Secured Receiver Location Privacy Based on Cyclic Chain Shift Technique in Mobile Ad Hoc Networks

Download Now
Provided by: International Journal of Computer Science and Information Technologies
Topic: Security
Format: PDF
In this paper, the location privacy of end nodes remains to be solved even when identification anonymity issues are addressed in the wireless routing protocol. Location privacy attacks can be performed by tracing either route discovery messages or data packets in order to discover the message's origin or destination venue. In this paper, the authors propose a protocol to provide receiver location privacy in mobile ad hoc networks. In general, anonymity is achieved by hiding the entity of interest among a number of similar entities, the anonymity set, so that it is not obvious to outsiders which anonymity set member is the real entity.
Download Now

Find By Topic