Achieving configural location privacy in location based routing for MANET

W Wang, C Cui - MILCOM 2008-2008 IEEE Military …, 2008 - ieeexplore.ieee.org
Research shows that location based routing can improve the performance and efficiency of
communication in mobile ad hoc networks. From another point of view, disclosure of location …

[引用][C] “任务-探究式” 教学模式在计算机基础教学中的应用

朱艳丽, 王川 - 福建电脑, 2009

[PDF][PDF] Performance metrics of wormhole detection using path tracing algorithm

M Reji, PCK Raja, C Joseph… - Indian Journal …, 2015 - sciresol.s3.us-east-2.amazonaws …
Abstract Objective: Mobile Adhoc Networks contains set of mobile nodes does not have a
fixed structure. It is very important to protect the network secure. The main aim of the paper is …

Averting in-situ adversaries in wireless sensor network using deceptive traffic

Y Ebrahimi, M Younis - 2011 IEEE Global Telecommunications …, 2011 - ieeexplore.ieee.org
Sensors in wireless sensor networks probe their surroundings and send their findings to a
nearby base-station over multi-hop routes. In a hostile application environment the network …

Effect of mobility and count of base-stations on the anonymity of wireless sensor networks

Z Ren, M Younis - 2011 7th International Wireless …, 2011 - ieeexplore.ieee.org
Wireless Sensor Networks (WSNs) can be deployed to serve mission-critical applications in
hostile environments such as battlefield and territorial borders. In these setups, the WSN …

Evaluation of a large-scale ubiquitous system model through peer-to-peer protocol simulation

J Barbosa, R Hahn, D Bonatto, F Cecin… - 11th IEEE International …, 2007 - ieeexplore.ieee.org
The ubiquitous computing scenario brings many new problems such as coping with the
limited processing power of mobile devices, frequent disconnections, the migration of code …

[PDF][PDF] Acimn protocol: A protocol for anonymous communication in multi hop wireless networks.

V Fusenig, D Spiewak, T Engel - WTS, 2007 - crpit.scem.westernsydney.edu.au
While communicating wireless every node residing in communication range of the sending
node is able to eavesdrop the communication. The content of the messages can be kept …

DD-SARP: Dynamic data secure Anonymous Routing Protocol for MANETs in attacking environments

S Imran, RV Karthick, P Visu - 2015 International Conference …, 2015 - ieeexplore.ieee.org
The most important application of MANETs is to maintain anonymous communication in
attacking environment. Though lots of anonymous protocols for secure routing have been …

Algorithmic advances in anonymous communication over networks

G Fanti, P Viswanath - 2016 Annual Conference on Information …, 2016 - ieeexplore.ieee.org
Over the years, researchers have thought extensively about how to communicate
anonymously over a network. In this position paper, we first provide an overview of the …

A statistical traffic pattern discovery system for manets

Y Qin, D Huang - MILCOM 2009-2009 IEEE Military …, 2009 - ieeexplore.ieee.org
Anonymous MANET routing relies on techniques such as re-encryption on each hop to hide
end-to-end communication relations. However, passive signal detectors and traffic analyzers …