期刊名称:International Journal of Computer Science and Network Security
印刷版ISSN:1738-7906
出版年度:2015
卷号:15
期号:3
页码:79-81
出版社:International Journal of Computer Science and Network Security
摘要:A packet in ALERT includes the source and destination zones rather than their positions to provide anonymity protection to the source and the goal node. ALERT further enhanced the anonymity protection of source and destination by hiding the data initiator/receiver among a number of data sender/ receivers. It has the apprise and extend mechanism for source anonymity, and uses broadcasting for anonymity to destination. ALERT��s ability to against timing pushattacks and traffic counter attacks is also analyzed. Using TWOAck concept, we can able to detect the selfish and attacker nodes. Source node forwards the Packet to neighbor node, and then, it forwards Packet to node destination. When destination receives Packet, as it is two hops away from Source. Destination is indebted to generate a TWOACK packet, which contains reverse route from source to destination, and sends it back to Source. The retrieval of this TWOACK packet at Source indicates that the transmission of Packet from Source to destination is successful .Otherwise, if this TWOACK packet is not received in a predefined time period, both neighbour and destination nodes are reportedmalicious. The same process applies to every three consecutive nodes along the rest of the route.