By Topic

Trust-Based Anonymous Communication for malicious user disclosure in Mobile Ad Hoc Networks

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Gunasekaran, M. ; Dept. of Comput. Applic., Bannari Amman Inst. of Technol., Sathyamangalam, India ; Premalatha, K.

Security is a major concern while implementing Mobile Ad Hoc Networks (MANET) for communication in an adverse environment. The dynamism in network topology and the absence of centralized administration, MANET is susceptible to security attacks from malicious users. This paper introduces the concept of anonymity for an informant who identifies and discloses anonymously the malicious behavior of other users in the network. This paper proposes the Trust-Based Anonymous Communication Technique (TACT) to provide anonymity for an informant and liability for the malicious users who attempt to misuse the anonymity property. The TACT restrains the misuse of anonymity in such a way that any user not sending cooperation message utmost once, upon receiving warnings two times is identified and also any user sending multiple cooperation messages per warning per malicious behavior type will also be termed as malicious user. The proposed technique is designed based on “broadcast with trapdoor information” a cryptography concept to monitor the users and to report malicious users to the network anonymously. The simulation results prove the necessity of anonymity in MANET and the effectiveness of this protocol in achieving such anonymity.

Published in:

Computing Communication & Networking Technologies (ICCCNT), 2012 Third International Conference on

Date of Conference:

26-28 July 2012