IJMTES – ANONYMOUS LOCATION BASED EFFICIENT ROUTING PROTOCOL DETECTING ARP SPOOFING BY USING ACTIVE TECHNIQUES

Journal Title : International Journal of Modern Trends in Engineering and Science

Author’s Name : M.Suganthi, S.Natrajan

Volume 01 Issue o5  Year 2014  

ISSN no:  2348-3121 

Page no: 48-54

Abstract—Mobile Ad hoc Network is used for anonymous routing protocol. The main aim of anonymous location based efficient routing protocol is to hide node identities and routes from source to destination with full anonymous protection. It gives ”identity and location anonymity” and also “route anonymity”. ”Notify and Go” mechanism is used to overcome counter intersection attack and timing attack.  It provides high anonymity protection than GPSR but does not give sufficient anonymity protection to spoofing attacks. In proposed method anonymous location based efficient routing protocol detects active techniques, Active attackers are ARP spoofing, man in the middle attack, denial of service, clone attack and session hijacking, to overcome these  active attackers ARP spoofing detection technique is used. If attackers found, the network blinks for identification and eliminate the attackers and also detects packet transmission rate, packet delivery ratio and delay rate for that packets.

Keywords—Address resolution protocol (ARP), Greedy Perimeter Stateless Routing (GPSR), Mobile Ad hoc Network (MANET).

Reference

[1] D Plummer, “An Ethernet Address Resolution Protocol”, RFC-826, USC Information Science Institute, California, November (1982).http://www.ietf.org/rfc/rfc0826.txt.
[2] Lawrence Berkeley National Laboratory , “ARPWATCH tool”: ARP Spoofing De-tector. ftp://ftp.ee.Ibl.gov/ARPwatch.tar.gz.
[3] Haiying shen, Lianyu zhao, “ALERT: An Anonymous Location Based Efficient Routing Protocol in MANETs”, IEEE trans. mobile computing, Vol.12, No.6, june (2013).
[4] Panagiotis papadimitratos, Zygmunt J. Haas,”Secure Data Communication in Mobile Ad Hoc Networks”, IEEE journal in selected areas in communication, Vol. 24, No. 2, February (2006).
[5] R.Wagner, “Address Resolution Protocol Spoofing and Man in the Middle Attacks” http://rr.sans.org/threats/address. php,(2001)
[6] A. Pfitzmann, M. Hansen, T. Dresden, and U. Kiel, “Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management a Consolidated Proposal for Terminology, Version 0.31,” technical report, (2005).
[7] Y. Zhang, W. Liu, and W. Luo, “Anonymous Communications in Mobile Ad Hoc Networks,” Proc. IEEE INFOCOM, (2005).
[8] L. Zhao and H. Shen, “ALERT: An Anonymous Location Based Efficient Routing Protocol in MANETs,” Proc. Int’l Conf. Parallel Processing (ICPP), (2011).
[9] priyanka goyal, vinti parmar, rahul rishi, “MANET:vulnerabilities, challenges, attacks, application” IJCEM international journal of computational engineering & management, vol.11, January (2011).
[10] M.H Ansari, V.TabatabaVakily,”classification and analysis of clone attack detection procedures in mobile wireless sensor networks”, International journal of scientific and research publications, volume 2, issue 11, November (2012).
[11] K. El-Khatib, L. Korba, R. Song, and G. Yee, “Anonymous Secure Routing in Mobile Ad-Hoc Networks, “proc.Int’l Conf. Parallel Processing Workshops (ICPPW), (2003).
[12] Kong, X. Hong, and M. Gerla, “ANODR: Anonymous on Demand Routing Protocol with Untraceable Routes for Mobile Ad-Hoc Networks,” Proc. ACM MobiHoc, pp. 291-302, (2003).
[13] A. Pfitzmann, M. Hansen, T. Dresden, and U. Kiel, “Anonymity, Unlinkability, Unobervability,Pseudonymity, and Identity Management a Consolidated Proposal for Terminology, Version 0.31,”technical report,(2005).

Full Pdf Paper-Click Here