Adaptive redundancy for data propagation exploiting dynamic sensory mobility
Proceedings of the 11th international symposium on Modeling, analysis and simulation of wireless and mobile systems
A trust-based security system for ubiquitous and pervasive computing environments
Computer Communications
Accelerated sensory data collection by greedy or aggregate mobility-based topology ranks
Proceedings of the 6th ACM symposium on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
Fast sensory data collection by mobility-based topology exploration
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Biased sink mobility with adaptive stop times for low latency data collection in sensor networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Performance analysis of trust-based node evaluation schemes in wireless and mobile ad hoc networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Accelerated collection of sensor data by mobility-enabled topology ranks
Journal of Systems and Software
Aggregated mobility-based topology inference for fast sensor data collection
Computer Communications
Improving the efficiency of anonymous routing for MANETs
Computer Communications
Direction-based adaptive data propagation for heterogeneous sensor mobility
Journal of Parallel and Distributed Computing
Hi-index | 0.00 |
While much recent research focuses only on providing routing services for ad hoc networks, very little work has been done towards achieving anonymity for wireless ad hoc and sensor networks. However, malicious nodes in a wireless and mobile ad hoc environment can jeopardize the security of the network if the issues of secure data exchange are not properly handled. Encryption cannot fully protect the data communicated between nodes, as routing information may expose the identities of the communicating nodes and put their relationships at risk. In this paper, we propose an efficient anonymous routing protocol that uses a mobile agent paradigm for wireless and mobile ad hoc networks. In our protocol, only trustworthy nodes are allowed to participate in communications and the misbehavior of malicious nodes is thus prevented effectively. We describe our protocol and provide its performance evaluation based on simulation experiments implemented in an ns-2 simulator. Compared to the SDAR protocol, our experimental results demonstrate that our scheme not only achieves the necessary anonymity in mobile ad hoc networks, but also provides more security with reasonably little additional overhead.