Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Space/time trade-offs in hash coding with allowable errors
Communications of the ACM
Efficient Identity Based Signature Schemes Based on Pairings
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
AnonDSR: efficient anonymous dynamic source routing for mobile ad-hoc networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Efficient pairing computation on supersingular Abelian varieties
Designs, Codes and Cryptography
Journal of Systems Architecture: the EUROMICRO Journal
Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks
International Journal of Security and Networks
Hierarchical Identity-Based Online/Offline Encryption
ICYCS '08 Proceedings of the 2008 The 9th International Conference for Young Computer Scientists
A brief overview of ad hoc networks: challenges and directions
IEEE Communications Magazine - Part Anniversary
Wireless telemedicine and m-health: technologies, applications and research issues
International Journal of Sensor Networks
L-priorities bloom filter: A new member of the bloom filter family
International Journal of Automation and Computing
A survey of security visualization for computer network logs
Security and Communication Networks
Security and Communication Networks
Enhanced authentication for commercial video services
Security and Communication Networks
SA3: Self-adaptive anonymous authentication for dynamic authentication policies
Future Generation Computer Systems
Hi-index | 0.00 |
Wireless ad hoc networks, especially in the hostile environment, are vulnerable to traffic analysis which allows the adversary to trace the routing messages and the sensitive data packets. Anonymity mechanism in ad hoc networks is a critical securing measure method employed to mitigate these problems. In this paper, we propose a novel secure and anonymous source routing protocol, called SADSR, based on Dynamic Source Routing (DSR) for wireless ad hoc networks. In the proposed scheme, we use the pseudonym, pseudonym based cryptography and the bloom filter to establish secure and anonymous routing in wireless ad hoc networks. Compared to other anonymous routing protocol, SADSR is not only anonymous but also the secure in the routing discover process and data transmission process.