GloMoSim: a library for parallel simulation of large-scale wireless networks
PADS '98 Proceedings of the twelfth workshop on Parallel and distributed simulation
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
Communications of the ACM
Security-aware ad hoc routing for wireless networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Enforcing service availability in mobile ad-hoc WANs
MobiHoc '00 Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computing
Secrets & Lies: Digital Security in a Networked World
Secrets & Lies: Digital Security in a Networked World
Securing Distance-Vector Routing Protocols
SNDSS '97 Proceedings of the 1997 Symposium on Network and Distributed System Security
Decentralized Trust Management
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks
EUROMICRO-PDP'02 Proceedings of the 10th Euromicro conference on Parallel, distributed and network-based processing
IEEE Network: The Magazine of Global Internetworking
A charging and rewarding scheme for packet forwarding in multi-hop cellular networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Report on a working session on security in wireless ad hoc networks
ACM SIGMOBILE Mobile Computing and Communications Review
Proceedings of the 9th annual international conference on Mobile computing and networking
Indra: A peer-to-peer approach to network intrusion detection and prevention
WETICE '03 Proceedings of the Twelfth International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises
Secure data transmission in mobile ad hoc networks
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Stimulating cooperation in self-organizing mobile ad hoc networks
Mobile Networks and Applications
Cooperation Issues in Mobile Ad Hoc Networks
ICDCSW '04 Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW'04) - Volume 7
SECTOR: secure tracking of node encounters in multi-hop wireless networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Location-based pairwise key establishments for static sensor networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
A specification-based intrusion detection system for AODV
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
A cooperative intrusion detection system for ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Market sharing games applied to content distribution in ad-hoc networks
Proceedings of the 5th ACM international symposium on Mobile ad hoc networking and computing
A Survey of Secure Wireless Ad Hoc Routing
IEEE Security and Privacy
Integrating heterogeneous wireless technologies: a cellular aided mobile Ad Hoc network (CAMA)
Mobile Networks and Applications
Experiences applying game theory to system design
Proceedings of the ACM SIGCOMM workshop on Practice and theory of incentives in networked systems
Rethinking incentives for mobile ad hoc networks
Proceedings of the ACM SIGCOMM workshop on Practice and theory of incentives in networked systems
Security in wireless mobile and sensor networks
Wireless communications systems and networks
Denial of service resilience in ad hoc networks
Proceedings of the 10th annual international conference on Mobile computing and networking
A framework of secure location service for position-based ad hoc routing
PE-WASUN '04 Proceedings of the 1st ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
Reputation-based Wi-Fi deployment protocols and security analysis
Proceedings of the 2nd ACM international workshop on Wireless mobile applications and services on WLAN hotspots
An advanced signature system for OLSR
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Detection and prevention of MAC layer misbehavior in ad hoc networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Reputation-based framework for high integrity sensor networks
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor networks
Providing Fault-Tolerant Ad hoc Routing Service in Adversarial Environments
Wireless Personal Communications: An International Journal
An Adaptive and Predictive Security Model for Mobile Ad hoc Networks
Wireless Personal Communications: An International Journal
Cooperative Packet Forwarding in Multi-Domain Sensor Networks
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 12 - Volume 13
Analysis of a Reputation System for Mobile Ad-Hoc Networks with Liars
WIOPT '05 Proceedings of the Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
Hidden-action in multi-hop routing
Proceedings of the 6th ACM conference on Electronic commerce
Improving TCP performance over wireless networks with collaborative multi-homed mobile hosts
Proceedings of the 3rd international conference on Mobile systems, applications, and services
A framework for MAC protocol misbehavior detection in wireless networks
Proceedings of the 4th ACM workshop on Wireless security
Proceedings of the 11th annual international conference on Mobile computing and networking
MoB: a mobile bazaar for wide-area wireless services
Proceedings of the 11th annual international conference on Mobile computing and networking
Selfish MAC Layer Misbehavior in Wireless Networks
IEEE Transactions on Mobile Computing
