|
[1] Cmumonarchgroup,cmumonarchextensions to the ns-2 simulator 1998. available from http://monarch.cs.cmu.edu/cmu-ns.html/. [2] Ieee standard 802.11-2007: Ieee standard for information technology, telecommunications and information exchange between systems, local and metropolitan area networks, specific requirements, part 11: Wireless lan medium access(mac) and physical layer(phy) specifications, june 2007. [3] K. fall, and k. varadhan, editors. the ns manual (formerly called "ns notes and documentation"). the vint project, uc berkeley, lbl, usc/isi, and xerox parc, june 2007. available from http://www.isi.edu/nsnam/ns/. [4] Onion routing. available from http://www.onion-router.net/. [5] B. Adam, M. Ulf, and S. Anton. Analysis attacks and trade-offs in anonymity providing systems. In Proceedings of the 5th International workshop on Information hiding (IH), 2001. [6] S.R. Afzal, S. Biswas, K. Jong-bin, T. Raza, L. Gunhee, and K. Dong-kyoo. Rsrp: A robust secure routing protocol for mobile ad hoc networks. In Proceedings of the IEEE International Conference on Wireless Communications and Networking (WCNC), March 2008. [7] O. Berthold, H. Federrath, and S. Kopsell. Web mixes: A system for anonymous and unobservable internet access. In Proceedings of the Workshop Design Issues in Anonymity and Unobservability (DIAU ), 2000. [8] D. Boneh, X. Boyen, and H. Shacham. Short group signatures. In Proceedings of the Advance in Cryptology|Crypto, 2004. [9] A. Boukerche, K. El-Khatib, L. Xu, and L. Korba. A novel solution for achieving anonymity in wireless ad hoc networks. In Proceedings of the 1st ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks, 2004. [10] A. Boukerche, K. El-Khatib, L. Xu, and L. Korba. Sdar: a secure distributed anonymous routing protocol for wireless and mobile ad hoc networks. In Proceedings of the 29th IEEE International Conference on Local Computer Networks (LCN), 2004. [11] H. Chen, H. Benxiong, M. Yijun, and M. Jianhua. A secure routing protocol based on token escrow set for ad hoc networks. In Proceedings of the 22th IEEE International Conference on Advanced Information Networking and Applications (AINA), March 2008. [12] C. Díaz, S. Seys, J. Claessens, and B. Preneel. Towards measuring anonymity. Proc. Privacy Enhancing Technologies Workshop (PET02), R. Dingledine and P. Syverson, Eds. Springer-Verlag, LNCS 2482, Apr 2002. [13] K. El-Khatib, L. Korba, R. Song, and G. Yee. Secure dynamic distributed routing algorithm for ad hoc wireless networks. In Proceedings of the IEEE International Conference on Parallel Processing Workshops (ICPPW), Oct 2003. [14] R. L. Gilaberte and L. P. Herrero. A secure routing protocol for ad hoc networks based on trust. In Proceedings of the 3th IEEE International Conference on Networking and Services (ICNS), June 2007. [15] S. Han, J. Wang, and W. Liu. An e±cient identity-based group signature scheme over elliptic curves. In Proceedings of the 3rd European conference on universal multiservice networks (ECUMN), Oct 2004. [16] L. Huaizhi and M. Singhal. A secure routing protocol for wireless ad hoc networks. In Proceedings of the 39th Annual Hawaii International Conference on System Sciences (HICSS), Jan 2006. [17] D. Kesdogan, J. Egner, and R. Buschkes. Stop-and-go mixes providing probabilistic security in an open system. In Proceedings of the Second International Workshop on Information Hiding (IH), 1998. [18] J. Kong and X. Hong. Anodr: anonymous on demand routing with untraceable routes for mobile ad-hoc networks. In Proceedings of the 4th ACM international symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2003. [19] J. Kong, X. Hong, and M. Gerla. An identity-free and on-demand routing scheme against anonymity threats in mobile ad hoc networks. IEEE Transactions on Mobile Computing, 6(8):888--902, Aug 2007. [20] Y. Lee, H. Kim, B. Chung, J. Lee, and H. Yoon. On-demand secure routing protocol for ad hoc network using id based cryptosystem. In Proceedings of the 4th IEEE International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT), Aug 2003. [21] Colin