CFP last date
20 December 2024
Reseach Article

A Study of Efficient Anonymous Routing Protocols in MANET

by Anupriya Augustine, Jubin Sebastian E.
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 91 - Number 8
Year of Publication: 2014
Authors: Anupriya Augustine, Jubin Sebastian E.
10.5120/15898-4876

Anupriya Augustine, Jubin Sebastian E. . A Study of Efficient Anonymous Routing Protocols in MANET. International Journal of Computer Applications. 91, 8 ( April 2014), 1-7. DOI=10.5120/15898-4876

@article{ 10.5120/15898-4876,
author = { Anupriya Augustine, Jubin Sebastian E. },
title = { A Study of Efficient Anonymous Routing Protocols in MANET },
journal = { International Journal of Computer Applications },
issue_date = { April 2014 },
volume = { 91 },
number = { 8 },
month = { April },
year = { 2014 },
issn = { 0975-8887 },
pages = { 1-7 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume91/number8/15898-4876/ },
doi = { 10.5120/15898-4876 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:12:11.567831+05:30
%A Anupriya Augustine
%A Jubin Sebastian E.
%T A Study of Efficient Anonymous Routing Protocols in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 91
%N 8
%P 1-7
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Mobile Ad Hoc Network (MANET) is a type of wireless network without a fixed topology consist a set of self organized nodes which are randomly, frequently and unpredictably mobile. MANET has a wide range of applications in civilian and military systems because of its infrastructureless nature and rapid self configuration capability. MANET is an open environment and it is susceptible to many security attacks due to dynamic topology and lack of centralized monitoring authority. Anonymous routing protocols conceal the identities about the route, source and destination to provide security and privacy from intruder's attacks. This paper provides an overview of most efficient anonymous routing protocols in MANET and examines the security efficiency of these protocols. The parameters consider for the comparative study of these protocols are the number of actual participating nodes in the network, latency in packet transmission, packet delivery rate and the transmission cost. The protocols taken in to account include, AO2P, ALARM and ALERT.

References
  1. A. Pfitzmann and M. Hansen, "Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management - A Consolidated Proposal for Terminology," Tech. Rep. , February 2008.
  2. J. Kong, X. Hong, M. Y. Sanadidi, and M. Gerla, "Mobility Changes Anonymity: Mobile Ad Hoc Networks Need Efficient Anonymous Routing," in ISCC, 2005, pp. 57–62.
  3. Y. Zhang, W. Liu, W. Lou, and Y. Fang, "MASK: Anonymous Ondemand Routing in Mobile Ad Hoc Networks," IEEE Transactions on Wireless Communications, no. 9, 2006.
  4. L. Yang, M. Jakobsson, and S. Wetzel, "Discount Anonymous On Demand Routing for Mobile Ad Hoc Networks," SECURECOMM, vol. 6, 2006.
  5. K. El-Khatib, L. Korba, R. Song, and G. Yee, "Secure Dynamic Distributed Routing Algorithm for Ad Hoc Wireless Networks," ICPP Workshops, 2003, pp. 359–366.
  6. A. Boukerche, K. El-Khatib, L. Xu, and L. Korba, "SDAR: A Secure Distributed Anonymous Routing Protocol for Wireless and Mobile Ad Hoc Networks," IEEE LCN '04, 2004.
  7. B. Zhu, Z. Wan, M. S. Kankanhalli, F. Bao, and R. H. Deng, "Anonymous Secure Routing in Mobile Ad-Hoc Networks," LCN '04, 2004.
  8. R. Song, L. Korba, and G. Yee, "AnonDSR: Efficient Anonymous Dynamic Source Routing for Mobile Ad-hoc Networks," SASN '05, 2005, pp. 33–42.
  9. J. Kong and X. Hong, "ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks," MobiHoc '03, 2003.
  10. S. Seys and B. Preneel, "ARM: Anonymous Routing Protocol for Mobile Ad hoc Networks," AINA '06, 2006.
  11. Jiejun Kong, Xiaoyan Hong, "An Anonymous On Demand Routing Protocol with Untraceable Routes for Mobile Ad-hoc Networks", UCLA computer science department technical report 030020.
  12. Karim El Defrawy and Gene Tsudik," ALARM: Anonymous Location-Aided Routing in Suspicious MANETs", IEEE Transactions on Wireless Communications.
  13. Haiying Shen and Lianyu Zhao," ALERT: An Anonymous Location-Based Efficient Routing Protocol in MANETs", IEEE Transactions on Wireless Communications.
  14. T. Camp, J. Boleng, and V. Davies, "A Survey of Mobility Models for Ad Hoc Network Research," Wireless Communications and Mobile Computing, vol. 2, pp. 483-502, 2002.
  15. X. Hong, M. Gerla, G. Pei, and C. C. Chiang, "A Group Mobility Model for Ad Hoc Wireless Networks," Proc. Second ACM Int'l Workshop Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM), 1999.
  16. X. X. Wu and B. Bhargava, "AO2P: Ad Hoc On-Demand Position-Based Private Routing Protocol," IEEE Transactions on Mobile Computing, vol. 4, no. 4, pp. 335-348, July 2005.
  17. Gene Tsudik and Karim El Defrawy," ALARM: Anonymous Location-Aided Routing in Suspiciou ANETs", IEEE Transactions on Mobile Computing, Volume: 10, Issue: 9,September 2011
  18. Haiying Shen and Lianyu Zhao, "ALERT: An Anonymous Location-Based Efficient Routing Protocol in MANETs", IEEE Transactions on Mobile Computing, Vol. 12, NO. 6, June 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile Ad Hoc Networks security anonymity routing protocols.