Loading

Privacy Preserving USOR Protocol Using Mobile Adhoc Networks
R.Regan1, D.Muruganandam2, S. Senthil3
1Regan.R, Department of Computer Engineering, University College of Engineering, Pantruti, India.
2Muruganandam.D, Department of Computer Engineering, University College of Engineering, Pantruti, India.
3Senthil.S, Department of Computer Engineering, University College of Engineering , BIT Campus, India.
Manuscript received on March 02, 2013. | Revised Manuscript received on April 13, 2013. | Manuscript published on April 30, 2013. | PP: 705-710 | Volume-2, Issue-4, April 2013. | Retrieval Number: D1496042413/2013©BEIESP

Open Access | Ethics and Policies | Cite
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Privacy protection of mobile ad hoc networks is critical issue, compared to wired networks due to the mobility of wireless media. The attacker needs an appropriate transceiver to receive the wireless signal .In wired networks; all the devices are always stable and do not move to any place. Hence in wired network, it’s not that much difficult to protect the environments. Collection of nodes that forms a network without the aid of any infrastructure or centralized administration. All the nodes are having limited transmission range. There are two issues plays the critical role for the Mobile ad hoc network i.e Privacy and Routing. Stronger privacy is needed for mobile ad hoc networks. An unobservable secure on demand routing protocol used to provide complete unlinkability and unobservablitiy for all packets. It uses the combination of ID based encryption and Group signature for route discovery. USOR provides security against both inside and outside attackers.
Keywords: ID, USOR.