1 |
D. Johnson, Y. Hu, and D. Maltz, "The Dynamic Source Routing Protocol(DSR) for Mobile Ad Hoc Networks for IPv4," IETF RFC 4728, Feb. 2007
|
2 |
C.E. Perkins, E. Belding-Royer, and S. Das, "Ad hoc On-Demand Distance Vector(AODV) Routing," IETF RFC 3561, July 2003
|
3 |
R. Song, L. Korba, and G. Yee, "AnonDSR: Efficient Anonymous Dynamic Source Routing for Mobile Ad-Hoc Networks," 3rd ACM workshop on Security of ad hoc and sensor networks, pp. 33-42, Nov. 2005
DOI
|
4 |
S. Seys and B. Preneel, "ARM: Anonymous Routing Protocol for Mobile Ad Hoc Networks," 20th International Conference on Advanced Information Networking and Applications, pp. 133-137, Apr. 2006
|
5 |
M. Shao and S. Huang, "Trust Enhanced Anonymous Routing in Mobile Ad-Hoc Networks," Ninth International Conference on Parallel and Distributed Computing, Applications and Technologies, pp. 335-341, Dec. 2008
DOI
|
6 |
Y. Zhang, W. Liu, W. Lou, and Y. Fang, "MASK: Anonymous On-Demand Routing in Mobile Ad Hoc Networks," IEEE Transactions on wireless communications, vol. 5, no. 9, pp. 2376-2385, Sep. 2006
DOI
ScienceOn
|
7 |
J. Kong and X. Hong, "ANODR: Anonymous On Demand Routing with Untraceable Routes for Mobile Ad-hoc Networks," 4th ACM international symposium on Mobile ad hoc networking & computing, pp. 291-302, June 2003
DOI
|
8 |
R. Lu, Z. Cao, L. Wang, and C. Sun, "A secure anonymous routing protocol with authenticated key exchange for ad hoc networks," Computer Standards & Interfaces, vol. 29, no. 5, pp. 521-527, July 2007
DOI
ScienceOn
|
9 |
C.E. Perkins and P. Bhagwat, "Highly dynamic Destination Sequenced Distance-Vector routing (DSDV) for mobile computers," ACM SIGCOMM Computer Communication Review, vol. 24, no. 4, pp. 234-244, Oct. 1994
DOI
ScienceOn
|
10 |
B. Zhu, Z. Wan, M.S. Kankanhalli, F. Bao, and R.H. Deng, "Anonymous Secure Routing in Mobile Ad-Hoc Networks," 29th Annual IEEE International Conference on Local Computer Networks, pp. 102-108, Nov. 2004
|
11 |
R. Shokri, M. Yabandeh, and N. Yazdani, "Anonymous Routing in MANET using Random Identifiers," Sixth International Conference on Networking, p. 2, Apr. 2007
|
12 |
D.M. Goldschlag, M.G. Reed, and P.F. Syverson, "Hiding Routing Information," First International Workshop on Information Hiding, Lecture Notes in Computer Science, 1174, pp. 137-150, May 1996
DOI
ScienceOn
|