SlideShare a Scribd company logo
1 of 7
An anonymous location based efficient
routing protocol in MANET’S
Name: Suprita
E-mail:supritarocks035@gmail.com
Twitter Id: @supritasam
University: VTU
Year/Semester:2nd / 4th
Branch: Digital Communication and Networking
Introduction
 Mobile Ad Hoc Networks (MANETs) has numerous wireless
application that can be used in a wide number of areas such as
commerce, emergency services, military, education, and entertainment.
 MANET feature self organizing and independent infrastructure.
 Nodes in MANETs are Vulnerable, analyze data, traffic analysis and
attacking routing protocols.
 Anonymous routing protocols are crucial in MANET.
 Anonymity in MANET includes identity, routing anonymity, location
anonymity of source and destination.
Cont…
 Anonymous routing: ALERT provides route anonymity, identity, and
location anonymity of source and destination.
 Low cost: Rather than relying on hop-by-hop encryption and redundant
traffic, ALERT mainly uses randomized routing of one message copy to
provide anonymity protection.
 Resilience to intersection attacks and timing attacks: ALERT has a
strategy to effectively counter intersection attacks, which have proved to
be a tough open issue ALERT can also avoid timing attacks because of its
nonfixed routing paths for a source destination pair.
 Extensive simulations: We conducted comprehensive experiments to
evaluate ALERT’s performance in comparison with other anonymous
protocols.
Existing System
 Anonymous routing protocols are crucial in MANETs to provide secure
communications by hiding node identities and preventing traffic analysis
attacks from outside observers.
 Anonymity in MANETs includes identity and location anonymity of data
sources (i.e., senders) and destinations (i.e., recipients), as well as route
anonymity. “Identity and location anonymity of sources and destinations”
means it is hard if possible for other nodes to obtain the real identities and exact
locations of the sources and destinations.
 For route anonymity, adversaries, either enroute or out of the route, cannot trace
a packet flow back to its source or destination, and no node have information
about the real identities and locations of intermediate nodes enroute.
 Also, in order to dissociate the relationship between source and destination (i.e.,
relationship un observability, it is important to form an anonymous path
between the two endpoints and ensure that nodes en route do not know where
the endpoints are, especially in MANETs where location devices may be
equipped.
Proposed System
 In order to provide high anonymity protection (for sources, destination, and route)
with low cost, we propose an Anonymous Location-based and Efficient Routing
protocol (ALERT).
 ALERT dynamically partitions a network field into zones and randomly chooses nodes
in zones as intermediate relay nodes, which form a nontraceable anonymous route.
 Specifically, in each routing step, a data sender or forwarder partitions the network
field in order to separate itself and the destination into two zones. It then randomly
chooses a node in the other zone as the next relay node and uses the GPSR algorithm
to send the data to the relay node.
 In the last step, the data is broadcasted to k nodes in the destination zone, providing k-
anonymity to the destination.
 In addition, ALERT has a strategy to hide the data initiator among a number of
initiators to strengthen the anonymity protection of the source.
 ALERT is also resilient to intersection attacks and timing attacks.
Interest Areas
 Network security, Wireless communication, MANETs, Computer
networks and Neural networks.
 For example in military applications such as soldier
communication. Consider the MANET deployed in a battlefield. By
traffic analysis enemies may intercept in the transmitted packets,
and track the soldiers (i.e. nodes) attack the commander nodes, and
then block the data transmission by comprising the relay nodes(RN)
is the major tactical disadvantages. Anonymous routing protocols
are very essential in MANETs to provide secure communications
by hiding the node identities and preventing traffic analysis attack
from the outside observers.
 We conduct comprehensive experiments to evaluate ALERT’s
performance in comparison with other anonymous protocols.
Thank you

More Related Content

Viewers also liked (6)

Oko dom-2
Oko dom-2Oko dom-2
Oko dom-2
 
Security projectzone credentials
Security projectzone credentialsSecurity projectzone credentials
Security projectzone credentials
 
