GPSR: greedy perimeter stateless routing for wireless networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Signature-Based Methods for Data Streams
Data Mining and Knowledge Discovery
Location Privacy in Pervasive Computing
IEEE Pervasive Computing
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
An RSSI-based Scheme for Sybil Attack Detection in Wireless Sensor Networks
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Internet routing resilience to failures: analysis and implications
CoNEXT '07 Proceedings of the 2007 ACM CoNEXT conference
Crowd (soft) control: moving beyond the opportunistic
Proceedings of the Twelfth Workshop on Mobile Computing Systems & Applications
Hi-index | 0.00 |
Mobile ad-hoc networks of wireless devices (MANETs) hold the promise of providing network services without traditional infrastructures that could fall victim to manipulation and censorship. Unfortunately, current MANET systems suffer significant scalability problems, effectively precluding their use for general-purpose networking. We suggest tailoring MANETs to particular classes of application and leveraging application-specific properties to increase scalability. This paper describes the design of a scalable and secure MANET for text-based personal communication. Our design is based on geographic routing and uses human motion and communication patterns to facilitate location tracking and distribution, thereby increasing scalability above that of traditional geographic routing. We provide location privacy by transplanting mix-net techniques into MANETs.