Publication Type : Journal Article
Publisher : International journal of Engineering Sciences and Research Technology
Source : International journal of Engineering Sciences and Research Technology(IJESRT, 5.164,UGC Approved.
Campus : Chennai
School : School of Engineering
Department : Computer Science
Year : 2014
Abstract : In hostile environments, the adversary can launch t raffic analysis against intercept able routing info rmation embedded in routing messages and data packets. The adversaries on tracing network routes and inferring the mobility pattern of nodes during the routing of pac kets may pose a serious threat to covert operations . Mobile Ad Hoc Networks (MANETs) use anonymous routing protocols that hide node identities and/or routes from out side observers in order to provide anonymity protection. The anonymous routing protocols can be applied to different network models with different mobility patterns. By means of route anonymity, adversaries cannot trace a packet flow back to its source or destination, either on t he route or out of the route and no node has inform ation about the real identities and locations of intermediate nodes in route. The various anonymous routing protocols are reviewed and performance of such protocols can be compared and evaluated using ns2 simulations of a well-known routing protocol to achieve better route anonymity.
Cite this Research Publication : T. Sathish, U. Muthaiah, "Anonymity Set Location Privacy Scheme in Manet", International journal of Engineering Sciences and Research Technology(IJESRT, 5.164,UGC Approved. (2014)