privacy-preserving location-based on-demand routing in manets

Upload: vinovictory8571

Post on 01-Jun-2018

222 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/9/2019 Privacy-Preserving Location-Based on-Demand Routing in MANETs

    1/16

    134 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 29, NO. 10, DECEMBER 2011

    M

    Privac!Pr"#"rvi$% L&ca'i&$!Ba#"( O$!D")a$(

    R&*'i$% i$ MANET#+ari) E D"-ra, Member, a$( /"$" T#*(i, Senior  Member 

     Abstract  —Mobile Ad-Hoc Networks (MANETs) are partic-ularly useful and well-suited for critical scenarios, includingilitary, law enforceent as well as eergency rescue and dis-aster reco!ery" #$en operating in $ostile or suspicious settings,MANETs re%uire counication security and pri!acy,especially, in underlying routing protocols" &nlike ostnetworks, w$ere counication is based on long-teridentities (addresses), we argue t$at t$e location-centriccounication paradig is better-suited for pri!acy insuspicious MANETs" To t$is end, we construct an on-deandlocation-based anonyous MANET routing protocol ('*M)t$at ac$ie!es pri!acy and security against bot$ outsider andinsider ad!ersaries" #e analy+e t$e security, pri!acy and

    perforance of '*M and copare it to alternati!e tec$ni%ues"esults s$ow t$at '*M is ore efficient and offers betterpri!acy t$an prior work"

     Index Terms —'ri!acy, counication syste security, co-unication syste routing, on-deand routing protocol, obilecounication, location-based counication, ilitary cou-nication"

    I. I NT RODUCT ION

    OBILE A(!&c N"'&r# MANET# a a$ i$cr"a#!

    i$% i)&r'a$' r&" i$ )a$ "$vir&$)"$'# a$( ai!

    ca'i&$#, "#"cia, i$ cri'ica #"''i$%# '5a' ac -i6"( $"'&r

    i$-ra#'r*c'*r", #*c5 a#7 ")"r%"$c r"#c*", 5*)a$i'aria$ ai(,a# " a# )ii'ar a$( a "$-&rc")"$' 81. Si$c" )'

    MANET# ar" )*'i!5& i$ $a'*r", a%i" a$( r"#ii"$' r&*'i$% i#

    a cr*cia -*$c'i&$ i'5 r":*ir")"$'# ar"cia; (i#'i$c' -r&)

    '5" i$ -i6"( $"'&r#. A' '5" #a)" 'i)", )a$ MANET

    ("&)"$' #c"$ari i$v&v" &"ra'i&$ i$ hostile "$vir&$!

    )"$'#, )"a$i$% '5a' a''ac# ar" "i'5"r "6"c'"( &r, a' "a#', #i;". M&r"&v"r, '5r"a'# ca$ &ri%i$a'" -r&) ;&'5 &*'#i("

    a$( i$#i(" '5" $"'&r.

  • 8/9/2019 Privacy-Preserving Location-Based on-Demand Routing in MANETs

    2/16

     A. Goals

    II. DESI/N ELEMENTS AND COICE S '& &ca'i&$#. Pr&'"c'i&$ a%ai$#' ac'iv" i$#i("r i# (i#c*##"( i$

    ("'ai i$ S"c'i&$ V!B1.

    A$&'5"r i)&r'a$' rivac i##*" i# '&&&% "6*r"7 toO*r &r 5a# '5r"" )ai$ %&a#7

    1  Privacy: )a6i)iG" 'raci$%!r"#i#'a$c" &- i$(ivi(*a$&("#, ; &*'#i("r a$( i$#i("r a(v"r#ari"#.

    2 Security:  r&vi(" r&'"c'i&$ a%ai$#' ac'iv" a$( a##iv"

    &*'#i("r a$( i$#i("r a''ac#.3  Eiciency: a''ai$ '5" a;&v" '& %&a# i'5 r"a#&$a;

    "--ici"$' #&*'i&$#.