HSM securio af auto feed
HSM securio af auto feedHSM securio af auto feed
HSM securio af auto feed
 
Agent уничтожители
Agent уничтожителиAgent уничтожители
Agent уничтожители
 
Sbi 2015
Sbi 2015Sbi 2015
Sbi 2015
 
презентация сайт Face вашей компании
презентация сайт   Face вашей компаниипрезентация сайт   Face вашей компании
презентация сайт Face вашей компании
 

Similar to Mphasisintern

A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...
A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...
A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...
IJERD Editor
 
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
ijsrd.com
 

Similar to Mphasisintern (20)

Alert an anonymous location based efficient routing protocol in mane ts
Alert an anonymous location based efficient routing protocol in mane tsAlert an anonymous location based efficient routing protocol in mane ts
Alert an anonymous location based efficient routing protocol in mane ts
 
Detecting Wormhole Attack in Mobile Ad-hoc Networks: A Survey
Detecting Wormhole Attack in Mobile Ad-hoc Networks: A SurveyDetecting Wormhole Attack in Mobile Ad-hoc Networks: A Survey
Detecting Wormhole Attack in Mobile Ad-hoc Networks: A Survey
 
2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...
2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...
2014 IEEE DOTNET SERVICE COMPUTING PROJECT Stars a statistical traffic patter...
 
IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...
IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...
IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...
 
Mlrt an mysterious location based efficient routing protocol in manets
Mlrt an mysterious location based efficient routing protocol in manetsMlrt an mysterious location based efficient routing protocol in manets
Mlrt an mysterious location based efficient routing protocol in manets
 
An mysterious location based efficient routing protocol in manets
An mysterious location based efficient routing protocol in manetsAn mysterious location based efficient routing protocol in manets
An mysterious location based efficient routing protocol in manets
 
IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...
IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...
IEEE 2014 DOTNET SERVICE COMPUTING PROJECTS Stars a statistical traffic patte...
 
Secure Routing for MANET in Adversarial Environment
Secure Routing for MANET in Adversarial EnvironmentSecure Routing for MANET in Adversarial Environment
Secure Routing for MANET in Adversarial Environment
 
Exclusion of Denial of Service Attack using Graph Theory in MANETS
Exclusion of Denial of Service Attack using Graph Theory in MANETSExclusion of Denial of Service Attack using Graph Theory in MANETS
Exclusion of Denial of Service Attack using Graph Theory in MANETS
 
Securing Data Communication for Node Anonymization Using Location Information
Securing Data Communication for Node Anonymization Using  Location InformationSecuring Data Communication for Node Anonymization Using  Location Information
Securing Data Communication for Node Anonymization Using Location Information
 
A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...
A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...
A Survey on Securing TORA for Detecting and Protecting Against Sybil Attack i...
 
ant2
ant2ant2
ant2
 
Paper id 2520141231
Paper id 2520141231Paper id 2520141231
Paper id 2520141231
 
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networksBlack hole Attack Avoidance Protocol for wireless Ad-Hoc networks
Black hole Attack Avoidance Protocol for wireless Ad-Hoc networks
 
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
An Enhanced Approach to Avoid Black hole Attack in Mobile Ad hoc Networks usi...
 
An intrusion detection system for detecting malicious nodes in manet using tr...
An intrusion detection system for detecting malicious nodes in manet using tr...An intrusion detection system for detecting malicious nodes in manet using tr...
An intrusion detection system for detecting malicious nodes in manet using tr...
 
