A performance comparison of multi-hop wireless ad hoc network routing protocols
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Self-Securing Ad Hoc Wireless Networks
ISCC '02 Proceedings of the Seventh International Symposium on Computers and Communications (ISCC'02)
Analysis of a Non Repudiation Authentication Protocol for Personal Communication Systems
IC3N '98 Proceedings of the International Conference on Computer Communications and Networks
Stimulating cooperation in self-organizing mobile ad hoc networks
Mobile Networks and Applications
Integrating heterogeneous wireless technologies: a cellular aided mobile Ad Hoc network (CAMA)
Mobile Networks and Applications
Node Cooperation in Hybrid Ad Hoc Networks
IEEE Transactions on Mobile Computing
Detecting impersonation attacks in future wireless and mobile networks
MADNES'05 Proceedings of the First international conference on Secure Mobile Ad-hoc Networks and Sensors
Hi-index | 0.00 |
The issue of secure charging must be solved before integrating networks are employed in commercial applications. In order to solve this problem, a secure incentive-based charging scheme for integrating networks is proposed. The scheme adopts charging receipt to thwart non-reputation attacks. Meanwhile, Message Authentication Code (MAC) and stream cipher mechanism are introduced to offer security guarantee. Security analysis shows that the proposed scheme not only grants the existence of selfish nodes to meet their rational demand, but also prevent various active attacks (e.g., denial of services (DoS), replay attacks, tampering attacks and impersonation attacks). Finally, simulation analysis indicates the influence of proposed scheme on routing stability and node incentive in low overhead.