     !. "ong-#erm $dentities and %ommunication

     Paradigm

    T5" $""( -&r c&)r"5"$#iv" a((r"##i$% i# -*$(a)"$'a i$

    )' $"'&r#. S&)" -&r) &- a *$i:*" a((r"## &r $a)"

    i# *#*a a r"!r":*i#i'" -&r &$" $&(" '& c&))*$ica'"

    i'5 a$&'5"r. &"v"r, " ar%*" '5a' i$ a rivac!c&$#ci&*#

    MANET #"''i$%, *#i$% &$%!'"r) &r "r#i#'"$' i("$'i-i"r# ca$

     ;" 5ar)-*. T5" -ir#' '5r"a' c&)"# -r&) &*'#i("r#7 'raci$%$&("# ;a#"( &$ '5"ir i("$'i-i"r# i# #i;" ; "av"#(r&i$%

    &$ r&*'i$% i$-&r)a'i&$ "6c5a$%"(. T5i# ca$ ;" "a#i

    r")"(i"( ; 5avi$% a MANET $&("# #5ar" a $"'&r!i("

    " a$( "$cr'i$% a r&*'i$% i$-&r)a'i&$. T5" #"c&$( '5r"a'

    c&)"# -r&) )aici&*# i$#i("r#, i."., MANET $&("# '5a' ai)

    '& 'rac '5"ir ""r#. T5i# '5r"a' i# )*c5 5ar("r '& a((r"##,

    #i$c" a 'ica "v"$ #"c*r" MANET r&*'i$% r&'&c& i#("#i%$"( '& r&vi(" r&*'i$% i$-&r)a'i&$ ;a#"( &$ a

    ("#'i$a'i&$ a((r"##.

    O*r rivac %&a (ic'a'"# '5a' &$%!'"r) i("$'i'i"# ca$ &$

     ;" *#"( i$ c&$>*$c'i&$ i'5 -&&(i$% 5ic5 i# i$"--ici"$'.

  • 8/9/2019 Privacy-Preserving Location-Based on-Demand Routing in MANETs

    3/16

    'hat degree should the routing protocol advertise current

    topology&1 /"$"ra, #i$c" "## i$-&r)a'i&$ )"a$# ;"''"rrivac, " ca$ c&$c*(" '5a' '5" ;"#' ar&ac5 i# '& *#"

    a r"ac'iv" &$!(")a$( r&*'i$% r&'&c& '5a' 5i("# MANET'&&&%. AODV i# a %&&( "6a)" i' r"v"a# &$ '5" 5&!c&*$' -&r a %iv"$ ("#'i$a'i&$.

    I- '5" c*rr"$' MANET '&&&% i# *$$&$ a$( '5"r" ar"

    $& &$%!'"r) $&(" i("$'i'i"#, 5& (& $&("# c&))*$ica'"O$" #i;ii' i# '& *#" a hit-and-miss ar&ac5, 5ic5 "

    a(&' i$ '5i# a"r. I$ i', a $&(" ic# a %"&%ra5ica &ca'i&$

    c&&r(i$a'"#, (ra# a c"r'ai$ "ri)"'"r ar&*$( i' ".%., ;

    #"ci-i$% a ra(i*# &r &i$'# &- a &%&$ *#"# '5" r"#*'i$%

    ar"a a# '5" ("#'i$a'i&$ a((r"##. T5" )"##a%" r&*'" r":*"#'

    a((r"##"( i$ #*c5 a a r&a%a'"# '5r&*%5 '5" $"'&r via

    -&&(i$%, a# i$ AODV a$( "i'5"r -ai# '& -i$( a$ $&("# i$

    '5" #"ci-i"( ar"a &r r"ac5"# &$" &r )&r". D"#'i$a'i&$ $&("#

    '5"$ r" i- '5" a$' '& *#i$% #'a'" a&$% '5" r"v"r#" r&*'",

    i'5 i$'"r)"(ia'" $&("# *#i$% i$-&r)a'i&$ cac5"( (*ri$%

    r&*'" r":*"#' r&c"##i$%. T5i# #i)" &ca'i&$!;a#"( '"c5$i:*"

    i# "--"c'iv" a# i' %*ara$'""# '5a', a# &$% a# '5" $"'&ri# c&$$"c'"(, a ("#'i$a'i&$# i'5i$ '5" #"ci-i"( ar"a ar"

    r"ac5"(. &"v"r, i' c&)ica'"# &"ra'i&$ #i$c" '5" #"ci-i"(ar"a )i%5' ;" ")'. I$ '5i# ca#", '5" #&*rc" $""(# '& "i'5"r

    "6a$( '5" "ri)"'"r &r 'r a (i--"r"$' ar"a a'&%"'5"r.

