SlideShare a Scribd company logo
1 of 7
An anonymous location based efficient
routing protocol in MANET’S
Name: Suprita
E-mail:supritarocks035@gmail.com
Twitter Id: @supritasam
University: VTU
Year/Semester:2nd / 4th
Branch: Digital Communication and Networking
Introduction
 Mobile Ad Hoc Networks (MANETs) has numerous wireless
application that can be used in a wide number of areas such as
commerce, emergency services, military, education, and entertainment.
 MANET feature self organizing and independent infrastructure.
 Nodes in MANETs are Vulnerable, analyze data, traffic analysis and
attacking routing protocols.
 Anonymous routing protocols are crucial in MANET.
 Anonymity in MANET includes identity, routing anonymity, location
anonymity of source and destination.
Cont…
 Anonymous routing: ALERT provides route anonymity, identity, and
location anonymity of source and destination.
 Low cost: Rather than relying on hop-by-hop encryption and redundant
traffic, ALERT mainly uses randomized routing of one message copy to
provide anonymity protection.
 Resilience to intersection attacks and timing attacks: ALERT has a
strategy to effectively counter intersection attacks, which have proved to
be a tough open issue ALERT can also avoid timing attacks because of its
nonfixed routing paths for a source destination pair.
 Extensive simulations: We conducted comprehensive experiments to
evaluate ALERT’s performance in comparison with other anonymous
protocols.
Existing System
 Anonymous routing protocols are crucial in MANETs to provide secure
communications by hiding node identities and preventing traffic analysis
attacks from outside observers.
 Anonymity in MANETs includes identity and location anonymity of data
sources (i.e., senders) and destinations (i.e., recipients), as well as route
anonymity. “Identity and location anonymity of sources and destinations”
means it is hard if possible for other nodes to obtain the real identities and exact
locations of the sources and destinations.
 For route anonymity, adversaries, either enroute or out of the route, cannot trace
a packet flow back to its source or destination, and no node have information
about the real identities and locations of intermediate nodes enroute.
 Also, in order to dissociate the relationship between source and destination (i.e.,
relationship un observability, it is important to form an anonymous path
between the two endpoints and ensure that nodes en route do not know where
the endpoints are, especially in MANETs where location devices may be
equipped.
Proposed System
 In order to provide high anonymity protection (for sources, destination, and route)
with low cost, we propose an Anonymous Location-based and Efficient Routing
protocol (ALERT).
 ALERT dynamically partitions a network field into zones and randomly chooses nodes
in zones as intermediate relay nodes, which form a nontraceable anonymous route.
 Specifically, in each routing step, a data sender or forwarder partitions the network
field in order to separate itself and the destination into two zones. It then randomly
chooses a node in the other zone as the next relay node and uses the GPSR algorithm
to send the data to the relay node.
 In the last step, the data is broadcasted to k nodes in the destination zone, providing k-
anonymity to the destination.
 In addition, ALERT has a strategy to hide the data initiator among a number of
initiators to strengthen the anonymity protection of the source.
 ALERT is also resilient to intersection attacks and timing attacks.
Interest Areas
 Network security, Wireless communication, MANETs, Computer
networks and Neural networks.
 For example in military applications such as soldier
communication. Consider the MANET deployed in a battlefield. By
traffic analysis enemies may intercept in the transmitted packets,
and track the soldiers (i.e. nodes) attack the commander nodes, and
then block the data transmission by comprising the relay nodes(RN)
is the major tactical disadvantages. Anonymous routing protocols
are very essential in MANETs to provide secure communications
by hiding the node identities and preventing traffic analysis attack
from the outside observers.
 We conduct comprehensive experiments to evaluate ALERT’s
performance in comparison with other anonymous protocols.
Thank you

More Related Content

Similar to Manet

Alert an anonymous location based efficient routing protocol in mane ts
Alert an anonymous location based efficient routing protocol in mane tsAlert an anonymous location based efficient routing protocol in mane ts
Alert an anonymous location based efficient routing protocol in mane tsJPINFOTECH JAYAPRAKASH
 
Detecting Wormhole Attack in Mobile Ad-hoc Networks: A Survey
Detecting Wormhole Attack in Mobile Ad-hoc Networks: A SurveyDetecting Wormhole Attack in Mobile Ad-hoc Networks: A Survey
Detecting Wormhole Attack in Mobile Ad-hoc Networks: A Surveyijsrd.com
 
2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...
2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...
2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...IEEEBEBTECHSTUDENTSPROJECTS
 
IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...
IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...
IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...IEEEBEBTECHSTUDENTPROJECTS
 
Mlrt an mysterious location based efficient routing protocol in manets
Mlrt an mysterious location based efficient routing protocol in manetsMlrt an mysterious location based efficient routing protocol in manets
Mlrt an mysterious location based efficient routing protocol in manetseSAT Publishing House
 
