Corpus ID: 16483696

Anonymizing Geographic Routing for Preserving Location Privacy Using Unlinkability and Unobservability

@inproceedings{Venkatesan2014AnonymizingGR,
  title={Anonymizing Geographic Routing for Preserving Location Privacy Using Unlinkability and Unobservability},
  author={K. G. S. Venkatesan and R. Resmi and R. Remya},
  year={2014}
}
Privacy-preserving routing is crucial for some Ad Hoc networks that require stronger privacy protection. A number of schemes have been proposed to protect privacy in Ad Hoc networks. However, none of these schemes offer complete unlinkability or unobservability property since data packets and control packets are still linkable and distinguishable in these schemes. In this project, Define stronger privacy requirements regarding privacy-preserving routing in mobile Ad Hoc networks. In order to… Expand
Privacy preservation and protection for cluster based geographic routing protocol in MANET
TLDR
A privacy preservation and protection for cluster based geographic routing protocol in MANET by using secured routing technique where the routing packets are protected by encryption and the proposed technique reduces the network overhead. Expand
Analyze and Detect Packet Loss for Data Transmission in WSN *
An emerging technology is Wireless Sensor Network where sensors are deployed at extreme geographical locations where human intervention is not possible. The data transferred through the sensor nodesExpand
Secure Data Transaction in Multi Cloud UsingTwo-Phase Validation
TLDR
This paper proposes many progressively tight levels of policy consistency constraints, and gift completely different social control approaches to ensure the trustiness of transactions capital punishment on cloud servers. Expand
Packet Loss in Wireless Sensor Network: A Survey
Wireless Sensor network is emerging rapidly almost in every field. Large sensor nodes are deployed in different environments to collect data which can be used to make critical decisions. A maliciousExpand
QOS - Guaranteed Neighbour Selection &Distributed Packet Scheduling Algorithm byUsing MANET Wireless Networks
TLDR
A QoS-Oriented Distributed routing protocol (QOD) to enhance the QoS support capability of hybrid networks is proposed and results show that QOD can provide high QoS performance in terms of overhead, transmission delay, mobility-resilience, and scalability. Expand
Reduced Path, Sink Failures in AutonomousNetwork Reconfiguration System (ANRS)Techniques
TLDR
A new path weight is proposed which captures the maximum available bandwidth path information in case of link failures which are recovered by Autonomous Network Reconfiguration System (ARNS) technique that allows to autonomously reconfiguring its local network settings. Expand
Transmission of Data between Sensors bydevolved Recognition
TLDR
A model of the property of a Wireless detector Network (WSN) deployed over asq. Expand
Associate Adaptable TransactionalInformation Store in the Cloud UsingDistributed Storage and Meta Data Manager
TLDR
This paper aims at providing the planning of a system current; highlight the major style selections, analysing the various guarantees provided by the system, and distinguishing several vital challenges for the analysis community striving for computing within the cloud. Expand
A Two-Phase Pattern Matching-parse Tree Validation Approach for Efficient SQL Injection Attacks Detection
TLDR
An algorithm was proposed that is based on the combination of two of the existing detection algorithms: pattern matching algorithm using Aho-Corasick (AC) and PT that guarantees high accuracy and reasonable time. Expand
Human Effects to Enhance ClusteringTechniques That Assists User in Groupingthe Friends
TLDR
The results show that privacy management models may be additional increased by utilizing user privacy sentiment for mass customization by exploiting tried cluster techniques that assists users in grouping their friends for ancient group- based mostly policy management approaches. Expand
...
1
2
...

References

SHOWING 1-10 OF 26 REFERENCES
USOR: An Unobservable Secure On-Demand Routing Protocol for Mobile Ad Hoc Networks
  • Z. Wan, K. Ren, M. Gu
  • Computer Science
  • IEEE Transactions on Wireless Communications
  • 2012
TLDR
This paper proposes an unobservable secure routing scheme USOR to offer complete unlinkability and content unobservability for all types of packets and demonstrates that USOR can well protect user privacy against both inside and outside attackers. Expand
ALARM: Anonymous Location-Aided Routing in Suspicious MANETs
TLDR
This work addresses a number of issues arising in suspicious location-based MANET settings by designing and analyzing a privacy-preserving and secure link-state based routing protocol (ALARM), which provides both security and privacy features, including node authentication, data integrity, anonymity, and untraceability. Expand
Anonymous secure routing in mobile ad-hoc networks
TLDR
Detailed analysis shows that ASR can achieve both anonymity and security properties, as defined in the requirements, of the routing protocol in mobile ad-hoc networks. Expand
Anonymous Geo-Forwarding in MANETs through Location Cloaking
TLDR
This paper proposes protocols that use the destination position to generate a geographic area called an anonymity zone (AZ) that makes up the anonymity set, and designs techniques to further improve node anonymity and reduce communication overhead. Expand
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
TLDR
ANODR, an anonymous on-demand routing protocol for mobile ad hoc networks deployed in hostile environments, addresses two closely related problems: for route anonymity, ANODR prevents strong adversaries from tracing a packet flow back to its source or destination; for location privacy, AN ODR ensures that adversaries cannot discover the real identities of local transmitters. Expand
Anonymizing geographic ad hoc routing for preserving location privacy
  • Zhi Zhou, K. Yow
  • Computer Science
  • 25th IEEE International Conference on Distributed Computing Systems Workshops
  • 2005
TLDR
This paper proposes an anonymous geographic routing algorithm which includes three components to avoid the explicit exposure of identity and location in communication without compromising the efficiency guaranteed by geographic routing. Expand
Securing location aware services over VANET using geographical secure path routing
TLDR
The overhead of location authentication is investigated under various scenarios through network simulation and results show that although the presence of malicious nodes increases the routing path length, a data delivery rate of larger than 80% is sustained even if 40% of the nodes are malicious. Expand
An anonymous on-demand position-based routing in mobile ad hoc networks
TLDR
A new position-based routing protocol is proposed which keeps routing nodes anonymous, thereby preventing possible traffic analysis and ensures the anonymity of both route and nodes and the robustness against the target-oriented attack and several others. Expand
DISPOSER: distributed secure position service in mobile ad hoc networks: Research Articles
TLDR
Analytical results show that while DISPOSER meets the security requirements, it achieves a high system robustness at a relatively low control overhead. Expand
Anonymity , Unlinkability , Unobservability , Pseudonymity , and Identity Management – A Consolidated Proposal for Terminology
Based on the nomenclature of the early papers in the field, we propose a terminology which is both expressive and precise. More particularly, we define anonymity, unlinkability, unobservability,Expand
...
1
2
3
...