    III. E NVIRONME NT @EATURE S

    T5i# #"c'i&$ ("#cri;"# ("'ai# &- '5" "$vi#a%"( MANET "$!

    vir&$)"$', i$c*(i$% $"'&r a##*)'i&$#, a(v"r#aria )&("

    a$( #"c*ri' i$-ra#'r*c'*r".

    A. (et'ork Assumptions

    ) A $&(" 5a# $& *;ic i("$'i'. T5"r" )i%5' ;" a riva'"

    &$%!'"r) i("$'i' &r a((r"## -&r "ac5 $&(" ;*' '5i#

    i$-&r)a'i&$ i# a##*)"( '& r")ai$ riva'" ;"'""$ "ac5

    $&(" a$( a 'r*#'"( &--!i$" a*'5&ri' #"" S"c'i&$ III!C.

    ) A c&))*$ica'i&$ i# 5i'!a$(!)i## a$( &ca'i&$!c"$'ric7a #&*rc" $&(" #""c'# a ("#'i$a'i&$ &ca'i&$ ar"a a$(

    a''")'# '& c&))*$ica'" '& a ("#'i$a'i&$ $&(" &r $&("#

    a' '5a' &ca'i&$. I- '5" #"ci-i"( &ca'i&$ i# ")', '5"

    #&*rc" $&(" 'i)"# &*'. M' c&))*$ica'i&$ #"##i&$# ar"

    #5&r'!iv"(. S"" S"c'i&$ V!B1.

    ) T5" MANET "$vir&$)"$' i# #*#ici&*#, )"a$i$% '5a'

    "v"$ %"$*i$" $&("# ca$ $&' ;" 'r*#'"(. S"" S"c'i&$III!B.

    ) Eac5 $&(" 5a# a )"a$# &- ("'"r)i$i$% i'# &ca'i&$ i'5r"a#&$a;" acc*rac, ".%., a /PS ("vic".

    )  N&("# ar" &" 'i)" #$c5r&$iG"(= '5i# -"a'*r" i#

    H-r"" i'5 /PS.

    )  N&("# ar" caa;" &- %"$"ra'i$% %&&(!:*ai' ra$(&)$*);"r# a$( "r-&r)i$% ;a#ic *;ic " &"ra'i&$#

    ".%., "$cr'i&$ a$( #i%$a'*r"#.

    1 I$ '5i# c&$'"6', a(v"r'i#" ai"# '& %"$*i$" MANET $&("#, i."., "a##*)" '5a' &*'#i("r# ar" *$a;" '& &;'ai$ '&&&% i$-&r)a'i&$.

  • 8/9/2019 Privacy-Preserving Location-Based on-Demand Routing in MANETs

    4/16

     !. Adversary Model 

    "c' #"")i$% %"$*i$" r&*'i$% )"##a%"#, '5*#)a#:*"ra(i$% a# &'5"r $&("#.

  • 8/9/2019 Privacy-Preserving Location-Based on-Demand Routing in MANETs

    5/16

    TABLE I NOTAT I O N USE D

    .

     11E  2 R&*'" R":*"#'

     11E  P R&*'" R" 3S#-A1EA D"#'i$a'i&$ ar"a &r &ca'i&$

     P 4  5 , S4  5 P*;ic, riva'" " &-

     5 # S  5 Ti)"!#'a) &- 5 GS  $  G 5 /r&* #i%$a'*r" %"$"ra'"( ; 5 3S#  "oc E6ac' &ca'i&$ &- a ("#'i$a'i&$ $&("

     / 2m3 a#5 &- m ".%., SA!2? E  4  2m3 E$cr'i&$ &- m i'5 " 4 

    i'5 '5" TTP a$( 5a# ;""$ i##*"( ar&ria'" cr"("$'ia#, #*c5

    a# a *;ic " &r a %r&* #i%$a'*r" c"r'i-ica'". I- a $"

    $&(" $""(# '& ;" a(("( '& '5" MANET a-'"r ("&)"$', i'

    5a# '& -ir#' i$'"rac' i'5 '5" TTP '& &;'ai$ i'# cr"("$'ia#. TTP

    r"#&$#i;ii'i"# a#& i$c*(" '5" (i#'ri;*'i&$ a$( )a$a%")"$'

    &- a MANET!i(" #"cr"' " *#"( -&r a 'ra--ic "$cr'i&$.

    T5i# i# $""("( '& r&'"c' a%ai$#' a##iv" &*'#i("r# 5& )i%5'

    "av"#(r& &$ i$'ra!MANET c&))*$ica'i&$.

