SlideShare a Scribd company logo
1 of 4
Download to read offline
International Journal of Computer Applications Technology and Research
Volume 2– Issue 6, 748 - 751, 2013

An Efficient Anonymous Location Service for
Geographic Ad Hoc Routing in MANET
Sathya.B

Umarani.S

Archana.S.S

Maharaja Engineering college

Maharaja Engineering college

R.V.S College of Engg. & Tech

Avinashi, TamilNadu,

Avinashi, TamilNadu

Coimbatore, TamilNadu

India

India

India

Rajeshwari.P

Sumathi.V.S

Maharaja Engineering college

Maharaja Engineering college

Avinashi, TamilNadu

Avinashi, TamilNadu

India

India

Abstract: Anonymous routing schemes in MANETs can be classified into on-demand or reactive routing methods, proactive
routing methods and anonymous middleware routing method. A finer classification of reactive routing methods includes hop-byhop encryption and redundant traffic routing which either generate high cost or cannot provide full anonymity protection to data
sources, destinations, and routes. An Anonymous Location-based Efficient Routing protocol (ALERT) was used to offer high
anonymity protection at a low cost. Like other anonymity routing algorithms, ALERT is not completely bulletproof to all attacks.
To prevent the occurrence of stronger and active attackers, we propose a Secure Cryptographic Based Mix-Zones Routing
Protocol (SCMIX).The idea for mix-zones is to prevent the adversary from accessing the content of messages, including the
Node's signatures. All legitimate nodes within the mix-zone obtain a symmetric key and utilize this key to encrypt all their
messages while within the zone.
Keywords: Anonymity, GPSR, Mix-Zone, Routing protocol, Zone Partition.

1. INTRODUCTION
A Mobile Ad Hoc Networks (MANET) is an autonomous
system of mobile nodes. It consists of mobile platforms for
example a router with multiple hosts and wireless
communications devices. Herein simply referred to as 'nodes'
which are free to move. It also may operate in isolation or may
have gateways to and interface with fixed network. There are
many important research questions in MANET. However, power
efficiency is one of the most important issues. It is important to
realize that issues such as QoS support, TCP performance, speed
of routing repair process and others are secondary if nodes have
a high probability of running out of energy resources.

addition, it hides the data initiator/receiver among many
initiators/receivers to strengthen source and destination
anonymity protection. Thus, ALERT offers anonymity
protection to sources, destinations, and routes. It also has
strategies to effectively counter intersection and timing attacks.
ALERT achieves better route anonymity protection and lower
cost compared to other anonymous routing protocols. Also,
ALERT achieves comparable routing efficiency to the GPSR
geographical routing protocol.

2. LITERATURE SURVEY

ALARM: Anonymous Location Aided Routing in Suspicious
MANETs [2] addresses a number of issues arising in suspicious
location-based MANET settings by designing and analyzing a
privacy-preserving and secure link-state based routing protocol
(ALARM). ALARM uses node‟s current locations to securely
disseminate and construct topology snapshots and forward data.
With the aid of advanced cryptographic techniques (e.g., group
signatures), ALARM provides both security and privacy
features, including node authentication, data integrity,
anonymity, and non-traceability (tracking-resistance). It also
offers protection against passive and active insider and outsider
attacks. It also offers resistance to certain insider attacks.

An Anonymous Location-based Efficient Routing protocol
(ALERT) [1] dynamically partitions the network field into zones
and randomly chooses nodes in zones as intermediate relay
nodes, which form a non-traceable anonymous route. In

Anonymous Geo Forwarding in MANETs through Location
Cloaking [3] addresses the problem of destination anonymity for
applications in mobile ad hoc networks where geographic
information is ready for use in both ad hoc routing and Internet

Energy awareness in wireless ad hoc networks actually spans
across several communication layers. Advances in battery
technology are very slow compared to the results achieved in
integrated circuit technology particularly in comparison to the
rate of growth in communication speeds. Therefore, saving
transmission power represents one of the most significant
methods for long term wireless system performance.

