Taheri et al., 2015 - Google Patents
Anonymous group-based routing in MANETsTaheri et al., 2015
View PDF- Document ID
- 10354462667503647293
- Author
- Taheri S
- Hartung S
- Hogrefe D
- Publication year
- Publication venue
- Journal of Information Security and Applications
External Links
Snippet
Although operating as groups is required by many of ad hoc applications and privacy  preservation is a critical issue in such scenarios, there is only a sparse research done on  anonymous multicast routing in MANETs. Anonymity, location privacy and unlinkable … 
    - 238000004891 communication 0 abstract description 21
Classifications
- 
        - H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/16—Arrangements for providing special services to substations contains provisionally no documents
- H04L12/18—Arrangements for providing special services to substations contains provisionally no documents for broadcast or conference, e.g. multicast
 
- 
        - H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/20—Signalling of application services or auxiliary data signalling, i.e. transmitting data via a non-traffic channel
- H04W4/206—Signalling of application services or auxiliary data signalling, i.e. transmitting data via a non-traffic channel for socializing or targeting users of the same wireless application service, e.g. joint gesture signalling or mobile advertising signalling
 
- 
        - H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
 
- 
        - H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/06—Selective distribution or broadcast application services; Mobile application services to user groups; One-way selective calling services
 
- 
        - H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/18—Self-organizing networks, e.g. ad-hoc networks or sensor networks
 
- 
        - H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W8/00—Network data management
- H04W8/02—Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
- H04W8/08—Mobility data transfer
- H04W8/082—Mobility data transfer for traffic bypassing of mobility servers, e.g. location registers, home PLMNs or home agents
 
- 
        - H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W4/00—Mobile application services or facilities specially adapted for wireless communication networks
- H04W4/02—Mobile application Services making use of the location of users or terminals, e.g. OMA SUPL, OMA MLP or 3GPP LCS
 
- 
        - H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/065—Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
 
- 
        - H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
- H04W8/186—Processing of subscriber group data
 
- 
        - H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity
 
- 
        - H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchical pre-organized networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
 
- 
        - H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W40/00—Communication routing or communication path finding
- H04W40/24—Connectivity information management, e.g. connectivity discovery or connectivity update
 
- 
        - H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W8/00—Network data management
- H04W8/26—Network addressing or numbering for mobility support
 
- 
        - H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W80/00—Wireless network protocols or protocol adaptations to wireless operation, e.g. WAP [Wireless Application Protocol]
- H04W80/04—Network layer protocols, e.g. mobile IP [Internet Protocol]
 
- 
        - H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/18—Network-specific arrangements or communication protocols supporting networked applications in which the network application is adapted for the location of the user terminal
 
- 
        - H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
 
- 
        - H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
 
- 
        - H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W28/00—Network traffic or resource management
- H04W28/02—Traffic management, e.g. flow control or congestion control
- H04W28/06—Optimizing the usage of the radio link, e.g. header compression, information sizing, discarding information
 
- 
        - H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L29/00—Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00 contains provisionally no documents
- H04L29/12—Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00 contains provisionally no documents characterised by the data terminal contains provisionally no documents
- H04L29/12009—Arrangements for addressing and naming in data networks
 
Similar Documents
| Publication | Publication Date | Title | 
|---|---|---|
| Usman et al. | QASEC: A secured data communication scheme for mobile Ad-hoc networks | |
| Haghighi et al. | Highly anonymous mobility-tolerant location-based onion routing for VANETs | |
| Chou et al. | An efficient anonymous communication protocol for peer-to-peer applications over mobile ad-hoc networks | |
| Pirzada et al. | Secure routing with the AODV protocol | |
| Kavitha et al. | Secure Routing in MANETs with Key Management | |
| Taheri et al. | Anonymous group-based routing in MANETs | |
| Patil et al. | Survey-secure routing protocols of MANET | |
| Tan et al. | Using cryptographic technique for securing route discovery and data transmission from blackhole attack on AODV-based MANET | |
| Nácher et al. | An overview of anonymous communications in mobile ad hoc networks | |
| Zhao et al. | An integrated key management and secure routing framework for mobile ad-hoc networks | |
| Imran et al. | DD-SARP: Dynamic data secure Anonymous Routing Protocol for MANETs in attacking environments | |
| Suma et al. | SIBLAR: a secured identity-based location aware routing protocol for MANETs | |
| Taheri et al. | Anonymity and privacy in multicast mobile ad hoc networks | |
| MS et al. | Implementation of Protected Routing to Defend Byzantine Attacks for MANET's. | |
| Ravilla et al. | Performance of secured zone routing protocol due to the effect of malicious nodes in MANETs | |
| Dholey et al. | Proposal to Provide Security in MANET's DSRRouting Protocol | |
| Wang et al. | Secure group-based information sharing in mobile ad hoc networks | |
| Aseez et al. | Hierarchical partition-based anonymous routing protocol (HPAR) in MANET for efficient and secure transmission | |
| Mohsen et al. | Key distribution protocol for Identity Hiding in MANETs | |
| Jeba et al. | Reliable anonymous secure packet forwarding scheme for wireless sensor networks | |
| Bongartz et al. | Seaman: A security-enabled anonymous manet protocol | |
| Skowronski | ADON-Anonymous data exchange in hybrid opportunistic networks using utility functions and bloom filters | |
| Qian et al. | Secure anonymous routing in clustered multihop wireless ad hoc networks | |
| Saravanan et al. | Location privacy protection for secure multicasting in MANET | |
| Khubalkar et al. | Security enabled DSR for establishing symmetric key and security in MANETS |