LERMP: A Secure Location Based Efficient Multipath Routing Protocol
Abstract
Keywords
Full Text:
PDFReferences
Haiying Shen and Lianyu Zhao, ”ALERT: An Anonymous Location Based Efficient Routing Protocol in MANETs ” IEEE Trans. Mobile Computing, vol. 4, no. 4, pp. 1079-1093, June 2013.
K.E. Defrawy and G. Tsudik, “ALARM: Anonymous Location-Aided Routing in Suspicious MANETs,” Proc. IEEE Int’l Conf. Network Protocols (ICNP), 2007.
V. Pathak, D. Yao, and L. Iftode, “Securing Location Aware Services over VANET Using Geographical Secure Path Routing,” Proc. IEEE Int’l Conf. Vehicular Electronics and safety (ICVES), 2008.
X. Wu, “AO2P: Ad Hoc On-Demand Position-Based Private Routing Protocol,” IEEE Trans. Mobile Computing, vol. 4, no. 4, pp. 335-348, July/Aug. 2005.
K.E. Defrawy and G. Tsudik, “PRISM: Privacy-Friendly Routing in Suspicious MANETs (and VANETs),” Proc. IEEE Int’l Conf.Network Protocols (ICNP), 2008.
Y.-C. Hu, A. Perrig, and D.B. Johnson, “Ariadne: A Secure On- Demand Routing Protocol for Ad Hoc Networks,” Wireless Networks, vol. 11, pp. 21-38, 2005.
Z. Zhi and Y.K. Choong, “Anonymizing Geographic Ad Hoc Routing for Preserving Location Privacy,” Proc. Third Int’l Workshop Mobile Distributed Computing (ICDCSW), 2005.
L. Sweeney, “k-Anonymity: A Model for Protecting Privacy,” Int’l J. Uncertainity Fuzziness Knowledge-Based Systems, vol. 10, no. 5, pp. 557-570, 2002.
J. Raymond, “Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems,” Proc. Int’l Workshop Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability (WDIAU), pp. 10-29, 2001.
Debian Administration, http://www.debian-administration.org/users/dkg/weblog/48, 2012.
M.F. Mokbel, C.-Y. Chow, and W.G. Aref, “The New Casper: Query Processing for Location Services without Compromising Privacy,” Proc. 32nd Int’l Conf. Very Large Databases (VLDB), 2006.
C.-C. Chou, D.S.L. Wei, C.-C. Jay Kuo, and K. Naik, “An Efficient Anonymous Communication Protocol for Peer-to-Peer Applications over Mobile Ad-Hoc Networks,” IEEE J. Selected Areas in Comm., vol. 25, no. 1, pp. 192-203, Jan. 2007.
Viren Mahajan, Maitreya Natu, and Adarshpal Sethi, Nov. 2008 “Analysis of wormhole Intrusion Attacks In MANETS”,IEEE Military Communications Conference,MILCOM 2008.
R.H. Khokhar, Md. A.Ngadi, S. Manda. “A Review of Current Routing Attacks in Mobile Ad Hoc Networks”, International Journal of Computer Science and Security, 2 (3), pp. 18-29, 2008.
F. Natt-Abdesselam, B. Bensaou, T. Taleb, “Detecting and Avoiding Wormhole Attacks in Wireless Ad Hoc Network”, IEEE Communications Magazine, 46(4), pp. 127-133, 2008.
Shalini Jain, Dr.Satbir Jain, “ Detection and prevention of wormhole attack in mobile adhoc networks” , In Proceedings of the International Journal of Computer Theory and Engineering, Vol. 2, No. 1 February, 2010, pp.78-86.
N. Song, L. Qian, X. Li. “Wormhole Attacks Detection in Wireless Ad Hoc Networks: A Statistical Analysis Approach”. In Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium, pp. 8-15, 2005.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.