Certain limitations of reputation--based schemes in mobile environments
MSWiM '05 Proceedings of the 8th ACM international symposium on Modeling, analysis and simulation of wireless and mobile systems
Balancing auditability and privacy in vehicular networks
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
Reputed authenticated routing for ad hoc networks protocol (reputed-ARAN)
PE-WASUN '05 Proceedings of the 2nd ACM international workshop on Performance evaluation of wireless ad hoc, sensor, and ubiquitous networks
Reputation-based Wi-Fi deployment
ACM SIGMOBILE Mobile Computing and Communications Review
Dempster-Shafer Theory for Intrusion Detection in Ad Hoc Networks
IEEE Internet Computing
DICTATE: DIstributed CerTification Authority with probabilisTic frEshness for Ad Hoc Networks
IEEE Transactions on Dependable and Secure Computing
On the cost-ineffectiveness of redundancy in commercial P2P computing
Proceedings of the 12th ACM conference on Computer and communications security
Improving key predistribution with deployment knowledge in static sensor networks
ACM Transactions on Sensor Networks (TOSN)
Cooperation in wireless ad hoc networks: a market-based approach
IEEE/ACM Transactions on Networking (TON)
Node Cooperation in Hybrid Ad Hoc Networks
IEEE Transactions on Mobile Computing
Nash Equilibria of Packet Forwarding Strategies in Wireless Ad Hoc Networks
IEEE Transactions on Mobile Computing
Performance Comparison of Trust-Based Reactive Routing Protocols
IEEE Transactions on Mobile Computing
Trust Establishment In Pure Ad-hoc Networks
Wireless Personal Communications: An International Journal
TARP: trust-aware routing protocol
Proceedings of the 2006 international conference on Wireless communications and mobile computing
Cooperation monitoring issues in ad hoc networks
Proceedings of the 2006 international conference on Wireless communications and mobile computing
Suicide for the common good: a new strategy for credential revocation in self-organizing systems
ACM SIGOPS Operating Systems Review
Incentive mechanism design for selfish hybrid wireless relay networks
Mobile Networks and Applications
Towards designing a trusted routing solution in mobile ad hoc networks
Mobile Networks and Applications
Using uncertainty in reputation methods to enforce cooperation in ad-hoc networks
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Evolution of cooperation in ad hoc networks under game theoretic model
Proceedings of the 4th ACM international workshop on Mobility management and wireless access
LARS: a locally aware reputation system for mobile ad hoc networks
Proceedings of the 44th annual Southeast regional conference
Achieving cooperation in multihop wireless networks of selfish nodes
GameNets '06 Proceeding from the 2006 workshop on Game theory for communications and networks
A price-based reliable routing game in wireless networks
GameNets '06 Proceeding from the 2006 workshop on Game theory for communications and networks
Reputation in self-organized communication systems and beyond
Interperf '06 Proceedings from the 2006 workshop on Interdisciplinary systems approach in performance evaluation and design of computer & communications sytems
Identity-based secure collaboration in wireless ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
A game-theoretic look at simple relay channel
Wireless Networks
DREAM: A system for detection and reaction against MAC layer misbehavior in ad hoc networks
Computer Communications
COMBINE: leveraging the power of wireless peers through collaborative downloading
Proceedings of the 5th international conference on Mobile systems, applications and services
Sustaining cooperation in multi-hop wireless networks
NSDI'05 Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2
Aggregating Bandwidth for Multihomed Mobile Collaborative Communities
IEEE Transactions on Mobile Computing
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Integrating a trust framework with a distributed certificate validation scheme for MANETs
EURASIP Journal on Wireless Communications and Networking
Cooperation Enhancement for Message Transmission in VANETs
Wireless Personal Communications: An International Journal
DARWIN: distributed and adaptive reputation mechanism for wireless ad-hoc networks
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
On designing collusion-resistant routing schemes for non-cooperative wireless ad hoc networks
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Secure incentives for commercial ad dissemination in vehicular networks
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
Maximum-lifetime routing: system optimization & game-theoretic perspectives
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
On improving the efficiency of truthful routing in MANETs with selfish nodes
Pervasive and Mobile Computing
A secure incentive protocol for mobile ad hoc networks
Wireless Networks
A mobile bazaar for wide-area wireless services
Wireless Networks
Stimulating cooperation in route discovery of ad hoc networks
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
PRISM: Improving the Performance of Inverse-Multiplexed TCP in Wireless Networks