www.ijcat.com

748
International Journal of Computer Applications Technology and Research
Volume 2– Issue 6, 748 - 751, 2013
services and proposes protocols that use the destination position
to generate a geographic area called an anonymity zone (AZ). A
packet for a destination is delivered to all the nodes in the AZ,
which make up the anonymity set. The size of the anonymity set
may decrease because nodes are mobile, yet the corresponding
anonymity set management is simple. We design techniques to
further improve node anonymity and reduce communication
overhead.
In [4], Vehicular Networks (VNs) seek to provide, among other
applications, safer driving conditions. To do so, vehicles need to
periodically broadcast safety messages providing precise
position information to nearby vehicles. However, this frequent
messaging (e.g., every 100 to 300ms per car) greatly facilitates
the tracking of vehicles, as it suffices to eavesdrop the wireless
medium. As a result, the driver‟s privacy is at stake. In order to
mitigate this threat, while complying with the safety
requirements of VNs, we suggest the creation of mix-zones at
appropriate places of the VN. We propose to do so with the use
of cryptography, and study analytically how the combination of
mix-zones into mix-networks brings forth location privacy in
VNs. Finally, we show by simulations that the proposed mix
system is effective in various scenarios. Our results show that,
although the unlinkability of individual mix-zones can be
relatively low in some cases, the accumulated unlinkability of
the mix-networks is generally very high.
[5] Safety critical applications for recently proposed vehicle to
vehicle ad-hoc networks (VANETs) rely on a beacon signal,
which poses a threat to privacy since it could allow a vehicle to
be tracked. Mix-zones, where vehicles encrypt their
transmissions and then change their identifiers, have been
proposed as a solution to this problem. In this work, we describe
a formal analysis of mix-zones. We model a mix-zone and
propose a formal definition of privacy for such a zone. We give
a set of necessary conditions for any mix-zone protocol to
preserve privacy. We analyze, using the tool ProVerif, a
particular proposal for key distribution in mix-zones, and the
CMIX protocol.

In ALERT, each and every data source or forwarder executes
the hierarchical zone partition. It first checks whether itself and
destination are in the same zone. If both are in same zone, it
divides the zone alternatively in the horizontal and vertical
directions. This process is repeated until itself and ZD are not in
the same zone. It then randomly chooses a position in the other
zone called temporary destination (TD), and uses the GPSR
routing algorithm to send the data to the node closest to TD.
This node is defined as a random forwarder (RF). ALERT aims
at achieving k-anonymity for destination node D, where k is a
predefined integer. Thus, in the last step, the data are
broadcasted to k nodes in ZD, providing k-anonymity to the
destination.

As shown in Figure. 1, the given area is vertically partitioned
into two zones X1 and X2. We then horizontally partition zone
X1 to Y1 and Y2. After that, we vertically partition zone Y2 into
two zones. This type of zone partitioning consecutively splits the
smallest zone in an alternating vertical and horizontal manner.
This partition process is known as hierarchical zone partition.
ALERT uses the hierarchical zone partition. In each step, it
randomly chooses a node in the partitioned zone as an
intermediate relay node which is called data forwarder, thus
dynamically generating an unpredictable routing path for a
message. The zone with k nodes where D exists is called as the
destination zone which is denoted as ZD. k is used to control the
degree of anonymity protection for the destination.

www.ijcat.com

RF1

RF1

Y1
RF2

X1

X2

S

X1
Y2

S

D

D

D

S

X1

S X2

Y1

Z1
Z2

S X2

..............

Figure. 1 Hierarchical Zone Partitions

3. EXISTING METHOD
3.1 ALERT Routing Algorithm
ALERT uses dynamic Hierarchical Zone Partition. It
dynamically partitions a network field into zones and randomly
chooses nodes in zone as intermediate relay nodes. This
intermediate relay node forms non traceable anonymous route. It
uses the GPSR algorithm to send the data to the relay node.

D

D

3.2 Destination Zone Position
We use ZD rather than D is to avoid exposure of D. Zone
position refers to the upper left and bottom-right coordinates of a
zone. There may be problem occur to find the position of ZD,
which is needed by each packet forwarder to check whether it is
separated from the destination after a partition and whether it
resides in ZD. Let H denote the total number of partitions in
order to produce ZD. H is calculated by

where

G is the size of the entire network area
k is the number of nodes in ZD
ρ is the node density

749
International Journal of Computer Applications Technology and Research
Volume 2– Issue 6, 748 - 751, 2013

3.3 Source Anonymity
ALERT aims to achieve the anonymity by restricting a node‟s
view only to its neighbors and constructing the same initial and
forwarded messages. This makes it difficult for an intruder to
tell if a node is a source or a forwarding node. To strengthen the
anonymity protection of the source nodes, we further propose a
lightweight mechanism called “notify and go”. The idea behind
“notify and go” is a number of nodes send out packets at the
same time as S in order to hide the source packet among many
other packets.
“Notify and go” has two phases: “notify” and “go.” In the first
“notify” phase, S piggybacks its data transmission notification
with periodical update packets to notify its neighbors that it will
send out a packet. The packet includes two random back-off
time periods, t and t0. In the “go” phase, S and its neighbors
wait for a certain period of randomly chosen time €[t,t+t0]
before sending out messages.
S‟s neighbors generate only several bytes of random data just in
order to cover the traffic of the source. T should be a small value
that does not affect the transmission latency. A long t0 may lead
to a long transmission delay while a short t0 may result in
interference due to many packets being sent out simultaneously.
Thus, t0 should be long enough to minimize interference and
balance out the delay between S and S‟s farthest neighbor in
order to prevent any intruder from discriminating S.

