|
[1] L. Bao, "A New Approach to Anonymous Multicast Routing in Ad Hoc Networks," Proceedings of the International Conference Communications Networks, pp. 1004- 1008, China, 2008. [2] C. Castelluccia and P. Mutaf, "Hash-Based Dynamic Source Routing," Lecture Notes in Computer Science, vol. 3042, pp. 1012-1023, 2004. [3] W. Dai, "Crypto++ 5.6.0 Benchmarks," Available: http://www.cryptopp.com/benchmarks.html, March, 2010. [4] S. Dabideen, B. R. Smith and J. J. Garcia-Luna-Aceves, "An End-to-End Solution for Secure and Survivable Routing in MANETs," Proceedings of the 2009 7th International Workshop on the Design of Reliable Communication Networks, pp. 183-190, Alexandria, VA, United States, October, 2009. [5] S. Denh, C. Rex and B. Lichun, "ODAR: On-Demand Anonymous Routing in Ad Hoc Networks," Proceedings of the 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems, pp. 267-276, Vancouver, BC, Canada, October, 2006. [6] K. El-Khatib, L. Korba, R. Song, and G. Yee, "Secure Dynamic Distributed Routing Algorithm for Ad Hoc Wireless Networks," Proceedings of the International Conference on Parallel Processing Workshops, pp. 359-366, Kaohsiung, Taiwan, October, 2003. [7] D. Johnson and D. Maltz, "Dynamic Source Routing in Ad Hoc Wireless Networks," Proceedings of the ACM Special Interest Group on Data Communication - Computer Communication, Palo Alto, 1996. [8] J.-C. Kao and R. Marculescu, "Energy-E cient Anonymous Multicast in Mobile Ad-Hoc Networks," Proceedings of the International Conference on Parallel and Distributed Systems, Hsinchu, Taiwan, December, 2007. [9] B. Karp and H.T. Kung, "GPSR: Greedy Perimeters Stateless Routing for Wireless Network," Proceedings of the Annual International Conference on Mobile Computing and Networking, pp. 243-254, 2000. [10] J. Kong and X. Hong, "ANODR: Anonymous On Demand Routing with Untrace- able Routes for Mobile Ad-hoc Networks," Proceedings of the 4th ACM International Symposium on Mobile Ad Hoc Networking and Computing, pp. 291-302, 2003. [11] J. Liu, F. Fu, J. Xiao, and Y. Lu, "Secure Routing for Mobile Ad hoc Networks," Proceedings of the Eighth ACIS International Conference on Software Engineering, Arti cial Intelligence, Networking, and Parallel/Distributed Computing, pp. 314-318, Qingdao, China, 2007. [12] J. Pan and J. Li, "MASR: An E cient Strong Anonymous Routing Protocol For Mobile Ad Hoc Networks," Proceedings of the International Conference on Management and Service Science, Wuhan, China, September, 2009. [13] P. Papadimitratos and Z. J. Haas, "Secure Routing for Mobile Ad hoc Networks," Proceedings of the SCS Communication Networks and Distributed Systems Modeling and Simulation Conference, San Antonio, TX, January, 2002. [14] C.E. Perkins and E.M. Royer, "Ad Hoc On-Demand Distance Vector Routing," Proceedings of the Second IEEE Workshop Mobile Computing Systems and Applications, pp. 90-100, New Orleans, Los Angles, 1999. [15] M. G. Reed, P. F. Syverson, and D. M. Goldschlag, "Anonymous Connections and Onion Routing," IEEE Journal on Selected Areas in Communications, vol. 16, pp. 482-494, May, 1998. [16] S. M. M. Rahman, M. Mambo, A. Inomata, and E. Okamoto, "An Anonymous On-Demand Position-Based Routing in Mobile Ad Hoc Networks," Proceedings of the 2006 International Symposium on Applications and the Internet, pp. 300-306, Phoenix, AZ, United States, January, 2006. [17] S. Seys and B. Preneel, "ARM: Anonymous Routing Protocol for Mobile Ad hoc Networks," Proceedings of the International Conference on Advanced Information Networking and Applications, Vienna, Austria, April, 2006. [18] R. Song, L. Korba, and G. Yee, "AnonDSR: E cient Anonymous Dynamic Source Routing for Mobile Ad-Hoc Networks," Proceedings of the 2005 ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 33-42, Alexandria, VA, United States, November, 2005. [19] X. Wu, J. Liu, X. Hong, and E. Bertino, "Anonymous Geo-Forwarding in MANETs through Location Cloaking," IEEE Transactions on Parallel and Distributed Systems, vol. 19, pp. 1297-1309, 2008. [20] X. Wu and B. Bhargava, "AO2P: Ad Hoc On-Demand Position-Based Private Rout- ing Protocol," IEEE Transactions on Mobile Computing, vol. 4, pp. 335-348, 2005. [21] M. Yu, M. Zhou and W. Su, "A Secure Routing Protocol Against Byzantine Attacks for MANETs in Adversarial Environments," IEEE Transactions on Vehicular Technology, vol. 58, pp. 449-460, 2009. [22] L. Zhao and H. Shen, "A Low-cost Anonymous Routing Protocol in MANETs," Proceedings of the International Conference on Computer Communications and Networks, San Francisco, CA, United States, August, 2009. [23] Y. Zhang, W. Liu, and W. Lou, "Anonymous Communications in Mobile Ad Hoc Networks," Proceedings of the 24th International Conference of the IEEE Communtications Societies, pp. 1940-1951, Miami, FL, United States, March, 2005. [24] B. Zhu, Z. Wan, M. S. Kankanhalli, F. Bao, and R. H.Deng, "Anonymous Secure Routing in Mobile Ad-hoc Networks," Proceedings of the 29th IEEE International Conference on Local Computer Networks, pp. 102-108, Tampa, FL, United States, November, 2004.
|