J. Lemmon and Phillip Musumeci. Boundary mapping and boundary state routing (bsr) in ad hoc networks. IEEE Transactions on Mobile Computing, 7(1):127--139, Jan 2008. [22] Y. Ming, Z. Mengchu, and S. Wei. A secure routing protocol against byzantine attacks for manets in adversarial environments. IEEE Transactions on Vehicular Technology, 58(1):449--460, Jan 2009. [23] A. Miyaji and K. Umeda. A fully-functional group signature scheme over only known-order group. In Proceedings of the applied cryptography and network security (ACNS), June 2004. [24] P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Proceedings of Advances in Cryptology - EUROCRYPT, pages 223--238, 1999. [25] Charles E. Perkins and Pravin Bhagwat. Highly dynamic destination-sequenced distance-vector routing(dsdv) for mobile computers. SIGCOMM Comput. Commun. Rev., 24(4):234{244, 1994. [26] A. Pfitzmann and M. KÄohntopp. Anonymity, unobservability, and pseudonymity: A proposal for terminology. Proc. Workshop on Design Issues in Anonymity and Unobservability, pages 1--9, 2000. [27] A. Pfitzmann, B. Pfitzmann, and M. Waidner. Isdnmixes: Untraceable communication with very small bandwidth overhead. In Proceedings of the GI/ITG Conference Communication Distributed Systems, 1991. [28] Sk. Md. Mizanur Rahman, Masahiro MAMBO, Atsuo INOMATA, and Eiji OKAMOTO. An anonymous on-demand position-based routing in mobile ad hoc networks. In Proceedings of the Symposium on Applications and the Internet, 2005. [29] J. F. Raymond. Tra±c analysis: Protocols, attacks, design issues, and open problems. In Proceedings of the International workshop on Designing privacy enhancing technologies Systems, 2001. [30] A. Serjantov and G. Danezis. Towards an information theoretic metric for anonymity. Proc. Privacy Enhancing Technologies Workshop (PET02), R. Dingledine and P. Syverson, Eds. Springer-Verlag, LNCS 2482, Apr 2002. [31] S. Seys and B. Preneel. Arm: anonymous routing protocol for mobile ad hoc networks. In Proceedings of the 20th IEEE International Conference on Advanced Information Networking and Applications (AINA), 2006. [32] Binod Vaidya, JaeYoung Pyun, JongAn Park, and SeungJo Han. Secure multipath routing scheme for mibile ad hoc network. IEEE International Symposiumon Dependable, Autonomic and Secure Computing, 2007. [33] G. Wang. Security analysis of several group signature schemes. In Proceedings of 4th International Conference on Cryptology in India (INDOCRYPT), Dec 2003. [34] Xiaoxin Wu, Jun Liu, Xiaoyan Hong, and Elisa Bertino. Anonymous geo-forwarding in manets through location cloacking. IEEE Transactions on Parallel and Distributed Systems, 19(10):1297{1309, Oct 2008. [35] R. J. Yang, Q. Xia, Q. H. Pan, W. N. Wang, and M. L. Li. New enhancement scheme for secure routing protocol in mobile ad hoc networks. In Proceedings of the 5th International Conference on Computer and Information Technology(CIT), Sept 2005. [36] Y. Zafoune and A. Mokhtari. Reactive vs proactive protocol: a comparative study between two localization approaches of mobile codes in ad hoc mobile networks. Computer Networks, 2006 International Symposium, 2006. [37] J. Zhang, Q. Wu, and Y. Wang. A novel efficient group signature with forward security. In Proceedings of the 5th International Conference on Information Communication Security, Oct 2003. [38] Y. Zhang, W. Liu, and W. Lou. Anonymous communications in mobile ad hoc networks. In Proceedings of the 24th IEEE International Conference on INFOCOM, 2005. [39] Yao Zhao, Yan Chen, Bo Li, and Qian Zhang. Hop id: A virtual coordinate-based routing for sparse mobile ad hoc networks. IEEE Transactions on Mobile Computing, 6(9):1075--1089, Jan 2007. [40] L. Zhitang and S. Shudong. A secure routing protocol for mobile ad hoc networks. In Proceedings of the IEEE International Conference on Computer and Information Science (ICIS), July 2007. [41] B. Zhu, Z.Wan, M. Kankanhalli, F. Bao, and R. Deng. Anonymous secure routing in mobile ad-hoc networks. In Proceedings of the 29th IEEE International Conference on Local Computer Networks (LCN), 2004.
|