3.4 Strategies against Attacks
ALERT has strategies to effectively counter intersection and
timing attacks.

3.4.1 Timing Attacks
In timing attacks, an intruder can identify the packets
transmitted between S and D through packet departure and
arrival times. From this observation, the attacker can detect S
and D. For example, two nodes A and B communicate with each
other at an interval of 4 seconds. After a long observation time,
the intruder finds that A‟s packet sending time and B‟s packet
receiving time have a fixed five second difference such as
(16:00:56, 16:01:00) and (12:08:33, 12:08:37). Then, the
intruder would guess that A and B are communicating with each
other. Avoiding the exhibition of interaction between
communication nodes is a way to counter timing attacks.
In ALERT, the “notify and go” mechanism and the broadcasting
in ZD both put the interaction between S-D into two sets of
nodes to obfuscate intruders. Also, the routing path between a
given S-D and the communication delay (i.e., time stamp)
change constantly. This again keeps an intruder from identifying
the S and D.

3.4.2 Counter Intersection Attacks
In an intersection attack, an attacker may have the information
about active users at a given time through repeated observations.
The attacker with this information can determine the sources and
destinations that communicate with each other. Though ALERT
offers k-anonymity to D, an intersection attacker can still
identify D from repeated observations of node movement and
communication if D always stays in ZD during a transmission
session. This is because as long as D is conducting
communication, the attacker can monitor the change of the
members in the destination zone containing D. As time elapses
and nodes move, all other members may move out of the
www.ijcat.com

destination zone except D. As a result, D is identified as the
destination because it always appears in the destination zone.
Figure. 2. a). is the status of a ZD after a packet is broadcasted to
the zone. The arrows show the moving directions of nodes. We
can see that nodes a, b, c, d, and D are in ZD. Figure. 2. b) is the
subsequent status of the zone the next time a packet is
transmitted between the same S-D pair. This time, nodes d, e, f,
g, and D are in ZD. Since the intersection of the in-zone nodes in
both figures includes d and D, D could be identified by the
attacker. Therefore, the longer an attacker watches the process,
the easier it is to identify the destination node.

a)

b)

c)

Figure. 2 Intersection Attack and Solution

To counter the intersection attack, ZAP dynamically enlarges
the range of anonymous zones to broadcast the messages or
minimizes communication session time. However, the former
strategy increases the communication overhead, while the latter
may not be suitable for long duration communication. Instead of
adopting such a mitigating mechanism, we propose another
strategy to resolve this problem. Note that the attacker can be
puzzled and lose the cumulated observation by making it
occasionally fail to observe D‟s reception of packets. Since
packets are delivered to ZD constantly in long-duration sessions
rather than using direct local broadcasting in the zone, the last
RF multicasts packet pkt1 to a partial set of nodes, say m nodes
out of the total k nodes in the zone. The m nodes hold the
packets until the arrival of the next packet pkt2. Upon the arrival
of the next packet, the m nodes conduct one-hop broadcasting to
enable other nodes in the zone to also receive the packet in order
to hide D.
Figure. 2. c) shows the two-step process with the first step in
solid arrows and the second step in dashed arrows. We can see
that the first step reaches a number of nodes in the destination
zone, but the destination is reached in the second step. Because
the deliveries of pkt1 and pkt2 are mixed, an attacker observes
that D is not in the recipient set of pkt1 though D receives pkt1
in the delivery time of pkt2. Therefore, the attacker would think
that D is not the recipient of every packet in ZD in the
transmission session, thus foiling the intersection attack.

4. PROPOSED METHOD
Like other anonymity routing algorithms, ALERT is not
completely bulletproof to all attacks. Also, ALERT cannot be
applied to all network models. ALERT can be applied to
Random Way Point model and Group Mobility Model. To
750
International Journal of Computer Applications Technology and Research
Volume 2– Issue 6, 748 - 751, 2013
prevent the occurrence of stronger and active attackers, we
propose a Secure Cryptographic Based Mix-Zones Routing
Protocol (SCMIX).
An unobserved zone functions as a mix zone where the mobile
nodes change pseudonym and mix with each other. Note that the
Mobile nodes do not know where the mix zone is (this depends
on where the adversary installs observation spots).
We propose to create mix-zones at predetermined locations and
to force pseudonym changes to take place within those regions.
Since the location of mix-zone is fixed, the adversary can
identify them and thus could easily attempt to eavesdrop
transmissions originating in the mix-zone area. The adversary
observes the timing and the location of the entering and exiting
node in order to derive a probability distribution over the
possible mappings. To solve this problem the timing of events
depends on the delay characteristics of the intersection structure.
Likewise, the location of entering and exiting nodes depends on
their trajectory in an intersection.

