International Journal of Computer Applications
In major scenarios of Mobile Ad-hoc NETworking (MANET), nodes communicate to each other based on public identities. But while considering applications such as military and law enforcement domains nodes should not expose their identities and node movements should be untraceable. So, alternately, nodes need to communicate based on their current locations or positions. While doing so; there is a challenge for nodes to maintain anonymity protection from outside observers or malicious attackers. Full anonymity protection can be achieved only when; sources, destinations and routes all are protected.