close
test_template

Implementation of an Anonymous Location-based Efficient Routing Protocol into a Network

Human-Written
download print

About this sample

About this sample

close
Human-Written

Words: 692 |

Pages: 2|

4 min read

Updated: 16 November, 2024

Words: 692|Pages: 2|4 min read

Updated: 16 November, 2024

Table of contents

  1. Introduction
  2. Implementation of an Anonymous Location-based Efficient Routing Protocol into a Network
  3. Anonymous Routing
  4. Resilience to Attacks
  5. Detection of Sybil Attacks
  6. Conclusion
  7. References

Introduction

A Sybil attack is a type of security threat in which a malicious node on a network illegitimately claims to be several different nodes simultaneously. A Sybil attacker can either create multiple identities on a single physical device to launch a coordinated attack on the network or switch identities to weaken the detection process, thus promoting a lack of accountability within the network. In this scenario, the relay node may act as the attacker, creating a new identity to pose as a neighbor to a particular node. It then sends a message to the relay node with a different identity, causing the relay node to route packets to the wrong relay node that is not closer to the destination. Such actions result in the unnecessary draining of energy from the nodes involved in the network.

Implementation of an Anonymous Location-based Efficient Routing Protocol into a Network

To provide high anonymity protection for sources, destinations, and routes at a low cost, this project proposes an Anonymous Location-based and Efficient Routing protocol (ALERT). ALERT dynamically partitions a network field into zones and randomly chooses nodes in these zones as intermediate relay nodes, forming a non-traceable anonymous route. Specifically, in each routing step, a data sender or forwarder partitions the network field to separate itself and the destination into two zones. It then randomly selects a node in the other zone as the next relay node and uses the GPSR algorithm to send data to the relay node. In the final step, the data is broadcast to k nodes in the destination zone, providing k-anonymity to the destination. Moreover, ALERT employs a strategy to conceal the data initiator among several initiators to enhance source anonymity protection. ALERT is also resilient to intersection attacks and timing attacks. This project analyzes ALERT in terms of anonymity and efficiency, and experiments were conducted to evaluate its performance compared to other anonymity and geographic routing protocols.

Anonymous Routing

In summary, the contributions of this work include the following aspects: firstly, Anonymous routing. ALERT provides route anonymity, identity, and location anonymity for both source and destination. ALERT primarily utilizes randomized routing of a single message copy to ensure anonymity protection. This approach not only enhances security but also maintains network efficiency. It is important to note that the randomness in routing decisions adds an additional layer of unpredictability, making it difficult for attackers to trace the message's path.

Resilience to Attacks

Another significant contribution is the resilience to intersection and timing attacks. ALERT has a strategy to effectively counter intersection attacks, which have proven to be a challenging open issue. The proposed protocol offers high anonymity protection at a low cost while increasing the nodal lifetime in the network. Similar to ALERT, the proposed EALERT also dynamically partitions a network field into zones and randomly selects nodes in these zones as intermediate relay nodes, forming a non-traceable anonymous route. In each routing step, a data sender or forwarder partitions the network field to separate itself and the destination into two zones. It then randomly chooses a node in the other zone as the next relay node and employs the EGPSR algorithm, a variant of GPSR in ALERT, to send data to the relay node. This consideration of inherent battery backup during geographical forwarding ensures that even though a node may be the best forwarder based on distance, it is only selected if it has sufficient battery power to forward the data packets. In the last step, the data is broadcast to k nodes in the destination zone, ensuring k-anonymity to the destination. Additionally, the protocol employs a strategy to conceal the data initiator among multiple initiators to enhance source anonymity protection.

Detection of Sybil Attacks

The second strategy included in the protocol addresses the detection of Sybil attacker nodes, which aim to create duplicate identities for themselves as different nodes at different locations. This increases routing overhead and wastes the inherent battery power of legitimate nodes by responding to these faulty identities. By preventing the battery drainage of nodes due to unnecessary routing policies, the overall lifetime of all nodes in the network can be significantly increased. This strategy not only improves network efficiency but also fortifies the network against potential security threats.

Conclusion

Thus, the proposed EALERT presents an efficient strategy towards increasing nodal lifetime in a low-cost anonymous routing protocol. This innovative approach not only enhances the security and efficiency of network operations but also ensures the sustainability of network resources.

References

Johnson, D. B., & Maltz, D. A. (1996). Dynamic source routing in ad hoc wireless networks. Mobile Computing, 353, 153–181.

Douceur, J. R. (2002). The Sybil attack. Proceedings of the 1st International Workshop on Peer-to-Peer Systems, 251–260.

Get a custom paper now from our expert writers.

Kar, A., & Bose, S. (2014). An efficient algorithm for the detection of Sybil attack in mobile wireless sensor networks. International Journal of Computer Applications, 98(10), 25–30.

Image of Dr. Charlotte Jacobson
This essay was reviewed by
Dr. Charlotte Jacobson

Cite this Essay

Implementation of an Anonymous Location-Based Efficient Routing Protocol into a network. (2019, February 11). GradesFixer. Retrieved November 19, 2024, from https://gradesfixer.com/free-essay-examples/implementation-of-an-anonymous-location-based-efficient-routing-protocol-into-a-network/
“Implementation of an Anonymous Location-Based Efficient Routing Protocol into a network.” GradesFixer, 11 Feb. 2019, gradesfixer.com/free-essay-examples/implementation-of-an-anonymous-location-based-efficient-routing-protocol-into-a-network/
Implementation of an Anonymous Location-Based Efficient Routing Protocol into a network. [online]. Available at: <https://gradesfixer.com/free-essay-examples/implementation-of-an-anonymous-location-based-efficient-routing-protocol-into-a-network/> [Accessed 19 Nov. 2024].
Implementation of an Anonymous Location-Based Efficient Routing Protocol into a network [Internet]. GradesFixer. 2019 Feb 11 [cited 2024 Nov 19]. Available from: https://gradesfixer.com/free-essay-examples/implementation-of-an-anonymous-location-based-efficient-routing-protocol-into-a-network/
copy
Keep in mind: This sample was shared by another student.
  • 450+ experts on 30 subjects ready to help
  • Custom essay delivered in as few as 3 hours
Write my essay

Still can’t find what you need?

Browse our vast selection of original essay samples, each expertly formatted and styled

close

Where do you want us to send this sample?

    By clicking “Continue”, you agree to our terms of service and privacy policy.

    close

    Be careful. This essay is not unique

    This essay was donated by a student and is likely to have been used and submitted before

    Download this Sample

    Free samples may contain mistakes and not unique parts

    close

    Sorry, we could not paraphrase this essay. Our professional writers can rewrite it and get you a unique paper.

    close

    Thanks!

    Please check your inbox.

    We can write you a custom essay that will follow your exact instructions and meet the deadlines. Let's fix your grades together!

    clock-banner-side

    Get Your
    Personalized Essay in 3 Hours or Less!

    exit-popup-close
    We can help you get a better grade and deliver your task on time!
    • Instructions Followed To The Letter
    • Deadlines Met At Every Stage
    • Unique And Plagiarism Free
    Order your paper now