Anonymity Set Location Privacy Scheme in Manet
Journal: International Journal of Engineering Sciences & Research Technology (IJESRT) (Vol.3, No. 3)Publication Date: 2014-03-30
Authors : T.Sathish; U.Muthaiah;
Page : 1093-1097
Keywords : Adversary; Anonymousrouting; Mobile Adhoc Networks; Mobility;
Abstract
In hostile environments, the adversary can launch traffic analysis against intercept able routing information embedded in routing messages and data packets. The adversaries on tracing network routes and inferring the mobility pattern of nodes during the routing of packets may pose a serious threat to covert operations. Mobile Ad Hoc Networks (MANETs) use anonymous routing protocols that hide node identities and/or routes from outside observers in order to provide anonymity protection. The anonymous routing protocols can be applied to different network models with different mobility patterns. By means of route anonymity, adversaries cannot trace a packet flow back to its source or destination, either on the route or out of the route and no node has information about the real identities and locations of intermediate nodes in route. The various anonymous routing protocols are reviewed and performance of such protocols can be compared and evaluated using ns2 simulations of a well-known routing protocol to achieve better route anonymity.
Other Latest Articles
- A STUDY OF EFFECT OF COPPER(II)-COMPLEX(CU-BHBH) ON THE PHOTODEGRADATION OF POLYSTYRENE FILMS
- WATER HOLE INFLUENCE ON DISTRIBUTION AND BEHAVIOUR OF LARKS IN KUWAIT FOR SPECIES COMPOSITION AND ABUNDANCE
- THE IMPACT PRICES AND SOME FACTORS ON MAIZE PRODUCTION IN WASIT GOVERNORATE ?AN ECONOMETRICS STUDY
- STUDY OF RADON LEVELS IN DWELLINGS OF NASIRIYA, THIQAR (IRAQ) AND DETERMINATION OF THE ANNUAL EFFECTIVE DOSE USING SOLID STATENUCLEAR TRACK DETECTORS (SSNTD) TECHNIQUE
- AQUA MEDIATED NOVEL, ONE-POT, CATALYST-FREE AND ECONOMICALLY EFFICIENT SYNTHESIS OF FUNCTIONALIZED 2-AMINOTHIAZOLES
Last modified: 2014-05-20 21:46:33