IEEE Transactions on Mobile Computing
Verifying Delivered QoS in Multihop Wireless Networks
IEEE Transactions on Mobile Computing
Best neighbor strategy to enforce cooperation among selfish nodes in wireless ad hoc network
Computer Communications
The COMMIT Protocol for Truthful and Cost-Efficient Routing in Ad Hoc Networks with Selfish Nodes
IEEE Transactions on Mobile Computing
ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks
ACM Transactions on Information and System Security (TISSEC)
Analysis of a reputation system for Mobile Ad-Hoc Networks with liars
Performance Evaluation
Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing
Computer Communications
Advanced Engineering Informatics
Enabling a cooperative strategy in mobile ad-hoc networks
EATIS '07 Proceedings of the 2007 Euro American conference on Telematics and information systems
The performance of a watchdog protocol for wireless network security
International Journal of Wireless and Mobile Computing
Wireless networking security: open issues in trust, management, interoperation and measurement
International Journal of Security and Networks
Collaborative Dynamic Source Routing using transitional trust filters
International Journal of Information and Computer Security
Reputation-based framework for high integrity sensor networks
ACM Transactions on Sensor Networks (TOSN)
Autonomic trust reasoning enables misbehavior detection in OLSR
Proceedings of the 2008 ACM symposium on Applied computing
A novel approach for creating trust to reduce malicious behavior in MANET
CoNEXT '07 Proceedings of the 2007 ACM CoNEXT conference
Modified AODV protocol for prevention of denial of service attacks in wireless ad hoc networks
AIC'05 Proceedings of the 5th WSEAS International Conference on Applied Informatics and Communications
SNARE: sensor node attached reputation evaluator
CoNEXT '06 Proceedings of the 2006 ACM CoNEXT conference
Truthful multipath routing for ad hoc networks with selfish nodes
Journal of Parallel and Distributed Computing
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
Self-monitoring for sensor networks
Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing
Cooperative packet relaying model for wireless ad hoc networks
Proceedings of the 1st ACM international workshop on Foundations of wireless ad hoc and sensor networking and computing
An Analytic Framework for Modeling and Detecting Access Layer Misbehavior in Wireless Networks
ACM Transactions on Information and System Security (TISSEC)
Trust-based evolutionary game model assisting AODV routing against selfishness
Journal of Network and Computer Applications
Incentive-compatible opportunistic routing for wireless networks
Proceedings of the 14th ACM international conference on Mobile computing and networking
MMAN - a monitor for mobile ad hoc networks: design, implementation, and experimental evaluation
Proceedings of the third ACM international workshop on Wireless network testbeds, experimental evaluation and characterization
REFACING: An autonomic approach to network security based on multidimensional trustworthiness
Computer Networks: The International Journal of Computer and Telecommunications Networking
Fair Reputation Evaluating Protocol for Mobile Ad Hoc Network
Computational Intelligence and Security
Detection of Packet Forwarding Misbehavior in Mobile Ad-Hoc Networks
WWIC '07 Proceedings of the 5th international conference on Wired/Wireless Internet Communications
Cooperative Security Schemes for Mobile Ad-Hoc Networks
CDVE '08 Proceedings of the 5th international conference on Cooperative Design, Visualization, and Engineering
Clique-based group key assignment in Wireless Sensor Networks
International Journal of Security and Networks
A TOOL FOR PROTOTYPING AIS BASED PROTECTION SYSTEMS FOR AD HOC AND SENSOR NETWORKS
Cybernetics and Systems
LIDF: Layered intrusion detection framework for ad-hoc networks
Ad Hoc Networks
Impact of denial of service attacks on ad hoc networks
IEEE/ACM Transactions on Networking (TON)
An approach for promoting contribution in GAF-based ad hoc networks: design and implementation
Proceedings of the 11th international symposium on Modeling, analysis and simulation of wireless and mobile systems
TSR: trust-based secure MANET routing using HMMs
Proceedings of the 4th ACM symposium on QoS and security for wireless and mobile networks
Dynamic reputation-based incentive mechanism considering heterogeneous networks
Proceedings of the 3nd ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks
A robust methodology for prediction of trust and reputation values
Proceedings of the 2008 ACM workshop on Secure web services
A cross-layer dropping attack in video streaming over ad hoc networks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
MISPAR: mitigating stealthy packet dropping in locally-monitored multi-hop wireless ad hoc networks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Subjective logic based trust model for mobile ad hoc networks
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Optimal forwarding for wireless ad hoc networks with game theory
