Anonymity Protection in MANETs By Zone Partitioning

Size: px
Start display at page:

Download "Anonymity Protection in MANETs By Zone Partitioning"

Transcription

1 Anonymity Protection in MANETs By Zone Partitioning Shruti Mariappa Hosmani M. Tech. Scholar, Department of CSE, VTU RO, PG Centre College, Gulbarga, India Dr. Shubhangi D.C Professor & HOD, Department of CSE, VTU RO, PG Centre College, Gulbarga, India Shailaja.Shastri Asst Professor, Department of CSE, PDA College of Engineering, Gulbarga, India Abstract Anonymous routing protocols play a vital role in MANETs in order to provide secure communications by concealing the identity of the nodes and avoiding traffic analysis assail from exterior observers. So, my project focuses on providing anonymity protection to data sources, destination and route, by concealing the node s identity and location which means that it should be tough enough for other nodes to obtain its real identity and exact location of the sender and the receiver. Mobile Ad hoc Networks (MANETs) use anonymous routing protocol where as the earlier routing protocols concentrated on concealing the node identity and/or routes from outside observers by using hop-by-hop encryption method or redundant traffic in order to provide anonymity protection, but it was not that highly secure and it incurred much cost for encrypting each and every node and timing attack and intersection attack prevailed. So, the proposed algorithm i.e., an Anonymous Location Based Efficient Routing Protocol (ALERT) which uses hierarchical zone partitioning process to overcome all the aforementioned problems & also overcomes intersection & timing attacks and reduces the cost to a greater extent & enforcing higher security, ALERT offers anonymity protection to all the three i.e. source, destination & route anonymity which was not possible by earlier used protocols. Keywords- Anonymity; GPSR; Mobile Adhoc Networks; Routing protocol; Security. I. INTRODUCTION A mobile ad-hoc network (MANET) is a self-configuring infrastructure less network of mobile devices connected by wireless links. Ad-hoc is Latin and means "for this purpose". In this era, mobile ad hoc wireless network is being recognized by network industry in recent years as practical media, and it becomes an important issue for network communication in terms of minimum infrastructure as well as economic part. Mobile ad hoc wireless network technology has developed very fast now days, which increases the use of communications in certain applications, battlefield, academic, business, education, entertainment, Bluetooth, Wi-Fi, and general packet radio service etc. All mobile nodes in ad hoc network are communicated with each other directly or through intermediate nodes by using routing protocols algorithm. The goal of using routing protocols in MANET is to discover and establish routes between two nodes in order to send the data packets from the source to destination and to provide secure communications between two ends in the network with low cost. Due to its receptiveness and deconcentrate features of MANETs, it is usually not desirable for nodes to be a member of that network. Nodes in MANETs are susceptible to vicious entities that aim to tamper and analyze data and traffic analysis by communication earwig or attacking routing protocol. Anonymity protection is critical in military applications (e.g., soldier communication). Consider a MANET deployed in a battlefield. Through traffic analysis, enemies may intercept transmitted packets, track our soldiers (i.e., nodes), attack the commander nodes, and block the data transmission by comprising relay nodes (RN), thus putting us at a tactical disadvantage. It is important to form an anonymous path between the two end points and make sure that nodes on the way do not get to know where the end points are. Anonymous routing protocols play a vital role in MANETs in order to provide secure communications by concealing the identity of the nodes and avoiding traffic analysis assail from exterior observers. In order to provide anonymity protection to data sources, destination and route, by concealing the node s identity and location which means that it should be tough enough for other nodes to obtain its real identity and exact location of the sender and the receiver. In case of route anonymity opponents either en route or out of route, no node will be having the information regarding the real identity and location of intermediate nodes en route and they cannot trace back the flow of packet to the source and destination. In MANET limited resource constraint is an integral problem in which nodes labour under an energy constraint. Due to complex routing and resource constraint problem in MANET which impose strict limit on system capacity. Existing IJTEL, ISSN: , VOL.3, NO.4, AUGUST

2 anonymous routing protocol focuses on hop-by-hop encryption[2][3][4][5][6] and redundant traffic[7][8] [9] [10][11][12][13], which uses public key based encryption and high traffic generate high cost, they are also resilient to timing attack and intersection attack. For example: SDDR [14] cannot provide route anonymity, ZAP[13] only focuses on destination anonymity and ALARM cannot protect the location anonymity of source and destination. Many approaches could not provide all the aforementioned anonymity protections. So, in order to provide high anonymity protection at low cost and to overcome from timing and intersection attack. So, the proposed algorithm that used is Anonymous Location-based and efficient routing protocol (ALERT) II. REVIEW OF LITERATURE SURVEY A. Jinyang li john jannotti et al In this paper the author uses GLS( geographic location service) which has the potential to dramatically simplify the deployment of data networks. For most part this potential has not been fulfilled. Most recent wireless networks use costly wired infrastructure for all but the final hop. Therefore ad hoc can fulfill this potential because they are easy to deploy, they require no infrastructure & configure themselves automatically, but previous ad hoc techniques do not usually scale well to large network. Here author has presented mobile ad hoc networking protocol with significantly better properties than previous protocols. In many ways two facets of our system, geographic forwarding & the GLS, operate in fundamentally similar ways. Geographic forwarding moves packets along paths that bring them closer to the destination in physical space. GLS moves packets along paths bring them closer to the destination in ID space, using only information about nodes with nearby IDs at each step along the path. Both mechanisms are scalable because they only need local information in their respective spaces. B. Adrian Perrig, Ran Canetti, Dawn Song et al. Here the author has used efficient scheme called TSLA which is based on initial loose time synchronization between the sender and the receivers, followed by delayed release of keys by the sender. This paper proposes several significant modifications and improvements to TESLA. One modification allows receivers to authenticate most packets as soon as they arrive, other modification improve the scalability of the scheme, reduce the space overhead for multiple instances, increase its resistance to denial-of-service attacks. The extensions proposed in this paper are The basic TESLA scheme provides delayed authentication with additional information in apacke, they also show how we can provide immediate authentication. Reduce the communication overhead when multiple TESLA instances with different authentication delays are used concurrently. Drive a tight cover bound on the disclosure delay. Harden the sender & the receiver against denial of service attacks. C. Tracy camp, Jeff Boleng et al In this paper the author have presented a survey of mobility models that are used in the simulations of ad hoc networks. Here author describes several mobility models that represent mobile nodes whose movements are independent of each other & several mobility models that represent mobile nodes whose movements are dependent on each other. The goal of this paper is to present a number of mobility models in order to offer researchers more informed choices when they are deciding upon a mobility model to use in their performance evaluation. D. Yin-Chun Hu, David B. Johnson All the previous adhoc network routing protocols have been assumed a trusted environment. Here in this paper author designs & evaluate the secure efficient ad hoc Distance vector routing protocol(sead), a secure ad hoc network routing protocol based on the design of the destination sequence Distance vector routing protocol. In order to support use with nodes of limited CPU processing capability & to guard against DOS attacks in which a attacker attempts to cause other nodes to consume excess network bandwidth or processing time, here they have used efficient one-way hash functions & do not use asymmetric cryptographic operations in he protocol. SEAD is robust against multiple unco-ordinated attackers creating incorrect routing state in any active attackers or compromised nodes in the network. Consequently, SEAD is efficient & can be used in networks of computation & bandwidth constraint nodes. E. Seonho choi Here author has introduced a multicast authentication scheme for real-time streaming applications that is resistant to denial-of-service attacks & consumes much less resources(cpu and Buffer) at receivers. This scheme uses prediction hashing(ph) and one-way key chain(okc) technique based on erasure codes & distillation codes. PH and OKC techniques enable the receivers to significantly reduce the CPU overhead & buffer requirements compared to other block-based approach. The basic idea of prediction hashing is that each block of packets convey authentication information that will be used authenticate the next block packets instead of sending te authentication information within the same block. One-way key chain technique is already used in other contexts such as in one-time password TESLA. F. Yin-Chun Hu and Adrian perrig et al In this paper the author presented the design & evaluation of Ariadne, a new secure ad hoc network routing protocol. Ariadne provides security against one compromised node & arbitrary active attackers, and relies only on efficient symmetric cryptographic operations. Here they have found that source routing facilitates securing adhoc network routing protocols. Source routing empowers the sender to circumvent potentially malicious nodes, & enables the sender to authenticate every node in a ROUTE REPLY. Such finegrained path control is absent in most distance-vector routing protocols, which makes such protocols more challenging to fully secure. G. Mohamed F.Mokbel, Chi-Yin Chow, Walid G.Aref Here the author presents casper, a framework in which users entertain anonymous location-based services. Casper consists of two main components the location anonymizer that IJTEL, ISSN: , VOL.3, NO.4, AUGUST