Paper id 311201512
Paper id 311201512Paper id 311201512
Paper id 311201512
 
Attacks in MANET
Attacks in MANETAttacks in MANET
Attacks in MANET
 
JPN1423 Stars a Statistical Traffic Pattern
JPN1423   Stars a Statistical Traffic PatternJPN1423   Stars a Statistical Traffic Pattern
JPN1423 Stars a Statistical Traffic Pattern
 
The apt identification and blocking through ids in manet
The apt identification and blocking through ids in manetThe apt identification and blocking through ids in manet
The apt identification and blocking through ids in manet
 

Recently uploaded

AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
dharasingh5698
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
 

Recently uploaded (20)

AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoorTop Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
Top Rated Call Girls In chittoor 📱 {7001035870} VIP Escorts chittoor
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak HamilCara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Intro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdfIntro To Electric Vehicles PDF Notes.pdf
Intro To Electric Vehicles PDF Notes.pdf
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 

Mphasisintern

  • 1. An anonymous location based efficient routing protocol in MANET’S Name: Suprita E-mail:supritarocks035@gmail.com Twitter Id: @supritasam University: VTU Year/Semester:2nd / 4th Branch: Digital Communication and Networking
  • 2. Introduction  Mobile Ad Hoc Networks (MANETs) has numerous wireless application that can be used in a wide number of areas such as commerce, emergency services, military, education, and entertainment.  MANET feature self organizing and independent infrastructure.  Nodes in MANETs are Vulnerable, analyze data, traffic analysis and attacking routing protocols.  Anonymous routing protocols are crucial in MANET.  Anonymity in MANET includes identity, routing anonymity, location anonymity of source and destination.
  • 3. Cont…  Anonymous routing: ALERT provides route anonymity, identity, and location anonymity of source and destination.  Low cost: Rather than relying on hop-by-hop encryption and redundant traffic, ALERT mainly uses randomized routing of one message copy to provide anonymity protection.  Resilience to intersection attacks and timing attacks: ALERT has a strategy to effectively counter intersection attacks, which have proved to be a tough open issue ALERT can also avoid timing attacks because of its nonfixed routing paths for a source destination pair.  Extensive simulations: We conducted comprehensive experiments to evaluate ALERT’s performance in comparison with other anonymous protocols.
  • 4. Existing System  Anonymous routing protocols are crucial in MANETs to provide secure communications by hiding node identities and preventing traffic analysis attacks from outside observers.  Anonymity in MANETs includes identity and location anonymity of data sources (i.e., senders) and destinations (i.e., recipients), as well as route anonymity. “Identity and location anonymity of sources and destinations” means it is hard if possible for other nodes to obtain the real identities and exact locations of the sources and destinations.  For route anonymity, adversaries, either enroute or out of the route, cannot trace a packet flow back to its source or destination, and no node have information about the real identities and locations of intermediate nodes enroute.  Also, in order to dissociate the relationship between source and destination (i.e., relationship un observability, it is important to form an anonymous path between the two endpoints and ensure that nodes en route do not know where the endpoints are, especially in MANETs where location devices may be equipped.
  • 5. Proposed System  In order to provide high anonymity protection (for sources, destination, and route) with low cost, we propose an Anonymous Location-based and Efficient Routing protocol (ALERT).  ALERT dynamically partitions a network field into zones and randomly chooses nodes in zones as intermediate relay nodes, which form a nontraceable anonymous route.  Specifically, in each routing step, a data sender or forwarder partitions the network field in order to separate itself and the destination into two zones. It then randomly chooses a node in the other zone as the next relay node and uses the GPSR algorithm to send the data to the relay node.  In the last step, the data is broadcasted to k nodes in the destination zone, providing k- anonymity to the destination.  In addition, ALERT has a strategy to hide the data initiator among a number of initiators to strengthen the anonymity protection of the source.  ALERT is also resilient to intersection attacks and timing attacks.
  • 6. Interest Areas  Network security, Wireless communication, MANETs, Computer networks and Neural networks.  For example in military applications such as soldier communication. Consider the MANET deployed in a battlefield. By traffic analysis enemies may intercept in the transmitted packets, and track the soldiers (i.e. nodes) attack the commander nodes, and then block the data transmission by comprising the relay nodes(RN) is the major tactical disadvantages. Anonymous routing protocols are very essential in MANETs to provide secure communications by hiding the node identities and preventing traffic analysis attack from the outside observers.  We conduct comprehensive experiments to evaluate ALERT’s performance in comparison with other anonymous protocols.