메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 97-106

Mobile traffic sensor network versus motion-mix: Tracing and protecting mobile wireless nodes

Author keywords

ANODR; Anonymity; Identity free Routing; Mobility; Motion MIX

Indexed keywords

ANODR; ANONYMITY; IDENTITY-FREE ROUTING; MOBILITY; MOTION-MIX;

EID: 33745971800     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (8)

References (46)
  • 3
    • 2942524994 scopus 로고    scopus 로고
    • Location privacy in pervasive computing
    • A. R. Beresford and F. Stajano. Location Privacy in Pervasive Computing. IEEE Pervasive Computing, 2(1):46-55, 2003.
    • (2003) IEEE Pervasive Computing , vol.2 , Issue.1 , pp. 46-55
    • Beresford, A.R.1    Stajano, F.2
  • 8
    • 77953853641 scopus 로고    scopus 로고
    • Shake them up (A mouvement-based pairing protocol for CPU-constrained devices)
    • C. Castelluccia and P. Mutaf. Shake Them Up (A mouvement-based pairing protocol for CPU-constrained devices). In ACM/Usenix MobiSys, 2005.
    • (2005) ACM/Usenix MobiSys
    • Castelluccia, C.1    Mutaf, P.2
  • 9
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • D. L. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2):84-88, 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.L.1
  • 10
    • 0023861309 scopus 로고
    • The dining cryptographers problem: Unconditional sender and recipient untraceability
    • D. L. Chaum. The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability. Journal of Cryptology, 1(1):65-75, 1988.
    • (1988) Journal of Cryptology , vol.1 , Issue.1 , pp. 65-75
    • Chaum, D.L.1
  • 12
    • 0010275933 scopus 로고    scopus 로고
    • W. Dai. PipeNet 1.1. http://www.eskimo.com/~weidai/pipenet.txt, 1996.
    • (1996) PipeNet 1.1
    • Dai, W.1
  • 16
    • 1242310099 scopus 로고    scopus 로고
    • A delay-tolerant network architecture for challenged internets
    • K. Fall. A Delay-Tolerant Network Architecture for Challenged Internets. In ACM SIGCOMM, pages 27-34, 2003.
    • (2003) ACM SIGCOMM , pp. 27-34
    • Fall, K.1
  • 17
    • 85018204196 scopus 로고    scopus 로고
    • Anonymous usage of location-based services through spatial and temporal cloaking
    • M. Gruteser and D. Grunwald. Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking. In MobiSys03, 2003.
    • (2003) MobiSys03
    • Gruteser, M.1    Grunwald, D.2
  • 18
    • 34247389249 scopus 로고    scopus 로고
    • A framework for location privacy in wireless networks
    • Y.-C. Hu and H. J. Wang. A Framework for Location Privacy in Wireless Networks. In ACM SIGCOMM Asia Workshop, 2005.
    • (2005) ACM SIGCOMM Asia Workshop
    • Hu, Y.-C.1    Wang, H.J.2
  • 19
    • 24944489750 scopus 로고    scopus 로고
    • Enhancing wireless location privacy using silent period
    • L. Huang, K. Matsuura, H. Yamane, and K. Sezaki. Enhancing Wireless Location Privacy Using Silent Period. In IEEE WCNC, 2005.
    • (2005) IEEE WCNC
    • Huang, L.1    Matsuura, K.2    Yamane, H.3    Sezaki, K.4
  • 23
    • 84885904718 scopus 로고    scopus 로고
    • Formal notions of anonymity for peer-to-peer networks
    • IACR Cryptology ePrint Archive, May Also CSD-TR050014, Department of Computer Science, UCLA
    • J. Kong. Formal Notions of Anonymity for Peer-to-peer Networks. Technical Report Report 2005/132, IACR Cryptology ePrint Archive, May 2005. Also CSD-TR050014, Department of Computer Science, UCLA.
    • (2005) Technical Report Report , vol.2005 , Issue.132
    • Kong, J.1
  • 24
    • 1542377713 scopus 로고    scopus 로고
    • ESCORT: A decentralized and localized access control system for mobile wireless access to secured domains
