Downloads: 112 | Views: 275
Review Papers | Computer Science & Engineering | India | Volume 4 Issue 1, January 2015 | Popularity: 6.2 / 10
Secured Routing Using ALERT in MANETs
Aniket K. Khasnikar, Smita Kapse
Abstract: The routing protocol depends on either hop-by-hop routing table which generates high cost and also unable to provide full anonymity protection to data sources, destinations and routes. So as to provide high anonymity protection at low cost in MANETs (Mobile Ad-hoc Networks), ALERT (Anonymous Location-Based Efficient Routing Protocol) routing protocol can be used. In the ALERT protocol, it partitions the network into zones which randomly chooses nodes as intermediate relay nodes. It also hides the data receiver or initiator between many receivers to strengthen source and destination anonymity protection. Thus it provides Anonymity Protection to sources, destinations and routes. ALERT also achieves comparable routing efficiency to base-line GPSR (Greedy Perimeter Stateless Routing) algorithm.
Keywords: Anonymity Protection, GPSR Algorithm, Relay nodes, ALERT, MANETs
Edition: Volume 4 Issue 1, January 2015
Pages: 1987 - 1989
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 0
Student Project, Computer Science & Engineering, India, Volume 11 Issue 1, January 2022
Pages: 455 - 459Real World IoT Applications in Daily Domain
Eega Vivek Reddy, J Bala Krishna, Huzaifa Saad
Downloads: 0
Research Paper, Computer Science & Engineering, India, Volume 11 Issue 6, June 2022
Pages: 993 - 1000Product Tracking and Identification using RF Identification
Dr V Usha Bala, D Divyanth Ramnath, K. Karthik
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 8, August 2024
Pages: 1766 - 1770IoT Enabled Intelligent Cargo Management System
Sanchit Arun Parwate, Smrity Baral
Downloads: 2
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1380 - 1382A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme
Rajshree Ambatkar, Purnima Selokar
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Review Papers, Computer Science & Engineering, India, Volume 12 Issue 5, May 2023
Pages: 2010 - 2014Air and Noise Pollution Monitoring Systems: A Critical Review
Amulya Gulati, Amit Prakash, Jayashree .A, K. P. Suresh