Saturday, 12 July 2014

ARMR PROTOCOL

Anonymous Routing Protocol with Multiple hops for Communications in Highly Dynamic Hetrogenious Networks

Vikram Neerugatti1
A.Sreekanth Reddy2
M.Tech CSE  II Year
Assistant Professor, Dept of CSE
Global College of engineering and Technology, Kadapa
Global College of engineering and Technology, Kadapa
Mail Id : vikram.nandu143 @ gmail.com
Mail Id : askr86 @ gmail.com





Abstract
               Mobile ad hoc networks (MANETs) are increasingly adopted in both military and civilian usesdue to its self configuration and self-maintenance capabilities. MANETs are higly vulnerable to security threats due to inherent charateristics as wireless transmission , lack of fixed infrastructure , dynamically changing topoly, etc. The broadcast nature of the wireless medium makes MANETs susceptible to various malicious attacks. Traffics annalsis is one of the most serious security attacks in MANETs. For instance , in a battle field the enemy can physically destroy the important mobile nodes if they can identify and locate suck nodes by traffic analysis . In order to thwat such attacks , ananymous communication protocols are developed. For the purposes of security and robustness , an ideal anonymous routing protocals as in the route, in particular , those of the source and the destination. Multiple routes should be established to increase the difficulty of traffic analysis and to avoid broken paths due to node mobility . Existing schemes either make the unrealistic and undesired assumption that certain topological information about the network is known to the nodes , or cannot achieve all the properties described in  the above .
                  In the paper , we propose an anonymous routing protocol with multiple routes called ARMR, which can satisfy all the required properties. In addition, the protocal has the flexibility of creating fake routes to confuse the adversaries , thus increasing the level of anonmity. In the terms of communication efficiency , extensive simultion is carried out. Compared with AODV and MASK , our ARMR protocol gives a higer route request success rate under all situations and delay of our protocol is comparable to the best of these two protocols.

Keywords – MANET, Secure Routing, Anonymous Routing, ARMA Protocol, Traffic Anonymity, Data Anonymity.

         I. INTRODUCTION

              Mobile Ad hoc Networks (MANETs) consist of a collection of wireless mobile nodes to form a network that does not need any pre-deployed infrastructure and routing packets are transmitted only relying on the intermediate peers. One of the aims of MANETs is to turn the dream of making users get connected at anytime and anywhere into true. Due to the attractive characteristics of MANETs, many practical applications are being designed including military and civilian scenarios. Typical application examples include military battlefield operations, disaster rescue scenarios, and ad hoc meetings, among others [1]. When planning mobile ad hoc networks, security is indispensable because of the shared nature of wireless devices, the mobility of the nodes and the limited transmission range.
             Adhoc means in Latin "formed for" or "concerned with one specific purpose", nodes in Ad Hoc Networks are freedom to move, they may act as both host and router, and each node can be trust traffic on anther nodes maintaining connectivity in a decentralized manner. That's why Ad hoc Network is also known as infrastructureless network, also nodes are self-forming and self-configuring.[2], [3]. It has many characteristic that differentiate it from other wireless network include: Dynamic deployment, Wireless medium less dependable than wired medium, Limited Capacity and Bandwidth, Energy life in mobile node power resources can be replaced by users, and the Security because mobile nodes in the network its prone to many kind of attacks [4]. Routing protocols for Mobile Ad Hoc Networks is very important to ensure deliver packet to appropriate distantion it can be classified to: (i) Table Driven or Proactive Protocols is updated every time the topology changes [5]. (ii) On Demand or Reactive Protocols is obtaining to create a path to a destination only when node in the network demands for it [6]. (iii) Hybrid Routing Protocols in this type is mixed between the above types [4]. Although all these routing protocols for Mobile Ad Hoc Networks without any protect from any type of attack. We used Cryptography for improve security to AODV protocol. Cryptography is an operative method of defensive sensitive information as it is kept on media or transmitted through network communication routes. The main reason for use cryptography for hide information from anyone unauthorized those called attackers, if the attacker has enough time, desire, and resources the algorithms can be destroyed and the information can be exposed [7]. Cryptography can classified into two type: secret key is also known as symmetric cryptography is single key used for both encryption and decryption but the major difficulty with this method is the distribution of the key that it's solved by the another type is public key (asymmetric) cryptograph public cryptography [8].     