International Journal of Autonomous and Adaptive Communications Systems
Games to induce specified equilibria
Theoretical Computer Science
A Multi-agents Contractual Approach to Incentive Provision in Non-cooperative Networks
OTM '08 Proceedings of the OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008. Part I on On the Move to Meaningful Internet Systems:
Fuzzy Logic Based Reputation System for Mobile Ad Hoc Networks
KES '07 Knowledge-Based Intelligent Information and Engineering Systems and the XVII Italian Workshop on Neural Networks on Proceedings of the 11th International Conference
Rater Credibility Assessment in Web Services Interactions
World Wide Web
Proceedings of the second ACM conference on Wireless network security
Scrivener: providing incentives in cooperative content distribution systems
Proceedings of the ACM/IFIP/USENIX 2005 International Conference on Middleware
A light-weight scalable truthful routing protocol in MANETs with selfish nodes
International Journal of Ad Hoc and Ubiquitous Computing
Identification of Multiple Invalid Signatures in Pairing-Based Batched Signatures
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
OMH: suppressing selfish behavior in ad hoc networks with One More Hop
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness
A secure credit-based cooperation stimulating mechanism for MANETs using hash chains
Future Generation Computer Systems
Game theoretic packet relaying model for wireless ad hoc networks
International Journal of Communication Networks and Distributed Systems
Impact of Misbehaviour on QoS in Wireless Mesh Networks
NETWORKING '09 Proceedings of the 8th International IFIP-TC 6 Networking Conference
A Coalitional Game Model for Heat Diffusion Based Incentive Routing and Forwarding Scheme
NETWORKING '09 Proceedings of the 8th International IFIP-TC 6 Networking Conference
Path-Based Reputation System for MANET Routing
WWIC 2009 Proceedings of the 7th International Conference on Wired/Wireless Internet Communications
A trust model based on fuzzy recommendation for mobile ad-hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Random sampling key revocation scheme for distributed sensor networks
Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments
Multimodal security enforcement framework for wireless ad hoc networks
Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly
Barter trade improves message delivery in opportunistic networks
Ad Hoc Networks
RATEWeb: Reputation Assessment for Trust Establishment among Web services
The VLDB Journal — The International Journal on Very Large Data Bases
CSR: Constrained Selfish Routing in Ad-Hoc Networks
WASA '09 Proceedings of the 4th International Conference on Wireless Algorithms, Systems, and Applications
Mitigating routing vulnerabilities in ad hoc networks using reputations
International Journal of Information and Computer Security
Securing wireless mesh networks: a winning combination of routing and forwarding mechanisms
Proceedings of the 5th International Latin American Networking Conference
Reliable and efficient forwarding in ad hoc networks
Ad Hoc Networks
Proceedings of the 2009 International Conference on Hybrid Information Technology
Comparison of motivation-based cooperation mechanisms for hybrid wireless networks
Computer Communications
Incorporating trust and reputation in the DSR protocol for dependable routing
Computer Communications
Location-based incentive pricing for tree-based relaying in multi-hop cellular networks
Computer Communications
IEEE Transactions on Communications
Controlling resource hogs in mobile delay-tolerant networks
Computer Communications
COFFEE: a context-free protocol for stimulating data forwarding in wireless ad hoc networks
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
Cooperation in ad hoc networks with noisy channels
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
Impact of a simple load balancing approach and an incentive-based scheme on MANET performance
Journal of Parallel and Distributed Computing
Adaptable misbehavior detection and isolation in wireless ad hoc networks using policies
IM'09 Proceedings of the 11th IFIP/IEEE international conference on Symposium on Integrated Network Management
Association between nodes to combat blackhole attack in DSR based MANET
WOCN'09 Proceedings of the Sixth international conference on Wireless and Optical Communications Networks
An Architecture for Dynamic Trust Monitoring in Mobile Networks
OTM '09 Proceedings of the Confederated International Workshops and Posters on On the Move to Meaningful Internet Systems: ADI, CAMS, EI2N, ISDE, IWSSA, MONET, OnToContent, ODIS, ORM, OTM Academy, SWWS, SEMELS, Beyond SAWSDL, and COMBEK 2009
Web Services Reputation Assessment Using a Hidden Markov Model
ICSOC-ServiceWave '09 Proceedings of the 7th International Joint Conference on Service-Oriented Computing
RDSR-V. Reliable Dynamic Source Routing for video-streaming over mobile ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Access point evaluation using packet transfer ratio in multihop wireless networks
