Communications of the ACM
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
A novel solution for achieving anonymity in wireless ad hoc networks
PE-WASUN '04 Proceedings of the 1st ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
HICSS '05 Proceedings of the Proceedings of the 38th Annual Hawaii International Conference on System Sciences - Volume 09
Mobile traffic sensor network versus motion-MIX: tracing and protecting mobile wireless nodes
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
Session Key Reuse Scheme to Improve Routing Efficiency in AnonDSR
ICCS '07 Proceedings of the 7th international conference on Computational Science, Part IV: ICCS 2007
A mobility camouflaging evaluation tool
Proceedings of the 47th Annual Southeast Regional Conference
Bloom filter based secure and anonymous DSR protocol in wireless ad hoc networks
International Journal of Security and Networks
Towards a tree-based taxonomy of anonymous networks
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
On an information theoretic approach to model anonymous MANET communications
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 3
A simplified anonymous dynamic source routing protocol for ad-hoc networks
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
Towards a taxonomy of wired and wireless anonymous networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
A survey on anonymous routing protocols in MANET
ICNVS'10 Proceedings of the 12th international conference on Networking, VLSI and signal processing
A robust anonymous ad hoc on-demand routing
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
A statistical traffic pattern discovery system for MANETs
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Uplink multiuser MIMO transceiver design with transmitting beamforming under power constraints
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Anonymous Communication in Ubiquitous Computing Environments
Wireless Personal Communications: An International Journal
ACM SIGSOFT Software Engineering Notes
Improving the efficiency of anonymous routing for MANETs
Computer Communications
An overview of anonymous communications in mobile ad hoc networks
Wireless Communications & Mobile Computing
FAN: friendship based anonymous routing in wireless social mobile networks of malicious communities
Proceedings of the 3rd Extreme Conference on Communication: The Amazon Expedition
Formal analysis of privacy for routing protocols in mobile ad hoc networks
POST'13 Proceedings of the Second international conference on Principles of Security and Trust
An anonymous distributed routing protocol in mobile ad-hoc networks
The Journal of Supercomputing
Hi-index | 0.00 |
Security, anonymity, and scalability are still important issues for mobile ad hoc network routing protocols. We first expose the limitations of several existing mobile ad hoc network routing protocols with security and anonymity constraints and analyze their scalabilities. Based on the analysis, we propose a new anonymous dynamic source routing protocol (AnonDSR) to provide three levels of security protection. We compare their scalabilities with security constraints, and analyze the new protocol to show it has strong security and anonymity protection, and very good scalability.