Title :
Anonymous location aided secure routing protocol
Author :
Manjuladevi, V. ; Bharathi, R. Jennie
Author_Institution :
Dept. of ECE, Sri Krishna Coll. of Eng. & Technol., Coimbatore, India
Abstract :
Anonymous location schemes classified into reactive routing methods and proactive routing methods and anonymous middleware methods. Reactive routing methods includes hop by hop encryption and redundant traffic analysis which either generates high cost or cannot provide full anonymity to source, destination and routes. An Anonymous Location-based Efficient Routing protocol (ALERT) was used to offer high anonymity protection at a low cost. GPSR protocol is used to transmit message from source to destination. Like other anonymity routing algorithms, ALERT is not completely bulletproof to all attacks. To prevent occurrence of active attacks advanced cryptographic algorithm SHA-2 is used, which provides better security features. Thus it provides full anonymity in Source destination as well as in route.
Keywords :
cryptography; routing protocols; telecommunication security; telecommunication traffic; ALERT; GPSR protocol; SHA-2; anonymity protection; anonymous location scheme; anonymous location-based efficient routing protocol; anonymous middleware method; cryptographic algorithm; hop by hop encryption; proactive routing method; reactive routing method; redundant traffic analysis; secure routing protocol; Algorithm design and analysis; Mobile ad hoc networks; Routing; Routing protocols; Security; ALERT; Anonymity; GPSR; Secure Hash Algorithm;
Conference_Titel :
Information Communication and Embedded Systems (ICICES), 2014 International Conference on
Conference_Location :
Chennai
Print_ISBN :
978-1-4799-3835-3
DOI :
10.1109/ICICES.2014.7034099