Bhutta, N., Ansa, G., Johnson, E., Ahmad, N., Alsiyabi, M., Cruickshank, H.: Security analysis for delay/disruption tolerant satellite and sensor networks. In: International Workshop on Satellite and Space Communications, IWSSC 2009, pp. 385–389 (2009)
Google Scholar
Cardei, I., Liu, C., Wu, J., Yuan, Q.: DTN routing with probabilistic trajectory prediction. In: Li, Y., Huynh, D.T., Das, S.K., Du, D.-Z. (eds.) WASA 2008. LNCS, vol. 5258, pp. 40–51. Springer, Heidelberg (2008)
CrossRef
Google Scholar
Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router. In: USENIX Security Symposium. USENIX Association (2004)
Google Scholar
DLR: SUMO - Simulation of Urban MObility, Insitute if Transportation Systems, Deutsches Zentrum für Luft- und Raumfahrt (DLR)
Google Scholar
Evans, N.S., Dingledine, R., Grothoff, C.: A practical congestion attack on tor using long paths. In: USENIX Security Symposium, pp. 33–50 (2009)
Google Scholar
Farrell, S., Cahill, V.: Delay- and Disruption-Tolerant Networking. Artech House, Norwood (2006)
Google Scholar
Feamster, N., Dingledine, R.: Location diversity in anonymity networks. In: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, pp. 66–76. ACM (2004)
Google Scholar
Goldschlag, D., Reed, M., Syverson, P.: Hiding routing information. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 137–150. Springer, Heidelberg (1996)
CrossRef
Google Scholar
Hay, D., Giaccone, P.: Optimal routing and scheduling for deterministic delay tolerant networks. In: Sixth International Conference on Wireless On-Demand Network Systems and Services, WONS 2009, pp. 27–34. IEEE (2009)
Google Scholar
Hopper, N., Vasserman, E.Y., Chan-Tin, E.: How much anonymity does network latency leak? ACM Trans. Inf. Syst. Secur. 13(2), 13:1–13:28 (2010)
CrossRef
Google Scholar
Jain, S., Fall, K., Patra, R.: Routing in a delay tolerant network, vol. 34. ACM (2004)
Google Scholar
OSM: JOSM, OpenStreetMap (OSM). https://josm.openstreetmap.de
Nsnam: NS-3 webpage. https://www.nsnam.org
Raj, C., Upadhayaya, U., Makwana, T., Mahida, P.: Simulation of vanet using NS-3 and SUMO. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 4, 563–569 (2014)
Google Scholar
Reed, M.G., Syverson, P.F., Goldschlag, D.M.: Anonymous connections and onion routing. IEEE J. Select. Areas Commun. 16(4), 482–494 (1998)
CrossRef
Google Scholar
Shi, C., Luo, X., Traynor, P., Ammar, M.H., Zegura, E.W.: Arden: anonymous networking in delay tolerant networks. Ad Hoc Netw. 10(6), 918–930 (2012)
CrossRef
Google Scholar
Tor Project. https://www.torproject.org/
Vakde, G., Bibikar, R., Le, Z., Wright, M.: Enpassant: anonymous routing for disruption-tolerant networks with applications in assistive environments. Secur. Commun. Netw. 4(11), 1243–1256 (2011)
CrossRef
Google Scholar
Zhou, D.: DTN Bundle Protocol. https://www.nsnam.org/wiki/Current_Development