An mysterious location based efficient routing protocol in manets
An mysterious location based efficient routing protocol in manetsAn mysterious location based efficient routing protocol in manets
An mysterious location based efficient routing protocol in manetseSAT Journals
 
IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...
IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...
IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...IEEEBEBTECHSTUDENTPROJECTS
 
Secure Routing for MANET in Adversarial Environment
Secure Routing for MANET in Adversarial EnvironmentSecure Routing for MANET in Adversarial Environment
Secure Routing for MANET in Adversarial EnvironmentIJCERT
 
Exclusion of Denial of Service Attack using Graph Theory in MANETS
Exclusion of Denial of Service Attack using Graph Theory in MANETSExclusion of Denial of Service Attack using Graph Theory in MANETS
Exclusion of Denial of Service Attack using Graph Theory in MANETSIRJET Journal
 
Securing Data Communication for Node Anonymization Using Location Information
Securing Data Communication for Node Anonymization Using  Location InformationSecuring Data Communication for Node Anonymization Using  Location Information
Securing Data Communication for Node Anonymization Using Location InformationIJMER
 
A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...
A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...
A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...IJERD Editor
 
Paper id 2520141231
Paper id 2520141231Paper id 2520141231
Paper id 2520141231IJRAT
 
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksBlack hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksijsrd.com
 
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...ijsrd.com
 
An intrusion detection system for detecting malicious nodes in manet using tr...
An intrusion detection system for detecting malicious nodes in manet using tr...An intrusion detection system for detecting malicious nodes in manet using tr...
An intrusion detection system for detecting malicious nodes in manet using tr...ijctet
 
Paper id 311201512
Paper id 311201512Paper id 311201512
Paper id 311201512IJRAT
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANETSunita Sahu
 
JPN1423 Stars a Statistical Traffic Pattern
JPN1423   Stars a Statistical Traffic PatternJPN1423   Stars a Statistical Traffic Pattern
JPN1423 Stars a Statistical Traffic Patternchennaijp
 
The apt identification and blocking through ids in manet
The apt identification and blocking through ids in manetThe apt identification and blocking through ids in manet
The apt identification and blocking through ids in manetijctet
 

Similar to Manet (20)

Alert an anonymous location based efficient routing protocol in mane ts
Alert an anonymous location based efficient routing protocol in mane tsAlert an anonymous location based efficient routing protocol in mane ts
Alert an anonymous location based efficient routing protocol in mane ts
 
Detecting Wormhole Attack in Mobile Ad-hoc Networks: A Survey
Detecting Wormhole Attack in Mobile Ad-hoc Networks: A SurveyDetecting Wormhole Attack in Mobile Ad-hoc Networks: A Survey
Detecting Wormhole Attack in Mobile Ad-hoc Networks: A Survey
 
2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...
2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...
2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...
 
IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...
IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...
IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...
 
Mlrt an mysterious location based efficient routing protocol in manets
Mlrt an mysterious location based efficient routing protocol in manetsMlrt an mysterious location based efficient routing protocol in manets
Mlrt an mysterious location based efficient routing protocol in manets
 
An mysterious location based efficient routing protocol in manets
An mysterious location based efficient routing protocol in manetsAn mysterious location based efficient routing protocol in manets
An mysterious location based efficient routing protocol in manets
 
IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...
IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...
IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...
 
Secure Routing for MANET in Adversarial Environment
Secure Routing for MANET in Adversarial EnvironmentSecure Routing for MANET in Adversarial Environment
Secure Routing for MANET in Adversarial Environment
 
Exclusion of Denial of Service Attack using Graph Theory in MANETS
Exclusion of Denial of Service Attack using Graph Theory in MANETSExclusion of Denial of Service Attack using Graph Theory in MANETS
Exclusion of Denial of Service Attack using Graph Theory in MANETS
 
Securing Data Communication for Node Anonymization Using Location Information
Securing Data Communication for Node Anonymization Using  Location InformationSecuring Data Communication for Node Anonymization Using  Location Information
Securing Data Communication for Node Anonymization Using Location Information
 
A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...
A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...
A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...
 
ant2
ant2ant2
ant2
 
Paper id 2520141231
Paper id 2520141231Paper id 2520141231
Paper id 2520141231
 
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksBlack hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
 
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
 
An intrusion detection system for detecting malicious nodes in manet using tr...
An intrusion detection system for detecting malicious nodes in manet using tr...An intrusion detection system for detecting malicious nodes in manet using tr...
An intrusion detection system for detecting malicious nodes in manet using tr...
 
