參考文獻 |
[1] A. Boukerche, K. El-Khatib, and L. Kobra, “SDAR: A Secure Distributed Anonymous Routing Protocol for Wireless and Mobile Ad Hoc Networks,” in Proceedings of IEEE International Conference on Local Computer Networks (LCN), pp. 618-624, Florida, USA, November 2004.
[2] A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar, “SPIN: Security Protocol for Sensor Networks,” in Proceedings of ACM conference on Mobile Computing and Networking (MobiCom), pp. 189-199, Rome, Italy, July 2001.
[3] B. Zhu, Z. wan, M. S. Kankanhalli, F. Bao, and R. H. Deng, “Anonymous Secure Routing in Mobile Ad Hoc Networks,” in Proceedings of IEEE International conference on Local Computer Networks (LCN), pp. 102-108, Florida, USA, November 2004.
[4] C. Karlof, N. Sastry, and D. Wagner, “TinySec: A Link Layer Security Architecture for WSNs,” in Proceedings of ACM International Conference on Embedded Networked Sensor Systems (Sensys), pp. 162-175, Maryland, USA, November 2004.
[5] C. Perkins, E. Belding-Royer, and S. Das, “Ad hoc On-Demand Distance Vector (AODV) Routing,” in Proceedings of IEEE Workshop on Mobile Computing Systems and Applications (WMCSA), pp. 90-100, Los Angeles, USA, February 1999.
[6] D. B. Johnson, D.A. Maltz, and Y. Hu, “The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR),” Mobile Computing, Kluwer Academic Publishers, vol. 353, pp. 153-181, 1996.
[7] D. Balfanz, G. Durfee, and N Shankar, “Secret Handshakes from Pairing-Based Key Agreement,” in Proceedings of IEEE Symposium on Security and Privacy, pp. 180-196, May 2003.
[8] D. Boneh and M. Franklin, “Identify-based Encryption from Weil Pairing,” SIAM Journal on Computing, Vol.32, No.3, pp. 586-651, March 2003.
[9] D. Eastlake and P. Jones, “US Secure Hash Algorithm 1 (SHA1),” in IETF Request for Comments 3174, The Internet Engineering Task Force (IETF), 2001.
[10] D. Gay, P. Levis, and D. Culler, “Software design patterns for TinyOS,” in Proceedings of ACM Conference on Languages, Compilers, and Tools for Embedded Systems (LCTES), pp. 40-49, Illinois, USA, June 2005.
[11] D. W. Carman, P. S. Kruus, and B. J. Matt, “Constraints and Approaches for Distributed Sensor Networks Security,” Technical Report, NAI Labs, The Security Research Division Network Associates, Inc. Glenwood, Maryland, USA, 2000.
[12] H. Chan and A. Perrig, “PIKE: Peer Intermediaries for Key Establishment in Sensor Networks,” in Proceedings of IEEE International Conference on Computer and Communications Societies (INFOCOM), pp. 524-535, Miami, USA, March 2005.
[13] J. C. Kao and R. Marculescu, “Real-Time Anonymous Routing for Mobile Ad Hoc Networks,” in Proceedings of IEEE Wireless Communications and Networking Conference (WCNC), pp. 4139-4144, Hong Kong, China, March 2007.
[14] J. Kong and X. Hong, “ANODR: Anonymous on Demand Routing with Untraceable Routes for Mobile Ad-Hoc Networks,” in Proceedings of ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), pp. 291-302, Maryland, USA, June 2003.
[15] J. Raymond, “Traffic Analysis: Protocols, Attacks, Design Issues and Open Problems,” in Proceeding of International Workshop on Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability, pp. 10-29, California, USA, January 2001.
[16] L. Zhou, J. Ni, and C. V. Ravishankar, “Efficient Key Establishment for Group-Based Wireless Sensor Deployments,” in Proceedings of ACM Workshop on Wireless Security (WiSe), pp. 1-10, Los Angeles, USA, September 2005.
[17] L. Zhou and Z. J. Haas, “Securing Ad Hoc Networks,” in IEEE Network Magazine, Vol. 13, No. 6, pp. 24-30, December 1999.
[18] M. Bellare, J. Kilian, and P. Rogaway, “The Security of the Cipher Block Chaining Message Authentication Code,” in Proceedings of International Cryptology Conference (CRYPTO), pp. 341-358, California, USA, August 1994.
[19] R. Song, L. Korba, and G. Yee, “AnonDSR: Efficient Anonymous Dynamic Source Routing for Mobile Ad-Hoc Networks,” in Proceedings of ACM workshop on Security of ad hoc and sensor networks, pp. 33-42, Alexandria, USA, November 2005.
[20] Y. W. Law, J. Doumen, and P. Hartel, “Survey and Benchmark of Block Cipher for WSNs,” in Proceedings of ACM Transaction on Sensor Networks (TOSN), Vol. 2, No. 1, pp. 65-93, Feburary 2006.
[21] Y. Yang, X. Wang, S. Zhu, and G. Cao, “SDAP: A Secure Hop-by-Hop Data Aggregation Protocol for Sensor Networks,” in Proceedings of ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), pp. 356-369, Florence, Italy, May 2006.
[22] Y. Zhang, W. Liu, and W. Lou, “Anonymous Communication in Mobile Ad Hoc Networks,” in Proceedings of IEEE International Conference on Computer and Communications Societies (INFOCOM), pp. 1940-1951, Miami, USA, March 2005. |