A secure anonymous routing protocol with authenticated key exchange for ad hoc networks
Computer Standards & Interfaces
Minimizing Eavesdropping Risk by Transmission Power Control in Multihop Wireless Networks
IEEE Transactions on Computers
Secure anonymous routing in ad hoc networks
COMPUTE '08 Proceedings of the 1st Bangalore Annual Compute Conference
Towards event source unobservability with minimum network traffic in sensor networks
WiSec '08 Proceedings of the first ACM conference on Wireless network security
Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks
International Journal of Security and Networks
Efficient anonymity schemes for clustered wireless sensor networks
International Journal of Sensor Networks
Compromising anonymous communication systems using blind source separation
ACM Transactions on Information and System Security (TISSEC)
Quantification of Anonymity for Mobile Ad Hoc Networks
Electronic Notes in Theoretical Computer Science (ENTCS)
ARM: anonymous routing protocol for mobile ad hoc networks
International Journal of Wireless and Mobile Computing
Minimizing detection probability routing in ad hoc networks using directional antennas
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
Cross-layer enhanced source location privacy in sensor networks
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
Towards a tree-based taxonomy of anonymous networks
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
A simplified anonymous dynamic source routing protocol for ad-hoc networks
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
Towards a taxonomy of wired and wireless anonymous networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Providing witness anonymity under peer-to-peer settings
IEEE Transactions on Information Forensics and Security
Anti-localization anonymous routing for Delay Tolerant Network
Computer Networks: The International Journal of Computer and Telecommunications Networking
A robust anonymous ad hoc on-demand routing
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Uplink multiuser MIMO transceiver design with transmitting beamforming under power constraints
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
An identity-based scheme for ad hoc network secure routing protocol from pairing
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
AOS: an anonymous overlay system for mobile ad hoc networks
Wireless Networks
Decorrelating WSN traffic patterns with maximally uninformative constrained routing
NETWORKING'11 Proceedings of the IFIP TC 6th international conference on Networking
Efficient password-based authentication and key exchange scheme preserving user privacy
WASA'06 Proceedings of the First international conference on Wireless Algorithms, Systems, and Applications
A secure routing protocol SDSR for mobile ad hoc networks
MSN'05 Proceedings of the First international conference on Mobile Ad-hoc and Sensor Networks
Improving the efficiency of anonymous routing for MANETs
Computer Communications
Secure anonymous routing for MANETs using distributed dynamic random path selection
PAISI'10 Proceedings of the 2010 Pacific Asia conference on Intelligence and Security Informatics
An overview of anonymous communications in mobile ad hoc networks
Wireless Communications & Mobile Computing
Information Sciences: an International Journal
Anonymous overlay network supporting authenticated routing
Information Sciences: an International Journal
On physical-layer identification of wireless devices
ACM Computing Surveys (CSUR)
Privacy Addressing-Based Anonymous Communication for Vehicular Ad Hoc Networks
Wireless Personal Communications: An International Journal
Anonymity and privacy in multicast mobile ad hoc networks
Proceedings of the 6th International Conference on Security of Information and Networks
Hi-index | 0.01 |
Although there are a large number of papers on secure routing in mobile ad-hoc networks, only a few consider the anonymity issue. In this paper, we define more strict requirements on the anonymity and security properties of the routing protocol, and notice that previous research works only provide Weak Location Privacy and Route Anonymity, and are vulnerable to specific attacks. Therefore, we propose the Anonymous Secure Routing (ASR) protocol that can provide additional properties on anonymity, i.e. Identity Anonymity and Strong Location Privacy, and at the same time ensure the security of discovered routes against various passive and active attacks. Detailed analysis shows that, ASR can achieve both anonymity and security properties, as defined in the requirements, of the routing protocol in mobile ad-hoc networks.