Paper id 311201512
Paper id 311201512Paper id 311201512
Paper id 311201512
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANET
 
JPN1423 Stars a Statistical Traffic Pattern
JPN1423   Stars a Statistical Traffic PatternJPN1423   Stars a Statistical Traffic Pattern
JPN1423 Stars a Statistical Traffic Pattern
 
The apt identification and blocking through ids in manet
The apt identification and blocking through ids in manetThe apt identification and blocking through ids in manet
The apt identification and blocking through ids in manet
 

More from Mphasis

Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Automation
AutomationAutomation
AutomationMphasis
 
Home Automation System
Home Automation SystemHome Automation System
Home Automation SystemMphasis
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Mphasis kushagra
Mphasis kushagraMphasis kushagra
Mphasis kushagraMphasis
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Internet of Things
Internet of ThingsInternet of Things
Internet of ThingsMphasis
 
Automation
AutomationAutomation
AutomationMphasis
 

More from Mphasis (20)

SMAC
SMACSMAC
SMAC
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Automation
AutomationAutomation
Automation
 
IoT
IoTIoT
IoT
 
Home Automation System
Home Automation SystemHome Automation System
Home Automation System
 
IoT
IoTIoT
IoT
 
SMAC
SMACSMAC
SMAC
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Mphasis kushagra
Mphasis kushagraMphasis kushagra
Mphasis kushagra
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
SMAC
SMACSMAC
SMAC
 
Io t 22
Io t 22Io t 22
Io t 22
 
IoT
IoTIoT
IoT
 
IoT
IoTIoT
IoT
 
IoT
IoTIoT
IoT
 
IoT
IoTIoT
IoT
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
SMAC
SMACSMAC
SMAC
 
IoT
IoTIoT
IoT
 
Automation
AutomationAutomation
Automation
 

Recently uploaded

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Principled Technologies
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 

Recently uploaded (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 

Manet

  • 1. An anonymous location based efficient routing protocol in MANET’S Name: Suprita E-mail:supritarocks035@gmail.com Twitter Id: @supritasam University: VTU Year/Semester:2nd / 4th Branch: Digital Communication and Networking
  • 2. Introduction  Mobile Ad Hoc Networks (MANETs) has numerous wireless application that can be used in a wide number of areas such as commerce, emergency services, military, education, and entertainment.  MANET feature self organizing and independent infrastructure.  Nodes in MANETs are Vulnerable, analyze data, traffic analysis and attacking routing protocols.  Anonymous routing protocols are crucial in MANET.  Anonymity in MANET includes identity, routing anonymity, location anonymity of source and destination.
  • 3. Cont…  Anonymous routing: ALERT provides route anonymity, identity, and location anonymity of source and destination.  Low cost: Rather than relying on hop-by-hop encryption and redundant traffic, ALERT mainly uses randomized routing of one message copy to provide anonymity protection.  Resilience to intersection attacks and timing attacks: ALERT has a strategy to effectively counter intersection attacks, which have proved to be a tough open issue ALERT can also avoid timing attacks because of its nonfixed routing paths for a source destination pair.  Extensive simulations: We conducted comprehensive experiments to evaluate ALERT’s performance in comparison with other anonymous protocols.
  • 4. Existing System  Anonymous routing protocols are crucial in MANETs to provide secure communications by hiding node identities and preventing traffic analysis attacks from outside observers.  Anonymity in MANETs includes identity and location anonymity of data sources (i.e., senders) and destinations (i.e., recipients), as well as route anonymity. “Identity and location anonymity of sources and destinations” means it is hard if possible for other nodes to obtain the real identities and exact locations of the sources and destinations.  For route anonymity, adversaries, either enroute or out of the route, cannot trace a packet flow back to its source or destination, and no node have information about the real identities and locations of intermediate nodes enroute.  Also, in order to dissociate the relationship between source and destination (i.e., relationship un observability, it is important to form an anonymous path between the two endpoints and ensure that nodes en route do not know where the endpoints are, especially in MANETs where location devices may be equipped.
  • 5. Proposed System  In order to provide high anonymity protection (for sources, destination, and route) with low cost, we propose an Anonymous Location-based and Efficient Routing protocol (ALERT).  ALERT dynamically partitions a network field into zones and randomly chooses nodes in zones as intermediate relay nodes, which form a nontraceable anonymous route.  Specifically, in each routing step, a data sender or forwarder partitions the network field in order to separate itself and the destination into two zones. It then randomly chooses a node in the other zone as the next relay node and uses the GPSR algorithm to send the data to the relay node.  In the last step, the data is broadcasted to k nodes in the destination zone, providing k- anonymity to the destination.  In addition, ALERT has a strategy to hide the data initiator among a number of initiators to strengthen the anonymity protection of the source.  ALERT is also resilient to intersection attacks and timing attacks.
  • 6. Interest Areas  Network security, Wireless communication, MANETs, Computer networks and Neural networks.  For example in military applications such as soldier communication. Consider the MANET deployed in a battlefield. By traffic analysis enemies may intercept in the transmitted packets, and track the soldiers (i.e. nodes) attack the commander nodes, and then block the data transmission by comprising the relay nodes(RN) is the major tactical disadvantages. Anonymous routing protocols are very essential in MANETs to provide secure communications by hiding the node identities and preventing traffic analysis attack from the outside observers.  We conduct comprehensive experiments to evaluate ALERT’s performance in comparison with other anonymous protocols.