Route Extrapolation for Source and Destination Camouflage in Wireless Ad Hoc Networks

NA

[1]  Prashant Krishnamurthy,et al.  SECLOUD: Source and Destination Seclusion Using Clouds for wireless ad hoc networks , 2009, 2009 IEEE Symposium on Computers and Communications.

[2]  Xiaoyan Hong,et al.  An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks , 2007, IEEE Transactions on Mobile Computing.

[3]  Elisa Bertino,et al.  An Analysis Study on Zone-Based Anonymous Communication in Mobile Ad Hoc Networks , 2007, IEEE Transactions on Dependable and Secure Computing.

[4]  Dawn Xiaodong Song,et al.  Random key predistribution schemes for sensor networks , 2003, 2003 Symposium on Security and Privacy, 2003..

[5]  Marco Gruteser,et al.  Enhancing Location Privacy in Wireless LAN Through Disposable Interface Identifiers: A Quantitative Analysis , 2003, WMASH '03.

[6]  Deborah Estrin,et al.  Directed diffusion for wireless sensor networking , 2003, TNET.

[7]  Latanya Sweeney,et al.  Achieving k-Anonymity Privacy Protection Using Generalization and Suppression , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[8]  Yunghsiang Sam Han,et al.  A key predistribution scheme for sensor networks using deployment knowledge , 2006, IEEE Transactions on Dependable and Secure Computing.

[9]  Wenjing Lou,et al.  Anonymous communications in mobile ad hoc networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[10]  Sencun Zhu,et al.  Towards event source unobservability with minimum network traffic in sensor networks , 2008, WiSec '08.

[11]  Dijiang Huang Unlinkability Measure for IEEE 802.11 Based MANETs , 2008, IEEE Transactions on Wireless Communications.

[12]  Dijiang Huang Traffic analysis-based unlinkability measure for IEEE 802.11b-based communication systems , 2006, WiSe '06.

[13]  Weisong Shi,et al.  Preserving source location privacy in monitoring-based wireless sensor networks , 2006, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium.

[14]  Anxiao Jiang,et al.  Separability and topology control of quasi unit disk graphs , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[15]  L. Zhang,et al.  A novel scheme for protecting receiver's location privacy in wireless sensor networks , 2008, IEEE Transactions on Wireless Communications.

[16]  Srdjan Capkun,et al.  Secure and Privacy-Preserving Communication in Hybrid Ad Hoc Networks , 2004 .

[17]  Nitin H. Vaidya,et al.  Power-Aware Traffic Cover Mode to Prevent Traffic Analysis in Wireless Ad Hoc Networks , 2000 .

[18]  Wade Trappe,et al.  Source-location privacy in energy-constrained sensor network routing , 2004, SASN '04.

[19]  Ben Y. Zhao,et al.  Protecting anonymity in dynamic peer-to-peer networks , 2008, 2008 IEEE International Conference on Network Protocols.

[20]  Donggang Liu,et al.  Location Privacy in Sensor Networks Against a Global Eavesdropper , 2007, 2007 IEEE International Conference on Network Protocols.

[21]  Shivakant Mishra,et al.  Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[22]  Xiaoyan Hong,et al.  ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks , 2003, MobiHoc '03.

[23]  Shivakant Mishra,et al.  Decorrelating wireless sensor network traffic to inhibit traffic analysis attacks , 2006, Pervasive Mob. Comput..

[24]  Sencun Zhu,et al.  Towards Statistically Strong Source Anonymity for Sensor Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[25]  Thomas F. La Porta,et al.  Privacy Preserving Communication in MANETs , 2007, 2007 4th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[26]  Liang Zhang,et al.  Organizational memory: reducing source-sink distance , 1997, Proceedings of the Thirtieth Hawaii International Conference on System Sciences.