A digital signature scheme secure against adaptive chosen-message attacks
SIAM Journal on Computing - Special issue on cryptography
The quest for security in mobile ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Relations Among Notions of Security for Public-Key Encryption Schemes
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
A charging and rewarding scheme for packet forwarding in multi-hop cellular networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
A Concrete Security Treatment of Symmetric Encryption
FOCS '97 Proceedings of the 38th Annual Symposium on Foundations of Computer Science
Proceedings of the 9th annual international conference on Mobile computing and networking
Stimulating cooperation in self-organizing mobile ad hoc networks
Mobile Networks and Applications
The AD-MIX Protocol for Encouraging Participation in Mobile Ad Hoc Networks
ICNP '03 Proceedings of the 11th IEEE International Conference on Network Protocols
Hi-index | 0.00 |
The question we consider here is the following: “How can a source verify the QoS (Quality of Service) experienced by its packet(s) at each hop to the destination in a multi-hop wireless network?” For example, if Bob needs to forward packets within some maximum delay of δB, how can the source verify that Bob did in fact forward the packets within this bound? Answering this question will enable innovations in multi-hop wireless network deployments where nodes may receive payment not only for forwarding packets but also for meeting some QoS guarantees. In this paper we present protocols that enable verification of delivered QoS for individual packets as well as verification of statistical QoS for groups of packets. The protocols are proved to be cheat-proof. We also provide expressions for the minimum verifiable delay.