3 blurs the users exact location into cloaked spatial regions and the privacy aware query processor that is responsible on providing location-based service based on the cloaked spatial regions. Drawback is that it incurs to blur each and every node location identity and it takes time even to pass the message to destination because it has to cross all the nodes. H. Tomasz Ciszkowski, Zbigniew Kotulski In this paper the author has provided a mechanism concealing a real identity of communicating nodes with an ability of resist to known attacks. Here end-to-end anonymous authentication is conducted in three-pass handshake based on an asymmetric and symmetric key cryptography. The proposed protocol consists of two complementary modules. First is in charge of anonymous authentication, establishing and maintaining bidirectional routes form source to the destination whereas second one monitors activity of nodes being along the existing or discovering path and evaluate their reputation. The process of mutual and anonymous authentication is based on the public-key cryptography and is conducted in three-pass handshake. First phase is aimed to initialize a discovery path from source S to destination D node. Node S and D know their public-keys with related pseudonyms which are distributed during network setup by trusted authority TA. Device S broadcasts a request of discovery path to node D without revealing its identity. Every node is obligated to relay this message through the entire network, in particular delivering it to the destination D. In the same way every node saves the reverse path form D to S. Node D verifies the validity of received message and if succeeds in second phase prepares and unicastly sends response to source node S using already created reverse path. The reply message travels hop-by-hop to the node S. When this message gets to the legitimate node S then its authenticity is verified. Successfully finished two phases determine bidirectional path from S to D. Generally, it is acceptable to establish several paths between nodes S and D (e.g. in order to increase performance of network), however initializing node S may choose only a subset of offered by D paths taking into account its preferences according to reputation system. This is done in former, confirmation phase of handshake. Supplementary, node D generates key material for session keys, one for every path, used by symmetric cryptography algorithms, thereby securing established data path. Here author has presented his work only on initialization and maintenance of the network model rather than sending the message. I. Zhenqiang Gong, Guang-Zhong sun, Xing Xie The study on earliaer paper showed that location-detection devices together with ubiquitous connectivity have enabled a large variety of location based services(lbs). Traditional K- anonymity method needs complex query processing algorithms at the server side. Space twist which rectifies the above short coming of traditional K-anonymity since it only requires incremental nearest neighbour(inn) queries processing techniques at the server side. However space twist may fail because it cannot guarantee K-anonymity. In this paper the author has proposed framework called KAWCR(K-anonymity without cloaked region), rectifies the shortcomings and retains the advantages of the above two techniques. KAWCK only needs the server to process INN queries and can guarantee that the users issuing the query is indistinguishable from atleast K-1 other users. The extensive experimental results show that the communication cost of KWCR for KNN queries is lower than that of both traditional K-anonymity and space twist. J. Balaji.S, Manicka Prabha.M In this paper the author uses B.A.T.M.A.N along with Attribute Based Encryption to achieve the security and to accomplish rapid transmission which is a routing protocol that maintains the best hop information in its routing table. To accomplish secured communication secret key is generated using attribute based encryption technique.to obtain fast transmission BATMAN routing scheme is used. Drawback: It maintains the details of only the best next hop and also incurs high cost to encrypt each and every node. III. PROBLEM DEFINITION The ALERT routing protocol is a light weight protocol, so it does not provide a heavy authentication against adversary attacks. Due to its nature there could be a delay in transmitting data. Hop-by-hop encryption incurs much cost, time to send data will also be more, it is not highly secure. If we use hop-byhop encryption timing attack and intersection attack prevails. So, an ALERT routing protocol is used to overcome all the aforementioned problems. IV. PROPOSED SYSTEM: In order to provide high anonymity protection (for sources, destination, and route) with low cost, we propose an Anonymous Location-based and Efficient Routing protocol (ALERT). ALERT dynamically partitions a network field into zones and randomly chooses nodes in zones as intermediate relay nodes, which form a non traceable anonymous route. In each routing step, a data forwarder partitions the network field in order to separate itself and the destination into two zones. It then randomly chooses a node in the other zone as the next relay node and uses the GPSR algorithm to send the data to the relay node. In the last step, the data is broadcasted to k nodes in the destination zone, providing k-anonymity to the destination. In addition, ALERT has a strategy to hide the data initiator among a number of initiators to strengthen the anonymity protection of the source. ALERT is also flexible enough to overcome intersection attacks and timing attacks. Advantages of Proposed System: Route anonymity, identity, and location anonymity of source and destination is provided by ALERT. Rather than relying on hop-by-hop encryption and redundant traffic, ALERT mainly uses randomized routing of one message copy to provide anonymity protection. Because of the non fixed routing path in MANETs, ALERT also overcomes from intersection and timing attack. Comprehensive experiments are conducted to evaluate ALERT s performance in comparison with other anonymous protocols IJTEL, ISSN: , VOL.3, NO.4, AUGUST

