An Anonymous MAC Protocol for Wireless Ad-hoc Networks

  • Shu Jiang


Medium Access Control Data Packet Traffic Load Data Frame Medium Access Control Address 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Bahl P, Padmanabhan VN (2000) RADAR: An in-building RF-based user location and tracking system. In: IEEE INFOCOM, pp 775–784Google Scholar
  2. 2.
    Berkeley U, LBL, USC/ISI, Xerox-PARC (2003) NS notes and documentation. Scholar
  3. 3.
    Boukerche A, El-Khatib K, Xu L, Korba L (2004) A novel solution for achieving anonymity in wireless ad hoc networks. In: ACM Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor and Ubiquitous Networks (PE-WASUN), Venice, ItalyGoogle Scholar
  4. 4.
    Chaum D (1981) Untraceable electronic mail, return addresses, and digital pseudonyms. In: Communications of the ACM, vol 24, no 2, pp 84–88CrossRefGoogle Scholar
  5. 5.
    IEEE (1999) IEEE std 802.11, 1999 edition, Wireless LAN medium access control (MAC) and physical layer (PHY) specifications. http://standards. Scholar
  6. 6.
    Johnson D, Maltz DA (1996) Dynamic source routing in ad hoc wireless networks. In: Imielinski I, Korth H (eds) Mobile Computing, vol 353, Kluwere Acedemic Publishers, pp 153–181Google Scholar
  7. 7.
    Kong J, Hong X (2003) ANODR: Anonymous on demand routing with untraceable routes for mobile ad-hoc networks. In: MobiHoc’03, Annapolis, MD, USAGoogle Scholar
  8. 8.
    Perkins C, Bhagwar P (1994) Highly dynamic destination-sequenced distance-vector routing (DSDV) for mobile computers. In: ACM SIGCOMM’94 Conference on Communications Architectures, Protocols and Applications, pp 234–244Google Scholar
  9. 9.
    Perkins CE (1997) Ad-hoc on-demand distance vector routing. In: IEEE MILCOMGoogle Scholar
  10. 10.
    Pfitzmann A, Köhntopp M (2000) Anonymity, unobservability, and pseudonymity: a proposal for terminology. IETF Draft, version 0.14Google Scholar
  11. 11.
    Pfitzmann A, Waidner (1985) Networks without user observability - design options. In: EUROCRYPT, vol 219 of Lecture Notes in Computer Science, Springer-VerlagGoogle Scholar
  12. 12.
    Reed MG, Syverson PF, Goldschlag DM (1997) Anonymous connections and onion routing. In: IEEE Symposium on Security and PrivacyGoogle Scholar
  13. 13.
    Smailagic A, Kogan D (2002) Location sensing and privacy in a context-aware computing environment. In: IEEE Wireless Communications, vol 9, no 10Google Scholar
  14. 14.
    Wu X, Bhargava B (2005) AO2P: Ad hoc on-demand position-based private routing protocol. In: IEEE Transaction on Mobile ComputingGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2007

Authors and Affiliations

  • Shu Jiang
    • 1
  1. 1.Department of Computer ScienceTexas A&M UniversityTexas

Personalised recommendations