ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Mitigating Location Attacks through Trust Based Model in MANETS?

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.2, No. 12)

Publication Date:

Authors : ;

Page : 249-253

Keywords : Mobile ad hoc networks; anonymity; routing protocol; trust based model;

Source : Downloadexternal Find it from : Google Scholarexternal


Mobile Ad Hoc Networks (MANETs) use anonymous routing protocols that hide node identities and routes from outside observers in order to provide anonymity protection. However, existing anonymous routing protocols which rely on either hop-by-hop encryption or redundant traffic generate high cost or cannot provide full anonymity protection to data sources, destinations, and routes. The high cost exacerbates the inherent resource constraint problem in MANETs especially in multimedia wireless applications. ALERT mechanism offers anonymity protection to sources, destinations, and also routes. It has strategies which effectively help to counter intersection and timing attacks. To offer high security protection at a low cost, we propose a Trust Based Model through Recommendation and local information of neighboring node for Efficient Routing based on this ALERT. Trust model dynamically partitions the nodes into benign and suspicious based on the data transmission of neighboring node and also it mitigates the network attack through formation of intermediate relay nodes, which form a non-traceable anonymous route. It hides the data initiator/receiver among many initiators/receivers to strengthen the source and destination anonymity protection.

Last modified: 2013-12-24 16:30:39