Full Length Research Paper
References
Akyildiz XW, Wang W (2005). Wireless mesh networks: A survey. Comput. Netw. 47(4):445-487. Crossref |
||||
Baumann R, Vincent L, Simon H, Martin M (2007). HEAT: Scalable Routing in Wireless Mesh Networks using Temperature Fields. IEEE WoWMoM.
|
||||
Bruno R, Conti M, Gregori E (2005). Mesh networks: Commodity multihop ad hoc networks. IEEE Commun. Mag. pp. 123-131. Crossref |
||||
Chaum DL (1981).Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Commun. ACM 24(2): 84-88. Crossref |
||||
Dingledine R, Mathewson N, Syverson P (2004). Tor: The Second-Generation Onion Router. In 13th USENIX Security Symposium. | ||||
Hu Y, Perrig A, Johnson D (2002). Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. In Proceedings of ACM MobiCom.
|
||||
Kargl F, Geiss A (2005). Secure Dynamic Source Routing. In Proceedings of HICSS, p. 38. | ||||
Lenders V, May M, Plattner B (2006). Density-based vs. Proximity-based Anycast Routing for Mobile Networks. In IEEE INFOCOM, Barcelona, Spain. pp. 1-13.
|
||||
Marti S, Giuli T, Lai K, Baker M (2000). Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In Proceedings of ACM MobiCom'00. Crossref |
||||
Pal A, Nasipuri A (2010). A quality aware anycast routing protocol for wireless mesh networks in IEEE southeastcon 2010 (southeastcon).
|
||||
Reed M, Syverson P, Goldschlag D (1998). Anonymous Connections and Onion Routing. IEEE J. Select. Areas Commun. Special Issue on Copyright and Privacy Protection, pp. 482-494.
|
||||
Reiter MK, Rubin AD (1998). Crowds: Anonymity ForWeb Transactions. ACM Trans. Inf. Syst. Secur. 1:1. Crossref |
||||
Sangsu J, Dujeong L, Malaz K, June-Koo KR (2009). Autonomous Load Balancing Anycast Routing Protocol for Wireless Mesh Networks, appeared in World of Wireless, Mobile and Multimedia Networks & Workshops, 2009. WoWMoM.
|
||||
Sanzgiri K, Dahill B, Levine B, Belding-Royer E (2002). A Secure Routing Protocol for Ad Hoc Networks. In Proceedings of IEEE ICNP'.
View
|
||||
Scarlata V, Levine B, Shields C (2001). Responder Anonymity and Anonymous Peer-to-Peer File Sharing. IEEE International Conference on Network Protocols (ICNP), Riverside, CA. | ||||
Song L, Xia Z (2009). An Anycast Routing Protocol for Wireless Mesh Access Network. WASE Int. Conference on Information Engineering.
|
||||
Stephen G, Vallipuram M, Vallipuram M (2009). Detecting Man-in-the-Middle and Wormhole Attacks in Wireless Mesh Networks. International Conference on Advanced Information Networking and Applications.
|
||||
Xiaoxin W, Ninghui L (2009). Achieving Privacy in Mesh Networks 4th International Symposium on Information, Computer, and Communications Security, Sydney, Australia.
|
||||
Yling Y, Jun W, Robin K (2005). Designing Routing Metrics for Mesh Networks, IEEE Workshop on Wireless Mesh Networks (WiMesh). | ||||
Zapata MG (2002). Secure Ad hoc On-Demand Distance Vector Routing. ACM Mobile Comput. Commun. Rev. (MC2R). 6(3):106-107.
|
Copyright © 2025 Author(s) retain the copyright of this article.
This article is published under the terms of the Creative Commons Attribution License 4.0