CFP last date
20 January 2025
Reseach Article

Enhancing Privacy Preservation using S-ALERT Protocol to Diminish Routing Attacks in MANETs

by Pooja P. Borekar, Nilav Muhkerjee
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 117 - Number 19
Year of Publication: 2015
Authors: Pooja P. Borekar, Nilav Muhkerjee
10.5120/20663-3392

Pooja P. Borekar, Nilav Muhkerjee . Enhancing Privacy Preservation using S-ALERT Protocol to Diminish Routing Attacks in MANETs. International Journal of Computer Applications. 117, 19 ( May 2015), 22-27. DOI=10.5120/20663-3392

@article{ 10.5120/20663-3392,
author = { Pooja P. Borekar, Nilav Muhkerjee },
title = { Enhancing Privacy Preservation using S-ALERT Protocol to Diminish Routing Attacks in MANETs },
journal = { International Journal of Computer Applications },
issue_date = { May 2015 },
volume = { 117 },
number = { 19 },
month = { May },
year = { 2015 },
issn = { 0975-8887 },
pages = { 22-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume117/number19/20663-3392/ },
doi = { 10.5120/20663-3392 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:59:50.056688+05:30
%A Pooja P. Borekar
%A Nilav Muhkerjee
%T Enhancing Privacy Preservation using S-ALERT Protocol to Diminish Routing Attacks in MANETs
%J International Journal of Computer Applications
%@ 0975-8887
%V 117
%N 19
%P 22-27
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

An innominate communication method in MANETS is categorized into proactive method, re-active method and anonymous routing method. Re-active routing is further divided into two methods, which includes superfluous traffic and routing hop-by-hop encryption. Whereas MANETs has various choices in respect to anonymous routing protocols, to provide location innominate safety to information, source node and destination node. However, a previous innominate routing protocol fully depends on station by station encryption or superfluous traffic which generates a heavy cost and offer low anonymity protection. Hence to offer a very high innominate protection, S-ALERT is pro-posed. Basic idea behind S-ALERT is to divide the whole network into number of nodes and then allocate each node a unique Id, so that we can differentiate source node and destination node. Followed by dynamic partition of network into zones and then randomly choosing nodes in zones as random forwarder, which forms a non trace-able innominate route. Along with, it also hides the source/destination node among many source/destination, in order to give very high safety to source node and destination node. It is observed that S-ALERT gives better as compared to other protocols. Hence S-ALERT protocol achieves full anonymity protection and that to at very least cost.

