Secure anonymous routing in ad hoc networks

T Rajendran, KV Sreenaath - Proceedings of the 1st Bangalore annual …, 2008 - dl.acm.org
Communication in Ad Hoc networks relies on the routing functionality of the intermediate
nodes. Secure routing and preventing traffic analysis are important criterion for secure …

Taro: Trusted anonymous routing for manets

J Chen, R Boreli, V Sivaraman - 2010 IEEE/IFIP International …, 2010 - ieeexplore.ieee.org
The currently proposed anonymous routing mechanisms for Mobile Ad hoc Networks enable
network entities to anonymously and securely communicate with each other. However …

Novel assessment metric and countermeasures for traffic attack threats in wireless sensor networks

Y Ebrahimi, M Younis - 37th Annual IEEE Conference on Local …, 2012 - ieeexplore.ieee.org
In wireless sensor networks, all data packets are routed from the individual sensor nodes
towards an in-situ base-station (BS). Such traffic pattern makes the BS vulnerable to …

[PDF][PDF] A study of efficient anonymous routing protocols in MANET

A Augustine - International Journal of Computer Applications, 2014 - researchgate.net
ABSTRACT Mobile Ad Hoc Network (MANET) is a type of wireless network without a fixed
topology consist a set of self organized nodes which are randomly, frequently and …

Anonymous aggregator election and data aggregation in wireless sensor networks

T Holczer, L Buttyán - International Journal of Distributed …, 2011 - journals.sagepub.com
In mission critical cyber-physical systems, dependability is an important requirement at all
layers of the system architecture. In this paper, we propose protocols that increase the …

[引用][C] 一个高效的双向无线Ad Hoc 网络匿名路由协议

张依惠, 许力, 陈泗盛 - 计算机应用, 2008

[PDF][PDF] A Survey on Anonymous Routing Protocols in Mobile Ad hoc Networks

V Madhumitha, S Kirubakaran - International Journal of Computer …, 2013 - academia.edu
ABSTRACT Mobile Ad hoc Networks (MANET) use anonymous routing protocols that hide
node identities and routes from outside observers in order to provide anonymity protection …

[PDF][PDF] Review of security approaches in routing protocol in mobile adhoc network

SR Gowda, PS Hiremath - … Journal of Computer Science Issues (IJCSI), 2013 - Citeseer
In this paper the objective is to present a review of routing protocols in mobile ad hoc
network (MANET) exclusively from security viewpoint. In MANET, the mobile nodes often …

A new collision-free pseudonym scheme in mobile ad hoc networks

JW Yoon, H Kim - … Symposium on Modeling and Optimization in …, 2009 - ieeexplore.ieee.org
A mobile ad hoc network (MANET) is a decentralized network of mobile nodes. Due to the
broadcast nature of radio transmissions, communication in MANETs is more susceptible to …

Anonymous end-to-end communications in adversarial mobile clouds

CA Ardagna, K Ariyapala, M Conti, CM Pinotti… - Pervasive and Mobile …, 2017 - Elsevier
Today's mobile devices have changed the way we interact with technology. Internet, cloud
access, online banking, instant messaging, and file exchange through the cloud are just a …