            The uniformly distributed keys in encryption and decryption it’s the same between communication parties the authentication can only be achieved for that reason public-key cryptography is used to solve the problem of key agreement or distribution, this render public key more suitable for MANETs. Nonetheless the Traditional public key cryptography usually used when dependence on a Public Key Infrastructure (PKI), that means it has a Certificate Authority as principal control point that every node in MANET must be trusted in this point. That is a big obstacle with the MANET characteristics also this PKIs make MANETs is more overhead in storage and packet transmission.
           In the MANET, the DSR[16] and AODV[14] are two principal on-demand routing protocols. However, they do not provide any security and anonymity protection, which make them vulnerable to a variety of security attacks. Up to now there have existed a number of valid and novel MANET anonymous routing protocols [9-13]. We classified them into two types based on their routing method. One is similar to the DSR routing protocol, the other is similar to the AODV routing protocol. The idea of ANODR[9], ASR[10] and MASK[11] is similar to AODV routing protocol which the intermediate node only know the previous and next node information ,and the source and destination node needn’t know the whole nodes en route. The overhead of packets forwarding in these protocol don’t contain the whole route information. In the other side, the idea of SDDR[13] and AnonDSR[12] is similar to DSR without optimization, in which the source node store the route to the destination node and the nodes en route don’t store the path information. The overhead of packets forwarding in AnonDSR protocol contain the whole route information.
            In[18],the author perfected the ANODR which was firstly proposed in [9] and provided better solutions for route discovery, data transfer and route maintenance. They also analyzed more comprehensively on the anonymity and security properties. The advantage of ANODR is trapdoored boomerang onion (TBO) used in route discovery which can protect the anonymity of node en route and destination node.
            The trapdoor thought is also accepted by the later anonymous routing protocols. To reduce the public key cryptographic computation, they advised the correspondence nodes exchange the symmetric key in the first route discovery. Then, the source would use the symmetric key in later route discovery processes toward the same destination node. However, one limitation is that the public key algorithms have to be processed in the RREP packets during route discovery. The other limitation of the protocol is the symbol of RREP in REEP packet may leak the route information due to its unicast mode.
             MASK uses periodic hello messages to establish pairwise trust relationship between neighborhood nodes when the nodes move to the new place. Like ANODR, MASK employs an ondemand procedure to establish a virtual circuit for later data delivery. The limitation of MASK is that it provides conditional destination anonymity by utilizing and exposing the destination’s identifier in ARREQs which it will benefit to get much better routing efficiency. The MASK doesn’t introduce the trapdoor thought used in ANODR.     
             AnonDSR and SDDR are anonymous routing protocol based on the mix-net [15] layer-encryption thought and the DSR protocol thought. They use layer encryption like onion in RREQ phase and each node en route will use the temporal public key to encrypt their pseudonym and symmetric key to encrypt the onion. As the destination node decrypts the trapdoor, he will also decrypt the onion and get the intermediate node’s pseudonym and corresponding symmetric key which won’t expose the intermediate nodes true identity. After destination node return RREP to source node, the source and destination nodes can communicate anonymously as the TOR[17]. To avoid running the public key decryption on the trapdoor which will cost too much time and power on mobile nodes, the AnonDSR introduces a security parameter establishment (SPE) protocol to manage shared secrets between end-nodes and the global trapdoor in RREQ is encrypted using symmetric cryptography. The one limitation of AnonDSR is that it may leak the route information during AnonDSR’s SPE phase because the route discovery in SPE phase is not encrypted and the route in SPE phase may be similar to the route in the anonymous route discovery. The other limitation is it doesn’t support the bi-directional link in the data transferred phase.