ICOIN'09 Proceedings of the 23rd international conference on Information Networking
Incentives for P2P file sharing in mobile ad hoc networks
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
A finite-state-model scheme for efficient cooperation enforcement in mobile ad hoc networks
International Journal of Wireless and Mobile Computing
A global security architecture for operated hybrid WLAN mesh networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
A unified security backplane for trust and reputation systems in decentralized networks
INFOCOM'09 Proceedings of the 28th IEEE international conference on Computer Communications Workshops
Cooperation requirements for packet forwarding in vehicular ad-hoc networks (VANETs)
CompSysTech '09 Proceedings of the International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing
A reliable routing model based on the residual energy in MANET
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
OMH--Suppressing Selfish Behavior in Ad hoc Networks with One More Hop
Mobile Networks and Applications
Trust enhanced secure multi-path routing protocol for detecting and mitigating misbehaving nodes
Proceedings of the International Conference and Workshop on Emerging Trends in Technology
Private location-based information retrieval through user collaboration
Computer Communications
Promoting cooperation among strangers to access Internet services from an ad hoc network
Pervasive and Mobile Computing
Security enforcement in wireless sensor networks: A framework based on non-cooperative games
Pervasive and Mobile Computing
A secure data transmission protocol for mobile ad hoc networks
PAISI'07 Proceedings of the 2007 Pacific Asia conference on Intelligence and security informatics
Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems
Computer Standards & Interfaces
Studying on economic-inspired mechanisms for routing and forwarding in wireless ad hoc network
TAMC'07 Proceedings of the 4th international conference on Theory and applications of models of computation
Cost-sensitive intrusion responses for mobile ad hoc networks
RAID'07 Proceedings of the 10th international conference on Recent advances in intrusion detection
Reputation-based routing in hybrid ad hoc networks
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
A trust approach for node cooperation in MANET
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
Analysis of distributed packet forwarding trategies in ad hoc networks
PPAM'07 Proceedings of the 7th international conference on Parallel processing and applied mathematics
NTMS'09 Proceedings of the 3rd international conference on New technologies, mobility and security
Emergency connectivity in ad-hoc networks with selfish nodes
LATIN'08 Proceedings of the 8th Latin American conference on Theoretical informatics
Generalized second price auction in multi-path routing with selfish nodes
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Comparison of access control methods in mobile as-hoc networks
IMSAA'09 Proceedings of the 3rd IEEE international conference on Internet multimedia services architecture and applications
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference
A collusion-resistant routing scheme for noncooperative wireless ad hoc networks
IEEE/ACM Transactions on Networking (TON)
On achieving cost-sensitive anomaly detection and response in mobile ad hoc networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
A new mechanism to detect selfish behavior in IEEE 802.11 ad hoc networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Detecting greedy behaviors by linear regression in wireless ad hoc networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Attack and flee: game-theory-based analysis on interactions among nodes in MANETs
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics - Special issue on game theory
Pi: a practical incentive protocol for delay tolerant networks
IEEE Transactions on Wireless Communications
A cluster-based trust-aware routing protocol for mobile ad hoc networks
Wireless Networks
Cooperation via contracts: stability and algorithms
INFOCOM'10 Proceedings of the 29th conference on Information communications
Stimulating cooperation in multi-hop wireless networks using cheating detection system
INFOCOM'10 Proceedings of the 29th conference on Information communications
Mobicent: a credit-based incentive system for disruption tolerant network
INFOCOM'10 Proceedings of the 29th conference on Information communications
INFOCOM'10 Proceedings of the 29th conference on Information communications
CPMC: an efficient proximity malware coping scheme in smartphone-based mobile networks
INFOCOM'10 Proceedings of the 29th conference on Information communications
A cross-layer route discovery strategy for virtual currency systems in mobile ad hoc networks
WONS'10 Proceedings of the 7th international conference on Wireless on-demand network systems and services
Reputation-based security protocol for MANETs in highly mobile disconnection-prone environments
WONS'10 Proceedings of the 7th international conference on Wireless on-demand network systems and services
