Energy Level Aware Anonymous Location Based Efficient Routing Protocol

T. Sharath Chandra Kumar*, K. Sudha**
* ME Student, Department of Electronics and Communication Engineering, SreeVidyanikethan Engineering College, Tirupathi, A.P., India.
** Assistant Professor, Department of Electronics and Communication Engineering, SreeVidyanikethan Engineering College, Tirupathi, A.P., India
Periodicity:July - September'2014
DOI : https://doi.org/10.26634/jwcn.3.2.2875

Abstract

Anonymous routing protocols are used in Mobile Ad Hoc Networks (MANETs) to hide node identities and/or routes from outside observers in order to provide anonymity. There are routing protocols that depend on either hop by hop encryption or redundant traffic. All the existing anonymous routing protocols will either produce high cost or cannot produce fully fledged anonymity protection to sources, destinations and routes. The high cost aggravates the indigenous resource constraint problem in MANETs especially in multimedia wireless applications. The demerits of existing protocols leads the need of new and efficient protocol i.e., Anonymous routing protocol robust to node failure. Our proposed protocol dynamically divides the network field into zones and randomly chooses nodes in zones as intermediate relay nodes, which form a non-traceable anonymous route. And it hides the data sources/destinations among many sources/destinations to strengthen source and destination anonymity protection. Additionally, it chooses nodes which have sufficient energy to transmit the packets in order to avoid route failure and to increase route efficiency.

Keywords

Mobile ad hoc networks, anonymity, routing protocol, geographical routing.

How to Cite this Article?

Kumar, T.S.C., and Sudha, K. (2014). Energy Level aware Anonymous Location Based Efficient Routing Protocol. i-manager’s Journal on Wireless Communication Networks, 3(2), 17-27. https://doi.org/10.26634/jwcn.3.2.2875

References

[1]. L. Zhao and H. Shen, ( 2013). “ALERT: An Anonymous Location-Based Efficient Routing Protocol in MANETs,” Proc. Int'l Conf. Parallel Processing (ICPP), Vol. 12, No. 6, pp. 1079-1093.
[2]. A. Pfitzmann, M. Hansen, T. Dresden, and U. Kiel, (2005). “Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management a Consolidated Proposal for Terminology, Version 0.31,” Technical report,.
[3]. Z. Zhi and Y.K. Choong (2005), “Anonymizing Geographic Ad Hoc Routing for Preserving Location Privacy,” Proc. Third Int'l Workshop Mobile Distributed Computing (ICDCSW), Vol. 2, No. 3, pp. 210-218.
[4]. V. Pathak, D. Yao, and L. Iftode, (2008). “Securing Location Aware Services over VANET Using Geographical Secure Path Routing,” Proc. IEEE Int'l Conf. Vehicular Electronics and safety (ICVES).
[5]. K.E. Defrawy and G. Tsudik, (2007). “ALARM: Anonymous Location-Aided Routing in Suspicious MANETs,” Proc. IEEE Int'l Conf. Network Protocols (ICNP), Vol. 10, No. 9, pp. 1345-1358.
[6]. I. Aad, C. Castelluccia, and J. Hubaux, (2006). “Packet Coding for Strong Anonymity in Ad Hoc Networks,” Proc. Securecomm and Workshops.
[7]. X. Wu, (2005). “AO2P: Ad Hoc On-Demand Position- Based Private Routing Protocol,” IEEE Trans. Mobile Computing, Vol. 4, No. 4, pp. 335-348.
[8]. B. Zhu, Z. Wan, M.S. Kankanhalli, F. Bao, and R.H. Deng, (2004). “Anonymous Secure Routing in Mobile Ad- Hoc Networks,” Proc. IEEE 29th Ann. Int'l Conf. Local Computer Networks (LCN).
[9]. X. Wu, J. Liu, X. Hong, and E. Bertino, (2008). “Anonymous Geo-Forwarding in MANETs through Location Cloaking,” IEEE Trans. Parallel and Distributed Systems, Vol. 19, No. 10, pp. 1297-1309.
[10]. S. Ratnasamy, B. Karp, S. Shenker, D. Estrin, R. Govindan, L. Yin, and F. Yu, (2003). “Data-Centric Storage in Sensornets with GHT, a Geographic Hash Table,” Mobile Network Applications, Vol. 8, No. 4, pp. 427-442.
[11]. J. Raymond, (2001).“Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems,” Proc. Int'l Workshop Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability (WDIAU), pp. 10-29.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Online 15 15

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.