4 A. NETWORKS AND ATTACK MODELS ALERT protocol can hold for different network models with various node movement patterns such as random way point model and group mobility model. Attacks Message s sender may be revealed by merely exposing the transmission direction. Therefore sender also needs protection of anonymity. A malicious observer may also try to detect destination nodes through traffic analysis by launching an intersection attack. Therefore destination node also needs protection of anonymity. The attackers can be battery powered nodes, they can be powerful nodes that pretend to be legitimate nodes & inject packets to the networks according to the analytical results from their eavesdropped packets. B. ALERTs GROUPING PROCEDURE TO MAINTAIN HIGH ANONYMITY PROTECTION Here in ALERT routing protocol we are avoiding hop-byhop encryption by grouping the nodes under zones hence by grouping the nodes under zones the cost of encrypting of each and every node is reduced to a greater extent, high security for every node is attained because nodes are grouped under zones and the whole zone is encrypted using secret key, and Intersection attack and timing attack are also overcome by zone partitioning process. Figure 2. Routing Among Zones In ALERT The zone having k nodes where D is present in destination zone, which is denoted as Zd. K- To control degree of anonymity protection. The zone in which destination symbol resides as shown in the figure is the destination zone. In ALERT routing, each data source or forwarder executes the hierarchical zone partition. It first checks whether itself and destination are in the same zone. If so, it divides the zone alternatively in the horizontal and vertical directions. The node repeats this process until itself and zd are not in the same zone. It then randomly chooses a position in the other zone called temporary destination (TD), and uses the GPSR routing algorithm to send the data to the node closest to TD. Fig. shows an example of routing in ALERT. in which nodes are randomly disseminated. ALERT features a dynamic and unpredictable routing path, which consists of a number of dynamically determined intermediate relay nodes as shown in figure below: the Figure 1. Data Flow Diagram Of ALERT Grouping Procedure C. THE ALERT ROUTING ALGORITHM Assume that the entire network area is a rectangle in shape and nodes in it are randomly scattered figure below Figure 3. Example Of Different Zone Partitions. As shown in the above figure ALERT uses a hierarchical zone partitioning process and randomly chooses a node in the partitioned zone in each step as an intermediate relay node(i.e., data forwarder), thus it dynamically generates an unpredictable routing path for a message. As shown in the Fig.4.2, given an area, by horizontally partitioning it into two zones A1 and A2 and then vertically partitioning zone A1 to B1 and B2. After IJTEL, ISSN: , VOL.3, NO.4, AUGUST

5 that, again horizontally partition zone B2 into two zones. Such zone partitioning consecutively splits the smallest zone in an alternating horizontal and vertical manner. This partitioning process is called hierarchical zone partition. Given an S-D pair, the partition pattern in ALERT varies depending on the randomly selected TDs and the order of horizontal and vertical division, which provides a better anonymity protection. Fig.4.2, shows one possible routing paths for a packet pkt issued by sender S targeting destination D in ALERT. There are also many other possible paths. In the above figure routing flow, data source S first horizontally divides the area into two zones that are equal in size, A1 and A2, in order to separate S and ZD. S then randomly chooses the first temporary destination TD1 in zone A1 where ZD is present. Then, S relies on GPSR to send pkt to TD1. The pkt is forwarded by many relay nodes until reaching a node that cannot find a neighbor closer to TD1. This is the node that is considered to be the first random-forwarder RF1. After RF1 receives pkt, it then vertically divides the region A1 into regions B1 and B2 so that ZD and itself are separated in two different zones. Then, RF1 randomly selects the next temporary destination TD2 and uses GPSR to send pkt to TD2. This process is repeated until a packet receiver finds itself residing in ZD, i.e., a partitioned zone is ZD having k nodes. Then, the node broadcasts the pkt to the k nodes. In our anaysis, we assume that entire network area is a rectangle with side lengths and and the entire area is partitioned H times to produce a K-anonymity destination zone. We introduce two functions to calculate the two side lengths of the hth partitioned zone. is anonymous middleware working between network layer and application layer[9]. Hop-by-hop authentication is used to prevent adversaries from participating in the routing to ensure route anonymity. MASK[32] topological routing uses neighbourhood authentication in routing path discovery to ensure that the discovered route consists of legitimate nodes & are anonymous to attackers. In GPSR[3] nodes encrypt their location updates and send location updates to the location server. VI. RESULTS Figure 4. Generation Of Nodes In the above figure all the clients holding red color are nodes, the server part is shown in cream colour box, under the view group detail we can view which are all the node added under which group and view label indicates the status of the message that is sent and view multicast keys displays group secret key The side lengths of the destination zone after H partitions are and. Above figure shows the example of three partitions of the entire network area. The side lengths of the final zone after the 3 partitions are =0.5 =0.25 V. RELATED WORK By the different usage of topological information, they can be classified into on-demand or reactive routing methods and proactive routing methods[8][32][33][34] [3][4][11][10]. There Figure 5. Adding Nodes Under Groups i.e Zones To Provide High Security. In the above figure we are adding the clients under the groups after that it asks and confirms whether to join or quit the node from the group. Due to this grouping of nodes under zones, hop-by-hop encryption is not needed for each and every node, hence cost is reduced and the nodes are securely encrypted under zones and the data is securely routed. IJTEL, ISSN: , VOL.3, NO.4, AUGUST

6 Figure 9. Keys Are Generated For Each Group Figure 6. Send The Encrypted Data The above figure depicts that it first browses the file that it wants to send and then it selects the group that it wants to send, after that encrypts the data that is selected and then presses the send button to send the data, its data encryption code will be displaying on the console when it is sent. The above figure depicts that as and when the nodes are added under groups and encrypted data is sent, secret keys are generated for each group in order to decrypt the data that is sent to server, this is where we are avoiding hop-by-hop encryption by using group key to encrypt the nodes added under zone in order to provide high security and to reduce the cost and time incurred in hop-by-hop encryption of each and every node Figure 7. Encrypted data is sent After adding all the nodes under zones the clients that are added are turned to green color and the encrypted data that is sent is tick marked as you can see in the figure above Figure 10. Decryption Takes Place By Using The Secret Key Of The Group Figure 8. We can see address of the data that we have sent. In continuation with figure 7 when the data is sent by the nodes/ clients under group A we can see the same address appears on the client A and client D as that on the server part which is under key server management module. Figure 11. After Doing The Message That Was Sent Is Seen In The Console The above figure depicts that the encrypted file that was sent to the server for which we were able to see only the address of the file on that cream colour server part now after complete decryption process the whole file that was sent is visible on the console. IJTEL, ISSN: , VOL.3, NO.4, AUGUST