Detection of selfish nodes in networks using CoopMAC protocol with ARQ
IEEE Transactions on Wireless Communications
Rating the raters: a reputation system for wiki-like domains
Proceedings of the 3rd international conference on Security of information and networks
International Journal of Communication Networks and Distributed Systems
SReD: a secure reputation-based dynamic window scheme for disruption-tolerant networks
MILCOM'09 Proceedings of the 28th IEEE conference on Military communications
Trust based security in MANET routing protocols: a survey
Proceedings of the 1st Amrita ACM-W Celebration on Women in Computing in India
An efficient reputation-based mechanism to enforce cooperation in MANETs
CIT'10 Proceedings of the 4th international conference on Communications and information technology
A gradual solution to detect selfish nodes in mobile ad hoc networks
International Journal of Wireless and Mobile Computing
Are you contributing trustworthy data?: the case for a reputation system in participatory sensing
Proceedings of the 13th ACM international conference on Modeling, analysis, and simulation of wireless and mobile systems
Probabilistic packet relaying in wireless mobile ad hoc networks
PPAM'09 Proceedings of the 8th international conference on Parallel processing and applied mathematics: Part I
KES-AMSTA'10 Proceedings of the 4th KES international conference on Agent and multi-agent systems: technologies and applications, Part II
A game theoretic trust model for on-line distributed evolution of cooperation inMANETs
Journal of Network and Computer Applications
A survey on game theory applications in wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
An optimal, strategy-proof scheme for multi-path traffic assignment in non-cooperative networks
IEEE Transactions on Wireless Communications
A proactive data security framework for mission-critical sensor networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Protocols for stimulating packet forwarding in wireless ad hoc networks
IEEE Wireless Communications
Efficient certification path discovery for MANET
EURASIP Journal on Wireless Communications and Networking
COSR: a reputation-based secure route protocol in MANET
EURASIP Journal on Wireless Communications and Networking - Special issue on multimedia communications over next generation wireless networks
AdContRep: a privacy enhanced reputation system for MANET content services
UIC'10 Proceedings of the 7th international conference on Ubiquitous intelligence and computing
A hierarchical architecture for detecting selfish behaviour in community wireless mesh networks
Computer Communications
A reputation system for wireless mesh networks using network coding
Journal of Network and Computer Applications
Vehicular networks and the future of the mobile internet
Computer Networks: The International Journal of Computer and Telecommunications Networking
Multi-dimensional evidence-based trust management with multi-trusted paths
Future Generation Computer Systems
A novel reputation computation model based on subjective logic for mobile ad hoc networks
Future Generation Computer Systems
Cautious rating for trust-enabled routing in wireless sensor networks
EURASIP Journal on Wireless Communications and Networking - Special issue on wireless network security
Perspectives of selfish behaviour in mobile ad hoc networks
NMA'10 Proceedings of the 7th international conference on Numerical methods and applications
Eliminating misbehaving nodes by opinion based trust evaluation model in MANETs
Proceedings of the 2011 International Conference on Communication, Computing & Security
A trust-based IDS for the AODV protocol
ICICS'10 Proceedings of the 12th international conference on Information and communications security
DPM'10/SETOP'10 Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security
Detecting misbehaving nodes in MANETs
Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services
Misbehaving nodes detection through opinion based trust evaluation model in MANETs
Proceedings of the International Conference & Workshop on Emerging Trends in Technology
Journal of Network and Computer Applications
A combinational perspective in stimulating cooperation in mobile ad hoc networks
Journal of Computer Science and Technology
GRAP: Grey risk assessment based on projection in ad hoc networks
Journal of Parallel and Distributed Computing
Incentivizing responsible networking via introduction-based routing
TRUST'11 Proceedings of the 4th international conference on Trust and trustworthy computing
Trust-based minimum cost opportunistic routing for Ad hoc networks
Journal of Systems and Software
Rescuing wireless sensor networks security from science fiction
NETWORKING'11 Proceedings of the IFIP TC 6th international conference on Networking
Review: Certification-based trust models in mobile ad hoc networks: A survey and taxonomy
Journal of Network and Computer Applications
A wireless intrusion detection system for secure clustering and routing in ad hoc networks
ISC'06 Proceedings of the 9th international conference on Information Security
Mechanisms to induce random choice
