In current scenario MANET are the upcoming
solution for communication in various fields, but the
problem of security lays a prime issue. Due to the
infrastructure less mode of communication such networks
have good utilization in future, but due to resource constraint
these network find limitation in utilization. Due to dynamic
nature of nodes and variant routing property, any fixed
approach for anonymity based security or resource
utilization is not applicable. Hence to optimize the utilization
of MANET for real time a hybrid approach is to be
developed. In this paper anonymous location based routing
protocol ‘ALERT’ and a spectrum sensing based coding in
cognitive radio network called ‘LAUNCH’ protocol are
studied and compared so as to propose a hybrid approach of
providing anonymity based security with optimal resource
allocation using cognitive radio network approach.
Charulata Ahir : I/C Head IT dept. Govt. Polytechnic, Murtizapur.
Dr. Hemant Deshmukh : Head Computer Science and Engg. IBSS college of Engg.,
Amravati, Maharashtra , India.
MANET (Mobile Adhoc Network), Anonymity,
ALERT(Anonymity Location Based Efficient Routing Protocol),
LAUNCH(A Location-Aided Routing Protocol for Cognitive
Radio Networks)
To optimize the utilization of MANET for real time this
paper suggest a hybrid approach of providing anonymity
based security with optimal resource allocation using
cognitive radio network approach. The approach of
security is developed by the improvement in anonymous
routing protocol, where in the computational overhead
during data trafficking is focused. This coding is
integrated with dynamic resource allocation based on the
user allocation pattern as used in CRN. In this approach
the nodes are defined as primary or secondary user based
on node and link weight factor. By this development adhoc
network will be made more secure with higher quality of
service in data communication.
[1] [K. E. Defrawy et al, 2011]”ALARM: anonymous
location aided routing in suspicious MANETs," IEEE
Trans. Mobile Compute., vol. 10, no. 9, pp. 1345-1358,
2011.
[2] [Xiaoxin Wu et al,2008 ] “Anonymous Geo-
Forwarding in MANETs through Location Cloaking”,
IEEE Transactions on Parallel and Distributed
Systems, Vol. 19, No. 10, October 2008.doi 1297-
1309.
[3] [Z. Zhang et al, 2006 ] "MASK: Anonymous On-
Demand Routing in Mobile Ad Hoc Networks," IEEE
Trans. Wireless Communication, vol. 5, pp. 2376-
2385, Sept. 2006.
[4] [D. Sy, R. Chen et al,2006 ] “ODAR: On-Demand
Anonymous Routing in Ad-hoc Networks,” in IEEE
Conference on Mobile Adhoc and Sensor Systems.,
vol.4,pp. 721-730,2006,
[5] [X. Wu et al,2005 ] “AO2P: Ad Hoc On-Demand
Position-Based Private Routing Protocol,” IEEE Trans.
Mobile Computing, vol. 4, no. 4,pp. 335-348,
July/Aug. 2005.
[6] [Cadger et al,2013 ] "A survey of geographical
routing in wireless ad-hoc networks." Communications
Surveys & Tutorials, IEEE 15, no. 2 (2013): 621-653.
[7] [Gunasekaran et al,2013 ] "SPAWN: a secure
privacy-preserving architecture in wireless mobile ad
hoc networks."EURASIP Journal on Wireless
Communications and Networking 2013, no. 1 (2013):
1-12
[8] [Karim El Defrawy et al,2011 ] “Privacy-Preserving
Location-Based On-Demand Routing in MANETs”,
IEEE Journal On Selected Areas in Communications,
Vol. 29, No. 10, December 2011.doi: 1926-1934.
[9] [Muthumanickam Gunasekaran1 et al,2013 ]
“TEAP: trust-enhanced anonymous on-demand routing
protocol for mobile ad hoc networks”, IET Information
Security, IET Inf. Secur., 2013, Vol. 7, Iss. 3, pp. 203–
211 203 doi: 10.1049/iet-ifs.2013
[10] [Agrawal et al,2011 ] "A survey of routing attacks
and security measures in mobile ad-hoc
networks." Journal of computing,vol.3,issue 1,jan-
2011, ISSN 2151-9617.
[11] [Haiying Shen et al,2013 ] “ALERT: An Anonymous
Location-Based Efficient Routing Protocol in
MANETs”, IEEE Transactions on Mobile Computing,
Vol. 12, No. 6,pp.304-313, June 2013.
[12] [M. Elena Renda et al,2012 ] “Load Balancing
Hashing in Geographic Hash Tables”, IEEE
Transactions on Parallel and Distributed Systems, Vol.
23, no. 8, August 2012. doi 1508-1519.
[13] [ X. Wu,2006] “DISPOSER: Distributed Secure
Position Service in Mobile Ad Hoc Networks:
Research Articles,” Wireless Comm. and Mobile
Computing, vol. 6, pp. 357-373.
[14] [Dutta et al, 2013]”A Routing Protocol for Cognitive
Networks in presence of Co-operative Primary
user."Advances in Computing, Communications and
Informatics (ICACCI), 2013 International Conference
on, pp. 143-148. IEEE -2013.
[15] [Kamruzzaman et al, 2012] ”Energy-aware routing
protocol for cognitive radio ad hoc networks."
IET communications 6, no. 14 (2012): 2159-2168.
[16] [Robert J. Hall, 2011], “An Improved Geocast for
Mobile Ad Hoc Networks”, IEEE Transactions on
Mobile Computing, Vol. 10, No. 2, February 2011:
254-266.
[17] [Chowdhury et al,2009 ] "Search: A routing protocol
for mobile cognitive radio ad-hoc networks." Computer
Communications 32, no. 18 (2009): 1983-1997.
[18] [Akyildiz, Ian F et al,2009 ] "CRAHNs: Cognitive
radio ad hoc networks." Ad Hoc Networks 7, no. 5
(2009): 810-836.
[19] [Karim Habak et al,2013 ] “A Location-Aided
Routing Protocol for Cognitive Radio Networks”,
International Conference on Computing, Networking
and Communications, IEEE, pp. 729-733,Jan-
2013,doi-978-1-4673-5288-8/13.