On physical-layer identification of wireless devices

B Danev, D Zanetti, S Capkun - ACM Computing Surveys (CSUR), 2012 - dl.acm.org
Physical-layer device identification aims at identifying wireless devices during radio
communication by exploiting unique characteristics of their analog (radio) circuitry. This work …

Data collection for attack detection and security measurement in mobile ad hoc networks: A survey

G Liu, Z Yan, W Pedrycz - Journal of Network and Computer Applications, 2018 - Elsevier
Abstract Mobile Ad Hoc Network (MANET) is becoming one type of major next generation
wireless networks. Nevertheless, it easily suffers from various attacks due to its specific …

Discrete-continuous optimization for large-scale structure from motion

D Crandall, A Owens, N Snavely, D Huttenlocher - CVPR 2011, 2011 - ieeexplore.ieee.org
Recent work in structure from motion (SfM) has successfully built 3D models from large
unstructured collections of images downloaded from the Internet. Most approaches use …

ALARM: Anonymous location-aided routing in suspicious MANETs

K El Defrawy, G Tsudik - IEEE Transactions on Mobile …, 2010 - ieeexplore.ieee.org
In most common mobile ad hoc networking (MANET) scenarios, nodes establish
communication based on long-lasting public identities. However, in some hostile and …

ARM: Anonymous routing protocol for mobile ad hoc networks

S Seys, B Preneel - International Journal of Wireless and …, 2009 - inderscienceonline.com
In this paper we describe a novel anonymous on-demand routing protocol for wireless
Mobile Ad Hoc Networks (MANETs) that is secure against both nodes that actively …

ALERT: an anonymous location-based efficient routing protocol in MANETs

H Shen, L Zhao - IEEE transactions on mobile computing, 2012 - ieeexplore.ieee.org
Mobile Ad Hoc Networks (MANETs) use anonymous routing protocols that hide node
identities and/or routes from outside observers in order to provide anonymity protection …

Towards event source unobservability with minimum network traffic in sensor networks

Y Yang, M Shao, S Zhu, B Urgaonkar… - Proceedings of the first …, 2008 - dl.acm.org
Sensors deployed to monitor the surrounding environment report such information as event
type, location, and time when a real event of interest is detected. An adversary may identify …

Privacy-preserving location-based on-demand routing in MANETs

K El Defrawy, G Tsudik - IEEE journal on selected areas in …, 2011 - ieeexplore.ieee.org
Mobile Ad-Hoc Networks (MANETs) are particularly useful and well-suited for critical
scenarios, including military, law enforcement as well as emergency rescue and disaster …

Towards a security architecture for vehicular ad hoc networks

K Plossl, T Nowey, C Mletzko - First International Conference …, 2006 - ieeexplore.ieee.org
Vehicular ad hoc networks (VANETs) have the potential to increase road safety and comfort.
Especially because of the road safety functions, there is a strong demand for security in …

USOR: An unobservable secure on-demand routing protocol for mobile ad hoc networks

Z Wan, K Ren, M Gu - IEEE transactions on wireless …, 2012 - ieeexplore.ieee.org
Privacy-preserving routing is crucial for some ad hoc networks that require stronger privacy
protection. A number of schemes have been proposed to protect privacy in ad hoc networks …