USOR: An unobservable secure on-demand routing protocol for mobile ad hoc networks

Z Wan, K Ren, M Gu - IEEE transactions on wireless …, 2012 - ieeexplore.ieee.org
Privacy-preserving routing is crucial for some ad hoc networks that require stronger privacy
protection. A number of schemes have been proposed to protect privacy in ad hoc networks …

[PDF][PDF] Anonymizing Geographic Routing for Preserving Location Privacy Using Unlink ability and Unobservability

KGS Venkatesan, R Resmi, R Remya - International Journal, 2014 - researchgate.net
Privacy-preserving routing is crucial for some Ad Hoc networks that require stronger privacy
protection. A number of schemes have been proposed to protect privacy in Ad Hoc networks …

ARM: Anonymous routing protocol for mobile ad hoc networks

S Seys, B Preneel - International Journal of Wireless and …, 2009 - inderscienceonline.com
In this paper we describe a novel anonymous on-demand routing protocol for wireless
Mobile Ad Hoc Networks (MANETs) that is secure against both nodes that actively …

Chain-based anonymous routing for wireless ad hoc networks

R Shokri, N Yazdani, A Khonsari - 4th IEEE Consumer …, 2007 - infoscience.epfl.ch
Wireless ad hoc networks are so vulnerable to passive attacks and eavesdropping
adversaries due to their shared medium which makes network traffic easy to capture and …

Anonymous secure routing in mobile ad-hoc networks

B Zhu, Z Wan, MS Kankanhalli, F Bao… - 29th annual IEEE …, 2004 - ieeexplore.ieee.org
Although there are a large number of papers on secure routing in mobile ad-hoc networks,
only a few consider the anonymity issue. We define more strict requirements on the …

SDAR: a secure distributed anonymous routing protocol for wireless and mobile ad hoc networks

A Boukerche, K El-Khatib, L Xu… - 29th Annual IEEE …, 2004 - ieeexplore.ieee.org
Providing security and privacy in mobile ad hoc networks has been a major issue over the
last few years. Most research work has so far focused on providing security for routing and …

A secure anonymous routing protocol with authenticated key exchange for ad hoc networks

R Lu, Z Cao, L Wang, C Sun - Computer Standards & Interfaces, 2007 - Elsevier
Anonymity and authenticated key exchange should be paid much more attention in secure
mobile ad hoc routing protocols, especially in privacy-vital environment. However, as far as …

Real-time anonymous routing for mobile ad hoc networks

JC Kao, R Marculescu - 2007 IEEE Wireless Communications …, 2007 - ieeexplore.ieee.org
We propose the anonymous symmetrically cryptographic (ASC) routing protocol which is
entirely based on a symmetric cryptosystem. The ASC protocol preserves the identity …

Privacy-preserving location-based on-demand routing in MANETs

K El Defrawy, G Tsudik - IEEE journal on selected areas in …, 2011 - ieeexplore.ieee.org
Mobile Ad-Hoc Networks (MANETs) are particularly useful and well-suited for critical
scenarios, including military, law enforcement as well as emergency rescue and disaster …

Ao2p: Ad hoc on-demand position-based private routing protocol

X Wu, B Bhargava - IEEE Transactions on Mobile Computing, 2005 - ieeexplore.ieee.org
Privacy is needed in ad hoc networks. An ad hoc on-demand position-based private routing
algorithm, called AO2P, is proposed for communication anonymity. Only the position of the …