Professional Documents
Culture Documents
Professor, Dept. of computer science and Engineering. Francis Xavier Engineering College, Tirunelveli 1
Asst.Prof, Dept. of computer science and Engineering. Loyola Institute of Technology and Science, Thovalai 2
Abstract Protection and Security have developed as an essential research issue in Mobile Ad Hoc Networks
(MANET) because of its exceptional nature, for example, rare of assets and nonattendance of unified power. There
are number of conventions have been proposed to give protection and security to information correspondence in an
unfriendly situation, yet those conventions are traded off from numerous points of view by the assailants. We
distinguish various issues of already proposed works and propose a proficient arrangement that gives namelessness
in a more grounded foe demonstrate.
21
22
W. LITERATURE REVIEW
Reed et al [7] proposed a timing attack focus
on the delay on each communication path. If
the attacker can monitor the latency of each
path, he can correlate the messages coming
in and out of the system by analyzing their
transmission latencies.
23
IV. CONCLUSION
Anonymity is an important part of the overall
security architecture for mobile ad hoc
networks as it allows users to hide their
activities.
This
enables
private
communications between users while making
it harder for adversaries to focus their attacks.
In this paper we first identified a number of
problems and strengths in previously proposed
solutions. We proposed a solution that
provides stronger anonymity properties while
also solving some of the efficiency problems.
We also provide an analysis of how our
protocol achieves its goals.
24
REFERENCES
[10] W. Dai Two Attacks against a PipeNetLike Protocol Once Used by the Freedom
Service, http://weidai.com/freedomattacks. txt,
2013.
25