|
[1]M. Mauve, J. Widmer and H. Hartenstein, A Survey on Position Based Routing in Mobile Ad-hoc Networks, IEEE Network Magazine, 15(6): pp. 30–39, No-vember 2001. [2]B. Karp, H.T. Kung, GPSR: greedy perimeter stateless routing for wireless net-works, in Mobile Computing and Networking, pp. 243–254, 2000. [3]L. Blazevic, L. Buttyan, S. Giordano, J.-P. Hubaux, and J.-Y. Le Boudec, Self-Organization in Mobile Ad hoc networks: The Approach of Terminodes, IEEE Personal Communications, pp. 166–174, June, 2000. [4]S. Basagni and et. al. A Distance Routing Effect Algorithm for Mobility (DREAM). In ACM/IEEE MobiCom '98, October, 1998 [5]H. Cheng, J. Cao, H.-H. Chen and H. Zhang. “GrLS: Group-based location ser-vice in mobile ad hoc networks,” IEEE Transactions on Vehicular Technology, 57(6): pp. 3693-3707, November, 2008. [6]Y. Xue, B. Li, and K. Nahrstedt, “A scalable location management scheme in mobile ad-hoc networks,” Proc. 26th Ann. IEEE Conf. Local Computer Networks, 2001. [7]W. Kiess, H. Fssler, J. Widmer, M. Mauve, “Hierarchical Location Service for Mobile Ad-Hoc Networks”, ACM MC2R, vol. 8, no. 4, Oct. 2004. [8]I. Stojmenovic, “A routing strategy and quorum based location update scheme for ad hoc wireless networks,” SITE, Univ. Ottawa, Ottawa, ON, Canada, Tech. Rep. TR-99-09, 1999. [9]X. Wu, “VDPS: Virtual home region based distributed position service in mobile ad hoc networks,” in Proc. ICDCS, pp. 113–122, June, 2005. [10]P. Hsiao, “Geographical region summary service for geographical routing,” ACM MC2R, vol. 5, no. 4, pp. 25–39, January, 2002. [11]X. Wu, “DISPOSER: distributed secure position service in mobile ad hoc net-works: Research Articles,” Wirel. Commun. Mob. Comput., vol. 6, no. 3, pp. 357–373, 2006. [12]Z. Zhi and Y. K. Choong. Anonymizing Geographic Ad Hoc Routing for Pre-serving Location Privacy. In IEEE ICDCSW’05, pp. 646–651, 2005. [13]J. Zhou, Z. Lu. A Secure Distributed Location Service Scheme for Mobile Ad Hoc Networks. In IEEE CNMT, pp. 1-4, 2009. [14]Isakow, A. and Shi, H. “Design and Development of ‘GlobeTrotter’ –An Innova-tive Location Based System using J2ME”, International Journal of Computer Science and Network Security, Vol 8 No. 3, pp. 201-207, March, 2008. [15]Sheng-Cheng Yeh, Wu-Hsiao Hsu, Ming-Yang Su, Ching-Hui Chen, and Ko-Hung Liu, “A Study on Outdoor Positioning Technology Using GPS and WiFi Networks”, In IEEE ICNSC, pp.597-601, March, 2009. [16]A. Beresford and F. Stajano. Mix zones: User privacy in location-aware services. In IEEE PerSec, 2004. [17]J. Liao and J. Li. Effectively Changing Pseudonyms for Privacy Protection in VANETs. In IEEE ISPAN, pp. 648-652, 2009. [18]J. Freudiger*, M. H. Manshaei*, J.-Y. Le Boudec, and J.-P. Hubaux. On the Age of Pseudonyms in Mobile Ad Hoc Networks. In IEEE Infocom, 2010. [19]P. J. Chuang, J. S. Deng and C. S. Lin. Location Privacy Protection Using Inde-pendent ID Update for WLANs. In Journal of Information Science and Engi-neering 27, pp. 403-418, March, 2011. [20]M. Li, K. Sampigethaya, L. Huang, and R. Poovendran, “Swing & Swap: Us-er-Centric Approaches Towards Maximizing Location Privacy,” ACM WPES, pp. 19-28, October, 2006. [21]J. F. Raymond. Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems. In H. Federrath, editor, Designing Privacy Enhancing Technologies: Workshop on Design Issue in Anonymity and Unobservability, pages 10–29. Springer-Verlag, LNCS 2009, July 2000. [22]V. Gupta, S. Gupta, S. Chang, and D. Stebila. Performance Analysis of Elliptic Curve Cryptography for (SSL). In Proc. ACM Workshop on Wireless Security, September, 2002. [23]Xiaoxin Wu and Bharat Bhargava,“AO2P: Ad Hoc On-Demand Position-Based Private Routing Protocol.” IEEE Transactions on Mobile Computing, vol. 4, no. 4, pp. 335-348, July, 2005. [24]Qualnet, Scalable Network Technologies (SNT), http://www.qualnet.com/, 2011. [25]D. Johnson and D. Maltz, “Dynamic Source Routing in Ad Hoc Wireless Net-works,” in Mobile Computing (Kluwer Academic) chapter 5, pp. 153-181, 1996.
|