02-04-2012, 09:47 PM
i' m ayesha.i want the coding for "ANONYMOUS LOCATION AIDED ROUTING IN MANETs" .i want the exact implementation of this paper...source code which i was implemented is not in paper...problem is "in paper nodes communicate based on node location" but i implemented like "nodes communicate based on node identity"
ABSTRACT:—In most common mobile ad hoc networking (MANET) scenarios, nodes establish communication based on long-lasting
public identities. However, in some hostile and suspicious settings, node identities must not be exposed and node movements should
be untraceable. Instead, nodes need to communicate on the basis of their current locations. While such MANET settings are not very
common, they do occur in military and law enforcement domains and require high security and privacy guarantees. In this paper, we
address a number of issues arising in suspicious location-based MANET settings by designing and analyzing a privacy-preserving and
secure link-state based routing protocol (ALARM). ALARM uses nodes’ current locations to securely disseminate and construct
topology snapshots and forward data. With the aid of advanced cryptographic techniques (e.g., group signatures), ALARM provides
both security and privacy features, including node authentication, data integrity, anonymity, and untraceability (tracking-resistance). It
also offers protection against passive and active insider and outsider attacks. To the best of our knowledge, this work represents the
first comprehensive study of security, privacy, and performance tradeoffs in the context of link-state MANET routing.