          In the paper , we propose an anonymous routing protocol with multiple routes called ARMR, which can satisfy all the required properties. In addition, the protocal has the flexibility of creating fake routes to confuse the adversaries , thus increasing the level of anonymity for MANETs which can overcome the shortcomings of above anonymity routing protocol and provide an efficient, security, strong anonymity, widely adaptability communication protocol for the routing establishment and data forwarding.
          The rest of the paper is organized as follows. Section II presents the related work. Section III presents our anonymous targets and the network assumptions and attack models. Section IV describes the essential idea of anonymous routing ARMR and the detail implementation of routing protocol. We present Proof of Correctness in section V. Section VI presents some concluding remarks in the paper.



  II. RELATED WORK
            The limited resources of wireless devices in MANETs requiring an efficient and reliable routing strategy become a quite challenging issue. Papadimitratos and Hass have proposed a Secure Link State Routing Protocol (SLSP) to secure the proactive topology discovery. The nodes of SLSP maintain and disseminate the updated topological information within their own zones in term of R hops. Smith et al. have presented a solution to the security problems of distance-vector protocols that use two classes of protection mechanism respectively for routing messages and routing updates.
            Hu et al. present a Secure Efficient Ad hoc Distance vector routing protocol (SEAD), which employs one-way hash functions instead of asymmetric cryptographic encryption. Papadimitriou and Haas also propose SRP (Secure Routing Protocol) based on DSR . The protocol introduces an effectively secure query/reply mechanism to prevent the misbehaviour of malicious nodes. Sanzgiri et al.  propose the ARAN (Authenticated Routing for Ad hoc Networks) protocol that makes use of cryptographic certificates to offer routing security. Hu et al.  provide a new secure on-demand ad hoc network routing protocol (Ariadne), where routing messages are authenticated to use different encryption approaches. Awerbuch et al.  discuss the issue of byzantine failures and propose an on-demand routing technique to detect a malicious link.
          Secure routing in the Internet has received increased attention, while secure routing for ad hoc networks is important too. Some research has been developed for the anonymity for these networks. Onion Routing protects the privacy of the sender, the receiver, message content as a message is traversed to a network. SDAR proposed  by Boukerche et al.  is a novel secure distributed anonymous routing protocol that uses onion routing to protect the anonymity and location of communicating nodes and introduces trust management system to filter those untrustworthy nodes. Kong et al.  design Anonymous On-Demand Routing (ANODR) which is based on a novel network security concept: “broadcast with trapdoor information”. Zhang et al.  design anonymous on-demand routing protocol to authenticate the anonymous neighbourhood nodes and establish the anonymous route discovery by pairing technique. Liu et al.  describe their trust management scheme for trust-based multi-path routing, where honest nodes receive the credit for good behavior; however, suspicious nodes will be penalized if they supposedly lie about or exaggerate their contribution to routing.
            MANETs was derivation through the military, define by the Defense Advanced Research Projects Agency (DARPA) that supported packet radio (PRNET) networks in 1970s, then still developing until Ad Hoc Networks entered a new stage of growth due to the popularity and the idea of an infrastructure less crew of mobile hosts was proposed, and its stall to develop. Cryptography is used to provide security goals for Ad Hoc Network because increase threats in network. Shamir was first proposed the idea of Identity-based cryptography, he proposed it can be enables any pair of nodes to communicate securely and to verify each other’s signatures without exchanging private or public keys, by calculate public key through chooses his name and network address, while secret key is computed by Private Key Generator which can be privileged situation by knowing some secret information that enable it to calculate the secret keys of all users in the network. After Shamir announced his idea not developed quickly . Boneh and Franklin in 2001 proposed Identity-Based Encryption from the Weil Pairing. They offer a completely practical Identity-Based Encryption scheme (IBE) and provide accurate definitions for secure identity based encryption schemes. Adjih et al in 2005, propose secure OLSR using IBC. Their suggestion TA is in charge of certifying or assigning keys of each node joining in the trusted network. Each node sharing the network will have the public key of the TA as global key; any node entering the ad hoc network could deployment its public keys, with a specific key exchange protocol, with proper parameters and signatures. Key that used later to sign message is called the local key. A node would start creating OLSR control messages, signing them using the local key with a specific addition which prepends a special signature message.