7 VII. CONCLUSION In MANETs due to high mobility of nodes and nodes are scattered. It is highly important to provide protection for the nodes. The anonymity protection used by earlier protocols was hop-by-hop encryption or redundant traffic which was too complex to be provided and which incurred heavy cost. So, we propose a modification over the protocols like ZAP, SDDR, ALARM to our new protocol ALERT which uses zone partitioning to hide node identities and overcomes from intersection attack and timing attack and also reduces cost to a greater extent and it is much easier compared to earlier protocols and more importantly it offers protection to all the three areas i.e. source, destination and route anonymity. REFERENCES [1] A. Pfitzmann, M. Hansen, T. Dresden, and U. Kiel, Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management a Consolidated Proposal for Terminology, Version 0.31, technical report, [1]. [2] K.E. Defrawy and G. Tsudik, ALARM: Anonymous Location- Aided Routing in Suspicious MANETs, Proc. IEEE Int l Conf. Network Protocols (ICNP), 2007.[5] [3] K. El-Khatib, L. Korba, R. Song, and G. Yee, Anonymous Secure Routing in Mobile Ad-Hoc Networks, Proc. Int l Conf. Parallel Processing Workshops (ICPPW), 2003.[14]. [4] X. Wu, J. Liu, X. Hong, and E. Bertino, Anonymous Geo- Forwarding in MANETs through Location Cloaking, IEEE Trans. Parallel and Distributed Systems, vol. 19, no. 10, pp , Oct [13]. [5] J. Raymond, Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems, Proc. Int l Workshop Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability (WDIAU), pp , 2001.[16]. [6] Z. Zhi and Y.K. Choong, Anonymizing Geographic Ad Hoc Routing for Preserving Location Privacy, Proc. Third Int l Workshop Mobile Distributed Computing (ICDCSW), 2005.[3] [7] V. Pathak, D. Yao, and L. Iftode, Securing Location Aware Services over VANET Using Geographical Secure Path Routing, Proc. IEEE Int l Conf. Vehicular Electronics and safety (ICVES), 2008.[4]. [8] I. Aad, C. Castelluccia, and J. Hubaux, Packet Coding for Strong Anonymity in Ad Hoc Networks, Proc. Securecomm and Workshops, 2006.[8]. [9] Ke Liu s NS2 Code, research/ns2code/index.html, [10] X. Wu, AO2P: Ad Hoc On-Demand Position-Based Private Routing Protocol, IEEE Trans. Mobile Computing, vol. 4, no. 4, pp , July/Aug [10]. [11] B. Zhu, Z. Wan, M.S. Kankanhalli, F. Bao, and R.H. Deng, Anonymous Secure Routing in Mobile Ad-Hoc Networks, Proc. IEEE 29th Ann. Int l Conf. Local Computer Networks (LCN), 2004.[11]. [12] Y. Zhang, W. Liu, and W. Luo, Anonymous Communications in Mobile Ad Hoc Networks, Proc. IEEE INFOCOM, 2005[32]. [13] J. Kong, X. Hong, and M. Gerla, ANODR: Anonymous on Demand Routing Protocol with Untraceable Routes for Mobile Ad-Hoc Networks, Proc. ACM MobiHoc, pp , 2003[33]. [14] L. Yang, M. Jakobsson, and S. Wetzel, Discount Anonymous On Demand Routing for Mobile Ad Hoc Networks, Proc. Securecomm and Workshops, 2006 [34] IJTEL, ISSN: , VOL.3, NO.4, AUGUST

Design and Development of Anonymous Zone Based Partitioning and Routing Protocol in MANETS (AZPR)

Design and Development of Anonymous Zone Based Partitioning and Routing Protocol in MANETS (AZPR) Design and Development of Anonymous Zone Based Partitioning and Routing Protocol in MANETS (AZPR) Ayeesha Siddiqha 1, Arshad Khan 2 1 Assistant Professor, Malnad College of Engineering, Hassan, India 2

More information

Providing Security and Energy Management in Location Based Routing of Manet s

Providing Security and Energy Management in Location Based Routing of Manet s Providing Security and Energy Management in Location Based Routing of Manet s Suprita Sambranikar 1, Prathima S D 2 1 Final Year M.Tech Dept. Of ECE, BTL Institute Of Technology And Management, Bangalore,

More information

SHARP : Secured Hierarchical Anonymous Routing Protocol for MANETs

SHARP : Secured Hierarchical Anonymous Routing Protocol for MANETs SHARP : Secured Hierarchical Anonymous Routing Protocol for MANETs Remya S MTech, Network Engineering Department of Information Technology Rajagiri School of Engineering and Technology remya.sasidharanpillai@yahoo.com

More information

Energy Aware and Anonymous Location Based Efficient Routing Protocol

Energy Aware and Anonymous Location Based Efficient Routing Protocol Energy Aware and Anonymous Location Based Efficient Routing Protocol N.Nivethitha 1, G.Balaji 2 1 PG student, 2 Asst.Professor Department of Electronics and Communication Engineering Angel College of Engineering

More information

LERP: A Secure Location Based Efficient Routing Protocol

LERP: A Secure Location Based Efficient Routing Protocol LERP: A Secure Location Based Efficient Routing Protocol Rajan Gandhi #1, Prof Prasanna Joeg * 2 # PG Research Scholar, Department of Computer Science Engineering Vishwakarma Institute of Technology, Pune

More information

Keywords ALERT,anonymity protection,blackhole attacks,r-alert

Keywords ALERT,anonymity protection,blackhole attacks,r-alert Volume 4, Issue 8, August 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Reputation Based

More information

Anonymous Privacy-Preserving Routing In Location Based Dynamic Ad-Hoc Networks

Anonymous Privacy-Preserving Routing In Location Based Dynamic Ad-Hoc Networks Anonymous Privacy-Preserving Routing In Location Based Dynamic Ad-Hoc Networks G.Gokila 1, Mrs.F.Salma Rosline Mary, M.E 2., P.Karthikeyan 3, Mr.A.Suresh Babu,M.E. 4 M.E. Applied Electronics, JJ College

More information

II. PROBLEM STATEMENT & DEFINITION: Existing anonymity routing protocols in MANETs can be mainly classified into two categories: hop-by-hop

II. PROBLEM STATEMENT & DEFINITION: Existing anonymity routing protocols in MANETs can be mainly classified into two categories: hop-by-hop Volume 5, Issue 6, June 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Unidentified

More information

Strongly Anonymous Communications in Mobile Ad Hoc Networks

Strongly Anonymous Communications in Mobile Ad Hoc Networks Strongly Anonymous Communications in Mobile Ad Hoc Networks Y.Dong 1, V.O.K.Li 1, S.M.Yiu 2 and C.K.Hui 2 Dept. of Electrical and Electronic Engineering, the University of Hong Kong 1 Dept. of Computer

More information

PIONEER RESEARCH & DEVELOPMENT GROUP

PIONEER RESEARCH & DEVELOPMENT GROUP An Efficient Location Based Anonymous Routing Protocol For ADHOC Networks J.Kirubhakaran 1, Dr.G.K.D.PrasannaVenkatesan 2, R.Muthusuganya 3 Assistant Professor 1, Vice Principal, Professor and Head 2,Post

More information

International Journal of Advance Research in Computer Science and Management Studies

International Journal of Advance Research in Computer Science and Management Studies Volume 3, Issue 8, August 2015 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack J.Anbu selvan 1, P.Bharat 2, S.Mathiyalagan 3 J.Anand 4 1, 2, 3, 4 PG Scholar, BIT, Sathyamangalam ABSTRACT:

More information

Privacy Protection over Network Communication in Manet

Privacy Protection over Network Communication in Manet Privacy Protection over Network Communication in Manet 1 Dr.K.Rajangam., Head of EEE Department, SCAD Institute of Technology 2 Ms.L.Dhanam, Assistant Professor Department of Computer Science & Engineering,

More information

Reliable Broadcast Message Authentication in Wireless Sensor Networks

Reliable Broadcast Message Authentication in Wireless Sensor Networks Reliable Broadcast Message Authentication in Wireless Sensor Networks Taketsugu Yao, Shigeru Fukunaga, and Toshihisa Nakai Ubiquitous System Laboratories, Corporate Research & Development Center, Oki Electric