WINE'06 Proceedings of the Second international conference on Internet and Network Economics
Distributed self-policing architecture for fostering node cooperation in wireless mesh networks
PWC'06 Proceedings of the 11th IFIP TC6 international conference on Personal Wireless Communications
EG-ICE'06 Proceedings of the 13th international conference on Intelligent Computing in Engineering and Architecture
Reputation based localized access control for mobile ad-hoc networks
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
LSTOP: a light-weight scalable truthful routing protocol in MANETs with selfish nodes
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
RAMP: a reputation-aware multi-hop routing protocol in wireless ad-hoc networks
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies
Spontaneous cooperation in multi-domain sensor networks
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Towards cheat-proof cooperative relay for cognitive radio networks
MobiHoc '11 Proceedings of the Twelfth ACM International Symposium on Mobile Ad Hoc Networking and Computing
Trustpert: a reputation model for collaboration in MANETs using fuzzy expert systems
Proceedings of the Second Kuwait Conference on e-Services and e-Systems
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
ICOIN'05 Proceedings of the 2005 international conference on Information Networking: convergence in broadband and mobile networking
Self-protection in p2p networks: choosing the right neighbourhood
IWSOS'06/EuroNGI'06 Proceedings of the First international conference, and Proceedings of the Third international conference on New Trends in Network Architectures and Services conference on Self-Organising Systems
Efficient node forwarding strategies via non-cooperative game for wireless ad hoc networks
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
OPODIS'04 Proceedings of the 8th international conference on Principles of Distributed Systems
A specification-based intrusion detection model for OLSR
RAID'05 Proceedings of the 8th international conference on Recent Advances in Intrusion Detection
Engineering incentive schemes for ad hoc networks
EDBT'04 Proceedings of the 2004 international conference on Current Trends in Database Technology
Peer collaboration in wireless ad hoc networks
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
Robust routing in malicious environment for ad hoc networks
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
Linking ad hoc charging schemes to AAAC architectures
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Advanced detection of selfish or malicious nodes in ad hoc networks
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
Comparison of incentive-based cooperation strategies for hybrid networks
WWIC'05 Proceedings of the Third international conference on Wired/Wireless Internet Communications
Random feedbacks for selfish nodes detection in mobile ad hoc networks
IPOM'05 Proceedings of the 5th IEEE international conference on Operations and Management in IP-Based Networks
A statistical mechanics approach to trust management in autonomic networks
International Journal of Systems, Control and Communications
A novel acknowledgment-based approach against collude attacks in MANET
Expert Systems with Applications: An International Journal
ICICS'09 Proceedings of the 11th international conference on Information and Communications Security
A game theory-based surveillance mechanism against suspicious insiders in MANETs
INTRUST'10 Proceedings of the Second international conference on Trusted Systems
Scrivener: providing incentives in cooperative content distribution systems
Middleware'05 Proceedings of the ACM/IFIP/USENIX 6th international conference on Middleware
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Solving soft security problem in MANETs using an evolutionary approach
SIIS'11 Proceedings of the 2011 international conference on Security and Intelligent Information Systems
Packet forwarding strategies for cooperation enforcement in mobile ad hoc wireless networks
ICDCIT'12 Proceedings of the 8th international conference on Distributed Computing and Internet Technology
Analytical models for trust based routing protocols in wireless ad hoc networks
ACM SIGSOFT Software Engineering Notes
Charging support for ad hoc stub networks
Computer Communications
A mathematical framework for analyzing adaptive incentive protocols in P2P networks
IEEE/ACM Transactions on Networking (TON)
International Journal of Communication Networks and Distributed Systems
On effectiveness of cooperation enforcement mechanisms in wireless ad hoc networks
International Journal of Communication Networks and Distributed Systems
Veracity, plausibility, and reputation
WISTP'12 Proceedings of the 6th IFIP WG 11.2 international conference on Information Security Theory and Practice: security, privacy and trust in computing systems and ambient intelligent ecosystems
CTAC: Control traffic tunneling attacks' countermeasures in mobile wireless networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
How do we encourage an egoist to act socially in an ad hoc mobile network?