6. REFERENCE
[1] Zhi Z. and Choong Y. K. (2005), „Anonymizing
Geographic Ad Hoc Routing for Preserving Location
Privacy‟, Proc. Third Int‟l Workshop Mobile Distributed
Computing (ICDCSW).
[2] Defrawy K. E. and Tsudik G. (2007), „ALARM:
Anonymous Location- Aided Routing in Suspicious
MANETs‟, Proc. IEEE Int‟l Conf. Network Protocols
(ICNP).
[3] Wu X., Liu J., Hong X. and Bertino E. (2008),
„Anonymous Geo- Forwarding in MANETs through
Location Cloaking‟, IEEE Trans. Parallel and Distributed
Systems, Vol. 19, No. 10, pp. 1297-1309.
[4] Freudiger J., Raya M., Felegyhazi M., Papadimitratos P.
and Hubaux J. (2007), „Mix-zones for location privacy in
vehicular networks‟, Proc. First Int‟l Workshop onWireless
Networking for IntelligentTransportation Systems (WiNITS‟07).
[5] Dahl M., Delaune S. and Steel G. (2010), „Formal analysis
of privacy for vehicular mix-zones‟, Proc. of the 15th
European conference onResearch in computer security
(ESORICS‟10), pp. 55–70.

Figure. 3 Mix-Zone Concepts
The idea for mix-zones is to prevent the adversary from
accessing the content of messages, including the Node's
signatures. All legitimate nodes within the mix-zone obtain a
symmetric key and utilize this key to encrypt all their messages
while within the zone. We improve location privacy of mixzones via extensions to the SCMIX protocol. SCMIX Protocol
distributes Keys for encrypting beacon messages while in the
mix-zone.
While the mobile node is inside of the cryptographic mix zone,
all communication is encrypted and therefore an adversary
cannot read-out useful information (including meta-information)
from its messages. Nodes in the mix-zone forward the
symmetric key to Mobile nodes that are in direct transmission
range outside of the mix zone such that these nodes are also able
to decrypt messages. Mobile Nodes then change pseudonyms
while being inside of the mix-zone.

5. CONCLUSION
The concept of mix zone refers to a service restricted area where
mobile users can change their pseudonyms so that the mapping
between their old pseudonyms and new pseudonyms are not
revealed. Since the location of mix-zones is fixed, the adversary
can identify them and thus could easily attempt to eavesdrop
transmissions originating in the mix-zone area. To solve this
problem, we propose a Secure Cryptographic Based Mix-Zones
Routing Protocol (SCMIX). In our future work, we intend to
study how the frequency of the pseudonym change influences
the level of privacy achieved.

www.ijcat.com

751

More Related Content

More from Editor IJCATR

Green Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendlyGreen Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendlyEditor IJCATR
 
Policies for Green Computing and E-Waste in Nigeria
 Policies for Green Computing and E-Waste in Nigeria Policies for Green Computing and E-Waste in Nigeria
Policies for Green Computing and E-Waste in NigeriaEditor IJCATR
 
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Editor IJCATR
 
Optimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation ConditionsOptimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation ConditionsEditor IJCATR
 
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Editor IJCATR
 
Web Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source SiteWeb Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source SiteEditor IJCATR
 
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
 Evaluating Semantic Similarity between Biomedical Concepts/Classes through S... Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...Editor IJCATR
 
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
 Semantic Similarity Measures between Terms in the Biomedical Domain within f... Semantic Similarity Measures between Terms in the Biomedical Domain within f...
Semantic Similarity Measures between Terms in the Biomedical Domain within f...Editor IJCATR
 
A Strategy for Improving the Performance of Small Files in Openstack Swift
 A Strategy for Improving the Performance of Small Files in Openstack Swift  A Strategy for Improving the Performance of Small Files in Openstack Swift
A Strategy for Improving the Performance of Small Files in Openstack Swift Editor IJCATR
 
Integrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and RegistrationIntegrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and RegistrationEditor IJCATR
 
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
 Assessment of the Efficiency of Customer Order Management System: A Case Stu... Assessment of the Efficiency of Customer Order Management System: A Case Stu...
Assessment of the Efficiency of Customer Order Management System: A Case Stu...Editor IJCATR
 
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Editor IJCATR
 
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Editor IJCATR
 
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Editor IJCATR
 
Hangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector MachineHangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector MachineEditor IJCATR
 
Application of 3D Printing in Education
Application of 3D Printing in EducationApplication of 3D Printing in Education
Application of 3D Printing in EducationEditor IJCATR
 
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Editor IJCATR
 
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Editor IJCATR
 
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsDecay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsEditor IJCATR
 
Prediction of Heart Disease in Diabetic patients using Naive Bayes Classifica...
Prediction of Heart Disease in Diabetic patients using Naive Bayes Classifica...Prediction of Heart Disease in Diabetic patients using Naive Bayes Classifica...
Prediction of Heart Disease in Diabetic patients using Naive Bayes Classifica...Editor IJCATR
 

More from Editor IJCATR (20)

Green Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendlyGreen Computing, eco trends, climate change, e-waste and eco-friendly
Green Computing, eco trends, climate change, e-waste and eco-friendly
 
Policies for Green Computing and E-Waste in Nigeria
 Policies for Green Computing and E-Waste in Nigeria Policies for Green Computing and E-Waste in Nigeria
Policies for Green Computing and E-Waste in Nigeria
 
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
Performance Evaluation of VANETs for Evaluating Node Stability in Dynamic Sce...
 
Optimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation ConditionsOptimum Location of DG Units Considering Operation Conditions
Optimum Location of DG Units Considering Operation Conditions
 
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
Analysis of Comparison of Fuzzy Knn, C4.5 Algorithm, and Naïve Bayes Classifi...
 
Web Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source SiteWeb Scraping for Estimating new Record from Source Site
Web Scraping for Estimating new Record from Source Site
 
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
 Evaluating Semantic Similarity between Biomedical Concepts/Classes through S... Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
Evaluating Semantic Similarity between Biomedical Concepts/Classes through S...
 
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
 Semantic Similarity Measures between Terms in the Biomedical Domain within f... Semantic Similarity Measures between Terms in the Biomedical Domain within f...
Semantic Similarity Measures between Terms in the Biomedical Domain within f...
 
A Strategy for Improving the Performance of Small Files in Openstack Swift
 A Strategy for Improving the Performance of Small Files in Openstack Swift  A Strategy for Improving the Performance of Small Files in Openstack Swift
A Strategy for Improving the Performance of Small Files in Openstack Swift
 
Integrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and RegistrationIntegrated System for Vehicle Clearance and Registration
Integrated System for Vehicle Clearance and Registration
 
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
 Assessment of the Efficiency of Customer Order Management System: A Case Stu... Assessment of the Efficiency of Customer Order Management System: A Case Stu...
Assessment of the Efficiency of Customer Order Management System: A Case Stu...
 
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
Energy-Aware Routing in Wireless Sensor Network Using Modified Bi-Directional A*
 
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...Security in Software Defined Networks (SDN): Challenges and Research Opportun...
Security in Software Defined Networks (SDN): Challenges and Research Opportun...
 
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
Measure the Similarity of Complaint Document Using Cosine Similarity Based on...
 
Hangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector MachineHangul Recognition Using Support Vector Machine
Hangul Recognition Using Support Vector Machine
 
Application of 3D Printing in Education
Application of 3D Printing in EducationApplication of 3D Printing in Education
Application of 3D Printing in Education
 
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
Survey on Energy-Efficient Routing Algorithms for Underwater Wireless Sensor ...
 
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
Comparative analysis on Void Node Removal Routing algorithms for Underwater W...
 
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable CoefficientsDecay Property for Solutions to Plate Type Equations with Variable Coefficients
Decay Property for Solutions to Plate Type Equations with Variable Coefficients
 
Prediction of Heart Disease in Diabetic patients using Naive Bayes Classifica...
Prediction of Heart Disease in Diabetic patients using Naive Bayes Classifica...Prediction of Heart Disease in Diabetic patients using Naive Bayes Classifica...
Prediction of Heart Disease in Diabetic patients using Naive Bayes Classifica...
 

Recently uploaded

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????blackmambaettijean
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 

Recently uploaded (20)

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
What is Artificial Intelligence?????????
What is Artificial Intelligence?????????What is Artificial Intelligence?????????
What is Artificial Intelligence?????????
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 