          The Routing protocols were presented for ad hoc networks deal with changing deployment of mobility nodes. Secure Routing protect against any threat on the network. The information that transmitted between mobility nodes must be route by routing protocols this information is the aim of many threats. There are two threat types on secure routing . One came from outside the network called external by inserting, replaying, or distorting information. Another threat came from inside network by compromised nodes, which may it announce false information to other nodes to distinguish this information is very difficult because vulnerable nodes are capable to create legal signatures using their private keys . For protected from the first threat by using cryptographic schemes for ensure security routing information, this way is not effective for the second threat. But it not necessity to ignore this type ,the detection of compromised nodes through routing information difficult in an ad hoc network as a result of changing deployment. The routing protocol should be capable to discovery paths that go around these vulnerable nodes. Routing protocols can discover multiple directions for example protocols in DSR , AODV and ZRP , nodes that use these protocol can change to an another route when the main route appears to have unsuccessful .

III. PRELIMINARIES
Anonymity Goals
        We classify into three anonymity goals proposed by  as follows:
·         Identity anonymity: The source and destination node cannot be identified by its neighbors. And it is computationally difficult for adversaries to snoop and determine the node’s true identity. These nodes needed protection include the sender nodes, recipient, nodes en route.
·         Location anonymity: Location Privacy consists of the following requirements: (a) No one node knows the exact location of the source or the destination, except themselves; (b) Other nodes, typically intermediate nodes en route, have no information about their distance, i.e. the number of hops, from either the source or the destination.
·         Route anonymity: Route anonymity consists of the following requirements: (a) Adversaries, either en route or out of the route, cannot trace a packet flow back to its source or destination; (b) Adversaries out of the route have no information on any node en the route.
Network assumption and attack model
      We assume that all nodes are wishing to forward the packets according to the protocol and have enough computational ability to process the algorithms in our protocol.
      We assume that the adversaries have unbounded eavesdropping capability to overwhelm any practical security protocol but bounded computing and node intrusion capabilities
       We assume that passive adversaries can communicate with each other through private and fast communication methods, either wireless or wired. They can collaborate with each other to monitor every radio transmission on every communication link. In addition, they may compromise any node in the target network to become an internal adversary.

IV. PROPOSED WORK
        We propose ARMR routing protocol for MANET. It is inspired by a combination of DSR, TOR, AODV, MASK, MASR and ANODR. We find that there exist similar thoughts in DSR and TOR. For instance, the source node in these protocols should know the whole route before data transferring. And the data packets also should contain the route information overhead. The Onion Router (TOR) is the culmination of many years of research by the Onion Routing project. To protect the data and routing information, the proxy of source node constructs a multi-layer encrypted data structure called an onion and sends it through the network. Each layer of the onion defines the next hop in the route. The node en route that receives an onion peels off the topmost layer, identifies the next hop, and sends the remaining onion to the next router. From above analysis, we can utilize the DSR protocol adaptability for unidirectional link, For layer encryption method and the global trapdoor introduced by ANODR to construct our ARMR protocol.
Path Discovery Phase
          The path discovery phase allows a source node S to discover and establish a routing path through a number of intermediate wireless nodes, in order to communicate with the destination node R securely and privately. When the source node S triggers the path discovery phase, the agent EDA associated with the destined node’s ID and other information are included in the path discovery message that has three parts. The first part is the open part, which indicates the message type, TYPE, trust requirement, TRUST_VALUE, and a unique identifier for the message, MESSAGE_ID. The second part contains the mobile agent EDA, and the length PLS of the third part, padding. EDA includes IDR of the intended receiver R, encrypted by EDA. Padding PS generated by the source node S in the third part can hide real routing information and protect against message size attack. When a node i receives a path discovery message, it processes the message according to the steps as described in Figure 1.
