Technical privacy metrics: a systematic survey

I Wagner, D Eckhoff - ACM Computing Surveys (Csur), 2018 - dl.acm.org
The goal of privacy metrics is to measure the degree of privacy enjoyed by users in a system
and the amount of protection offered by privacy-enhancing technologies. In this way, privacy …

ALARM: Anonymous location-aided routing in suspicious MANETs

K El Defrawy, G Tsudik - IEEE Transactions on Mobile …, 2010 - ieeexplore.ieee.org
In most common mobile ad hoc networking (MANET) scenarios, nodes establish
communication based on long-lasting public identities. However, in some hostile and …

Exploring extant and emerging issues in anonymous networks: A taxonomy and survey of protocols and metrics

D Kelly, R Raines, R Baldwin… - … Surveys & Tutorials, 2011 - ieeexplore.ieee.org
The desire to preserve privacy in cyberspace drives research in the area of anonymous
networks. Any entity operating in cyberspace is susceptible to debilitating cyber attacks. As …

AASR: authenticated anonymous secure routing for MANETs in adversarial environments

W Liu, M Yu - IEEE transactions on vehicular technology, 2014 - ieeexplore.ieee.org
Anonymous communications are important for many of the applications of mobile ad hoc
networks (MANETs) deployed in adversary environments. A major requirement on the …

Privacy-preserving location-based on-demand routing in MANETs

K El Defrawy, G Tsudik - IEEE journal on selected areas in …, 2011 - ieeexplore.ieee.org
Mobile Ad-Hoc Networks (MANETs) are particularly useful and well-suited for critical
scenarios, including military, law enforcement as well as emergency rescue and disaster …

Pairwise and triple key distribution in wireless sensor networks with applications

S Ruj, A Nayak, I Stojmenovic - IEEE Transactions on …, 2012 - ieeexplore.ieee.org
We address pairwise and (for the first time) triple key establishment problems in wireless
sensor networks (WSN). Several types of combinatorial designs have already been applied …

USOR: An unobservable secure on-demand routing protocol for mobile ad hoc networks

Z Wan, K Ren, M Gu - IEEE transactions on wireless …, 2012 - ieeexplore.ieee.org
Privacy-preserving routing is crucial for some ad hoc networks that require stronger privacy
protection. A number of schemes have been proposed to protect privacy in ad hoc networks …

SAT: A security architecture achieving anonymity and traceability in wireless mesh networks

J Sun, C Zhang, Y Zhang, Y Fang - IEEE Transactions on …, 2010 - ieeexplore.ieee.org
Anonymity has received increasing attention in the literature due to the users' awareness of
their privacy nowadays. Anonymity provides protection for users to enjoy network services …

A study on improving secure routing performance using trust model in MANET

H Yang - Mobile Information Systems, 2020 - Wiley Online Library
MANET is utilized in many fields because of its advantage in quickly establishing networks.
The network will perform well if mobile nodes trust each other and act cooperatively …

Increasing base-station anonymity in wireless sensor networks

U Acharya, M Younis - Ad Hoc Networks, 2010 - Elsevier
Nodes in a wireless sensor network (WSN) probe their surroundings and report their
findings to a base-station over multi-hop paths. Given the important role of the base-station …