An Efficient Anonymous Location Service for Geographic Ad Hoc Routing in MANET

  • 1. International Journal of Computer Applications Technology and Research Volume 2– Issue 6, 748 - 751, 2013 An Efficient Anonymous Location Service for Geographic Ad Hoc Routing in MANET Sathya.B Umarani.S Archana.S.S Maharaja Engineering college Maharaja Engineering college R.V.S College of Engg. & Tech Avinashi, TamilNadu, Avinashi, TamilNadu Coimbatore, TamilNadu India India India Rajeshwari.P Sumathi.V.S Maharaja Engineering college Maharaja Engineering college Avinashi, TamilNadu Avinashi, TamilNadu India India Abstract: Anonymous routing schemes in MANETs can be classified into on-demand or reactive routing methods, proactive routing methods and anonymous middleware routing method. A finer classification of reactive routing methods includes hop-byhop encryption and redundant traffic routing which either generate high cost or cannot provide full anonymity protection to data sources, destinations, and routes. An Anonymous Location-based Efficient Routing protocol (ALERT) was used to offer high anonymity protection at a low cost. Like other anonymity routing algorithms, ALERT is not completely bulletproof to all attacks. To prevent the occurrence of stronger and active attackers, we propose a Secure Cryptographic Based Mix-Zones Routing Protocol (SCMIX).The idea for mix-zones is to prevent the adversary from accessing the content of messages, including the Node's signatures. All legitimate nodes within the mix-zone obtain a symmetric key and utilize this key to encrypt all their messages while within the zone. Keywords: Anonymity, GPSR, Mix-Zone, Routing protocol, Zone Partition. 1. INTRODUCTION A Mobile Ad Hoc Networks (MANET) is an autonomous system of mobile nodes. It consists of mobile platforms for example a router with multiple hosts and wireless communications devices. Herein simply referred to as 'nodes' which are free to move. It also may operate in isolation or may have gateways to and interface with fixed network. There are many important research questions in MANET. However, power efficiency is one of the most important issues. It is important to realize that issues such as QoS support, TCP performance, speed of routing repair process and others are secondary if nodes have a high probability of running out of energy resources. addition, it hides the data initiator/receiver among many initiators/receivers to strengthen source and destination anonymity protection. Thus, ALERT offers anonymity protection to sources, destinations, and routes. It also has strategies to effectively counter intersection and timing attacks. ALERT achieves better route anonymity protection and lower cost compared to other anonymous routing protocols. Also, ALERT achieves comparable routing efficiency to the GPSR geographical routing protocol. 2. LITERATURE SURVEY ALARM: Anonymous Location Aided Routing in Suspicious MANETs [2] addresses a number of issues arising in suspicious location-based MANET settings by designing and analyzing a privacy-preserving and secure link-state based routing protocol (ALARM). ALARM uses node‟s current locations to securely disseminate and construct topology snapshots and forward data. With the aid of advanced cryptographic techniques (e.g., group signatures), ALARM provides both security and privacy features, including node authentication, data integrity, anonymity, and non-traceability (tracking-resistance). It also offers protection against passive and active insider and outsider attacks. It also offers resistance to certain insider attacks. An Anonymous Location-based Efficient Routing protocol (ALERT) [1] dynamically partitions the network field into zones and randomly chooses nodes in zones as intermediate relay nodes, which form a non-traceable anonymous route. In Anonymous Geo Forwarding in MANETs through Location Cloaking [3] addresses the problem of destination anonymity for applications in mobile ad hoc networks where geographic information is ready for use in both ad hoc routing and Internet Energy awareness in wireless ad hoc networks actually spans across several communication layers. Advances in battery technology are very slow compared to the results achieved in integrated circuit technology particularly in comparison to the rate of growth in communication speeds. Therefore, saving transmission power represents one of the most significant methods for long term wireless system performance. www.ijcat.com 748
  • 2. International Journal of Computer Applications Technology and Research Volume 2– Issue 6, 748 - 751, 2013 services and proposes protocols that use the destination position to generate a geographic area called an anonymity zone (AZ). A packet for a destination is delivered to all the nodes in the AZ, which make up the anonymity set. The size of the anonymity set may decrease because nodes are mobile, yet the corresponding anonymity set management is simple. We design techniques to further improve node anonymity and reduce communication overhead. In [4], Vehicular Networks (VNs) seek to provide, among other applications, safer driving conditions. To do so, vehicles need to periodically broadcast safety messages providing precise position information to nearby vehicles. However, this frequent messaging (e.g., every 100 to 300ms per car) greatly facilitates the tracking of vehicles, as it suffices to eavesdrop the wireless medium. As a result, the driver‟s privacy is at stake. In order to mitigate this threat, while complying with the safety requirements of VNs, we suggest the creation of mix-zones at appropriate places of the VN. We propose to do so with the use of cryptography, and study analytically how the combination of mix-zones into mix-networks brings forth location privacy in VNs. Finally, we show by simulations that the proposed mix system is effective in various scenarios. Our results show that, although the unlinkability of individual mix-zones can be relatively low in some cases, the accumulated unlinkability of the mix-networks is generally very high. [5] Safety critical applications for recently proposed vehicle to vehicle ad-hoc networks (VANETs) rely on a beacon signal, which poses a threat to privacy since it could allow a vehicle to be