More information

A New Energy Efficient and Scalable Multicasting Algorithm for Hierarchical Networks

A New Energy Efficient and Scalable Multicasting Algorithm for Hierarchical Networks International Journal of Engineering Research and Development ISSN: 2278-067X, Volume 1, Issue 5 (June 2012), PP.12-17 www.ijerd.com A New Energy Efficient and Scalable Multicasting Algorithm for Hierarchical

More information

SECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS

SECURED KEY MANAGEMENT ALGORITHM FOR DATA TRANSMISSION IN MOBILE ADHOC NETWORKS International Journal of Electronics and Communication Engineering and Technology (IJECET) Volume 7, Issue 6, November-December 2016, pp. 96 100, Article ID: IJECET_07_06_014 Available online at http://www.iaeme.com/ijecet/issues.asp?jtype=ijecet&vtype=7&itype=6

More information

Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network

Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network Source Anonymous Message Authentication and Source Privacy using ECC in Wireless Sensor Network 1 Ms.Anisha Viswan, 2 Ms.T.Poongodi, 3 Ms.Ranjima P, 4 Ms.Minimol Mathew 1,3,4 PG Scholar, 2 Assistant Professor,

More information

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM

TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM R.Bhuvaneswari 1, V.Vijayalakshmi 2 1 M.Phil., Scholar, Bharathiyar Arts And Science College For Women, India 2 HOD

More information

Challenges in Mobile Ad Hoc Network

Challenges in Mobile Ad Hoc Network American Journal of Engineering Research (AJER) e-issn: 2320-0847 p-issn : 2320-0936 Volume-5, Issue-5, pp-210-216 www.ajer.org Research Paper Challenges in Mobile Ad Hoc Network Reshma S. Patil 1, Dr.

More information

Keywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing.

Keywords Mobile Ad hoc Networks, Multi-hop Routing, Infrastructure less, Multicast Routing, Routing. Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Study on Various

More information

A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET

A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET Bhagyashri Thakre 1, Archana Raut 2 1 M.E. Student, Mobile Technology, G H Raisoni College of Engineering, Nagpur, India 2 Assistant

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

Anonymization Mechanism for Privacy-Preserving Location Monitoring System in WSN

Anonymization Mechanism for Privacy-Preserving Location Monitoring System in WSN Anonymization Mechanism for Privacy-Preserving Location Monitoring System in WSN D.Gayathri 1, Abdul Vahed 2 1 Student,M.Tech (CSE), 2 Assistant Professor,CSE Department, Sri Sunflower college of Engineering

More information

MITIGATING DENIAL OF SERVICE ATTACKS IN OLSR PROTOCOL USING FICTITIOUS NODES

MITIGATING DENIAL OF SERVICE ATTACKS IN OLSR PROTOCOL USING FICTITIOUS NODES MITIGATING DENIAL OF SERVICE ATTACKS IN OLSR PROTOCOL USING FICTITIOUS NODES 1 Kalavathy.D, 2 A Gowthami, 1 PG Scholar, Dept Of CSE, Salem college of engineering and technology, 2 Asst Prof, Dept Of CSE,

More information

COOPERATIVE DATA SHARING WITH SECURITY IN VEHICULAR AD-HOC NETWORKS

COOPERATIVE DATA SHARING WITH SECURITY IN VEHICULAR AD-HOC NETWORKS COOPERATIVE DATA SHARING WITH SECURITY IN VEHICULAR AD-HOC NETWORKS Deepa B 1 and Dr. S A Kulkarni 2 1 IV Sem M. Tech, Dept of CSE, KLS Gogte Institute of Technology, Belagavi deepa.bangarshetru@gmail.com

More information

EZR: Enhanced Zone Based Routing In Manet

EZR: Enhanced Zone Based Routing In Manet EZR: Enhanced Zone Based Routing In Manet Bency Wilson 1, Geethu Bastian 2, Vinitha Ann Regi 3, Arun Soman 4 Department of Information Technology, Rajagiri School of Engineering and Technology, Rajagiri

More information

SECURE ROUTING PROTOCOLS IN AD HOC NETWORKS

SECURE ROUTING PROTOCOLS IN AD HOC NETWORKS SECURE ROUTING PROTOCOLS IN AD HOC NETWORKS INTRODUCTION 1. With the advancement in radio technologies like Bluetooth, IEEE 802.11or Hiperlan, a new concept of networking has emerged, known as ad hoc networks,

More information

Secure Key Sharing in Mobile Ad hoc Network using Content Invisibility Scheme

Secure Key Sharing in Mobile Ad hoc Network using Content Invisibility Scheme Secure Key Sharing in Mobile Ad hoc Network using Content Invisibility Scheme A. JEGATHEESAN Assistant Professor, Department of Information Technology Cape Institute of Technology, Levengipuram, Tamilnadu

More information

Introduction to Mobile Ad hoc Networks (MANETs)

Introduction to Mobile Ad hoc Networks (MANETs) Introduction to Mobile Ad hoc Networks (MANETs) 1 Overview of Ad hoc Network Communication between various devices makes it possible to provide unique and innovative services. Although this inter-device

More information

Overview of Challenges in VANET

Overview of Challenges in VANET Overview of Challenges in VANET Er.Gurpreet Singh Department of Computer Science, Baba Farid College, Bathinda(Punjab), India ABSTRACT VANET are becoming active area of research and development because

More information

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network

Detection and Removal of Black Hole Attack in Mobile Ad hoc Network Detection and Removal of Black Hole Attack in Mobile Ad hoc Network Harmandeep Kaur, Mr. Amarvir Singh Abstract A mobile ad hoc network consists of large number of inexpensive nodes which are geographically

More information

Efficient and Secure Source Authentication for Multicast

Efficient and Secure Source Authentication for Multicast Efficient and Secure Source Authentication for Multicast Authors: Adrian Perrig, Ran Canetti Dawn Song J. D. Tygar Presenter: Nikhil Negandhi CSC774 Network Security Outline: Background Problem Related

More information

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS

PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS PRIVACY AND TRUST-AWARE FRAMEWORK FOR SECURE ROUTING IN WIRELESS MESH NETWORKS 1 PRASHANTH JAYAKUMAR, 2 P.S.KHANAGOUDAR, 3 VINAY KAVERI 1,3 Department of CSE, GIT, Belgaum, 2 Assistant Professor, Dept.

More information

Subject: Adhoc Networks

Subject: Adhoc Networks ISSUES IN AD HOC WIRELESS NETWORKS The major issues that affect the design, deployment, & performance of an ad hoc wireless network system are: Medium Access Scheme. Transport Layer Protocol. Routing.

