An identity-free and on-demand routing scheme against anonymity threats in mobile ad hoc networks

J Kong, X Hong, M Gerla - IEEE transactions on mobile …, 2007 - ieeexplore.ieee.org
Introducing node mobility into the network also introduces new anonymity threats. This
important change of the concept of anonymity has recently attracted attentions in mobile …

Performance comparison of different multicast routing strategies in disruption tolerant networks

Q Ye, L Cheng, MC Chuah, BD Davison - Computer Communications, 2009 - Elsevier
Disruption Tolerant Networks (DTNs) technologies are emerging solutions to networks that
experience frequent partitions. As a result, multicast design in DTNs is a considerably more …

Quantifying the effectiveness of mobile phone virus response mechanisms

E Van Ruitenbeek, T Courtney… - 37th Annual IEEE …, 2007 - ieeexplore.ieee.org
Viruses that infect smartphones are emerging as a new front in the fight against computer
viruses. In this paper, we model the propagation of mobile phone viruses in order to study …

Authentication in a layered security approach for mobile ad hoc networks

N Komninos, DD Vergados, C Douligeris - computers & security, 2007 - Elsevier
An ad hoc network is a collection of nodes that do not need to rely on a predefined
infrastructure to keep the network connected. Nodes communicate amongst each other …

Mobility changes anonymity: new passive threats in mobile ad hoc networks

X Hong, J Kong, M Gerla - Wireless Communications and …, 2006 - Wiley Online Library
Privacy in mobile ad hoc networks has new semantics in addition to the conventional
notions for infrastructure networks. Mobility enabled by wireless communication has …

[图书][B] A taxonomy for and analysis of anonymous communications networks

DJ Kelly - 2009 - search.proquest.com
Any entity operating in cyberspace is susceptible to debilitating attacks. With cyber attacks
intended to gather intelligence and disrupt communications rapidly replacing the threat of …

Performance evaluation of anonymous routing protocols in MANETs

J Liu, J Kong, X Hong, M Gerla - … Wireless Communications and …, 2006 - ieeexplore.ieee.org
Mobile ad hoc networks require anonymous communications in order to thwart new wireless
passive attacks; and to protect new assets of information such as nodes' locations, motion …

Chain-based anonymous routing for wireless ad hoc networks

R Shokri, N Yazdani, A Khonsari - 4th IEEE Consumer …, 2007 - infoscience.epfl.ch
Wireless ad hoc networks are so vulnerable to passive attacks and eavesdropping
adversaries due to their shared medium which makes network traffic easy to capture and …

Anonymous routing in manet using random identifiers

R Shokri, M Yabandeh… - … Conference on Networking …, 2007 - ieeexplore.ieee.org
Anonymous communication methods, try to prevent traffic analysis attacks by hiding nodes'
identities from outside observers. As a result, adversaries can not find any correlation …

Improving the efficiency of anonymous routing for MANETs

JT Chen, R Boreli, V Sivaraman - Computer Communications, 2012 - Elsevier
Anonymity of mobile devices and their data is an essential requirement to facilitate the
deployment of future Mobile Ad hoc Networks. The currently proposed anonymous routing …