  • 8/9/2019 Privacy-Preserving Location-Based on-Demand Routing in MANETs

    6/16

    a PRISM RRE M"##a%"

    ; PRISM RREP M"##a%"

    @i%. 1. PRISM RRE a$( RREP M"##a%" @&r)a'

     ;" v"ri-i"( ; a$&$" 5& 5a# a c& &- a c&$#'a$'!"$%'5

    %r&* *;ic ". A vai( %r&* #i%$a'*r" i)i"# '5a' '5"

    #i%$"r i# a bona ide %r&* )");"r. B*', %iv"$ '& vai(

    %r&* #i%$a'*r"#, i' i# c&)*'a'i&$a i$-"a#i;" '& ("ci("

    5"'5"r '5" ar" %"$"ra'"( ; '5" #a)" &r (i--"r"$' %r&*

    )");"r#. @*r'5"r)&r", i- a (i#*'" a'"r ari#"# &v"r a %r&*

    #i%$a'*r", a #"cia "$'i' ca"( a /r&* Ma$a%"r /M ca$-&rc" &"$ a %r&* #i%$a'*r" a$( i("$'i- '5" ac'*a #i%$"r.

    T5i# i)&r'a$' -"a'*r" i# r"-"rr"( '& a#  Escro'ed Anonymity.R"-"rri$% '& '5" #"ci-ica'i&$# &- %r&* #i%$a'*r"# i$ 8K, i'

    i# "a# '& i)a%i$" a %r&* #i%$a'*r" #c5")" ("&"( i$ aMANET #"''i$%, 5"r" "ac5 $&(" c&rr"#&$(# '& a %r&*

    )");"r a$( '5" &--!i$" TTP #"" S"c'i&$ III!C c&rr"#&$(#'& a /r&* Ma$a%"r /M.

    %. Protocol

     8eatures

    PRISM i# ("#i%$"( i'5 '5" -&&i$% -"a'*r"# i$ )i$(7 '5"

    #&*rc" a*'5"$'ica'"# '5" ("#'i$a'i&$ a$( vic" v"r#a. I$'"r)"!(ia'" $&("# (& $&' "ar$ c*rr"$' &ca'i&$ &- '5" #&*rc" &r '5"

    e9act c*rr"$' &ca'i&$ &- '5" ("#'i$a'i&$#. I$'"r)"(ia'" $&("#ar" $&' a*'5"$'ica'"(. A-'"r r&*'" (i#c&v"r, a

    c&))*$ica'i&$ ;"'""$ #&*rc" a$( ("#'i$a'i&$ i# "$cr'"(

    a$( a*'5"$'ica'"( *#i$% a &$"!'i)" #"##i&$!#4"ci-ic #"cr"'

    ". T5" TTP %r&* )a$a%"r ca$ a'"r "ar$ cai)"(

    &ca'i&$# &- a $&("# '5a' "$%a%" i$ (ir"c' c&))*$ica'i&$,

    i."., #"rv" a# "i'5"r #&*rc"# &r ("#'i$a'i&$#. T5" rivac

    ac5i"v"( ; PRISM i# $&' r"#'ric'"( '& a #"ci-ic )&;ii'

     a''"r$ )&r" ("'ai# a$( a$a#i# *$("r (i--"r"$' )&;ii'

    )&(" i$ S"c'i&$ V!B.

     3. Protocolperation

    T5" ;a#ic &"ra'i&$ &- PRISM i# #i)iar '& AODV. PRISMa&# a #&*rc" '& #"ci- a ("#'i$a'i&$ ar"a a$( #i)*'a$"!

    &*# (i#c&v"r )*'i" ("#'i$a'i&$ $&("# i$ i'. &"v"r, '&

    "" '5" ("#cri'i&$ #i)", " a##*)" '5a' &$ &$" $&("

    "6i#'# i'5i$ "ac5 ("#'i$a'i&$ ar"a.

