In wireless ad-hoc networks, malicious nodes can constitute a threat to the security and/or anonymity of the exchanged data between communicating nodes. While data encryption can protect traffic content, plain routing headers may reveal valuable information about end nodes and their relationship. The main purposes of this thesis are to study the feasibility of achieving anonymity in wireless ad-hoc networks, and to propose a secure distributed anonymous routing protocol (SDAR), which is similar to the onion routing concept used in wired networks. SDAR employs a special mechanism to establish trust among wireless nodes and to avoid untrustworthy ones during route discovery processes. The major objective of SDAR is to allow only trustworthy n...
In this paper we describe a novel anonymous on-demand routing protocol for wireless Mobile Ad Hoc Ne...
Mobile Ad Hoc Network(MANET) is an infrastructure less network. Any node may enter or leave network ...
Mobile ad hoc networks require anonymous communications in order to thwart new wireless passive atta...
A mobile ad hoc network consists of mobile nodes that can move freely in an open environment. Commun...
A mobile ad hoc network consists of mobile nodes that can move freely in an open environment. Commun...
Abstract—Providing anonymous routing in mobile ad hoc networks (MANET) has been a hot issue for the ...
[[abstract]]More attention should be paid to anonymous routing protocols in secure wireless ad hoc n...
Abstract- A mobile Ad Hoc network is an interconnection of group of nodes without fixed infrastructu...
Abstract—Providing security and anonymity to users are critical in wireless ad hoc networks. In this...
[[abstract]]This paper proposes an efficient anonymous routing protocol for mobile ad hoc networks (...
Anonymity and location privacy are two important aspects of network security for users. This thesis ...
Mobile Ad hoc Networks (MANETs) are vulnerable to security threats due to the inherent characteristi...
Due to the unique features of mobile ad hoc networks (MANETs), traditional wired anonymous protocols...
Abstract:Anonymous communications are vital for several applications of the mobile unplanned network...
An ad hoc wireless network permits wireless mobile nodes to communicate without prior infrastructure...
In this paper we describe a novel anonymous on-demand routing protocol for wireless Mobile Ad Hoc Ne...
Mobile Ad Hoc Network(MANET) is an infrastructure less network. Any node may enter or leave network ...
Mobile ad hoc networks require anonymous communications in order to thwart new wireless passive atta...
A mobile ad hoc network consists of mobile nodes that can move freely in an open environment. Commun...
A mobile ad hoc network consists of mobile nodes that can move freely in an open environment. Commun...
Abstract—Providing anonymous routing in mobile ad hoc networks (MANET) has been a hot issue for the ...
[[abstract]]More attention should be paid to anonymous routing protocols in secure wireless ad hoc n...
Abstract- A mobile Ad Hoc network is an interconnection of group of nodes without fixed infrastructu...
Abstract—Providing security and anonymity to users are critical in wireless ad hoc networks. In this...
[[abstract]]This paper proposes an efficient anonymous routing protocol for mobile ad hoc networks (...
Anonymity and location privacy are two important aspects of network security for users. This thesis ...
Mobile Ad hoc Networks (MANETs) are vulnerable to security threats due to the inherent characteristi...
Due to the unique features of mobile ad hoc networks (MANETs), traditional wired anonymous protocols...
Abstract:Anonymous communications are vital for several applications of the mobile unplanned network...
An ad hoc wireless network permits wireless mobile nodes to communicate without prior infrastructure...
In this paper we describe a novel anonymous on-demand routing protocol for wireless Mobile Ad Hoc Ne...
Mobile Ad Hoc Network(MANET) is an infrastructure less network. Any node may enter or leave network ...
Mobile ad hoc networks require anonymous communications in order to thwart new wireless passive atta...