Prism: Privacy-friendly routing in suspicious manets (and vanets)

K El Defrawy, G Tsudik - 2008 IEEE International Conference …, 2008 - ieeexplore.ieee.org
Mobile Ad-Hoc Networks (MANETs) are particularly useful and well-suited for critical
scenarios, including military, law enforcement as well as emergency rescue and disaster …

STARS: A statistical traffic pattern discovery system for MANETs

Y Qin, D Huang, B Li - IEEE Transactions on Dependable and …, 2013 - ieeexplore.ieee.org
Many anonymity enhancing techniques have been proposed based on packet encryption to
protect the communication anonymity of mobile ad hoc networks (MANETs). However, in this …

Load-conscious maximization of base-station location privacy in wireless sensor networks

N Baroutis, M Younis - Computer Networks, 2017 - Elsevier
In various applications of Wireless Sensor Networks (WSNs), sensor nodes forward data
packets towards an in-situ base-station (BS) over multi-hop routes. The BS not only collects …

An anonymous end-to-end communication protocol for mobile cloud environments

CA Ardagna, M Conti, M Leone… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
The increasing spread of mobile cloud computing paradigm is changing the traditional
mobile communication infrastructure. Today, smartphones can rely on virtual …

Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks

D Huang - International Journal of Security and Networks, 2007 - inderscienceonline.com
Key management for anonymous communication in mobile ad hoc networks is a critical but
unsolved problem. Many current anonymous mobile ad hoc routing protocols assume that …

Using deceptive packets to increase base-station anonymity in wireless sensor network

Y Ebrahimi, M Younis - 2011 7th International Wireless …, 2011 - ieeexplore.ieee.org
In wireless sensor networks, nodes probe ambient conditions in their surrounding and report
back to the base-station via multi-hop routing. In a hostile environment the network may be …

Analysis of location privacy solutions in wireless sensor networks

R Rios, J Lopez - Iet Communications, 2011 - IET
Extensive work has been done on the protection of wireless sensor networks (WSNs) from
the hardware to the application layer. However, only recently, the privacy preservation …

On measuring anonymity for wireless mobile ad-hoc networks

D Huang - Proceedings. 2006 31st IEEE Conference on Local …, 2006 - ieeexplore.ieee.org
We propose an evidence theory based anonymity measuring approach for wireless mobile
ad-hoc networks. In our approach, an evidence is a measure of the number of detected …

Cross-layer traffic analysis countermeasures against adaptive attackers of wireless sensor networks

JR Ward, M Younis - Wireless Networks, 2019 - Springer
Abstract In most Wireless Sensor Network (WSN) applications the sensor nodes forward
their measurements to a central base station (BS). The unique role of the BS makes it a …

Security issues in mobile ad hoc network

N Islam, ZA Shaikh - Wireless Networks and Security: Issues, Challenges …, 2013 - Springer
Abstract Mobile Ad hoc Networks (MANET) are infrastructure-less networks characterized by
lack of prior configuration and the hostile environments. Their unique properties make them …