2005
DOI: 10.1016/j.comcom.2004.07.019
|View full text |Cite
|
Sign up to set email alerts
|

An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
55
0

Year Published

2007
2007
2021
2021

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 75 publications
(55 citation statements)
references
References 11 publications
0
55
0
Order By: Relevance
“…The easiest way to implement a trapdoor function is by using public key cryptography. See for example the protocols SDAR [2], ARMR [3] and AnonDSR [4]. In these works the identity of the receiver is ciphered with its public key so that only the receiver will be able to suc-…”
Section: Related Workmentioning
confidence: 99%
“…The easiest way to implement a trapdoor function is by using public key cryptography. See for example the protocols SDAR [2], ARMR [3] and AnonDSR [4]. In these works the identity of the receiver is ciphered with its public key so that only the receiver will be able to suc-…”
Section: Related Workmentioning
confidence: 99%
“…Anonymity schemes in mobile ad hoc networks were proposed in [23], [2], and [10]. ANODR [10] is based on an on-demand with identity free routing protocol using a symmetric cryptography with a 'trapdoor boomerang onion' (TBO) approach, similar to onion routing [18] used by Chaum in [3].…”
Section: Related Workmentioning
confidence: 99%
“…Already established paths may consist of several multipath channels however the source and destination nodes become unauthenticated. In SDAR [2] the communication between the source and the destination is based on a public key cryptography. Additionally, the destination node shares a symmetric session key with each intermediate node and uses them to secure discovery path process.…”
Section: Related Workmentioning
confidence: 99%
“…There are representative schemes such as SDAR [2], ANODR [1], and Anon DSR [3]. These schemes maintain anonymity using the trapdoor technique [4].…”
Section: Introductionmentioning
confidence: 99%