An Efficient Method for Preventing Mobile Tracing Using Motion-Mix over Mobile Wireless Nodes
C.K. Toh, “Ad Hoc Mobile Wireless Networks: Protocols and Systems”, Prentice Hall PTR, 2001.
Teerawat Issariyakul, Ekram Hossain, “Introduction to Network Simulator NS2”, Springer, 2009
Aad, C. Castelluccia, and J.-P. Huubaux, “Packet coding for strong anonymity in ad hoc networks,” in Proc. SecureComm Workshops, 2006, pp. 1–10.
C. Bettstetter, “Mobility modeling in wireless networks: Categorization, smooth movement, and border effects,” ACM Mobile Comput. Commun. Rev., vol. 5, no. 3, pp. 55–67, 2001.
M. Gruteser and D. Grunwald, “Anonymous usage of location-based services through spatial and temporal cloaking,” in Proc. MobiSys, 2003, pp. 31–42.
Y.-C. Hu and H. J. Wang, “A framework for location privacy in wireless networks,” in Proc. ACM SIGCOMM Asia Workshop, 2005, pp. 1–8.
K. B. Rasmussen and S. Capkun, “Implications of radio fingerprinting on the security of sensor networks,” in Proc. IEEE SecureComm, Nice, France, Sep. 2007, pp. 331–340.
R. Song, L. Korba, and G. Yee, “AnonDSR: Efficient anonymous dynamic source routing for mobile ad-hoc networks,” in Proc. ACM Workshop SASN, 2005, pp. 33–42.
L. Sweeney, “k-anonymity: A model for protecting privacy,” Int. J. Uncertainty, Fuzziness Knowledge-Based Syst., vol. 10, no. 5, pp. 557–570, 2002.
L. Yang, M. Jakobsson, and S. Wetzel, “Discount anonymous on demand routing for mobile ad hoc networks,” in Proc. SecureComm, 2006, pp. 1–10.
Y. Zhang, W. Liu, and W. Lou, “Anonymous communications in mobile ad hoc networks,” in Proc. IEEE INFOCOM, 2005, pp. 1940–1951.
J. Deng, R. Han, and S. Mishra, “Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks,” in Proc. IEEE Int. Conf. DSN, 2004, pp. 594–603.
C. Ozturk, Y. Zhang, and W. Trappe, ”Source-location privacy in energy-constrained sensor network routing,” in Proc. ACM SASN, 2004, pp. 88–93.
J.Kong, X.Hong, “ANODR: Anonymous on demand routing with untraceable routes for mobile ad hoc networks”, in Proc. ACM MOBIHOC, 2003,pp. 291-302.
X. Lin, R. Lu, H.Zhu, P.-H. Ho, X.S. Shen, and Z.Cao, “ASRPAKE: An anonymous secure routing protocol with authenticated key exchange for wireless ad hoc networks,” in Proc. IEEE ICC, Jun. 2007, pp.4646-4651.
A. Boukerche, K. EI-Khatib, L. Xu, and L. Korba, “SDAR: A secure distributed anonymous routing protocol for wireless and mobile ad hoc networks,” in Proc. 29th IEEE Int. Conf. LCN, 2004, pp. 618 – 624.
K. Fall, “A delay-tolerant network architecture for challenged internets,” in Proc. ACM SIGCOMM, 2003, pp.27-34.
L. Huang, K. Matsuura, H. Yamane, and K. Sezaki, “ Enhancing wireless location privacy using silent period,” in Proc. IEEE WCNC, 2005, pp. 1187-1192.
A.R. Beresford and F. Stajano, “Mix zones: User Privacy in location-aware services,” in Proc. Pervasive Compt. Commun. Security (PerSec), 2004, pp. 127-131.
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.