    • J. Kong, S. Das, E. Tsai, and M. Gerla. ESCORT: A Decentralized and Localized Access Control System for Mobile Wireless Access to Secured Domains. In ACM WiSe'03 in conjunction with MOBICOM'03, pages 51-60, 2003.
    • (2003) ACM WiSe'03 in Conjunction with MOBICOM'03 , pp. 51-60
    • Kong, J.1    Das, S.2    Tsai, E.3    Gerla, M.4
  • 25
    • 0242696170 scopus 로고    scopus 로고
    • ANODR: ANonymous on demand routing with untraceable routes for mobile ad-hoc networks
    • J. Kong and X. Hong. ANODR: ANonymous On Demand Routing with Untraceable Routes for Mobile Ad-hoc Networks. In ACM MOBIHOC'03, pages 291-302, 2003.
    • (2003) ACM MOBIHOC'03 , pp. 291-302
    • Kong, J.1    Hong, X.2
  • 27
    • 14844303406 scopus 로고    scopus 로고
    • Source-location privacy in energy-constrained sensor network routing
    • C. Ozturk, Y. Zhang, and W. Trappe. Source-Location Privacy in Energy-Constrained Sensor Network Routing. In ACM SASN, pages 88-93, 2004.
    • (2004) ACM SASN , pp. 88-93
    • Ozturk, C.1    Zhang, Y.2    Trappe, W.3
  • 28
    • 0030412572 scopus 로고    scopus 로고
    • Mobility support in IPv6
    • C. Perkins and D. Johnson. Mobility Support in IPv6. In ACM MOBICOM, pages 27-37, 1996.
    • (1996) ACM MOBICOM , pp. 27-37
    • Perkins, C.1    Johnson, D.2
  • 30
    • 84937564790 scopus 로고    scopus 로고
    • Anonymity, unobservability, and pseudonymity - A proposal for terminology
    • H. Federrath, editor
    • A. Pfitzmann and M. Köhntopp. Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology. In H. Federrath, editor, DIAU'00, Lecture Notes in Computer Science 2009, pages 1-9, 2000.
    • (2000) DIAU'00, Lecture Notes in Computer Science , vol.2009 , pp. 1-9
    • Pfitzmann, A.1    Köhntopp, M.2
  • 32
    • 84937555451 scopus 로고
    • Networks without user observability: Design options
    • F. Pichler, editor
    • A. Pfitzmann and M. Waidner. Networks Without User Observability: Design Options. In F. Pichler, editor, EUROCRYPT'85, Lecture Notes in Computer Science 219, pages 245-253, 1986.
    • (1986) EUROCRYPT'85, Lecture Notes in Computer Science , vol.219 , pp. 245-253
    • Pfitzmann, A.1    Waidner, M.2
  • 36
    • 0141761240 scopus 로고    scopus 로고
    • An analysis of the node spatial distribution of the random waypoint model for ad hoc networks
    • G. Resta and P. Santi. An Analysis of the Node Spatial Distribution of the Random Waypoint Model for Ad Hoc Networks. In ACM Workshop on Principles of Mobile Computing (POMC), pages 44-50, 2002.
    • (2002) ACM Workshop on Principles of Mobile Computing (POMC) , pp. 44-50
    • Resta, G.1    Santi, P.2
  • 37
    • 0029451888 scopus 로고
    • Untraceability in mobile networks
    • D. Samfat, R. Molva, and N. Asokan. Untraceability in Mobile Networks. In ACM MOBICOM, pages 26-36, 1995.
    • (1995) ACM MOBICOM , pp. 26-36
    • Samfat, D.1    Molva, R.2    Asokan, N.3
  • 40
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. E. Shannon. Communication Theory of Secrecy Systems. Bell System Technical Journal, 28(4):656-715, 1949.
    • (1949) Bell System Technical Journal , vol.28 , Issue.4 , pp. 656-715
    • Shannon, C.E.1
  • 45
    • 14844289583 scopus 로고    scopus 로고
    • K-anonymous secret handshakes with reusable credentials
    • S. Xu and M. Yung. k-Anonymous Secret Handshakes with Reusable Credentials. In ACM CCS, pages 158-159, 2004.
    • (2004) ACM CCS , pp. 158-159
    • Xu, S.1    Yung, M.2
  • 46
    • 25844443821 scopus 로고    scopus 로고
    • Anonymous communications in mobile ad hoc networks
    • Y. Zhang, W. Liu, and W. Lou. Anonymous Communications in Mobile Ad Hoc Networks. In IEEE INFOCOM, 2005.
    • (2005) IEEE INFOCOM
    • Zhang, Y.1    Liu, W.2    Lou, W.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.