Privacy Preservation and Protection Scheme over ALARM on Geographical Routing

Routing and security is a major issue in mobile ad-hoc networks due to dynamic network topology. Each node may compromise the packet routing functionality by disrupting the route discovery technique. Clustering divides a physical network into disjoint virtual sub networks in each cluster consisting of fewer nodes. The cluster based routing schemes in Mobile ad-hoc network are used to reduce the channel contention in networks with a numerous number of nodes. Privacy preservation and protection scheme is proposed to protect mobile ad hoc network link layer and operations of delivering packet over the location based routing or geographical routing.

[1]  Lung-Chung Li,et al.  Securing Cluster-Based Ad Hoc Networks with Distributed Authorities , 2010, IEEE Transactions on Wireless Communications.

[2]  S. Murugavalli,et al.  Location Aided Cluster Based Geographical Routing Protocol for Intermittently Connected MANET , 2014 .

[3]  Meng Wu,et al.  A Secure Trust-based Location-Aided Routing for Ad Hoc networks , 2008, 2008 Third International Conference on Communications and Networking in China.

[4]  Haiying Shen,et al.  ALERT: An Anonymous Location-Based Efficient Routing Protocol in MANETs , 2011, IEEE Transactions on Mobile Computing.

[5]  Gene Tsudik,et al.  ALARM: Anonymous Location-Aided Routing in Suspicious MANETs , 2007, IEEE Transactions on Mobile Computing.

[6]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[7]  A. Vineela,et al.  Secure geographic routing protocol in MANETs , 2011, 2011 International Conference on Emerging Trends in Electrical and Computer Technology.

[8]  SenthilVelmurugan Mangai,et al.  A new approach to geographic routing for location aided cluster based MANETs , 2011, EURASIP J. Wirel. Commun. Netw..

[9]  Yang Zhang,et al.  A Pseudonym-Based Signature Scheme for Dynamic Clusters in Ad Hoc Networks , 2009, 2009 Third International Conference on Network and System Security.