Creating multiple routes with fake routes Phase
          When the network is scalable or the trust value required by the source node is not high, it is possible to discover multiple different routes based on our current multicast routing strategy, so the optimal path is helpful for the latter data transfer phase. Here, we utilize the similar approach as the ARAN protocol: a non-congested, non-shortest route will likely be preferred to a congested, shortest route . This means that network congestion or network delay may lead that the first reply to the source node from a route discovery request did not travel along the shortest route. Therefore, ARMA does not seek a shortest path, but prefers a quickest path. After the source node S verifies that the first path discovery message is correct and valid, it then uses a similar approach to the path discovery process to transfer the official data. The sender provides the official data to the mobile agent including the information about all intermediate nodes along the established route to the receiver. The official data is encrypted by the session keys provided by the intermediate nodes. Each intermediate node just decrypts the message using its session key and then forwards it to the next node according to the ID of the next node provided by EDA until it reaches the destined receiver.


(1) Check if the new arrived message has already been
received based on the unique identifier MESSAGE_ID.
If the message was received previously, drop it silently
and stop; otherwise, continue.
(2) Check if the node satisfies the required trust value.
(3) Provide its ID to the path discovery message, so that the agent EDA can check if the node is the destined receiver.
(4) If the node is NOT the intended receiver, then
(a) The agent EDA will generate a secret key Ki to encrypt the following information and append to the message: the identifier of the intermediate node IDi, a session key SKi generated by this node and the signature of the original received message. The key Ki will be stored in EDA so that it can be retrieved by the source or destination node to decrypt this corresponding information.
(b) Ask the node to forward the new message to its neighbors whose trust values meet the source node’s trust requirement.
(5) If the node is the destined receiver R, then
(a) EDA hands over the autonomy to the receiver.
(b) The receiver implements its corresponding operations and triggers the path reverse phase.

Figure 1/path Discovery phase Algorithm.
Mobile Agent
       The goal of mobile agent applied in our protocol is to protect the privacy of the communicating parties. Here, the mobile agent called Encryption and Decryption Agent (EDA) has two functions: (1) judge the intended destination; (2) generate different keys to encrypt the intermediate node’s ID and other information. The agent is generated by the source node, and only the source and destination nodes are authorized to manage this agent after authentication. That is, all intermediate nodes cannot encrypt and decrypt any information through this agent. The advantage of mobile agent is that the autonomy of encryption is controlled by mobile agent, instead of intermediate nodes. Therefore, it is not necessary to trust each cooperating node; if one or more nodes are compromised, anonymous communication can still be achieved.
Path Reverse Phase
    When the intended receiver R gets the path discovery message, it will implement its corresponding operations to retrieve the information about all intermediate nodes and compose the path reverse message, as shown in Figure 2.
     When the source node S receives the path reverse message, it decrypts the two sets of encrypted information about the intermediate nodes respectively from the path discovery phase and the path reverse phase through EDA. After the source node obtains all IDs about the intermediate nodes, it will apply TIP mechanism to verify them. Thus, the source node can compare if these identifiers provided by the intermediate nodes are consistent and correct. If there is any malicious node providing incorrect or false identifier during the route establishment process, such invalid route will not be accepted by our TIP mechanism. Then the source node S passes the information about all the intermediate nodes (i.e., the route) to the higher application.







(1) Decrypt the IDs of all intermediate nodes, compose a
message that contains all these IDs along the path to the source node, encrypt the message through the agent EDA, and then send the path reverse message back.
(2) Check if the new arrived node is along the reverse path to the source node. If not, drop this message silently
and stop; otherwise, continue.
(3) Provide its ID to the path reverse message, so that the
agent EDA can check if the node is the source node.