Computer Networks: The International Journal of Computer and Telecommunications Networking
A strategic reputation-based mechanism for mobile ad hoc networks
Canadian AI'12 Proceedings of the 25th Canadian conference on Advances in Artificial Intelligence
An incentive scheme in wireless access networks through a game based on trust prediction
International Journal of Ad Hoc and Ubiquitous Computing
A transmission scheme for opportunistic networks with social selfish nodes
Proceedings of the 4th International Conference on Internet Multimedia Computing and Service
UIC'07 Proceedings of the 4th international conference on Ubiquitous Intelligence and Computing
An incentive-based forwarding protocol for mobile ad hoc networks with anonymous packets
NEW2AN'07 Proceedings of the 7th international conference on Next Generation Teletraffic and Wired/Wireless Advanced Networking
Determining the Representative Factors Affecting Warning Message Dissemination in VANETs
Wireless Personal Communications: An International Journal
Bio-inspired enhancement of reputation systems for intelligent environments
Information Sciences: an International Journal
Detection and Prevention of Single and Cooperative Black Hole Attacks in Mobile Ad Hoc Networks
International Journal of Business Data Communications and Networking
Inspired Social Spider Behavior for Secure Wireless Sensor Networks
International Journal of Mobile Computing and Multimedia Communications
A practical reputation system for pervasive social chatting
Journal of Computer and System Sciences
CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using policies
Distributed and Parallel Databases
Mitigating collaborative blackhole attacks on DSR-Based mobile ad hoc networks
FPS'12 Proceedings of the 5th international conference on Foundations and Practice of Security
AODV-based technique for quick and secure local recovery from link failures in MANETs
International Journal of Communication Networks and Distributed Systems
Requirements and design for neutral trust management framework in unstructured networks
The Journal of Supercomputing
A survey of intrusion detection techniques for cyber-physical systems
ACM Computing Surveys (CSUR)
On the credit evolution of credit-based incentive protocols in wireless mesh networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Comparative trust management with applications: Bayesian approaches emphasis
Future Generation Computer Systems
A cooperative watchdog model based on Dempster-Shafer for detecting misbehaving vehicles
Computer Communications
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
Mobile ad-hoc networking works properly only if the participating nodes cooperate in routing and forwarding. However,it may be advantageous for individual nodes not to cooperate. We propose a protocol, called CONFIDANT, for making misbehavior unattractive; it is based on selective altruism and utilitarianism. It aims at detecting and isolating misbehaving nodes, thus making it unattractive to deny cooperation. Trust relationships and routing decisions are based on experienced, observed, or reported routing and forwarding behavior of other nodes. The detailed implementation of CONFIDANT in this paper assumes that the network layer is based on the Dynamic Source Routing (DSR) protocol. We present a performance analysis of DSR fortified by CONFIDANT and compare it to regular defenseless DSR. It shows that a network with CONFIDANT and up to 60% of misbehaving nodes behaves almost as well as a benign network, in sharp contrast to a defenseless network. All simulations have been implemented and performed in GloMoSim.