tracked. Mix-zones, where vehicles encrypt their transmissions and then change their identifiers, have been proposed as a solution to this problem. In this work, we describe a formal analysis of mix-zones. We model a mix-zone and propose a formal definition of privacy for such a zone. We give a set of necessary conditions for any mix-zone protocol to preserve privacy. We analyze, using the tool ProVerif, a particular proposal for key distribution in mix-zones, and the CMIX protocol. In ALERT, each and every data source or forwarder executes the hierarchical zone partition. It first checks whether itself and destination are in the same zone. If both are in same zone, it divides the zone alternatively in the horizontal and vertical directions. This process is repeated until itself and ZD are not in the same zone. It then randomly chooses a position in the other zone called temporary destination (TD), and uses the GPSR routing algorithm to send the data to the node closest to TD. This node is defined as a random forwarder (RF). ALERT aims at achieving k-anonymity for destination node D, where k is a predefined integer. Thus, in the last step, the data are broadcasted to k nodes in ZD, providing k-anonymity to the destination. As shown in Figure. 1, the given area is vertically partitioned into two zones X1 and X2. We then horizontally partition zone X1 to Y1 and Y2. After that, we vertically partition zone Y2 into two zones. This type of zone partitioning consecutively splits the smallest zone in an alternating vertical and horizontal manner. This partition process is known as hierarchical zone partition. ALERT uses the hierarchical zone partition. In each step, it randomly chooses a node in the partitioned zone as an intermediate relay node which is called data forwarder, thus dynamically generating an unpredictable routing path for a message. The zone with k nodes where D exists is called as the destination zone which is denoted as ZD. k is used to control the degree of anonymity protection for the destination. www.ijcat.com RF1 RF1 Y1 RF2 X1 X2 S X1 Y2 S D D D S X1 S X2 Y1 Z1 Z2 S X2 .............. Figure. 1 Hierarchical Zone Partitions 3. EXISTING METHOD 3.1 ALERT Routing Algorithm ALERT uses dynamic Hierarchical Zone Partition. It dynamically partitions a network field into zones and randomly chooses nodes in zone as intermediate relay nodes. This intermediate relay node forms non traceable anonymous route. It uses the GPSR algorithm to send the data to the relay node. D D 3.2 Destination Zone Position We use ZD rather than D is to avoid exposure of D. Zone position refers to the upper left and bottom-right coordinates of a zone. There may be problem occur to find the position of ZD, which is needed by each packet forwarder to check whether it is separated from the destination after a partition and whether it resides in ZD. Let H denote the total number of partitions in order to produce ZD. H is calculated by where G is the size of the entire network area k is the number of nodes in ZD ρ is the node density 749
  • 3. International Journal of Computer Applications Technology and Research Volume 2– Issue 6, 748 - 751, 2013 3.3 Source Anonymity ALERT aims to achieve the anonymity by restricting a node‟s view only to its neighbors and constructing the same initial and forwarded messages. This makes it difficult for an intruder to tell if a node is a source or a forwarding node. To strengthen the anonymity protection of the source nodes, we further propose a lightweight mechanism called “notify and go”. The idea behind “notify and go” is a number of nodes send out packets at the same time as S in order to hide the source packet among many other packets. “Notify and go” has two phases: “notify” and “go.” In the first “notify” phase, S piggybacks its data transmission notification with periodical update packets to notify its neighbors that it will send out a packet. The packet includes two random back-off time periods, t and t0. In the “go” phase, S and its neighbors wait for a certain period of randomly chosen time €[t,t+t0] before sending out messages. S‟s neighbors generate only several bytes of random data just in order to cover the traffic of the source. T should be a small value that does not affect the transmission latency. A long t0 may lead to a long transmission delay while a short t0 may result in interference due to many packets being sent out simultaneously. Thus, t0 should be long enough to minimize interference and balance out the delay between S and S‟s farthest neighbor in order to prevent any intruder from discriminating S. 3.4 Strategies against Attacks ALERT has strategies to effectively counter intersection and timing attacks. 3.4.1 Timing Attacks In timing attacks, an intruder can identify the packets transmitted between S and D through packet departure and arrival times. From this observation, the attacker can detect S and D. For example, two nodes A and B communicate with each other at an interval of 4 seconds. After a long observation time, the intruder finds that A‟s packet sending time and B‟s packet receiving time have a fixed five second difference such as (16:00:56, 16:01:00) and (12:08:33, 12:08:37). Then, the intruder would guess that A and B are communicating with each other. Avoiding the exhibition of interaction between communication nodes is a way to counter timing attacks. In ALERT, the “notify and go” mechanism and the broadcasting in ZD both put the interaction between S-D into two sets of nodes to obfuscate intruders. Also, the routing path between a given S-D and the communication delay (i.e., time stamp) change constantly. This again keeps an intruder from identifying the S and D. 3.4.2 Counter Intersection Attacks In an intersection attack, an attacker may have the information about active users at a given time through repeated observations. The attacker with this information can determine the sources and destinations that communicate with each other. Though ALERT offers k-anonymity to D, an intersection attacker can still identify D from repeated observations of node movement and communication if D always stays in ZD during a transmission session. This is because as long as D is conducting communication, the attacker can monitor the change of the members in the destination zone containing D. As time elapses and nodes move, all other members may move out of the www.ijcat.com destination zone except D. As a result, D is identified as the destination because it always appears in the destination zone. Figure. 