메뉴 건너뛰기




Volumn 6, Issue 3, 2006, Pages 281-293

Mobility changes anonymity: New passive threats in mobile ad hoc networks

Author keywords

Anonymous routing; Mobile ad hoc networks; Mobile anonymity; Network security; On demand routing; Privacy

Indexed keywords

ANONYMOUS ROUTING; MOBILE AD HOC NETWORKS; MOBILE ANONYMITY; ON-DEMAND ROUTING; PRIVACY;

EID: 33646835920     PISSN: 15308669     EISSN: None     Source Type: Journal    
DOI: 10.1002/wcm.395     Document Type: Article
Times cited : (15)

References (43)
  • 2
    • 85106319926 scopus 로고    scopus 로고
    • A performance comparison of multi-hop wireless ad hoc network routing protocols
    • Broch J, Maltz DA, Johnson DB, Hu Y-C, Jetcheva J. A performance comparison of multi-hop wireless ad hoc network routing protocols. In ACM MOBICOM, 1998; 85-97.
    • (1998) ACM MOBICOM , pp. 85-97
    • Broch, J.1    Maltz, D.A.2    Johnson, D.B.3    Hu, Y.-C.4    Jetcheva, J.5
  • 3
    • 2442551009 scopus 로고    scopus 로고
    • Optimized link state routing protocol(OLSR)
    • March
    • Clausen T, Jacquet P. Optimized link state routing protocol(OLSR). Internet RFC 3626, http://www.ietf.org/rfc/rfc3626.txt, March 2005.
    • (2005) Internet RFC , vol.3626
    • Clausen, T.1    Jacquet, P.2
  • 4
    • 4444282195 scopus 로고    scopus 로고
    • Topology dissemination based on reverse-path forwarding (TBRPF)
    • March
    • Ogier R, Templin F, Lewis M. Topology dissemination based on reverse-path forwarding (TBRPF). Internet RFC 3684, http://www.ietf.org/rfc/rfc3684.txt, March 2005.
    • (2005) Internet RFC , vol.3684
    • Ogier, R.1    Templin, F.2    Lewis, M.3
  • 5
    • 85031307530 scopus 로고
    • Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers
    • Perkins CE, Bhagwat P. Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. In ACM SIGCOMM 1994; 234-244.
    • (1994) ACM SIGCOMM , pp. 234-244
    • Perkins, C.E.1    Bhagwat, P.2
  • 6
    • 34347349933 scopus 로고    scopus 로고
    • Ad-hoc on-demand distance vector routing
    • Perkins CE, Royer EM. Ad-hoc on-demand distance vector routing. In IEEE WMCSA'99 1999; 90-100.
    • (1999) IEEE WMCSA'99 , pp. 90-100
    • Perkins, C.E.1    Royer, E.M.2
  • 7
    • 0000629443 scopus 로고    scopus 로고
    • Dynamic source routing in ad hoc wireless networks
    • Imielinski T, Korth H (eds). Kluwer Academic Publishers: Dordrecht, The Netherlands
    • Johnson DB, Maltz DA. Dynamic source routing in ad hoc wireless networks. In Mobile Computing, Vol. 353, Imielinski T, Korth H (eds). Kluwer Academic Publishers: Dordrecht, The Netherlands, 1996; 153-181.
    • (1996) Mobile Computing , vol.353 , pp. 153-181
    • Johnson, D.B.1    Maltz, D.A.2
  • 9
    • 0036957315 scopus 로고    scopus 로고
    • Ariadne: A secure on-demand routing protocol for ad hoc networks
    • Hu Y-C, Perrig A, Johnson DB. Ariadne: a secure on-demand routing protocol for ad hoc networks. In ACM MOBICOM 2002; 12-23.
    • (2002) ACM MOBICOM , pp. 12-23
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3
  • 13
    • 0023861309 scopus 로고
    • The dining cryptographers problem: Unconditional sender and recipient untraceability
    • Chaum DL. The dining cryptographers problem: unconditional sender and recipient untraceability. Journal of Cryptology 1988; 1(1): 65-75.