(4) If the node is NOT the intended source node, then
(a) The agent EDA will generate a secret key Ki’ to encrypt the identifier of the intermediate node Idi again and append to the message.
(b) Ask the node to forward the new message to the next node on the reverse path.
(5) If the node is the destined source node S, then
(a) EDA hands over the autonomy to the source node.
(b) The source node applies the TIP mechanism and
implements its corresponding operations.


Figure 2. Path Reverse Phase Algorithm
Mobility of Nodes (capable when network breaks)
       It is indispensable for routing protocols to take the mobility of nodes into account. After the route has been established, the mobility of nodes often disrupts the existing information exchange. In order to continuously communicate along the path, in our protocol we utilize the same mechanism of route maintenance as DSR and it is unnecessary to issue periodic routing updates to check for changes in the route status. When the data link is broken at a node because of the mobility of nodes or other reasons, this node will send a route error message to the source node of the route. Once the route error message is received by those nodes that detected this error node, they will remove the node in error from their route cache, and all routes through this node should be truncated there. A new route discovery request might be triggered later.
V. PROOF OF CORRECTNESS
      The proposed ARMA protocol owns many different characteristics when compared to other conventional protocols.
In this section, we will provide the proof of correctness of our ARMA protocol.
Theorem 1. ARMA is secured against passive and active attacks.
Proof.
1. ARMA provides protection against passive attacks. This is proved based on the path discovery phase and the path reverse phase. During the two-way conversations, all identifiers IDi of the intermediate nodes as well as the identifier IDS of the source node and the identifier IDR of the intended receiver, are encrypted by either the public key PKS of the sender or the secret keys respectively generated by the mobile agent EDA. The session keys and other information provided by the intermediate nodes are also encrypted in the same approach. Since only the source and destination nodes can access EDA, the passive attacks can be prevented effectively. Thus, an adversary cannot learn anything information about the real sender, receiver, and all intermediate nodes, even if it obtains the path discovery message or the path reverse message.
2. ARMA provides protection against active attacks. As the mobile agent technique is applied in our protocol, the source node embeds its identifier and the encryption function into EDA, Thus, the modification attacks cannot occur even if the malicious nodes obtain the path discovery message. In addition, the secret key generated by the agent EDA can protect the path discovery message against replay attacks. Given that some adversaries want to impersonate the sender or some intermediate nodes, the receiver can easily find out by EDA that prevents not only malicious modification, but also impersonation or other kinds of active attacks.
Theorem 3. ARMA guarantees the anonymity of the sender and receiver.
Proof.
1. During the path discovery phase:  If a malicious node receives the path discovery message and only forwards it to its malicious neighbors, the path might include more malicious nodes after the first one. However, even if this case happens, our protocol can still achieve anonymity, because the information of communicating parities isencapsulated in the corresponding mobile agent, even if the path discovery request will never be sent to the intended receiver under such circumstances. The malicious nodes that obtain the mobile agent still cannot access the agent and decrypt the secret information, as only the source and destination nodes can be authenticated by EDA to access the agent.
    If a series of nodes is compromised and the nodes can collude with each other, they would not know where the message came from and where the message was forwarded, because the destination information always was encrypted by EDA, and particularly, EDA will judge and decide if the destination arrives or not. In addition, the route reverse phase also helps to prevent node collusion attacks as the route reply mechanism means that the receiver has received the route discovery request.
2. during the path reverse phase: If a malicious node receives the path reverse message, the mobile agent EDA will protect the anonymous information as such information is encrypted and included in EDA. The same situation can happen like the above path discovery phase.  If a series of nodes is compromised and the nodes can collude with each other, EDA still can guarantee the anonymity as EDA will judge and decide if the destination is reached or not.
Theorem 4. ARMA guarantees the anonymity of the message content.
Proof. ARMA can achieve the anonymity for the content of the message, as the message is encrypted and contained in EDA so that malicious nodes cannot retrieve the hiding information when they obtain the path discovery or path reverse message.
