International Journal of Computer Science and Information Technologies
In this paper, the location privacy of end nodes remains to be solved even when identification anonymity issues are addressed in the wireless routing protocol. Location privacy attacks can be performed by tracing either route discovery messages or data packets in order to discover the message's origin or destination venue. In this paper, the authors propose a protocol to provide receiver location privacy in mobile ad hoc networks. In general, anonymity is achieved by hiding the entity of interest among a number of similar entities, the anonymity set, so that it is not obvious to outsiders which anonymity set member is the real entity.