    • (1988) Journal of Cryptology , vol.1 , Issue.1 , pp. 65-75
    • Chaum, D.L.1
  • 14
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • Chaum DL. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 1981; 24(2): 84-88.
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.L.1
  • 21
    • 0010275933 scopus 로고    scopus 로고
    • Dai W. PipeNet 1.1. http://www.eskimo.com/~weidai/pipenet.txt, 2004.
    • (2004) PipeNet 1.1
    • Dai, W.1
  • 23
    • 85018204196 scopus 로고    scopus 로고
    • Anonymous usage of location-based services through spatial and temporal cloaking
    • Gruteser M, Grunwald D. Anonymous usage of location-based services through spatial and temporal cloaking. In MobiSys03, 2003.
    • (2003) MobiSys03
    • Gruteser, M.1    Grunwald, D.2
  • 25
    • 2542616812 scopus 로고    scopus 로고
    • Quest for personal control over mobile location privacy
    • He Q, Wu D, Khosla P. Quest for personal control over mobile location privacy. IEEE Communications Magazine 2004; 42(5): 130-136.
    • (2004) IEEE Communications Magazine , vol.42 , Issue.5 , pp. 130-136
    • He, Q.1    Wu, D.2    Khosla, P.3
  • 26
    • 34247389249 scopus 로고    scopus 로고
    • A framework for location privacy in wireless networks
    • Hu Y-C, Wang HJ. A framework for location privacy in wireless networks. In ACM SIGCOMM Asia Workshop, 2005.
    • (2005) ACM SIGCOMM Asia Workshop
    • Hu, Y.-C.1    Wang, H.J.2
  • 29
    • 0242696170 scopus 로고    scopus 로고
    • ANODR: Anonymous on demand routing with untraceable routes for mobile ad-hoc networks
    • Kong J, Hong X. ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks. In ACM MOBIHOC'03 2003; 291-302.
    • (2003) ACM MOBIHOC'03 , pp. 291-302
    • Kong, J.1    Hong, X.2
  • 31
    • 25844443821 scopus 로고    scopus 로고
    • Anonymous communications in mobile ad hoc networks
    • Zhang Y, Liu W, Lou W. Anonymous communications in mobile ad hoc networks. In IEEE INFOCOM'05, 2005.
    • (2005) IEEE INFOCOM'05
    • Zhang, Y.1    Liu, W.2    Lou, W.3
  • 33
    • 85116486060 scopus 로고    scopus 로고
    • Location-aided routing (LAR) in mobile ad hoc networks
    • Ko Y-B, Vaidya N. Location-aided routing (LAR) in mobile ad hoc networks. In ACM MOBICOM 1998; 66-75.
    • (1998) ACM MOBICOM , pp. 66-75
    • Ko, Y.-B.1    Vaidya, N.2
  • 38
    • 33646851032 scopus 로고    scopus 로고
    • A new set of passive routing attacks in mobile ad hoc networks
    • Hong X, Kong J, Gerla M. A new set of passive routing attacks in mobile ad hoc networks. In IEEE MILCOM, 2003.
    • (2003) IEEE MILCOM
    • Hong, X.1    Kong, J.2    Gerla, M.3
  • 40
    • 0031353437 scopus 로고    scopus 로고
    • A highly adaptive distributed routing algorithm for mobile wireless networks
    • Park VD, Corson MS. A highly adaptive distributed routing algorithm for mobile wireless networks. In IEEE INFOCOM 1997; 1405-1413.
    • (1997) IEEE INFOCOM , pp. 1405-1413
    • Park, V.D.1    Corson, M.S.2
  • 42
    • 0041973497 scopus 로고    scopus 로고
    • Packet leashes: A defense against wormhole attacks in wireless networks
    • Hu Y-C, Perrig A, Johnson DB. Packet leashes: a defense against wormhole attacks in wireless networks. In IEEE INFOCOM 2003.
    • (2003) IEEE INFOCOM
    • Hu, Y.-C.1    Perrig, A.2    Johnson, D.B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.