The dining cryptographers problem: unconditional sender and recipient untraceability
Journal of Cryptology
Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
A protocol for anonymous communication over the Internet
Proceedings of the 7th ACM conference on Computer and communications security
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
On the performance of ad hoc networks with beamforming antennas
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Spread Spectrum in Mobile Communication
Spread Spectrum in Mobile Communication
A Secure Routing Protocol for Ad Hoc Networks
ICNP '02 Proceedings of the 10th IEEE International Conference on Network Protocols
Introducing Tarzan, a Peer-to-Peer Anonymizing Network Layer
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
ACSAC '96 Proceedings of the 12th Annual Computer Security Applications Conference
Strategies for enhancing routing security in protocols for mobile ad hoc networks
Journal of Parallel and Distributed Computing - Special issue on Routing in mobile and wireless ad hoc networks
Anonymous Connections and Onion Routing
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Secure hierarchical multicast routing and multicast internet anonymity
Secure hierarchical multicast routing and multicast internet anonymity
Handbook of Algorithms for Wireless Networking and Mobile Computing (Chapman & Hall/Crc Computer & Information Science)
Ad hoc networking with directional antennas: a complete system solution
IEEE Journal on Selected Areas in Communications
A novel solution based on mobile agent for anonymity in wireless and mobile ad hoc networks
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
Proceedings of the 5th ACM symposium on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
A trust-based security system for ubiquitous and pervasive computing environments
Computer Communications
A secure mobile healthcare system using trust-based multicast scheme
IEEE Journal on Selected Areas in Communications - Special issue on wireless and pervasive communications for healthcare
Performance modelling of anonymity protocols
Performance Evaluation
Hi-index | 0.00 |
Malicious nodes in a mobile and wireless ad hoc network can be a threat to the security and/or anonymity of the exchanged data. While data encryption can protect the content exchanged between nodes, routing information may reveal the identities of communicating nodes and their relationships. This paper describes our effort to provide anonymous communication services in mobile and wireless ad hoc networks and proposes an anonymous routing protocol. Our protocol includes a mechanism to establish a trust among mobile nodes while avoiding untrustworthy nodes during the route discovery process. The major objective of our protocol is to allow only trustworthy intermediate nodes to participate in the routing protocol without jeopardizing the anonymity of the communicating nodes. We first present our scheme, and then report on its performance using an extensive set of simulation experiments using an ns-2 simulator. Compared to the non-secure DSR ad hoc routing protocol, our results indicate clearly that anonymity can be achieved in mobile ad hoc networks, and the additional overhead of our scheme is reasonably low.