More information

A REVIEW PAPER ON DETECTION AND PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK

A REVIEW PAPER ON DETECTION AND PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK A REVIEW PAPER ON DETECTION AND PREVENTION OF WORMHOLE ATTACK IN WIRELESS SENSOR NETWORK Parmar Amish 1, V.B. Vaghela 2 1 PG Scholar, Department of E&C, SPCE, Visnagar, Gujarat, (India) 2 Head of Department

More information

Pseudonym Based Security Architecture for Wireless Mesh Network

Pseudonym Based Security Architecture for Wireless Mesh Network IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 4, Ver. VII (Jul Aug. 2014), PP 01-05 Pseudonym Based Security Architecture for Wireless Mesh Network

More information

Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report

Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report Effective Cluster Based Certificate Revocation with Vindication Capability in MANETS Project Report Mandadapu Sravya M.Tech, Department of CSE, G. Narayanamma Institute of Technology and Science. Ch.Mandakini

More information

A Review on Black Hole Attack in MANET

A Review on Black Hole Attack in MANET A Review on Black Hole Attack in MANET Gourav Ahuja 1, Mrs. Sugandha 2 1 Department of Computer Science and Engineering, VCE, Rohtak, Haryana (India) 2 Asst. Prof., Department of Computer Science and Engineering,

More information

Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks

Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks Ensuring Trustworthiness and Security during Data Transmission in Multihop Wireless Networks 1 S.Nandhini, 2 Mr.S.Franson Varun Richo, 1 PG Student, 2 Assistant professor, Francis Xavier Engineering college,

More information

Performance Evaluation of MANET through NS2 Simulation

Performance Evaluation of MANET through NS2 Simulation International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 25-30 International Research Publication House http://www.irphouse.com Performance Evaluation

More information

Anonymous Routing in Ad-hoc Networks

Anonymous Routing in Ad-hoc Networks Mercedes Rodríguez-García (mrodriguezgarci@uoc.edu) Helena Rifà-Pous (hrifa@uoc.edu) Universitat Oberta de Catalunya Working Paper Working Paper Series WP00-000 Research group: K-ryptography and Information

More information

Security Issues In Mobile Ad hoc Network Routing Protocols

Security Issues In Mobile Ad hoc Network Routing Protocols Abstraction Security Issues In Mobile Ad hoc Network Routing Protocols Philip Huynh phuynh@uccs.edu Mobile ad hoc network (MANET) is gaining importance with increasing number of applications. It can be

More information

Packet Estimation with CBDS Approach to secure MANET

Packet Estimation with CBDS Approach to secure MANET Packet Estimation with CBDS Approach to secure MANET Mr. Virendra P. Patil 1 and Mr. Rajendra V. Patil 2 1 PG Student, SSVPS COE, Dhule, Maharashtra, India 2 Assistance Professor, SSVPS COE, Dhule, Maharashtra,

More information

International Journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online

International Journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online RESEARCH ARTICLE ISSN: 2321-7758 DESIGN AND IMPLEMENTATION OF ADVANCED SECURE INTRUSION DETECTION SYSTEM FOR MANETS SAYYED MUSADDIQUE 1, S.S.HIPPARGI 2, ATTAR SHUAIB 3 1,2,3 Department of Electronics and

More information

International Journal of Advance Engineering and Research Development. Improved OLSR Protocol for VANET

International Journal of Advance Engineering and Research Development. Improved OLSR Protocol for VANET Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 4, Issue 11, November -2017 Improved OLSR Protocol for VANET Ravi Shrimali

More information

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs

Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Study and Comparison of Mesh and Tree- Based Multicast Routing Protocols for MANETs Rajneesh Gujral Associate Proffesor (CSE Deptt.) Maharishi Markandeshwar University, Mullana, Ambala Sanjeev Rana Associate

More information

Survey on Traffic Pattern Discovery System For MANETs

Survey on Traffic Pattern Discovery System For MANETs Survey on Traffic Pattern Discovery System For MANETs Sanchali S. Pandhare 1 PG student, Department of Computer Science & engineering, Pankaj Laddhad Institute of Technology & Management Studies, Buldana.

More information

Reducing End to End per Packet Energy Consumption

Reducing End to End per Packet Energy Consumption Reducing End to End per Packet Energy Consumption N.Annapurna #1, M.V.Vijaya saradhi *2 # PG Scholar, Department of IT, Aurora s Engineering College, Bhongir, Andhra Pradesh, India # HOD, Department of

More information

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model

Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model Simulation and Analysis of AODV and DSDV Routing Protocols in Vehicular Adhoc Networks using Random Waypoint Mobility Model 1 R. Jeevitha, 2 M. Chandra Kumar 1 Research Scholar, Department of Computer

More information

Routing Protocols in MANET: Comparative Study

Routing Protocols in MANET: Comparative Study Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 7, July 2014, pg.119

More information

Defenses against Wormhole Attack

Defenses against Wormhole Attack Defenses against Wormhole Attack Presented by: Kadhim Hayawi, ID: 20364216 COURSE PRESENTATION FOR ECE750 - INTELLIGENT SENSORS AND SENSOR NETWORKS Prof. Otman A. Basir Outline Introduction Packet Leashes

More information

A Novel Secure Routing Protocol for MANETs

A Novel Secure Routing Protocol for MANETs 22 A Novel Secure Routing Protocol for MANETs Zhongwei Zhang University of Southern Queensland Australia 1. Introduction Ad hoc networks is a special kind of wireless network mode. A mobile ad hoc network

More information

Review:- EN-efficient Approaches for MANETs in Rushing Attacks

Review:- EN-efficient Approaches for MANETs in Rushing Attacks Review:- EN-efficient Approaches for MANETs in Rushing Attacks Rashmi Vishwakarma Sumit Dhariwal Mohmmed.Imran Deptt.Of CSE Deptt.Of CSE HOD,Deptt.Of CSE JNCT Rewa M.P, India SIRTE Bhopal M.P, India JNCT

More information

EFFICIENT AND PRIVACY-AWARE DATA AGGREGATION IN MOBILE SENSING

EFFICIENT AND PRIVACY-AWARE DATA AGGREGATION IN MOBILE SENSING EFFICIENT AND PRIVACY-AWARE DATA AGGREGATION IN MOBILE SENSING E. PRAGANAVI 1,A. GAYATHRI 2 12 Assistant Professor, 12 Department of Computer Science, UCE OU, Hyderabad, Telangana, India. Abstract: - Mobile

More information

Introduction and Statement of the Problem

Introduction and Statement of the Problem Chapter 1 Introduction and Statement of the Problem 1.1 Introduction Unlike conventional cellular wireless mobile networks that rely on centralized infrastructure to support mobility. An Adhoc network

More information

BUSNet: Model and Usage of Regular Traffic Patterns in Mobile Ad Hoc Networks for Inter-Vehicular Communications

BUSNet: Model and Usage of Regular Traffic Patterns in Mobile Ad Hoc Networks for Inter-Vehicular Communications BUSNet: Model and Usage of Regular Traffic Patterns in Mobile Ad Hoc Networks for Inter-Vehicular Communications Kai-Juan Wong, Bu-Sung Lee, Boon-Chong Seet, Genping Liu, Lijuan Zhu School of Computer

More information

Sybil Attack Detection in Mobile Adhoc Network

Sybil Attack Detection in Mobile Adhoc Network Sybil Attack Detection in Mobile Adhoc Network 469 1 Yamini D. Malkhede, 2 Purnima Selokar 1 Department of CSE, G. H. Raisoni Institute of Engineering &Technology for Women, Nagpur, Maharashtra, India

