Provides security to the data. ๏‚— Protect data transmission between sender and receiver.
  • 18. THE MLERT ROUTING: ๏‚— MLERT features a dynamic and unpredictable routing path. ๏‚— Hierarchical zone partition of network is done. ๏‚— Choose an intermediate relay node. DYNAMIC PSEUDONYM: ๏‚— A source node S sends a request to a destination node D and the destination responds with data. ๏‚— Each node in the network uses a dynamic pseudonym as its node identifier rather than using its real MAC address.
  • 19. ANONYMITY PROTECTION: ๏‚— Intersection attack and timing attacks are resolved. ๏‚— TTL algorithm is implemented to overcome those attacks. RANDOM FORWARDER: ๏‚— The partition pattern in ALERT varies depending on the randomly selected TDs. ๏‚— The order of horizontal and vertical division provides a better anonymity protection.
  • 25.
  • 26.
  • 27.
  • 28. REFERENCES [1]. A.R. Beresford and F. Stajano, โ€œMix Zones: User Privacy in Location-Aware Services,โ€ Proc. IEEE Second Ann. Conf. Pervasive Computing and Comm. Workshops (PERCOMW), 2004. [2]. K.E. Defrawy and G. Tsudik, โ€œALARM: Anonymous Location-Aided Routing in Suspicious MANETs,โ€ Proc. IEEE Intโ€™l Conf.Network Protocols (ICNP), 2007. [3]. Y.C. Hu, D.B. Johnson, and A. Perrig, โ€œSEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks,โ€ Proc. IEEE Workshop Mobile Computing Systems and Applications (WMCSA), 2002. [4]. M.F. Mokbel, C.-Y. Chow, and W.G. Aref, โ€œThe New Casper: Query Processing for Location Services without Compromising Privacy,โ€ Proc. 32nd Intโ€™l Conf. Very Large Databases (VLDB), 2006 [5]. N.R.Potlapally, S. Ravi, A. Raghunathan, and N.K. Jha, โ€œAnalyzing the Energy Consumption of Security Protocols,โ€ Proc. Intโ€™l Symp. Low Power Electronics and Design (ISLPED), 2003.
  • 29. [6]. Sk.Md.M. Rahman, M. Mambo, A. Inomata, and E. Okamoto, โ€œAn Anonymous On-Demand Position-Based Routing in Mobile Ad Hoc Networks,โ€ Proc. Intโ€™l Symp. Applications on Internet (SAINT), 2006. [7]. L. Sweeney, โ€œk-Anonymity: A Model for Protecting Privacy,โ€ Intโ€™l J. Uncertainty Fuzziness Knowledge-Based Systems, vol. 10, no. 5,pp. 557-570, 2002. [8]. X. Wu, โ€œAO2P: Ad Hoc On-Demand Position-Based Private Routing Protocol,โ€ IEEE Trans. Mobile Computing, vol. 4, no. 4, pp. 335-348, July/Aug. 2005. [9]. X. Wu, J. Liu, X. Hong, and E. Bertino, โ€œAnonymous Geo-Forwarding in MANETs through Location Cloaking,โ€ IEEE Trans. Parallel and Distributed Systems, vol. 19, no. 10, pp. 1297-1309, Oct.2008. [10]. Y. Xue, B. Li, and K. Nahrstedt, โ€œA Scalable Location Management Scheme in Mobile Ad-Hoc Networks,โ€ technical report, 2001. [11]. Haiying Shen and Lianyu Zhao, โ€œALERT: An Anonymous Location-Based Efficient Routing Protocol in MANETsโ€ vol. 12, no. 6, June 2013.