Scientific Research and Essays

  • Abbreviation: Sci. Res. Essays
  • Language: English
  • ISSN: 1992-2248
  • DOI: 10.5897/SRE
  • Start Year: 2006
  • Published Articles: 2768

Full Length Research Paper

Secure anycast routing in wireless mesh networks

Fazl-e-Hadi*
  • Fazl-e-Hadi*
  • Department of Graduate Studies and Applied Sciences, Bahria University, Islamabad, Pakistan.
  • Google Scholar
Abid Ali Minhas
  • Abid Ali Minhas
  • Department of Graduate Studies and Applied Sciences, Bahria University, Islamabad, Pakistan.
  • Google Scholar
Atif Naseer
  • Atif Naseer
  • Prince Muqrin Chair for IT Security, King Saud University, Kingdom of Saudi Arabia.
  • Google Scholar
Abdulaziz Almazyad
  • Abdulaziz Almazyad
  • Al Yamamah University, Kingdom of Saudi Arabia, King Saud University, Kingdom of Saudi Arabia.
  • Google Scholar


  •  Received: 25 May 2011
  •  Accepted: 16 August 2011
  •  Published: 30 May 2014

References

Akyildiz XW, Wang W (2005). Wireless mesh networks: A survey. Comput. Netw. 47(4):445-487.
Crossref
 
Baumann R, Vincent L, Simon H, Martin M (2007). HEAT: Scalable Routing in Wireless Mesh Networks using Temperature Fields. IEEE WoWMoM.
 
Bruno R, Conti M, Gregori E (2005). Mesh networks: Commodity multihop ad hoc networks. IEEE Commun. Mag. pp. 123-131.
Crossref
 
Chaum DL (1981).Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Commun. ACM 24(2): 84-88.
Crossref
 
Dingledine R, Mathewson N, Syverson P (2004). Tor: The Second-Generation Onion Router. In 13th USENIX Security Symposium.
 
Hu Y, Perrig A, Johnson D (2002). Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. In Proceedings of ACM MobiCom.
 
Kargl F, Geiss A (2005). Secure Dynamic Source Routing. In Proceedings of HICSS, p. 38.
 
Lenders V, May M, Plattner B (2006). Density-based vs. Proximity-based Anycast Routing for Mobile Networks. In IEEE INFOCOM, Barcelona, Spain. pp. 1-13.
 
Marti S, Giuli T, Lai K, Baker M (2000). Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In Proceedings of ACM MobiCom'00.
Crossref
 
Pal A, Nasipuri A (2010). A quality aware anycast routing protocol for wireless mesh networks in IEEE southeastcon 2010 (southeastcon).
 
Reed M, Syverson P, Goldschlag D (1998). Anonymous Connections and Onion Routing. IEEE J. Select. Areas Commun. Special Issue on Copyright and Privacy Protection, pp. 482-494.
 
Reiter MK, Rubin AD (1998). Crowds: Anonymity ForWeb Transactions. ACM Trans. Inf. Syst. Secur. 1:1.
Crossref
 
Sangsu J, Dujeong L, Malaz K, June-Koo KR (2009). Autonomous Load Balancing Anycast Routing Protocol for Wireless Mesh Networks, appeared in World of Wireless, Mobile and Multimedia Networks & Workshops, 2009. WoWMoM.
 
Sanzgiri K, Dahill B, Levine B, Belding-Royer E (2002). A Secure Routing Protocol for Ad Hoc Networks. In Proceedings of IEEE ICNP'.
View
 
Scarlata V, Levine B, Shields C (2001). Responder Anonymity and Anonymous Peer-to-Peer File Sharing. IEEE International Conference on Network Protocols (ICNP), Riverside, CA.
 
Song L, Xia Z (2009). An Anycast Routing Protocol for Wireless Mesh Access Network. WASE Int. Conference on Information Engineering.
 
Stephen G, Vallipuram M, Vallipuram M (2009). Detecting Man-in-the-Middle and Wormhole Attacks in Wireless Mesh Networks. International Conference on Advanced Information Networking and Applications.
 
Xiaoxin W, Ninghui L (2009). Achieving Privacy in Mesh Networks 4th International Symposium on Information, Computer, and Communications Security, Sydney, Australia.
 
Yling Y, Jun W, Robin K (2005). Designing Routing Metrics for Mesh Networks, IEEE Workshop on Wireless Mesh Networks (WiMesh).
 
Zapata MG (2002). Secure Ad hoc On-Demand Distance Vector Routing. ACM Mobile Comput. Commun. Rev. (MC2R). 6(3):106-107.