Topic > Implementing an Efficient Anonymous Location-Based Routing Protocol in a Network

The Sybil attack is an attack in which a malicious node on a network illegitimately claims to be several different nodes at the same time. A Sybil attacker can create more than one identity on a single physical device to launch a coordinated attack on the network, or can change identities to weaken the detection process, thus promoting a lack of accountability in the network. Here the relay node can act as an attacker and then, the node creates the new identity and then acts as a neighbor to the particular node, it will send a message to the relay node with the different identity, the relay node routes the packet to the wrong relay node not approaching the destination. If this happens it will drain energy from the nodes involved in the network. Say no to plagiarism. Get a tailor-made essay on "Why Violent Video Games Shouldn't Be Banned"? Get original essay In order to provide high anonymity protection (for sources, destination and route) at low cost, this project proposes location-based anonymous essay and Efficient Routing Protocol (ALERT).ALERT dynamically splits a field network into zones and randomly chooses the nodes in the zones as intermediate forwarding nodes, which form an anonymous untraceable route. Specifically, at each stage of routing, a data sender or forwarder divides the network field to separate itself and the destination into two zones. Then it randomly chooses a node in the other zone as the next relay node and uses the GPSR algorithm to send the data to the relay node. In the last step, the data is transmitted to k nodes in the destination zone, providing k-anonymity to the destination. Furthermore, ALERT has a strategy to hide the data promoter among a set of promoters to strengthen the protection of source anonymity. ALERT is also resistant to intersectional attacks and temporal attacks. This project analyzes ALERT in terms of anonymity and efficiency. He also conducted experiments to evaluate the performance of ALERT compared to other anonymity and geographic routing protocols. In summary, the contribution of this work includes: The first is anonymous routing. ALERT provides source and destination location anonymity, identity and location anonymity. ALERT primarily uses random routing of a message copy to provide anonymity protection. The third is resilience to intersectional attacks and temporal attacks. ALERT has a strategy to effectively counter intersection attacks, which have proven to be an open and difficult issue. The proposed protocol provides high anonymity protection (for sources, destination and route) at low cost along with increased lifetime of nodes in the network. Like ALERT, and then also the proposed EALERT dynamically divides a network field into zones and randomly chooses the nodes in the zones as intermediate relay nodes, which form an anonymous untraceable path. Specifically, at each stage of routing, a data sender or forwarder divides the network field to separate itself and the destination into two zones. It then randomly chooses a node in the other zone as the next relay node and uses the EGPSR algorithm as a variant of GPSR in ALERT to send the data to the relay node. In this way, the intrinsic battery reserve of the node is also considered during geographic forwarding. This way, even if the node is the best forwarder in terms of distance, it is only selected for forwarding if it has enough battery power to perform the task of forwarding data packets. In the last step, the data is transmitted to the k nodes in the destination zone, providing.