Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
The quest for security in mobile ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Path set selection in mobile ad hoc networks
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
MIPMANET: mobile IP for mobile ad hoc networks
MobiHoc '00 Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computing
Elliptic Curve Cryptography on a Palm OS Device
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Providing Robust and Ubiquitous Security Support for Mobile Ad Hoc Networks
ICNP '01 Proceedings of the Ninth International Conference on Network Protocols
A charging and rewarding scheme for packet forwarding in multi-hop cellular networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
About the impact of co-operation approaches for Ad hoc networks
ACM SIGMOBILE Mobile Computing and Communications Review
Rethinking incentives for mobile ad hoc networks
Proceedings of the ACM SIGCOMM workshop on Practice and theory of incentives in networked systems
Node Cooperation in Hybrid Ad Hoc Networks
IEEE Transactions on Mobile Computing
Experimental evaluation of the usage of ad hoc networks as stubs for multiservice networks
EURASIP Journal on Wireless Communications and Networking
Wireless networking security: open issues in trust, management, interoperation and measurement
International Journal of Security and Networks
Differentiated security in wireless mesh networks
Proceedings of the 4th ACM symposium on QoS and security for wireless and mobile networks
Routing game in hybrid wireless mesh networks with selfish mesh clients
International Journal of Autonomous and Adaptive Communications Systems
Comparison of motivation-based cooperation mechanisms for hybrid wireless networks
Computer Communications
Location-based incentive pricing for tree-based relaying in multi-hop cellular networks
Computer Communications
A trust approach for node cooperation in MANET
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
Pricing, competition, and routing in relay networks
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
DSC: cooperation incentive mechanism for multi-hop cellular networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Stimulating cooperation in multi-hop wireless networks using cheating detection system
INFOCOM'10 Proceedings of the 29th conference on Information communications
Towards cheat-proof cooperative relay for cognitive radio networks
MobiHoc '11 Proceedings of the Twelfth ACM International Symposium on Mobile Ad Hoc Networking and Computing
ICOIN'05 Proceedings of the 2005 international conference on Information Networking: convergence in broadband and mobile networking
OPODIS'04 Proceedings of the 8th international conference on Principles of Distributed Systems
Linking ad hoc charging schemes to AAAC architectures
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Comparison of incentive-based cooperation strategies for hybrid networks
WWIC'05 Proceedings of the Third international conference on Wired/Wireless Internet Communications
Packet forwarding strategies for cooperation enforcement in mobile ad hoc wireless networks
ICDCIT'12 Proceedings of the 8th international conference on Distributed Computing and Internet Technology
An incentive scheme in wireless access networks through a game based on trust prediction
International Journal of Ad Hoc and Ubiquitous Computing
Hi-index | 0.24 |
Wired equivalent security is difficult to provide in ad hoc networks due to high dynamics, wireless link vulnerability, and the requirement of complete decentralization. Especially mutual authentication among nodes in a self-organized mode of ad hoc network, where a single definition of trust is hard to build, is very difficult. This leads to several loopholes in previously established security architectures and intrusion detection systems if employed to ad hoc networks. Also, typical to ad hoc routing major security lacks are unfair participation of nodes in the system, and frequent attacks to the routing protocols by ad hoc nodes that do not want to forward foreign packets but use other nodes to forward their own packets. Contrary to detection-based approaches to tackle this situation, we propose a motivation-based approach, which does not require mutual authentication. We enable this by providing (a) a realistic architecture of ad hoc access network to an Internet Service Provider, (b) a workable business model for charging in this architecture and (c) a necessary security protocol to implement the charging scheme. For the latter we give a formal validation.