2008 the 4th International Conference on Mobile Ad-Hoc and Sensor Networks 2008
DOI: 10.1109/msn.2008.42
|View full text |Cite
|
Sign up to set email alerts
|

On-Demand Anonymous Routing with Distance Vector Protecting Traffic Privacy in Wireless Multi-hop Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2010
2010
2017
2017

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 11 publications
0
3
0
Order By: Relevance
“…Existing research in the context of mobile networks mainly focused on protecting communication anonymity and privacy in mobile ad-hoc networks [Aiache et al 2008;Chen and Wu 2010;Dong et al 2009;Kong and Hong 2003;Takahashi et al 2010;Zhang et al 2006], vehicular ad-hoc networks [Lin et al 2007;Sampigethaya et al 2007], and mobile hybrid networks [Ardagna et al 2010;Capkun et al 2004]. ANODR [Kong and Hong 2003] provides an untraceable and intrusion tolerant routing protocol, based on the paradigm of "broadcast with trapdoor information".…”
Section: Related Workmentioning
confidence: 99%
“…Existing research in the context of mobile networks mainly focused on protecting communication anonymity and privacy in mobile ad-hoc networks [Aiache et al 2008;Chen and Wu 2010;Dong et al 2009;Kong and Hong 2003;Takahashi et al 2010;Zhang et al 2006], vehicular ad-hoc networks [Lin et al 2007;Sampigethaya et al 2007], and mobile hybrid networks [Ardagna et al 2010;Capkun et al 2004]. ANODR [Kong and Hong 2003] provides an untraceable and intrusion tolerant routing protocol, based on the paradigm of "broadcast with trapdoor information".…”
Section: Related Workmentioning
confidence: 99%
“…If an attacker knows the identity and location of each node, he will be able to selectively compromise more important nodes, which will allow him to get much more information and/or cause more damages to the network. Different from wired networks and many other types of wireless networks such as ad hoc networks [7][8][9][10][11], WSN is a many-to-one network, where all sensor nodes send data to one base station. With the communication relationship among neighboring nodes, attackers may be able to infer the location of a source node and the base station [12].…”
Section: Introductionmentioning
confidence: 99%
“…Ref. [8] also proposed two anonymous routing algorithms aim to provide difference multipath routing to the same destination enhancing anonymity of the network traffic. But this scheme only considers traffic anonymous which doesn't consider the identity and route anonymity.…”
Section: Introductionmentioning
confidence: 99%