The dining cryptographers problem: unconditional sender and recipient untraceability
Journal of Cryptology
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Communications of the ACM
Anonymity, unobservability, and pseudeonymity — a proposal for terminology
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
The disadvantages of free MIX routes and how to overcome them
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
Location Privacy in Pervasive Computing
IEEE Pervasive Computing
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
A novel solution for achieving anonymity in wireless ad hoc networks
PE-WASUN '04 Proceedings of the 1st ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
Anonymous Secure Routing in Mobile Ad-Hoc Networks
LCN '04 Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks
SDAR: A Secure Distributed Anonymous Routing Protocol for Wireless and Mobile Ad Hoc Networks
LCN '04 Proceedings of the 29th Annual IEEE International Conference on Local Computer Networks
AnonDSR: efficient anonymous dynamic source routing for mobile ad-hoc networks
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
ARM: Anonymous Routing Protocol for Mobile Ad hoc Networks
AINA '06 Proceedings of the 20th International Conference on Advanced Information Networking and Applications - Volume 02
WLAN steganography: a first practical review
MM&Sec '06 Proceedings of the 8th workshop on Multimedia and security
Nonesuch: a mix network with sender unobservability
Proceedings of the 5th ACM workshop on Privacy in electronic society
Practical Protocol Steganography: Hiding Data in IP Header
AMS '07 Proceedings of the First Asia International Conference on Modelling & Simulation
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Anonymous Routing in MANET Using Random Identifiers
ICN '07 Proceedings of the Sixth International Conference on Networking
An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Secure anonymous routing in ad hoc networks
COMPUTE '08 Proceedings of the 1st Bangalore Annual Compute Conference
Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks
International Journal of Security and Networks
A3RP: Anonymous and Authenticated Ad Hoc Routing Protocol
ISA '08 Proceedings of the 2008 International Conference on Information Security and Assurance (isa 2008)
Trust Enhanced Anonymous Routing in Mobile Ad-Hoc Networks
PDCAT '08 Proceedings of the 2008 Ninth International Conference on Parallel and Distributed Computing, Applications and Technologies
Reasoning about the anonymity provided by pool mixes that generate dummy traffic
IH'04 Proceedings of the 6th international conference on Information Hiding
On flow correlation attacks and countermeasures in mix networks
PET'04 Proceedings of the 4th international conference on Privacy Enhancing Technologies
MASK: anonymous on-demand routing in mobile ad hoc networks
IEEE Transactions on Wireless Communications
Toward an analytical approach to anonymous wireless networking
IEEE Communications Magazine
Hi-index | 0.00 |
Security is an important topic in the context of mobile ad hoc networks (MANETs). The particular features of these networks, such as the use of open air as the transmission medium or computational constraints, make them vulnerable. One of the mechanisms to protect the communication is to provide anonymity, that aims at hiding the participants' identities, as well as the message contents and any kind of information about the transaction. For this purpose, some additional security mechanisms are required, usually based on cryptographic techniques. In this paper, we review the most relevant anonymity studies in the literature, starting with an analysis of proposals for wired networks, and then moving on to MANET environments. We also present a taxonomy to differentiate proposals according to the degree of anonymity offered. Copyright © 2010 John Wiley & Sons, Ltd. (The paper reviews the most relevant anonymity studies, starting with an analysis of the proposals for wired networks, and then moving on to MANET environments. Such proposals are presented according to the degree of anonymity offered, from the least to the most anonymous proposals.)