Theorem 5. ARMA has the capability of identifying malicious nodes and establishing routes without them.
Proof. The features of wireless ad hoc network and their bidirectional links among wireless nodes determine that the wireless nodes can monitor the behaviours of their neighbouring nodes. The malicious behaviours of a node can be found by its neighbours and the malicious node can be excluded from its neighbouring community accordingly. Thereby, the neighbouring node can accept the path discovery message but avoid the misbehaving nodes through the trust management systems.
VI. CONCLUSION
Anonymity is one of the most challenging issues in wireless and mobile ad hoc networks. In this paper, we have presented a novel secure and anonymous routing protocol for wireless ad hoc networks. Our protocol employs the technique of mobile agent to dynamically discover routes without the necessity of requiring the intermediate nodes to operate the route discovery message. The identities of the sender and the receiver as well as the topology of the network are anonymous. In our approach, our protocol can prevent malicious nodes compromising the communication through collusion, and the agent obtains the autonomy of the encryption to improve the security.
REFERENCES
[1] B. Hughes and V. Cahill, “Achieving real-time guarantees in mobile ad hoc wireless networks”, 24th IEEE Real-Time
       Systems   Symposium, pp. 37–40, 2003.
[2] Ç. Erdal and R. Chunming, Security in Wireless Ad Hoc and Sensor Networks, 1st ed , A John Wiley and Sons, Ltd,    
      Publication, United Kingdom, 2009.
[3] T. Sunil and K. Ashwani,"A Survey of Routing Protocols in Mobile Ad Hoc Networks", International Journal of  
      Innovation, Management and Technology, Vol. 1, No. 3, August 2010.
[4] S. Kuldeep, K. Neha and M. Prabhakar, " An Overview Of security Problems in MANET", [Y. Hu, A. Perrig and D.
      Johnson, Ariadne: A Secure On-demand Routing Protocol for Ad Hoc Networks, in Proceedings of ACM   
      MOBICOM’02, 2010.
[5] P. Niroj, "A secure Zone-based routing protocol For Mobile ad hoc networks", M.S. thesis, Dep. Computer Scie.,
     Department of Computer Science and Engineering National Institute of Technology, India May 2009.
[6] S. Kimaya, L. Brian, S. Clay, D. Bridget, R. Elizabeth, "A Secure Routing Protocol for Ad Hoc Networks", IEEE 10 th,
      International Conference on Network Protocols,2002.
[7] Ayushi, "A Symmetric Key Cryptographic Algorithm", International Journal of Computer Applications, Vol 1, No. 15,
      Haryana, 2010. K. Anil and R. Sanjeev, "Identity-Based Key Management in MANETs using Public Key
      Cryptography", International Journal of Security, Vol 3, India.
[8] S. Zhao, A. Aggarwal, R. Frost and X. Bai, "A Survey of Applications of Identity-Based Cryptography in Mobile Ad-
      Hoc Networks", IEEE Communications Surveys & Tutorials, 1553- 877X/11/$25.00, 2011.
[9] J. Kong, X. Hong. ANODR: Anonymous On Demand Routing with Untraceable Routes for Mobile Ad-hoc Networks. In
      Proceedings of the 4th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc'03),
      pp. 291--302, 2003.
[10] B. Zhu, Z. Wan, M. S. Kankanhalli, and F. Bao, R. H.Deng, Anonymous Secure Routing in Mobile Ad-hoc Networks.
       Proceedings of the 29th IEEE International Conference on Local Computer Networks (LCN 2004),Tampa, USA, pp.
       102-108, November 2004.
[11] Y. Zhang, W. Liu, and W. Lou. Anonymous communications in mobile ad hoc networks. In Proceedings of the 24th
        International Conference of the IEEE Communications Society (INFOCOM 2005). IEEE, 2005.
