Power-aware routing in mobile ad hoc networks
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
Vertical handoffs in wireless overlay networks
Mobile Networks and Applications - Special issue: mobile networking in the Internet
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Mobile communications
Password authentication with insecure communication
Communications of the ACM
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Securing ad hoc routing protocols
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
PayWord and MicroMint: Two Simple Micropayment Schemes
Proceedings of the International Workshop on Security Protocols
Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security
Self-Securing Ad Hoc Wireless Networks
ISCC '02 Proceedings of the Seventh International Symposium on Computers and Communications (ISCC'02)
Proceedings of the 9th annual international conference on Mobile computing and networking
Stimulating cooperation in self-organizing mobile ad hoc networks
Mobile Networks and Applications
Rethinking incentives for mobile ad hoc networks
Proceedings of the ACM SIGCOMM workshop on Practice and theory of incentives in networked systems
Modelling incentives for collaboration in mobile ad hoc networks
Performance Evaluation - Selected papers from the first workshop on modeling and optimization in mobile, ad hoc and wireless networks (WiOpt'2003)
Cooperation in wireless ad hoc networks: a market-based approach
IEEE/ACM Transactions on Networking (TON)
Cooperation enforcement schemes for MANETs: a survey: Research Articles
Wireless Communications & Mobile Computing - Wireless Network Security
Cooperation in ad hoc networks: enhancing the virtual currency based models
InterSense '06 Proceedings of the first international conference on Integrated internet ad hoc and sensor networks
LARS: a locally aware reputation system for mobile ad hoc networks
Proceedings of the 44th annual Southeast regional conference
Achieving cooperation in multihop wireless networks of selfish nodes
GameNets '06 Proceeding from the 2006 workshop on Game theory for communications and networks
An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs
IEEE Transactions on Mobile Computing
Toward secure and scalable time synchronization in ad hoc networks
Computer Communications
DARWIN: distributed and adaptive reputation mechanism for wireless ad-hoc networks
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Maximum battery life routing to support ubiquitous mobile computing in wireless ad hoc networks
IEEE Communications Magazine
Self organization in mobile ad hoc networks: the approach of Terminodes
IEEE Communications Magazine
IEEE Network: The Magazine of Global Internetworking
A game theoretic trust model for on-line distributed evolution of cooperation inMANETs
Journal of Network and Computer Applications
Review: Certification-based trust models in mobile ad hoc networks: A survey and taxonomy
Journal of Network and Computer Applications
A game theory-based surveillance mechanism against suspicious insiders in MANETs
INTRUST'10 Proceedings of the Second international conference on Trusted Systems
Robust smart card secured authentication scheme on SIP using Elliptic Curve Cryptography
Computer Standards & Interfaces
Hi-index | 0.00 |
One of the most challenging problems in self-organized mobile ad hoc networks (MANETs), which consist of autonomous and self-interested nodes, is to stimulate the nodes to cooperate in routing and packet forwarding. In this paper, we propose a novel credit-based cooperation mechanism that utilizes hash chains on messages to defend against cheating by the nodes. We show that it imposes a low workload on the nodes in comparison with the mechanisms that deploy digital signature schemes. Moreover, through a game-theoretic analysis, it is shown that any level of cooperation by a node will be attainable if the mechanism makes appropriate payments.