Open Access Open Access  Restricted Access Subscription or Fee Access

LERMP: A Secure Location Based Efficient Multipath Routing Protocol

Rajan Gandhi, Dr. Prasanna Joeg

Abstract


In wireless communication and mobile Ad hoc network mainly concern with security. In MANETs anonymous routing protocol available which should be provide anonymity for route, source, and destination. So LEMRP hides the route of communication from outside observer and gives anonymity protection from malicious node. There is much protocol available which does not provide anonymity. So we developed secure location based efficient multipath routing protocol which provides anonymity for source, destination and route. This protocol select random node as a next hop. Previous anonymity protocol relies on Hop by Hop encryption and redundant traffic. So it generates high cost for communication and takes long time for communication. LERMP send multi packet through multiple path and   dynamically doing partition of network into zone and choose random node in that zone which make anonymous route between source and destination. We also gave solution of wormhole attack. Experimental results exhibit consistency with the theoretical analysis, and show that LEMRP achieves better route anonymity protection and lower cost compared to anonymous routing protocol with wormhole attack.

Keywords


Mobile Ad Hoc Network, Anonymity, Hop by Hop Encryption, Multipath, Wormhole Attack

Full Text:

PDF

References


Haiying Shen and Lianyu Zhao, ”ALERT: An Anonymous Location Based Efficient Routing Protocol in MANETs ” IEEE Trans. Mobile Computing, vol. 4, no. 4, pp. 1079-1093, June 2013.

K.E. Defrawy and G. Tsudik, “ALARM: Anonymous Location-Aided Routing in Suspicious MANETs,” Proc. IEEE Int’l Conf. Network Protocols (ICNP), 2007.

V. Pathak, D. Yao, and L. Iftode, “Securing Location Aware Services over VANET Using Geographical Secure Path Routing,” Proc. IEEE Int’l Conf. Vehicular Electronics and safety (ICVES), 2008.

X. Wu, “AO2P: Ad Hoc On-Demand Position-Based Private Routing Protocol,” IEEE Trans. Mobile Computing, vol. 4, no. 4, pp. 335-348, July/Aug. 2005.

K.E. Defrawy and G. Tsudik, “PRISM: Privacy-Friendly Routing in Suspicious MANETs (and VANETs),” Proc. IEEE Int’l Conf.Network Protocols (ICNP), 2008.

Y.-C. Hu, A. Perrig, and D.B. Johnson, “Ariadne: A Secure On- Demand Routing Protocol for Ad Hoc Networks,” Wireless Networks, vol. 11, pp. 21-38, 2005.

Z. Zhi and Y.K. Choong, “Anonymizing Geographic Ad Hoc Routing for Preserving Location Privacy,” Proc. Third Int’l Workshop Mobile Distributed Computing (ICDCSW), 2005.

L. Sweeney, “k-Anonymity: A Model for Protecting Privacy,” Int’l J. Uncertainity Fuzziness Knowledge-Based Systems, vol. 10, no. 5, pp. 557-570, 2002.

J. Raymond, “Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems,” Proc. Int’l Workshop Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability (WDIAU), pp. 10-29, 2001.

Debian Administration, http://www.debian-administration.org/users/dkg/weblog/48, 2012.

M.F. Mokbel, C.-Y. Chow, and W.G. Aref, “The New Casper: Query Processing for Location Services without Compromising Privacy,” Proc. 32nd Int’l Conf. Very Large Databases (VLDB), 2006.

C.-C. Chou, D.S.L. Wei, C.-C. Jay Kuo, and K. Naik, “An Efficient Anonymous Communication Protocol for Peer-to-Peer Applications over Mobile Ad-Hoc Networks,” IEEE J. Selected Areas in Comm., vol. 25, no. 1, pp. 192-203, Jan. 2007.

Viren Mahajan, Maitreya Natu, and Adarshpal Sethi, Nov. 2008 “Analysis of wormhole Intrusion Attacks In MANETS”,IEEE Military Communications Conference,MILCOM 2008.

R.H. Khokhar, Md. A.Ngadi, S. Manda. “A Review of Current Routing Attacks in Mobile Ad Hoc Networks”, International Journal of Computer Science and Security, 2 (3), pp. 18-29, 2008.

F. Natt-Abdesselam, B. Bensaou, T. Taleb, “Detecting and Avoiding Wormhole Attacks in Wireless Ad Hoc Network”, IEEE Communications Magazine, 46(4), pp. 127-133, 2008.

Shalini Jain, Dr.Satbir Jain, “ Detection and prevention of wormhole attack in mobile adhoc networks” , In Proceedings of the International Journal of Computer Theory and Engineering, Vol. 2, No. 1 February, 2010, pp.78-86.

N. Song, L. Qian, X. Li. “Wormhole Attacks Detection in Wireless Ad Hoc Networks: A Statistical Analysis Approach”. In Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium, pp. 8-15, 2005.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.