10
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

Anonymous Routing for Mobile Wireless Ad Hoc Networks

, , &
Pages 105-117 | Published online: 14 Feb 2007

References

  • Vesa Karpijoki. Security in Ad hoc Networks. In Proceedings of the Helsinki University of Technology, Seminars on Network Security, Helsinki, Finland, 2000 http://ntrg.cs.tcd.ie/htewari/papers/netsec00_manet_sec.pdf
  • Zhou , L. and Haas , Z. J. 1999 . Securing Ad Hoc Networks . IEEE Network Magazine , 13 ( 6 ) November/December : 24 – 30 .
  • Janne Lundberg. Routing Security in Ad Hoc Networks. http://citeseer.nj.nec.com/400961.html
  • Stajano , F. and Anderson , R.J. 2000 . The Resurrecting Duckling: Security Issues in Ad-Hoc Wireless Networks . Proc. Seventh Security Protocols Workshop, Lecture Notes in Computer Science 1796 . 2000 , Springer-Verlag, Berlin. pp. 172 – 182 .
  • Deng , H. , Li , W. and Agrawal , D. 2002 . Routing Security in Wireless Ad Hoc Networks . IEEE Communications Magazine . Oct. 2002 . pp. 70 – 75 .
  • Lakshmi , Venkatraman and Agrawal , Dharma P. Startegies for Enhancing Routing Security in Protocols for Mobile Ad hoc Networks . JPDC Special Issue on Mobile Ad Hoc Networking and Computing . accepted for publication
  • Davis , C. R. 2000 . IPSec: Securing VPNs , New York : McGraw-Hill .
  • Zhou , L. and Haas , J. 1999 . Securing Ad Hoc Networks . IEEE Network , 13 ( 6 ) : 24 – 30 .
  • HuBaux , J. P. , Buttyan , L. and Capkun , S. 2001 . The Quest for Security in Mobile Ad Hoc Networks . Proc. ACM MobiHoc . October 2001 .
  • Yi , S. , Naldurg , P. and Kravets , R. Security-aware ad hoc routing for wireless networks . Technical Report UIUCDCS-R-2001- 2241, UILU-ENG-2001–1748 . August 2001 . University of Illinois at Urbana–Champaign
  • ([PKIX])Public-Key Infrastructure (X.509). IETF Working Group http://www.ietf.org/html.charters/pkix-charter.html
  • Schneir , B. 1996 . Applied Cryptography , New York : John Wiley & Sons, Inc. .
  • Johnson , David B. and Maltz , Davis A. 1999 . The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks . IETF Draft , October : 49
  • Perkins , C.E. and Royer , E.M. 1999 . Ad-hoc On Demand Distance Vector Routing . Proceedings of the 2nd IEEE Workshop on Mobile Computing Systems and Applications . February 1999 , New Orleans, LA. pp. 90 – 100 .
  • Ni , S. Y. 1999 . The Broadcast Storm Problem in a Mobile Ad Hoc Network . ACM MOBICOM , 15 Aug. : 1 – 162 .
  • Haas , Halpern and Li . 2002 . Gossip Based Ad Hoc Routing . IEEE INFOCOM . June 2002 .
  • Diffie , W. and Hellman , M.E. 1976 . New Directions in Cryptography . IEEE Transactions on Information Theory , IT-22 ( 6 ) Nov : 644 – 654 .
  • Kachirski , Oleg and Guha , Ratan . Intrusion Detection Using Mobile Agents in Wireless Ad Hoc Networks . IEEE Workshop on Knowledge Media Networking .
  • Ramanujan , R. , Kudige , S. , Nguyen , T. , Takkella , S. and Adelstein , F. 2002 . Intrusion-Resistant Ad Hoc Wireless Networks . Proceedings of MILCOM 2002 . Oct 2002 .
  • Yongguang , Zhang and Lee , Wenke . 2000 . Intrusion Detection in Wireless Ad-Hoc Networks . Proceedings of The Sixth International Conference on Mobile Computing and Networking . August 2000 , Boston, MA.
  • Pfitzmann , A. and Waidner , M. 1987 . Networks Without User Observability . Computer Security , 6 ( 2 ) : 158 – 166 .
  • Reiter , M. K. and Rubin , A. D. 1998 . Crowds: Anonymity for Web Transactions . ACM Transactions on Information and System Security , 1 ( 1 ) : 66 – 92 .
  • Chaum , D. 1981 . Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms . Communication of the ACM , 24 ( 2 ) : 84 – 88 .
  • Pfitzmann , A. , Pfitzmann , B. and Waidner , M. . ISDN-MIXes – Untraceable Communication with Very Small Bandwidth Overhead . Proc. Kommunikation in Verteilten Systemen . pp. 451 – 463 .
  • Rackoff , C. and Simon , D. . Cryptographic Defense Against Traffic Analysis . Proc. of the 25th Annual. ACM Symp. on the Theory of Computing . pp. 672 – 681 .
  • Syverson , P. F. , Goldsclag , D. M. and Reed , M. G. . Anonymous connections and onion routing . Proc. of IEEE Symposium on Security and Privacy . pp. 44 – 54 .
  • Anonymizer – Online Privacy and Security www.anonymizer.com
  • Niculescu , D. and Nath , B. . Ad Hoc Positioning (APS) using AoA . Proceedings of INFOCOM. 2003 . 30 March-3 April 2003 , San Francisco, CA.
  • Bahl , P. and Padmanabhan , V. N. 2000 . RADAR: An In-Building RF-Based User Location and Tracking System . Proceedings of the IEEE INFOCOM 2000 . March 2000 , Tel Aviv, Israel.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.