Implementation of an Anonymous Location-Based Efficient Routing Protocol into a network: [Essay Example], 692 words GradesFixer
exit-popup-close

Haven't found the right essay?

Get an expert to write your essay!

exit-popup-print

Professional writers and researchers

exit-popup-quotes

Sources and citation are provided

exit-popup-clock

3 hour delivery

exit-popup-persone
exit-popup-close

Haven't found the right essay?

Get an expert to write your essay!

close
This essay has been submitted by a student. This is not an example of the work written by professional essay writers.

Implementation of an Anonymous Location-Based Efficient Routing Protocol into a network

Print Download now

Pssst… we can write an original essay just for you.

Any subject. Any type of essay.

We’ll even meet a 3-hour deadline.

Get your price

121 writers online

blank-ico
Download PDF

Sybil attack is one in which a malicious node on a network illegitimately claims to be several different nodes simultaneously. A Sybil attacker can either create more than one identity on a single physical device in order to launch a coordinated attack on the network or can switch identities in order to weaken the detection process, thereby promoting lack of accountability in the network. Here the relay node may act as the attacker and then, the node create the new identity and then act as the neighbor to the particular node, it will send message to the relay node with the different identity, relay node route packet to the wrong relay node that does not nearer to the destination. If it occurs it will drains energy of the nodes involved in the network.

In order to provide high anonymity protection (for sources, destination, and route) with low cost, this project proposes an Anonymous Location-based and Efficient Routing protocol (ALERT).

ALERT dynamically partitions a network field into zones and randomly chooses nodes in zones as intermediate relay nodes, which form a non-traceable anonymous route. Specifically, in each routing step, a data sender or forwarder partitions the network field in order to separate itself and the destination into two zones. It then randomly chooses a node in the other zone as the next relay node and uses the GPSR algorithm to send the data to the relay node. In the last step, the data is broadcasted to k nodes in the destination zone, providing k-anonymity to the destination. In addition, ALERT has a strategy to hide the data initiator among a number of initiators to strengthen the anonymity protection of the source. ALERT is also resilient to intersection attacks and timing attacks this project analyze ALERT in terms of anonymity and efficiency. It also conducted experiments to evaluate the performance of ALERT in comparison with other anonymity and geographic routing protocols.

In Summary, the contribution of this work includes: first one is Anonymous routing. ALERT provides route anonymity, identity and location anonymity of source and destination. ALERT mainly uses randomized routing of one message copy to provide anonymity protection.

Third one is Resilience to intersection attacks and timing attacks. ALERT has a strategy to effectively counter intersection attacks, which have proved to be a tough open issue. .The proposed protocol provides high anonymity protection (for sources, destination, and route) with low cost along with the increased nodal lifetime in the network. As like ALERT, and then The proposed EALERT also dynamically partitions a network field into zones and randomly chooses nodes in zones as intermediate relay nodes, which form a non-traceable anonymous route. Specifically, in each routing step, a data sender or forwarder partitions the network field in order to separate itself and the destination into two zones. It then randomly chooses a node in the other zone as the next relay node and uses the EGPSR algorithm as a variant of GPSR in ALERT to send the data to the relay node. With this the inherent battery backup of the node is also considered during geographical forwarding. By this even though the node is the best forwarder by the distance factor, it is selected for forwarding only if it has the sufficient battery power to carry out the task of forwarding the data packets. In the last step, the data is broadcasted to k nodes in the destination zone, providing k-anonymity to the destination. In addition, the protocol has a strategy to hide the data initiator among a number of initiators to strengthen the anonymity protection of the source.

Second strategy included in the protocol is towards the detection of the Sybil attacker nodes which aims at creating duplicate identities for themselves as different nodes at different locations thereby increasing the routing overhead and wasting the inherent battery power of the legitimate nodes by responding to these faulty identities. By this the battery draining of nodes due to unnecessary routing policies are avoided priory thereby increasing the overall lifetime of all the nodes in the network is possible.

Thus the proposed EALERT has the efficient strategy towards increased nodal life time in the low cost anonymous routing protocol.

Remember: This is just a sample from a fellow student.

Your time is important. Let us write you an essay from scratch

100% plagiarism free

Sources and citations are provided

Cite this Essay

To export a reference to this article please select a referencing style below:

GradesFixer. (2019, February, 11) Implementation of an Anonymous Location-Based Efficient Routing Protocol into a network. Retrived June 6, 2020, from https://gradesfixer.com/free-essay-examples/implementation-of-an-anonymous-location-based-efficient-routing-protocol-into-a-network/
"Implementation of an Anonymous Location-Based Efficient Routing Protocol into a network." GradesFixer, 11 Feb. 2019, https://gradesfixer.com/free-essay-examples/implementation-of-an-anonymous-location-based-efficient-routing-protocol-into-a-network/. Accessed 6 June 2020.
GradesFixer. 2019. Implementation of an Anonymous Location-Based Efficient Routing Protocol into a network., viewed 6 June 2020, <https://gradesfixer.com/free-essay-examples/implementation-of-an-anonymous-location-based-efficient-routing-protocol-into-a-network/>
GradesFixer. Implementation of an Anonymous Location-Based Efficient Routing Protocol into a network. [Internet]. February 2019. [Accessed June 6, 2020]. Available from: https://gradesfixer.com/free-essay-examples/implementation-of-an-anonymous-location-based-efficient-routing-protocol-into-a-network/
close

Sorry, copying is not allowed on our website. If you’d like this or any other sample, we’ll happily email it to you.

By clicking “Send”, you agree to our Terms of service and Privacy statement. We will occasionally send you account related emails.

close

Attention! this essay is not unique. You can get 100% plagiarism FREE essay in 30sec

Recieve 100% plagiarism-Free paper just for 4.99$ on email
get unique paper
*Public papers are open and may contain not unique content
download public sample
close

Sorry, we cannot unicalize this essay. You can order Unique paper and our professionals Rewrite it for you

close

Thanks!

Your essay sample has been sent.

Want us to write one just for you? We can custom edit this essay into an original, 100% plagiarism free essay.

thanks-icon Order now
boy

Hi there!

Are you interested in getting a customized paper?

Check it out!
Having trouble finding the perfect essay? We’ve got you covered. Hire a writer

GradesFixer.com uses cookies. By continuing we’ll assume you board with our cookie policy.