Unobservable Privacy-Preserving Routing in MANET
P. Thamizharasi1, D.Vinoth2

1P. Thamizharasi, Communication Systems, Anna University/ Arunai College of Engineering/ Tiruvannamalai, India.
2D. Vinoth, Communication Systems, Anna University/ Arunai College of Engineering/ Tiruvannamalai, India.
Manuscript received on January 12 2013. | Revised Manuscript Received on January 15 2013. | Manuscript published on January 25, 2013. | PP: 14-16 | Volume-1, Issue-3, January 2013. | Retrieval Number: C0125011313/2013©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Privacy-preserving routing is crucial for some ad hoc networks that require stronger privacy protection. A number of anonymous routing schemes have been proposed for ad hoc networks in recent years, and they provide different level of privacy protection at different cost. These schemes are more scalable to network size, but require more computation effort. However, existing schemes provide only anonymity and unlinkability, while unobservability is never considered or implemented by now. An obvious drawback in existing schemes is that packets are not protected as a whole. An efficient privacy-preserving routing protocol USOR that achieves content unobservability by employing anonymous key establishment based on group signature. USOR is to protect all parts of a packet’s content and it is independent of solutions on traffic pattern unobservability. The unobservable routing protocol is then executed in two phases. First, an anonymous key establishment process is performed to construct secret session keys. Then an unobservable route discovery process is executed to find a route to the destination. By using NS-2 the performance analysis such as energy, bandwidth etc., are simulated.
Keywords: MANET, Privacy, Public key, Routing, Unobservable