References
  1. Y. Zhang, W. Liu, and W. Luo, "Anonymous Communications in Mobile Ad Hoc Networks," Proc. IEEE INFOCOM, 2005.
  2. J. Kong, X. Hong, and M. Gerla, "ANODR: Anonymous on Demand Routing Protocol with Untraceable Routes for Mobile Ad-Hoc Networks," Proc. ACM MobiHoc, pp. 291-302, 2003.
  3. Sk. Md. M. Rahman, M. Mambo, A. Inomata, and E. Okamoto, "An Anonymous On-Demand Position-Based Routing in Mobile Ad Hoc Networks," Proc. Int'l Symp. Applications on Internet (SAINT), 2006.
  4. Z. Zhi and Y. K. Choong, "Anonymizing Geographic Ad Hoc Routing for Preserving Location Privacy," Proc. Third Int'l Workshop Mobile Distributed Computing (ICDCSW), 2005.
  5. K. E. Defrawy and G. Tsudik, "ALARM: Anonymous Location- Aided Routing in Suspicious MANETs," Proc. IEEE Int'l Conf. Network Protocols(ICNP), 2007.
  6. K. E. Defrawy and G. Tsudik, "PRISM: Privacy-Friendly Routing in Suspicious MANETs (and VANETs)," Proc. IEEE Int'l Conf. Network Protocols (ICNP), 2008.
  7. X. Wu, "AO2P: Ad Hoc On-Demand Position-Based Private Routing Protocol," IEEE Trans. Mobile Computing, vol. 4, no. 4, pp. 335-348, July/Aug. 2005.
  8. C. -C. Chou, D. S. L. Wei, C. -C. Jay Kuo, and K. Naik, "An Efficient Anonymous Communication Protocol for Peer-to-Peer Applications over Mobile Ad-Hoc Networks," IEEE J. Selected Areas in Comm. , vol. 25, no. 1, pp. 192-203, Jan. 2007.
  9. I. Aad, C. Castelluccia, and J. Hubaux, "Packet Coding for Strong Anonymity in Ad Hoc Networks," Proc. Securecomm and Workshops, 2006.
  10. V. Pathak, D. Yao, and L. Iftode, "Securing Location Aware Services over VANET Using Geographical Secure Path Routing," Proc. IEEE Int'l Conf. Vehicular Electronics and safety (ICVES), 2008.
  11. L. Zhao and H. Shen, "ALERT: An Anonymous Location-Based Efficient Routing Protocol in MANETs," Proc. Int'l Conf. Parallel Processing (ICPP), 2011.
  12. X. Wu, J. Liu, X. Hong, and E. Bertino, "Anonymous Geo-Forwarding in MANETs through Location Cloaking," IEEE Trans. Parallel and Distributed Systems, vol. 19, no. 10, pp. 1297-1309, Oct. 2008.
  13. X. Wu, J. Liu, X. Hong, and E. Bertino, "Anonymous Geo-Forwarding in MANETs through Location Cloaking," IEEE Trans. Parallel and Distributed Systems, vol. 19, no. 10, pp. 1297-1309, Oct. 2008.
  14. B. Zhu, Z. Wan, M. S. Kankanhalli, F. Bao, and R. H. Deng, "Anonymous Secure Routing in Mobile Ad-Hoc Networks," Proc. IEEE 29th Ann. Int'l Conf. Local Computer Networks (LCN), 2004.
  15. Z. Zhi and Y. K. Choong, "Anonymizing Geographic Ad Hoc Routing for Preserving Location Privacy," Proc. Third Int'l Workshop Mobile Distributed Computing (ICDCSW), 2005.
  16. A. R. Beresford and F. Stajano, "Mix Zones: User Privacy in Location-Aware Services," Proc. IEEE Second Ann. Conf. Pervasive Computing and Comm. Workshops (PERCOMW), 2004.
  17. J. Li, J. Jannotti, D. S. J. De, C. David, R. Karger, and R. Morris, "A Scalable Location Service for Geographic Ad Hoc Routing," Proc. ACM MobiCom, 2000.
  18. L. Yang, M. Jakobsson, and S. Wetzel, "Discount Anonymous On Demand Routing for Mobile Ad Hoc Networks," Proc. Securecomm and Workshops, 2006.
  19. Y. -C. Hu, D. B. Johnson, and A. Perrig, "SEAD: Secure Efficient Distance Vector Routing for Mobile Wireless Ad Hoc Networks," Proc. IEEE Workshop Mobile Computing Systems and Applications (WMCSA), 2002.
  20. A. Perrig, R. Canetti, D. Song, and J. D. Tygar, "Efficient and Secure Source Authentication for Multicast," Proc. Network and Distributed System Security Symp. (NDSS), 2001.
  21. T. Camp, J. Boleng, and V. Davies, "A Survey of Mobility Models for Ad Hoc Network Research," Wireless Communications and Mobile Computing, vol. 2, pp. 483-502, 2002.
  22. X. Hong, M. Gerla, G. Pei, and C. C. Chiang, "A Group Mobility Model for Ad Hoc Wireless Networks," Proc. Second ACM Int' Workshop Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM), 1999.
  23. K. El-Khatib, L. Korba, R. Song, and G. Yee, "Anonymous Secure Routing in Mobile Ad-Hoc Networks," Proc. Int'l Conf. Parallel Processing Workshops (ICPPW), 2003.
  24. G. Calandriello, P. Papadimitratos, J. -P. Hubaux, and A. Lioy,"Efficient and Robust Pseudonymous Authentication in VANET", Proc. ACM Intl Workshop Vehicular Ad Hoc Networks (VANET 07), pp. 19-28, Sept. 2007.
  25. E. Schoch, F. Kargl, T. Leinmu ller, S. Schlott, and P. Papadimitratos,"Impact of Pseudonym Changes on Geographic Ad Hoc Routing",Proc. Third European Workshop Security and Privacy in Ad Hoc and Sensor Networks (ESAS 06), vol. 4357, pp. 43-57, 2006.
  26. X. Wu,"DISPOSER: Distributed Secure Position Service in Mobile Ad Hoc Networks: Research Articles", Wireless Comm. and Mobile Computing, vol. 6, pp. 357-373, 2006.
  27. X. Hong, M. Gerla, G. Pei, and C. C. Chiang,"A Group Mobility Model for Ad Hoc Wireless Networks",Proc. Second ACM Intl Workshop Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM), 1999.
  28. (ISLPED), 2003. L. Sweeney,"k-Anonymity: A Model for Protecting Privacy",Intl J. Uncertainity Fuzziness Knowledge-Based Systems, vol. 10, no. 5,pp. 557-570, 2002.
  29. J. Li, J. Jannotti, D. S. J. De, D. S. J. De Couto, D. R. Karger, and R. Morris, "A Scalable Location Service for Geographic Ad Hoc Routing",Proc. ACM MobiCom, 2000.
  30. L. Y. Xue, B. Li, and K. Nahrstedt,"A Scalable Location Management Scheme in Mobile Ad-Hoc Networks",technical report, 2001 J. Li, J. Jannotti, D. S. J.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile-Ad-Network Anonymity Routing Protocols Zone Partitions Geographical Routing.