2007 IEEE International Conference on Network Protocols 2007
DOI: 10.1109/icnp.2007.4375861
|View full text |Cite
|
Sign up to set email alerts
|

ALARM: Anonymous Location-Aided Routing in Suspicious MANETs

Abstract: Abstract-In most common mobile ad-hoc networking (MANET) scenarios, nodes establish communication based on long-lasting public identities. However, in some hostile and suspicious settings, node identities must not be exposed and node movements should be untraceable. Instead, nodes need to communicate on the basis of their current locations. While such MANET settings are not very common, they do occur in military and law enforcement domains and require high security and privacy guarantees. In this paper, we add… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
56
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 64 publications
(56 citation statements)
references
References 27 publications
0
56
0
Order By: Relevance
“…Defrawy and Tsudik proposed a topology based secure routing protocol for MANET named as Anonymous Location Aided Routing (ALARM) [13]. Nodes authentication and locations secure data forwarding in ALARM is by using the node's current locations.…”
Section: Anonymous Location Aided Routing Protocolmentioning
confidence: 99%
“…Defrawy and Tsudik proposed a topology based secure routing protocol for MANET named as Anonymous Location Aided Routing (ALARM) [13]. Nodes authentication and locations secure data forwarding in ALARM is by using the node's current locations.…”
Section: Anonymous Location Aided Routing Protocolmentioning
confidence: 99%
“…ALARM (Anonymous Location-Aided Routing in MANET) [10] is an anonymous secure location based routing protocol. ALARM finds node's current location by flooding the LAM (Location Announcement Message) throughout the MANET.…”
Section: Manet Securitymentioning
confidence: 99%
“…Due to its usage in various fields it can be classified into reactive routing and proactive routing [5]. There are various anonymous routing protocol [5], [10], [11]. Existing protocols are mainly of two types' step-by-step encryption and superfluous traffic [6], [8].…”
Section: Related Workmentioning
confidence: 99%
“…PRISM requires neither pre-distributed pair wise shared secrets nor on-line servers of any kind. As an on-demand protocol, PRISM is also very different from ALARM [5], even though the latter uses group signatures and is also location centric [4]. ZAP [16] an anonymous rerouting protocol that adopts fuzzy positions to positions to create AZ for destination anonymity.…”
Section: Related Workmentioning
confidence: 99%