[12] R. Song, L. Korba, and G. Yee. AnonDSR: Efficient Anonymous Dynamic Source Routing for Mobile Ad-Hoc
        Networks. In ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN), 2005
[13] K. El-Khatib, L. Korba, R. Song, and G. Yee, “Secure dynamic distributed routing algorithm for ad hoc wireless
        networks,” in Proc.ICPP Workshops, Kaohsiung, Taiwan, Oct. 2003.
[14] C. Perkins, E. Belding-Royer, and S. Das. Ad hoc On-Demand Distance Vector (AODV) Routing. RFC 3561, July
        2003.
[15] David Chaum. Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM,
        24(2), 1981.
[16] D. B. Johnson, D. A. Maltz, and Y. Hu. The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR).
       <draft-ietf-manet-dsr- 09.txt>, April 2003.
[17] R. Dingledine, N. Mathewson, and P. Syverson. Tor: The secondgeneration onion router. In Proceedings of the 13th
        USENIX Security Symposium, August 2004.
[18] Kong Jiejun, Hong Xiaoyan, Gerla, M. An Identity-Free and On- Demand Routing Scheme against Anonymity Threats
       in Mobile Ad Hoc Networks. IEEE Transactions on Mobile Computing, Volume 6, Issue 8, Aug. 2007 :888 – 902
[19] B. Awerbuch, D. Holmer, N.-R. Cristina, H. Rubens, “An on-demand secure routing protocol resilient to byzantine
       failures”, 3rd ACM workshop on Wireless security, pp. 21–30, 2002.
[20] A. Boukerche, K. El-Khatib, L. Xu, L. Korba, “Performance evaluation of an anonymity providing protocol for wireless
        ad hoc networks”, Performance Evaluation, Vol. 63, pp. 1094–1109, 2006.
[21] D. Goldschlag, M. Reed, and P. Syverson, “Onion routing for anonymous and private Internet connections”,
        Communications of the ACM, Vol. 42, pp. 39–41, 1999.
[22] Y.-C. Hu, A. Perrig, and D. B. Johnson, “Ariadne: A secure on-demand routing protocol for ad hoc networks”,
        Technical Report, TR01-384, Rice University, 2001.
[23] Y.-C. Hu, D. B. Johnson, A. Perrig, “SEAD: secure efficient distance vector routing for mobile wireless ad hoc
        networks”, 4th IEEE Workshop on Mobile Computing Systems and Applications, pp. 3–13, 2002.
[24] D. B. Johnson and D. B. Maltz, “Dynamic source routing in ad hoc wireless networks”, Mobile Computing, Kluwer
        Academic Publishers, pp. 153–181, 1996.
[25] J. Kong and X. Hong, “ANODR: Anonymous on demand routing with untraceable routes for mobile ad hoc networks”,
       4th ACM symposium on Mobile ad hoc networking and computing, pp. 291–302, 2003.
[26] K. Liu, N. Abu-Ghazaleh, and K. Kang, “Location verification and trust management for resilient geographic routing”,
        Journal of Parallel and Distributed Computing, Vol. 67, pp. 215–228, 2007.
[27] P. Papadimitratos and Z. J. Haas, “Secure routing for mobile ad hoc networks”, SCS Communication Networks and
        Distributed Systems Modeling and Simulation Conference, 2002.
[28] P. Papadimitratos and Z. J. Haas, “Secure Link State Routing for Mobile Ad Hoc Networks”, Applications and the
        Internet Workshops, pp. 379– 383, 2003.
[29] B. R. Smith, S. Murthy, and J. J. Garcia-Luna-Aceves., “Securing Distance-Vector Routing Protocols”, Symposium on
        Network and
        Distributed System Security, pp. 85–92, 1997.
[30] K. Sanzgiri, et al., “A secure routing protocol for ad hoc networks”, 10th International Conference on Network
        Protocols, pp. 78–87, 2002.
 [31] Y. Zhang, W. Liu, W. Lou, “Anonymous communications in mobile ad hoc networks”, 24th Annual Joint Conference
         of the IEEE Computer and Communications Societies, pp. 291–302, 2005.