2011 International Conference on Parallel Processing 2011
DOI: 10.1109/icpp.2011.8
|View full text |Cite
|
Sign up to set email alerts
|

ALERT: An Anonymous Location-Based Efficient Routing Protocol in MANETs

Abstract: Mobile Ad Hoc Networks (MANETs) use anonymous routing protocols that hide node identities and/or routes from outside observers in order to provide anonymity protection. However, existing anonymous routing protocols relying on either hop-by-hop encryption or redundant traffic either generate high cost or cannot provide full anonymity protection to data sources, destinations, and routes. The high cost exacerbates the inherent resource constraint problem in MANETs especially in multimedia wireless applications. T… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(15 citation statements)
references
References 37 publications
0
15
0
Order By: Relevance
“…Nowadays multimedia applications (e.g., video transmission) require high routing efficiency. Our existing anonymous routing protocols [1] generate a significantly high cost, which badly affect the resource constraint problem in MANETs. A MANET employed in a battlefield, with a high-cost anonymous routing and low quality of service in voice and video data transmission due to depleted resources may lead to disastrous delay in military operations.…”
Section: Introductionmentioning
confidence: 99%
“…Nowadays multimedia applications (e.g., video transmission) require high routing efficiency. Our existing anonymous routing protocols [1] generate a significantly high cost, which badly affect the resource constraint problem in MANETs. A MANET employed in a battlefield, with a high-cost anonymous routing and low quality of service in voice and video data transmission due to depleted resources may lead to disastrous delay in military operations.…”
Section: Introductionmentioning
confidence: 99%
“…Hence it should have counter measures to be safe from all attacks which harm it. Second S-ALERT system is not feasible for network models [11], [22], so there is need to make some changes in S-ALERT. It can also achieve comparable routing efficiency to the base-line GPSR algorithm.…”
Section: Conclusion and Future Scopementioning
confidence: 99%
“…Due to its usage in various fields it can be classified into reactive routing and proactive routing [5]. There are various anonymous routing protocol [5], [10], [11]. Existing protocols are mainly of two types' step-by-step encryption and superfluous traffic [6], [8].…”
Section: Related Workmentioning
confidence: 99%
“…Haiying Shen and Lianyu Zhao introduced Anonymous Location Based Efficient Routing Protocol (ALERT) [14]. ALERT provides both identity and location anonymity to the route and nodes in the networks without using any complex cryptographic techniques.…”
Section: Anonymous Location Based Efficient Routing Protocolmentioning
confidence: 99%