More information

Detection and Localization of Multiple Spoofing Attackers in Wireless Networks Using Data Mining Techniques

Detection and Localization of Multiple Spoofing Attackers in Wireless Networks Using Data Mining Techniques Detection and Localization of Multiple Spoofing Attackers in Wireless Networks Using Data Mining Techniques Nandini P 1 Nagaraj M.Lutimath 2 1 PG Scholar, Dept. of CSE Sri Venkateshwara College, VTU, Belgaum,

More information

International Journal of Advanced Engineering Research and Science (IJAERS) [Vol-1, Issue-2, July 2014] ISSN:

International Journal of Advanced Engineering Research and Science (IJAERS) [Vol-1, Issue-2, July 2014] ISSN: Cluster Based Id Revocation with Vindication Capability for Wireless Network S. Janani Devi* *Assistant Professor, ECE, A.S.L.Pauls College of Engineering and Technology, Tamilnadu, India ABSTRACT: The

More information

A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network

A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network ShriRam College of Engineering & Management 1 A Review of Reactive, Proactive & Hybrid Routing Protocols for Mobile Ad Hoc Network M.Ramaiya Rohit Gupta Rachit Jain Head,Dept. Computer Science Dept. Computer

More information

Eradication of Vulnerable host from N2N communication Networks using probabilistic models on historical data

Eradication of Vulnerable host from N2N communication Networks using probabilistic models on historical data Volume 117 No. 15 2017, 1087-1094 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu Eradication of Vulnerable host from N2N communication Networks using

More information

Spatial Cloaking algorithm for location privacy preservation.

Spatial Cloaking algorithm for location privacy preservation. International Journal of Scientific & Engineering Research, Volume 5, Issue 4, April-2014 619 Spatial Cloaking algorithm for location privacy preservation. Suchita R. Shastry, Dr. A. B. Bagwan, Department

More information

Secure and Efficient Routing Mechanism in Mobile Ad-Hoc Networks

Secure and Efficient Routing Mechanism in Mobile Ad-Hoc Networks Secure and Efficient Routing Mechanism in Mobile Ad-Hoc Networks Masroor Ali 1, Zahid Ullah 2, Meharban Khan 3, Abdul Hafeez 4 Department of Electrical Engineering, CECOS University of IT and Emerging

More information

A Survey on Traffic Pattern Discovery in Mobile Ad hoc Network

A Survey on Traffic Pattern Discovery in Mobile Ad hoc Network 25 A Survey on Traffic Pattern Discovery in Mobile Ad hoc Network 1 Priyanka Sen, 2 Vaishali Sahare 1 Department of Computer Science and Engineering, RTMNU, G.H Raisoni Institute of Engineering and Technology

More information

Middle in Forwarding Movement (MFM): An efficient greedy forwarding approach in location aided routing for MANET

Middle in Forwarding Movement (MFM): An efficient greedy forwarding approach in location aided routing for MANET Middle in Forwarding Movement (MFM): An efficient greedy forwarding approach in location aided routing for MANET 1 Prashant Dixit* Department of CSE FET, Manavrachna international institute of research

More information

Figure 1. Clustering in MANET.

Figure 1. Clustering in MANET. Volume 6, Issue 12, December 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance

More information

International Journal of Advance Research in Computer Science and Management Studies

International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 10, October 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

Nearest Neighbor Query in Location- Aware Mobile Ad-Hoc Network

Nearest Neighbor Query in Location- Aware Mobile Ad-Hoc Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,

More information

A Centralized Approaches for Location Management in Personal Communication Services Networks

A Centralized Approaches for Location Management in Personal Communication Services Networks A Centralized Approaches for Location Management in Personal Communication Services Networks Fahamida Firoze M. Tech. (CSE) Scholar, Deptt. Of CSE, Al Falah School of Engineering & Technology, Dhauj, Faridabad,

More information

Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network

Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network Dr.S.Senthil Kumar,Assistant Professor, Dept of Electrical and Electronics Engineering, Government College of Engineering, Salem,India

More information

Key establishment in sensor networks

Key establishment in sensor networks Security and Cooperation in Wireless Networks http://secowinet.epfl.ch/ key types; establishment of link keys using a shortterm master key; random key predistribution: - the basic scheme, and - some improvements;

More information

AODV Routing Protocol in MANET based on Cryptographic Authentication Method

AODV Routing Protocol in MANET based on Cryptographic Authentication Method IJCSET October 2012 Vol 2, Issue 10, 1459-1464 www.ijcset.net ISSN:2231-0711 AODV Routing Protocol in MANET based on Cryptographic Authentication Method Thandu Naga Srinu Padma CSE,Sri Sunflower College

More information

Implementation of AODV Protocol and Detection of Malicious Nodes in MANETs

Implementation of AODV Protocol and Detection of Malicious Nodes in MANETs Implementation of AODV Protocol and Detection of Malicious Nodes in MANETs Savithru Lokanath 1, Aravind Thayur 2 1 Department of Electronics & Communication Engineering, DayanandaSagar College of Engineering,

More information

CASER Protocol Using DCFN Mechanism in Wireless Sensor Network

CASER Protocol Using DCFN Mechanism in Wireless Sensor Network Volume 118 No. 7 2018, 501-505 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu CASER Protocol Using DCFN Mechanism in Wireless Sensor Network A.Shirly

More information

Catching BlackHole Attacks in Wireless Sensor Networks

Catching BlackHole Attacks in Wireless Sensor Networks Catching BlackHole Attacks in Wireless Sensor Networks Ashish M 1 and Mr. Jason Martis 2 1 M. Tech, Department Of ISE, NMAM Institute of Technology, Nitte 2 Asst. Prof, Department Of ISE, NMAM Institute

More information

Survey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud

Survey Paper on Efficient and Secure Dynamic Auditing Protocol for Data Storage in Cloud Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

Ad-hoc Trusted Information Exchange Scheme for Location Privacy in VANET

Ad-hoc Trusted Information Exchange Scheme for Location Privacy in VANET Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 1, January 2015,

More information

A Secure Routing Protocol for Wireless Adhoc Network Creation

A Secure Routing Protocol for Wireless Adhoc Network Creation Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.88

More information

[Kamboj* et al., 5(9): September, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116

[Kamboj* et al., 5(9): September, 2016] ISSN: IC Value: 3.00 Impact Factor: 4.116 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY NOVEL REVIEW OF MANET ROUTING PROTOCOLS Nippun Kamboj*, Dr. Munishwar Rai Department of Computer Applications Maharishi Markandeshwar

More information

Secure Routing for Mobile Ad-hoc Networks

Secure Routing for Mobile Ad-hoc Networks Department of Computer Science IIT Kanpur CS625: Advanced Computer Networks Outline 1 2 3 4 Outline 1 2 3 4 Need Often setting up an infrastructure is infeasible Disaster relief Community networks (OLPC)

More information

Survey on Location Based Routing Protocols in MANET

Survey on Location Based Routing Protocols in MANET Survey on Location Based Routing Protocols in MANET Vivek Nikam, Prof. G.T. Chavan Sinhgad College of engineering, University of Pune Abstract- Due to the infrastructure less and dynamic nature of mobile