  • 8/9/2019 Privacy-Preserving Location-Based on-Demand Routing in MANETs

    7/16

    @i%. 2. PRISM Da'a M"##a%" @&r)a'

    1 T5" #&*rc" ;r&a(ca#'# a r&*'" r":*"#' RRE 5ic5c&$'ai$# '5" ("#'i$a'i&$ &ca'i&$, i$ '5" -&r) &- c&&r(i$a'"#a$( a ra(i*# DST-AREA. RRE a#& c&$'ai$# a '")&rar

    *;ic "  P 4 #M  P , a 'i)"!#'a) # S S1% a$( a %r&*

    #i%$a'*r", GS $  GS1% c&)*'"( &v"r a r"vi&*# -i"(#. T5"

    RRE )"##a%" -&r)a' i# #5&$ i$ @i%*r" 1a. T5" r&c"##&- 5& '5" #&*rc" ("ci("# '& c&))*$ica'" a$( '5" r&c"##i$v&v"( i# #5&$ i$ @i%*r" 3. N&'" '5a' '5" #&*rc" #'ar'# ;#"arc5i$% i$ a$ ar"a i'5 a #)a"r ra(i*# a$( i- $& r" i#r"c"iv"( i'5i$ a #"ci-ic 'i)" i$(&, i' i$cr"a#"# '5" ra(i*#&- '5" ar"a a$( #"$(# a$&'5"r RRE. A r"c"iv"( RREP i#

    c&$#i("r"( "rr&$"&*# i- '5" 'i)"!#'a) i$c*("( i# i$c&rr"c',&r '5" "6ac' &ca'i&$ &- '5" r"i$% $&(" i# $&' i'5i$ '5"

    ("#'i$a'i&$ ar"a &r '5" v"ri-ica'i&$ &- '5" %r&* #i%$a'*r"i$c*("( i$ '5" RREP -ai#. I$ a$ &- '5"#" ca#"# '5" RREP i#&%%"( a# a -aii$% &$" a$( '5" #&*rc" ai'# '& r"c"iv" a$&'5"rRREP -&r '5i# RRE.

    2 U&$ r"c"ivi$% a RRE, "ac5 $&(" -ir#' c5"c# i-# S S1% i# vai(. I- $&', '5" RRE i# (r&"(. N"6', '5"

    $&(" c5"c# 5"'5"r i' 5a# r"vi&*# r&c"##"( '5" #a)"RRE. T5i# i# (&$" ; c&)*'i$% a 5a#5 &- '5" $" RRE / 2 11E233 a$( &&i$% i' * i$ '5" &ca cac5" 5"r" ar"c"$' 5a$("( RRE 5a#5"# ar" #'&r"(. T5"$, '5" $&("

    c5"c# 5"'5"r i' i# i'5i$ DST-AREA7 A I- $&', '5"i$'"r)"(ia'" $&(" cac5"#  / 2 11E23 a$( r"!;r&a(ca#'# '5"RRE. N&'" '5a' $& RRE -i"(# ar" c5a$%"(. B I- '5" $&("i# i'5i$ '5" ("#'i$a'i&$ ar"a, i' v"ri-i"# GS  $   GS1% . I-

    i$vai(, '5" RRE i# (i#car("(. O'5"ri#", i' #'&r"# '5" "$'ir"

    RRE i$c*(i$% GS $  GS1% . T5i# i# $""("( -&r -&r"$#ic

    a$a#i#, i$ &r("r '& i("$'i- a$( 'rac )i#;"5avi&r. T5"("#'i$a'i&$ '5"$ c&)"# a r&*'" r" RREP 5ic5c&$'ai$#7 1  / 2 11E23, 2 a $" ra$(&) #"##i&$ "

    4 S a$( 3 '5" "6ac' ("#'i$a'i&$ &ca'i&$. B&'5 2 a$(

    3 ar" "$cr'"( *$("r  P  4 #M   P &;'ai$"( -r&) '5"

    RRE. T5" RREP a#& i$c*("# '5" %r&* #i%$a'*r" GS $G 3S# &- a -i"(#. @i$a, '5" ("#'i$a'i&$ ;r&a(ca#'# RREP.

