IJCTT-International Journal of Computer Trends and Technology
Mobile Ad hoc NETworks (MANETs) use anonymous routing protocols that hide node identities and/or routes from outside observers in order to provide anonymity protection. Anonymity in MANETs includes identity and location anonymity of data sources (i.e., senders) and destinations (i.e., recipients), as well as route anonymity. Existing anonymity routing protocols in MANETs can be mainly classified into two categories: hop-by-hop encryption and redundant traffic routes. In this paper, the authors study and compare between the existing anonymous routing protocols deployed for MANETS.