2. a). is the status of a ZD after a packet is broadcasted to the zone. The arrows show the moving directions of nodes. We can see that nodes a, b, c, d, and D are in ZD. Figure. 2. b) is the subsequent status of the zone the next time a packet is transmitted between the same S-D pair. This time, nodes d, e, f, g, and D are in ZD. Since the intersection of the in-zone nodes in both figures includes d and D, D could be identified by the attacker. Therefore, the longer an attacker watches the process, the easier it is to identify the destination node. a) b) c) Figure. 2 Intersection Attack and Solution To counter the intersection attack, ZAP dynamically enlarges the range of anonymous zones to broadcast the messages or minimizes communication session time. However, the former strategy increases the communication overhead, while the latter may not be suitable for long duration communication. Instead of adopting such a mitigating mechanism, we propose another strategy to resolve this problem. Note that the attacker can be puzzled and lose the cumulated observation by making it occasionally fail to observe D‟s reception of packets. Since packets are delivered to ZD constantly in long-duration sessions rather than using direct local broadcasting in the zone, the last RF multicasts packet pkt1 to a partial set of nodes, say m nodes out of the total k nodes in the zone. The m nodes hold the packets until the arrival of the next packet pkt2. Upon the arrival of the next packet, the m nodes conduct one-hop broadcasting to enable other nodes in the zone to also receive the packet in order to hide D. Figure. 2. c) shows the two-step process with the first step in solid arrows and the second step in dashed arrows. We can see that the first step reaches a number of nodes in the destination zone, but the destination is reached in the second step. Because the deliveries of pkt1 and pkt2 are mixed, an attacker observes that D is not in the recipient set of pkt1 though D receives pkt1 in the delivery time of pkt2. Therefore, the attacker would think that D is not the recipient of every packet in ZD in the transmission session, thus foiling the intersection attack. 4. PROPOSED METHOD Like other anonymity routing algorithms, ALERT is not completely bulletproof to all attacks. Also, ALERT cannot be applied to all network models. ALERT can be applied to Random Way Point model and Group Mobility Model. To 750
  • 4. International Journal of Computer Applications Technology and Research Volume 2– Issue 6, 748 - 751, 2013 prevent the occurrence of stronger and active attackers, we propose a Secure Cryptographic Based Mix-Zones Routing Protocol (SCMIX). An unobserved zone functions as a mix zone where the mobile nodes change pseudonym and mix with each other. Note that the Mobile nodes do not know where the mix zone is (this depends on where the adversary installs observation spots). We propose to create mix-zones at predetermined locations and to force pseudonym changes to take place within those regions. Since the location of mix-zone is fixed, the adversary can identify them and thus could easily attempt to eavesdrop transmissions originating in the mix-zone area. The adversary observes the timing and the location of the entering and exiting node in order to derive a probability distribution over the possible mappings. To solve this problem the timing of events depends on the delay characteristics of the intersection structure. Likewise, the location of entering and exiting nodes depends on their trajectory in an intersection. 6. REFERENCE [1] Zhi Z. and Choong Y. K. (2005), „Anonymizing Geographic Ad Hoc Routing for Preserving Location Privacy‟, Proc. Third Int‟l Workshop Mobile Distributed Computing (ICDCSW). [2] Defrawy K. E. and Tsudik G. (2007), „ALARM: Anonymous Location- Aided Routing in Suspicious MANETs‟, Proc. IEEE Int‟l Conf. Network Protocols (ICNP). [3] Wu X., Liu J., Hong X. and Bertino E. (2008), „Anonymous Geo- Forwarding in MANETs through Location Cloaking‟, IEEE Trans. Parallel and Distributed Systems, Vol. 19, No. 10, pp. 1297-1309. [4] Freudiger J., Raya M., Felegyhazi M., Papadimitratos P. and Hubaux J. (2007), „Mix-zones for location privacy in vehicular networks‟, Proc. First Int‟l Workshop onWireless Networking for IntelligentTransportation Systems (WiNITS‟07). [5] Dahl M., Delaune S. and Steel G. (2010), „Formal analysis of privacy for vehicular mix-zones‟, Proc. of the 15th European conference onResearch in computer security (ESORICS‟10), pp. 55–70. Figure. 3 Mix-Zone Concepts The idea for mix-zones is to prevent the adversary from accessing the content of messages, including the Node's signatures. All legitimate nodes within the mix-zone obtain a symmetric key and utilize this key to encrypt all their messages while within the zone. We improve location privacy of mixzones via extensions to the SCMIX protocol. SCMIX Protocol distributes Keys for encrypting beacon messages while in the mix-zone. While the mobile node is inside of the cryptographic mix zone, all communication is encrypted and therefore an adversary cannot read-out useful information (including meta-information) from its messages. Nodes in the mix-zone forward the symmetric key to Mobile nodes that are in direct transmission range outside of the mix zone such that these nodes are also able to decrypt messages. Mobile Nodes then change pseudonyms while being inside of the mix-zone. 5. CONCLUSION The concept of mix zone refers to a service restricted area where mobile users can change their pseudonyms so that the mapping between their old pseudonyms and new pseudonyms are not revealed. Since the location of mix-zones is fixed, the adversary can identify them and thus could easily attempt to eavesdrop transmissions originating in the mix-zone area. To solve this problem, we propose a Secure Cryptographic Based Mix-Zones Routing Protocol (SCMIX). In our future work, we intend to study how the frequency of the pseudonym change influences the level of privacy achieved. www.ijcat.com 751