2008
DOI: 10.1109/icnp.2008.4697044
|View full text |Cite
|
Sign up to set email alerts
|

PRISM: Privacy-friendly routing in suspicious MANETs (and VANETs)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
22
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 32 publications
(22 citation statements)
references
References 18 publications
0
22
0
Order By: Relevance
“…Routing techniques that rely on complex key distribution schemes or expensive cryptographic operations (for example, SMC [23]) are incompatible with HumaNets' distributed architecture and use of power-constrained devices. A significant advantage of PPBR is that it provides Privacy-Preservation using simple probabilistic techniques, and avoids the key management and computation issues present in protocols that provide more traditional cryptographic protections [6,4,21].…”
Section: Network Assumptions and Goalsmentioning
confidence: 99%
See 2 more Smart Citations
“…Routing techniques that rely on complex key distribution schemes or expensive cryptographic operations (for example, SMC [23]) are incompatible with HumaNets' distributed architecture and use of power-constrained devices. A significant advantage of PPBR is that it provides Privacy-Preservation using simple probabilistic techniques, and avoids the key management and computation issues present in protocols that provide more traditional cryptographic protections [6,4,21].…”
Section: Network Assumptions and Goalsmentioning
confidence: 99%
“…[6,22]) are loosely based off of AODV [17], a popular routing protocol for decentralized mobile networks (e.g., MANETs). However, such techniques assume a highly connected and mostly static network in which messages can be quickly forwarded between nodes.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…There are various anonymous routing protocol [5], [10], [11]. Existing protocols are mainly of two types' step-by-step encryption and superfluous traffic [6], [8]. All this generate a huge cost and offer with low protection.…”
Section: Related Workmentioning
confidence: 99%
“…It fails to provide route protection. PRISM [6] uses a location-centric, instead of an identity centric, communication paradigm. Therefore, it does not assume any knowledge of long-term node identifiers or public keys.…”
Section: Related Workmentioning
confidence: 99%