More information

Key establishment in sensor networks

Key establishment in sensor networks Key establishment in sensor networks -- introduction to wireless sensor networks -- needed key types -- LEAP -- random key pre-distribution (c) Levente Buttyán (buttyan@crysys.hu) Wireless sensor networks

More information

Survey on Multicast Routing Protocols in MANETs

Survey on Multicast Routing Protocols in MANETs Survey on Multicast Routing Protocols in MANETs A Viswanath, Dept of CSE, Sree Vidyanikethan Engineering College, Tirupati, AP, India. N Papanna, M.Tech, Assistant Professor, Sree Vidyanikethan Engineering

More information

Performance Evaluation of Various Routing Protocols in MANET

Performance Evaluation of Various Routing Protocols in MANET 208 Performance Evaluation of Various Routing Protocols in MANET Jaya Jacob 1,V.Seethalakshmi 2 1 II MECS,Sri Shakthi Institute of Science and Technology, Coimbatore, India 2 Associate Professor-ECE, Sri

More information

Efficient Authentication and Congestion Control for Vehicular Ad Hoc Network

Efficient Authentication and Congestion Control for Vehicular Ad Hoc Network Efficient Authentication and Congestion Control for Vehicular Ad Hoc Network Deivanai.P 1, K.Sudha 2, K.Radha 3 Department of CSE, Muthayammal Engineering College, Rasipuram, India 1 Assistant Professor,

More information

DYNAMIC DATA ROUTING IN MANET USING POSITION BASED OPPORTUNISTIC ROUTING PROTOCOL

DYNAMIC DATA ROUTING IN MANET USING POSITION BASED OPPORTUNISTIC ROUTING PROTOCOL INTERNATIONAL JOURNAL OF RESEARCH IN COMPUTER APPLICATIONS AND ROBOTICS ISSN 2320-7345 DYNAMIC DATA ROUTING IN MANET USING POSITION BASED OPPORTUNISTIC ROUTING PROTOCOL P. Kalaivani 1, G. Sathya 2, N.

More information

Performance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks

Performance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks Performance Of OLSR Routing Protocol Under Different Route Refresh Intervals In Ad Hoc Networks P.Suganthi Research Scholar Mother Teresa Women s University Kodaikanal, TamilNadu, India Dr.A.Tamilarasi

More information

Routing Protocols in Mobile Ad-Hoc Network

Routing Protocols in Mobile Ad-Hoc Network International Journal of Computer Science & Management Studies, Vol. 12, Issue 02, April 2012 Protocols in Mobile Ad-Hoc Network Sachin Minocha M. Tech Student, Vaish College of Engineering, Rohtak, Haryana

More information

Mobile Ad Hoc Networks: Basic Concepts and Research Issues

Mobile Ad Hoc Networks: Basic Concepts and Research Issues Mobile Ad Hoc s: Basic Concepts and Research Issues Ing. Alessandro Leonardi aleonardi@dieei.unict.it Wireless s Generations (1/3) Generation 1G 2G 2.5G 3G 4/5G Time 1980s 1990s Late1990s 2000s (2010 full

More information

ISSN Vol.04,Issue.05, May-2016, Pages:

ISSN Vol.04,Issue.05, May-2016, Pages: WWW.IJITECH.ORG ISSN 2321-8665 Vol.04,Issue.05, May-2016, Pages:0737-0741 Secure Cloud Storage using Decentralized Access Control with Anonymous Authentication C. S. KIRAN 1, C. SRINIVASA MURTHY 2 1 PG

More information

Ad Hoc Routing Protocols and Issues

Ad Hoc Routing Protocols and Issues Ad Hoc Routing Protocols and Issues Stefano Basagni ECE Dept Northeastern University Boston, Jan 2003 Ad hoc (AD-HAHK or AD-HOKE)-Adjective a) Concerned with a particular end or purpose, and b) formed

More information

BISS: Building secure routing out of an Incomplete Set of Security associations

BISS: Building secure routing out of an Incomplete Set of Security associations BISS: Building secure routing out of an Incomplete Set of Security associations Srdjan Čapkun and Jean-Pierre Hubaux Secure routing in ad hoc networks - Common assumptions for secure routing: - a network

More information

Efficient Message Caching Scheme for MANET

Efficient Message Caching Scheme for MANET Efficient Message Caching Scheme for MANET S. Manju 1, Mrs. K. Vanitha, M.E., (Ph.D) 2 II ME (CSE), Dept. of CSE, Al-Ameen Engineering College, Erode, Tamil Nadu, India 1 Assistant Professor, Dept. of

More information

Wormhole Attack in Wireless Ad-Hoc Networks

Wormhole Attack in Wireless Ad-Hoc Networks Wormhole Attack in Wireless Ad-Hoc Networks Yahya Ghanbarzadeh, Ahmad Heidari, and Jaber Karimpour Abstract Wormhole attack is a severe attack in wireless ad-hoc networks. To establish a wormhole attack,

More information

Proactive Approach for Cooperative Caching in Mobile Adhoc Networks

Proactive Approach for Cooperative Caching in Mobile Adhoc Networks IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 3, No 8, May 2010 21 Proactive Approach for Cooperative Caching in Mobile Adhoc Networks Prashant Kumar 1, Naveen Chauhan 2, LK Awasthi

More information

Performance Metrics of MANET in Multi-Hop Wireless Ad-Hoc Network Routing Protocols

Performance Metrics of MANET in Multi-Hop Wireless Ad-Hoc Network Routing Protocols Performance Metrics of MANET in Multi-Hop Wireless Ad-Hoc Network Routing Protocols R.Devi, B.Sumathi, T.Gandhimathi, G.Alaiyarasi 1 st year, M.Tech (Software Engineering), Department of Information Technology,

More information

A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs

A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs A Neighbor Coverage Based Probabilistic Rebroadcast Reducing Routing Overhead in MANETs Ankita G. Rathi #1, Mrs. J. H. Patil #2, Mr. S. A. Hashmi #3 # Computer Science-Information Technology Department,

More information

The Novel HWN on MANET Cellular networks using QoS & QOD

The Novel HWN on MANET Cellular networks using QoS & QOD The Novel HWN on MANET Cellular networks using QoS & QOD Abstract: - Boddu Swath 1 & M.Mohanrao 2 1 M-Tech Dept. of CSE Megha Institute of Engineering & Technology for Women 2 Assistant Professor Dept.

More information

Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1

Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1 Enhancing the Performance of Mobile Ad Hoc Networks with the Aid of Internet Gateways 1 Shiv Mehra and Chansu Yu Department of Electrical and Computer Engineering Cleveland State University E-mail: {s.mehra,c.yu91}@csuohio.edu

More information

Routing Protocol Based Shared and Session Key Exchange Protocol for Wireless Mobile Ad-hoc Network

Routing Protocol Based Shared and Session Key Exchange Protocol for Wireless Mobile Ad-hoc Network Routing Protocol Based Shared and Session Key Exchange Protocol for Wireless Mobile Ad-hoc Network Md. Golam Kaosar Victoria University, Australia golam.kaosar@vu.edu.au Abstract Mobile Ad-hoc Network

More information