    T5" r"vi&*# #":*"$c" &- &"ra'i&$ i# #5&$ i$ '5"r"c"iv"r r&c"## i$ PRISM i$ @i%*r" 4. N&'" '5a', *$i"

    #&)" &'5"r a$&$)&*# r&*'i$% r&'&c&#, PRISM (&"# $&'r":*ir" $&("# i$ DST-AREA '& r"!;r&a(ca#' RRE &r '&("a #"$(i$% RREP i$ &r("r '& 5i(" '5"ir r"#"$c". A$

    i$#i("r &v"r5"ari$% a RREP ar"a( $&# '5a' '5"("#'i$a'i&$ i# i'5i$ '5" ar"a #"ci-i"( i$ '5"

    c&rr"#&$(i$% RRE. I$ &'5"r &r(#, a$ "av"#(r&i$%i$#i("r ca$ i$-"r -r&) a RREP '5a' a $&(" "6i#'# i$ DST-

    AREA, 5&"v"r, i' ca$ $&' "ar$ 5ic5 $&(". PRISM (&"#$&' 5i(" '5" r"#"$c" &- a $&(" i'5i$ a c"r'ai$ ("#'i$a'i&$ar"a &r '5" -ac' '5a' #&)" $&(" r"#&$(# '& a c"r'ai$ RRE.

  • 8/9/2019 Privacy-Preserving Location-Based on-Demand Routing in MANETs

    8/16

    I' 5i("# 5ic5 $&(" r"#&$("( a$( r"v"$'# 'raci$% &- #*c5

    $&("#.

    3 U&$ r"c"ivi$% a RREP, "ac5 $&(" c5"c# 5"'5"r i'

    5a# cac5"( '5" c&rr"#&$(i$% / 2 11E23. I- $&', '5" RREPi# (r&"( #i$c" '5i# $&(" a# $&' &$ '5" -&rar( r&*'". I-

     / 2 11E23 i# ar"a( cac5"(, '5" $&(" c5"c# i- '5" #a)"RREP 5a# ;""$ r&c"##"(. I- #&, '5" RREP i# (r&"(. T5"

    i$'"r)"(ia'" $&(" $& cr"a'"# a $" "$'r i$ i'# ac'iv" r&*'"#'a;" a$( r"!;r&a(ca#'# '5" RREP. Eac5 ac'iv" 'a;" "$'r

    c&$'ai$#7  / 2 11E23,  / 2 11EP a$( '5" 'i)"!#'a) &-"$'r cr"a'i&$.

    4

  • 8/9/2019 Privacy-Preserving Location-Based on-Demand Routing in MANETs

    9/16

    @i%. 3. PRISM S"$("r Pr&c"##

    @i%. 4. PRISM R"c"iv"r Pr&c"##

    (*ra'i&$ &- MANET ("&)"$' a$( 2 a((i'i&$a #'&ra%"

    a$( 'ra$#)i##i&$ ;a$(i('5 (*" '& c"r'i-ica'"#.

    A$ a'"r$a'iv" i# '& i)")"$' %r&* #i%$a'*r"# i'5i$'a)"r!r"#i#'a$' 5ar(ar". @&r "6a)", 810 #5&# a$ "6a)!

     " &- %r&* #i%$a'*r" -*$c'i&$ai' &$ #)ar'car(#. I- #*c5

    a$ i)")"$'a'i&$ ca$ ;" c&*"( i'5 a 'a)"r!r"#i#'a$'/PS ("vic", ac'iv" i$#i("r a''ac# i$ PRISM ca$ ;" vir'*a"i)i$a'"(, #i$c" a$ i$#i("r &*( ;" *$a;" '& i" a;&*' i'#

    c*rr"$' &ca'i&$ &r '& )&*$' a S;i a''ac.

    TABLE IIPRISM SIM U L AT IO   N

    PARAMETERS 

    'araeter 0alue

    Si)*a'i&$ Ar"a 1000m 6 1000mSi)*a'i&$ Ti)" 10000 #"c

    R""'i'i&$# 100 r*$# &- "ac5 #i)*a'i&$ #c"$ari&

     N*);"r &- N&("# Vari"( -r&) 20 '& 100D#' Ar"a Ra(i*# ?0)M&;ii' M&("# Ra$(&)

  • 8/9/2019 Privacy-Preserving Location-Based on-Demand Routing in MANETs

    10/16

    )*c5 &- '5"

