Anonymous routing: A cross-layer coupling between application and network layer

S Li, A Ephremides - 2006 40th Annual Conference on …, 2006 - ieeexplore.ieee.org
Implementation of any anonymous routing protocols relies on the cryptographic tools
provided at the application layer. This paper takes a joint consideration of these two layers …

Delay anonymity tradeoff in mix networks: Optimal routing

O Javidbakht… - IEEE/ACM Transactions …, 2017 - ieeexplore.ieee.org
Anonymous systems on the Internet aim to protect users from revealing to an external
unauthorized entity their identities and their network activities. Despite using layered …

Quantification of anonymity for mobile ad hoc networks

MEG Moe - Electronic Notes in Theoretical Computer Science, 2009 - Elsevier
We propose a probabilistic system model for anonymous ad hoc routing protocols that takes
into account the a priori knowledge of the adversary, and illustrate how the information …

On the use of distributed relays to increase base station anonymity in wireless sensor networks

JR Ward, M Younis - MILCOM 2012-2012 IEEE Military …, 2012 - ieeexplore.ieee.org
In recent years, Wireless Sensor Networks (WSNs) have become valuable assets to both the
commercial and military communities with applications ranging from industrial control on a …

On convergence rate of autonomous decentralized structure formation technology for clustering in ad hoc networks

K Takagi, Y Sakumoto, C Takano… - 2012 32nd International …, 2012 - ieeexplore.ieee.org
Hierarchization by clustering is effective for scalable routing control in an ad hoc network.
Due to a constraint from structural features of ad hoc networks, clustering in ad hoc networks …

SDBR: a secure depth-based anonymous routing protocol in underwater acoustic networks

C Peng, X Du - International Journal of Performability Engineering, 2017 - ijpe-online.com
Underwater Acoustic Networks (UANs) adopt acoustic communication. The opening and
sharing features of underwater acoustic channel make communication in UANs vulnerable …

Clustering-based mitigation of anonymity attacks in wireless sensor networks

S Alsemairi, M Younis - 2015 IEEE Global Communications …, 2015 - ieeexplore.ieee.org
The use of wireless sensor networks (WSNs) can be advantageous in applications that
serve in hostile environments such as security surveillance and military battlefield. The …

An overview of anonymous communications in mobile ad hoc networks

M Nácher, CT Calafate, JC Cano… - … and Mobile Computing, 2012 - Wiley Online Library
Security is an important topic in the context of mobile ad hoc networks (MANETs). The
particular features of these networks, such as the use of open air as the transmission …

[PDF][PDF] Anonymous Location-Support and Self-Reliance Routing Protocol For Manet

M Balamurugan, MS Anand, DS Kumar… - Indian Journal of Public …, 2018 - academia.edu
ABSTRACT Mobile Adhoc Network (MANET) is comprised of mobile nodes where each
mobile node can act as of any type like starter, router and terminal. While performing node …

On the privacy and performance of mobile anonymous microblogging

M Senftleben, A Barroso, M Bucicoiu… - IEEE Transactions …, 2016 - ieeexplore.ieee.org
Microblogging is a popular form of online social networking activity. It allows users to send
messages in a one-to-many publish-subscribe manner. Most current service providers are …