|
[1] Cmumonarchgroup,cmumonarchextensions to the ns-2 simulator 1998. available from http://monarch.cs.cmu.edu/cmu-ns.html/. [2] K. fall, and k. varadhan, editors. the ns manual (formerly called "ns notes and documentation"). the vint project, uc berkeley, lbl, usc/isi, and xerox parc, june 2007. available from http://www.isi.edu/nsnam/ns/. [3] A. Back, U. Moller, and A. Stiglic. Traffic analysis attacks and trade-offs in anonymity providing systems. Lecture Notes in Computer Science, 2137(245-257):76, 2001. [4] O. Berthold, H. Federrath, and S. Kopsell. Web mixes: A system for anonymous and unobservable internet access. Proceedings of the Workshop Design Issues in Anonymity and Unobservability (DIAU ), 2000. [5] C. Bettstetter, H. Hartenstein, and X. P¶erez-Costa. Stochastic properties of the random waypoint mobility model. Wireless Networks, 10(5):555{567, 2004. [6] C. Bettstetter and C. Wagner. The spatial node distribution of the random waypoint mobility model. In German Workshop on Mobile Ad Hoc Networks (WMAN), pages 41{58, 2002. [7] D. Boneh, X. Boyen, and H. Shacham. Short group signatures. Proceedings of the Advance in Cryptology|Crypto, 2004. [8] A. Boukerche, K. El-Khatib, L. Xu, and L. Korba. A novel solution for achieving anonymity in wireless ad hoc networks. Proceedings of the 1st ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks, 2004. [9] A. Boukerche, K. El-Khatib, L. Xu, and L. Korba. Sdar: a secure distributed anonymous routing protocol for wireless and mobile ad hoc networks. Proceedings of the 29th IEEE International Conference on Local Computer Networks (LCN), 2004. [10] N. Cressie. Statistics for spatial data. Terra Nova, 4(5):613{617, 1992. [11] K. El-Khatib, L. Korba, R. Song, and G. Yee. Secure dynamic distributed routing algorithm for ad hoc wireless networks. Proceedings of the IEEE International Conference on Parallel Processing Workshops (ICPPW), Oct 2003. [12] R. L. Gilaberte and L. P. Herrero. A secure routing protocol for ad hoc networks based on trust. Proceedings of the 3th IEEE International Conference on Networking and Services (ICNS), June 2007. [13] S. Han, J. Wang, and W. Liu. An e±cient identity-based group signature scheme over elliptic curves. Proceedings of the 3rd European conference on universal multiservice networks (ECUMN), Oct 2004. [14] B. Karp and HT Kung. GPSR: greedy perimeter stateless routing for wireless networks. In Proceedings of the 6th annual international conference on Mobile computing and networking, pages 243{254. ACM New York, NY, USA, 2000. [15] D. Kesdogan, J. Egner, and R. Buschkes. Stop-and-go mixes providing probabilistic security in an open system. Proceedings of the Second International Workshop on Information Hiding (IH), 1998. [16] J. Kong and X. Hong. Anodr: anonymous on demand routing with untraceable routes for mobile ad-hoc networks. Proceedings of the 4th ACM international symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), 2003. [17] J. Kong, X. Hong, and M. Gerla. An identity-free and on-demand routing scheme against anonymity threats in mobile ad hoc networks. IEEE Transactions on Mobile Computing, 6(8):888{902, Aug 2007. [18] Y. Lee, H. Kim, B. Chung, J. Lee, and H. Yoon. On-demand secure routing protocol for ad hoc network using id based cryptosystem. Proceedings of the 4th IEEE International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT), Aug 2003. [19] H. Li and M. Singhal. A secure routing protocol for wireless ad hoc networks.In HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, volume 39, page 225. IEEE, 2006. [20] A. Miyaji and K. Umeda. A fully-functional group signature scheme over only known-order group. Proceedings of the applied cryptography and network security (ACNS), June 2004. [21] A. P‾tzmann, B. P‾tzmann, and M. Waidner. Isdnmixes: Untraceable communication with very small bandwidth overhead. Proceedings of the GI/ITG Conference Communication Distributed Systems, 1991. [22] J. F. Raymond. Tra±c analysis: Protocols, attacks, design issues, and open problems. Proceedings of the International workshop on Designing privacy enhancing technologies Systems, 2001. [23] G. Resta and P. Santi. An analysis of the node spatial distribution of the random waypoint mobility model for ad hoc networks. In Proceedings of the second ACM international workshop on Principles of mobile computing, pages 44{50. ACM New York, NY, USA, 2002. [24] S. Seys and B. Preneel. Arm: anonymous routing protocol for mobile ad hoc networks. Proceedings of the 20th IEEE International Conference on Advanced Information Networking and Applications (AINA), 2006. [25] G. Wang. Security analysis of several group signature schemes. Proceedings of 4th International Conference on Cryptology in India (INDOCRYPT), Dec 2003. [26] X. Wu and E. Bertino. An Analysis Study on Zone-Based Anonymous Communication in Mobile Ad Hoc Networks. IEEE Transactions on Dependable and Secure Computing, 4(4):252{265, 2007. [27] X. Wu, J. Liu, X. Hong, and E. Bertino. Anonymous Geo-Forwarding in MANETs through Location Cloaking. IEEE Transactions on Parallel and Distributed Systems, 19(10):1297{1309, 2008. [28] R.J. Yang, Q. Xia, Q.H. Pan, W.N. Wang, and M.L. Li. New enhancement scheme for secure routing protocol in mobile ad hoc networks. In Proceedings of the The Fifth International Conference on Computer and Information Technology, pages 685{689. IEEE Computer Society Washington, DC, USA, 2005. [29] J. Zhang, Q. Wu, and Y. Wang. A novel e±cient group signature with forward security. Proceedings of the 5th International Conference on Information Communication Security, Oct 2003. [30] Y. Zhang, W. Liu, and W. Lou. Anonymous communications in mobile ad hoc networks. Proceedings of the 24th IEEE International Conference on INFOCOM, 2005. [31] L. Zhitang and S. Shudong. A secure routing protocol for mobile ad hoc networks. Proceedings of the IEEE International Conference on Computer and Information Science (ICIS), July 2007. [32] B. Zhu, Z. Wan, M. Kankanhalli, F. Bao, and R. Deng. Anonymous secure routing in mobile ad-hoc networks. Proceedings of the 29th IEEE International Conference on Local Computer Networks (LCN), 2004.
|