  • 8/9/2019 Privacy-Preserving Location-Based on-Demand Routing in MANETs

    11/16

       T  o   t  a   l   N  u  m   b  e  r  o   f      R      R      E      P

       T  o   t  a   l

       N  u  m   b  e  r  o   f      R      R      E      P

       T

      o   t  a   l   N  u  m   b  e  r  o   f      R      R      E      P

    10000

    1000

    100

    10

    1

    10000

    1000

    100

    10

    1

    10000

    1000

    100

    10

    1

    RREQ period = 5secCofidece !ter"als for  RREQ period = 5sec 

    #i$ State Protocol %e&'&(  A#AR)* 

    +0 ,0 0 50 .0 /0 0 0 100

    Number of )ANET Nodes

    a R

  • 8/9/2019 Privacy-Preserving Location-Based on-Demand Routing in MANETs

    12/16

    TVUMM7 4 c&))*$i'i"#, ("-i$"( a# a$ ar"a c&v"r"( ; acirc" i'5 100) ra(i*# a$( c"$'"r #""c'"( a' ra$(&). NMP

    i# 200#"c a$( CMP i# 400#"c. T5" r&;a;ii' &- #i'c5i$%-r&) &ca '& r&a)i$% "&c5 i#  pr Q 0.4, a$(, -r&) r&a)i$%

    '& &ca  pl Q 0.. L&ca "&c5 i# #"' '& 200#"c a$( r&a)i$%

    100#"c.

    A$ i$'"r"#'i$% &;#"rva'i&$ i# '5a' i$ RP/MM a$( TVUMM

    -&r & $*);"r &- $&("# "## '5a$ 40 '5" $*);"r &- RREP

    i# 5i%5"r '5a$ '5a' *$("r R

  • 8/9/2019 Privacy-Preserving Location-Based on-Demand Routing in MANETs

    13/16

       N  u  m   b  e  r  o   f   #  o  c  a   t   i  o    s      R    e    "    e    a      l    e      d

       N  u  m   b  e  r  o   f   #  o  c  a   t   i  o    s      R    e    "    e    a      l    e      d

       N  u  m   b  e  r  o   f   #  o  c  a   t   i  o    s      R    e    "    e    a      l    e      d

    1+0

    100

    0

    .0

    -0

    +0

    0

    0

    /0

    .0

    50

    -0

    ,0

    +0

    10

    0

    10 Sedi' NodesCof& !t& for  10 

    ,0 Sedi' Nodes Cof& !t& for ,0

    50 Sedi' NodesCof& !t& for 50

    0 + . 10

    Number of Set RREQ per Node

    a Rac"$' #$a#5&'#.

  • 8/9/2019 Privacy-Preserving Location-Based on-Demand Routing in MANETs

    14/16

    PRISM *#"# a &ca'i&$!c"$'ric, i$#'"a( &- a$ i("$'i'!c"$'ric,

  • 8/9/2019 Privacy-Preserving Location-Based on-Demand Routing in MANETs

    15/16

    c&))*$ica'i&$ ara(i%). T5"r"-&r", i' (&"# $&' a##*)" a$

    $&"(%" &- &$%!'"r) $&(" i("$'i-i"r# &r *;ic "#. 2PRISM r":*ir"# $"i'5"r r"!(i#'ri;*'"( airi#" #5ar"( #"cr"'#

    $&r &$!i$" #"rv"r# &- a$ i$(. A# a$ &$!(")a$( r&'&c&,

    PRISM i# a#& v"r (i--"r"$' -r&) '5" r&'&c& i$ 811

    ALARM, "v"$ '5&*%5 '5" a''"r *#"# %r&* #i%$a'*r"# a$(

    i# a#& &ca'i&$!c"$'ric. ALARM i# a i$!#'a'" r&'&c& a$(

    "6"# '5" "$'ir" '&&&% '& a i$#i("r#.

    VII. CONCL USION

    T5i# a"r r"#"$'# '5" PRISM r&'&c& 5ic5 #*!

     &r'# a$&$)&*# r"ac'iv" r&*'i$% i$ #*#ici&*# &ca'i&$!;a#"(

    MANET#. I' r"i"# &$ %r&* #i%$a'*r"# '& a*'5"$'ica'" $&("#,

    "$#*r" i$'"%ri' &- r&*'i$% )"##a%"# 5i" r"v"$'i$% $&("

    'raci$%. I' &r# i'5 a$ %r&* #i%$a'*r" #c5")" a$( a$

    &ca'i&$!;a#"( -&rar(i$% )"c5a$i#).

  • 8/9/2019 Privacy-Preserving Location-Based on-Demand Routing in MANETs

    16/16

    81K S. Car'"r a$( A. a#i$#ac, HS"c*r" i'i&$ ai("( a( 5&c r&*'i$%, Proc. $AS#E3 $nternational %onerence on %ommunications and %omputer  (et'orks %%(@+, . 329334, 2002.

    819 .