2007 Second International Conference on Communications and Networking in China 2007
DOI: 10.1109/chinacom.2007.4469552
|View full text |Cite
|
Sign up to set email alerts
|

Secure Anonymous Routing in Trust and Clustered Wireless Ad Hoc Networks

Abstract: Wireless ad hoc networks , especially in the hostile environment, are vulnerable to traffic analysis which allows the adversary to trace the routing messages and the sensitive data packets. Anonymity mechanism in ad hoc networks is critical securing measure used to mitigate these problems. In this paper, we propose a novel secure anonymous routing scheme for clustered wireless ad hoc networks. In our proposed scheme, we use the bloom filter to establish secure anonymous routing in trust and clustered wireless … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2008
2008
2017
2017

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…In the proposed protocol, location information is pre-distributed to the group of nodes with different level of trust. In [9], Sisheng Chen et al proposed a secure anonymous routing scheme for clustered wireless ad hoc networks to prevent the traffic monitoring. It provides sender, receiver, link anonymity and privacy through bloom filters to establish the trust.…”
Section: Related Workmentioning
confidence: 99%
“…In the proposed protocol, location information is pre-distributed to the group of nodes with different level of trust. In [9], Sisheng Chen et al proposed a secure anonymous routing scheme for clustered wireless ad hoc networks to prevent the traffic monitoring. It provides sender, receiver, link anonymity and privacy through bloom filters to establish the trust.…”
Section: Related Workmentioning
confidence: 99%
“…In particular, several protocols use them to perform message authentication [41] and node authentication [37] efficiently. Anonymous data transmission and anonymous route discovery was proposed in [9], while in [32] the authors introduced a system that uses BFs to prevent user movements detection based on to the tracking of RFID (Radio Frequency Identification) tags. BFs have also be used to cope with several kinds of malicious network behavior.…”
Section: Bloom Filtersmentioning
confidence: 99%