5 research outputs found

    Zone Partition Based Routing Protocol In MANET

    Get PDF
    ABSTRACT -Mobile ad hoc networks use anonymous routing protocol that hide sender receiver location and routes from outside attackers and also gives anonymity protection of wireless network. However, existing anonymous routing protocols mainly based on hop-byhop encryption or redundant traffic, but it's generate high cost and cannot provide full anonymity protection. To offer high anonymity protection, we propose a zone partition based routing protocol. Zone partition based routing protocol dynamically partitions the entire network field into zones and randomly select nodes in zone as intermediate relay nodes, it's form a no traceable anonymous route. Zones contain nodes varies during packet transmissions, so outside observers cannot find packet transmission path. Unfortunately sometime outside observer find sender, receiver locations and route, so this project also proposed neighbor coverage based probabilistic rebroadcast protocol. This protocol correctly indentify attacker's node and preventing from outside attackers. These protocols offer high anonymity protection of entire wireless network. It also effectively prevents the intersection and timing attacks

    A Reactive Protocol for Privacy Preservation using Location-Based Efficient Routing in MANETs

    Get PDF
    Abstract -Mobile Ad Hoc Networks (MANETs) use anonymous routing protocols that hide node identities and/or routes from outside observers in order to provide anonymity protection. However, existing anonymous routing protocols relying on either hop-by-hop encryption or redundant traffic, either incurs high cost or cannot provide full anonymity protection to data sources, destinations, and routes. The high cost adds to the inherent resource constraint problem in MANETs especially in multimedia wireless applications. To offer high anonymity protection at a low cost, Anonymous Location-based Efficient Routing protocol (ALERT) is proposed. ALERT partitions the network field into zones and randomly chooses nodes in zones as intermediate relay nodes, which form a non-traceable anonymous route and offers anonymity protection to sources, destinations, and routes

    Anonymous Geo-Forwarding in MANETs through Location Cloaking

    No full text
    In this paper, we address the problem of destination anonymity for applications in mobile ad hoc networks where geographic information is ready for use in both ad hoc routing and Internet services. Geographic forwarding becomes a lightweight routing protocol in favor of the scenarios. Traditionally the anonymity of an entity of interest can be achieved by hiding it among a group of other entities with similar characteristics, i.e., an anonymity set. In mobile ad hoc networks, generating and maintaining an anonymity set for any ad hoc node is challenging because of the node mobility, consequently the dynamic network topology. We propose protocols that use the destination position to generate a geographic area called {em anonymity zone (AZ)}. A packet for a destination is delivered to all the nodes in the AZ, which make up the anonymity set. The size of the anonymity set may decrease because nodes are mobile, yet the corresponding anonymity set management is simple. We design techniques to further improve node anonymity and reduce communication overhead. We use analysis and extensive simulation to study the node anonymity and routing performance, and to determine the parameters that most impact the anonymity level that can be achieved by our protocol

    Balancing privacy needs with location sharing in mobile computing

    Get PDF
    Mobile phones are increasingly becoming tools for social interaction. As more phones come equipped with location tracking capabilities, capable of collecting and distributing personal information (including location) of their users, user control of location information and privacy for that matter, has become an important research issue. This research first explores various techniques of user control of location in location-based systems, and proposes the re-conceptualisation of deception (defined here as the deliberate withholding of location information) from information systems security to the field of location privacy. Previous work in this area considers techniques such as anonymisation, encryption, cloaking and blurring, among others. Since mobile devices have become social tools, this thesis takes a different approach by empirically investigating first the likelihood of the use of the proposed technique (deception) in protecting location privacy. We present empirical results (based on an online study) that show that people are willing to deliberately withhold their location information to protect their location privacy. However, our study shows that people feel uneasy in engaging in this type of deception if they believe this will be detected by their intended recipients. The results also suggest that the technique is popular in situations where it is very difficult to detect that there has been a deliberate withholding of location information during a location disclosure. Our findings are then presented in the form of initial design guidelines for the design of deception to control location privacy. Based on these initial guidelines, we propose and build a deception-based privacy control model. Two different evaluation approaches are employed in investigating the suitability of the model. These include; a field-based study of the techniques employed in the model and a laboratory-based usability study of the Mobile Client application upon which the DPC model is based, using HCI (Human Computer Interaction) professionals. Finally, we present guidelines for the design of deception in location disclosure, and lessons learned from the two evaluation approaches. We also propose a unified privacy preference framework implemented on the application layer of the mobile platform as a future direction of this thesis
    corecore