Fair exchange with a semi-trusted third party (extended abstract)
Proceedings of the 4th ACM conference on Computer and communications security
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Unenforced E-Commerce Transactions
IEEE Internet Computing
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
A fair non-repudiation protocol
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
IEEE Network: The Magazine of Global Internetworking
The quest for security in mobile ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Cross-Layer Design for Data Accessibility in Mobile Ad Hoc Networks
Wireless Personal Communications: An International Journal
A charging and rewarding scheme for packet forwarding in multi-hop cellular networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Mobility helps security in ad hoc networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Proceedings of the 9th annual international conference on Mobile computing and networking
Secure data transmission in mobile ad hoc networks
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Stimulating cooperation in self-organizing mobile ad hoc networks
Mobile Networks and Applications
Solving billing issues in ad hoc networks
ACM-SE 42 Proceedings of the 42nd annual Southeast regional conference
Security in wireless ad hoc networks
The handbook of ad hoc wireless networks
Securing mobile ad hoc networks
The handbook of ad hoc wireless networks
Security issues in ad hoc networks
The handbook of ad hoc wireless networks
Rethinking incentives for mobile ad hoc networks
Proceedings of the ACM SIGCOMM workshop on Practice and theory of incentives in networked systems
Denial of service resilience in ad hoc networks
Proceedings of the 10th annual international conference on Mobile computing and networking
Truthful multicast routing in selfish wireless networks
Proceedings of the 10th annual international conference on Mobile computing and networking
Providing Fault-Tolerant Ad hoc Routing Service in Adversarial Environments
Wireless Personal Communications: An International Journal
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 12 - Volume 13
A Game-Theoretic Analysis on the Conditions of Cooperation in a Wireless Ad Hoc Network
WIOPT '05 Proceedings of the Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
Proceedings of the 11th annual international conference on Mobile computing and networking
MoB: a mobile bazaar for wide-area wireless services
Proceedings of the 11th annual international conference on Mobile computing and networking
Selfish MAC Layer Misbehavior in Wireless Networks
IEEE Transactions on Mobile Computing
Overcoming free-riding behavior in peer-to-peer systems
ACM SIGecom Exchanges
Nash Equilibria of Packet Forwarding Strategies in Wireless Ad Hoc Networks
IEEE Transactions on Mobile Computing
Low-Cost Routing in Selfish and Rational Wireless Ad Hoc Networks
IEEE Transactions on Mobile Computing
Performance Comparison of Trust-Based Reactive Routing Protocols
IEEE Transactions on Mobile Computing
Cooperation in ad hoc networks: enhancing the virtual currency based models
InterSense '06 Proceedings of the first international conference on Integrated internet ad hoc and sensor networks
Incentive mechanism design for selfish hybrid wireless relay networks
Mobile Networks and Applications
Strategyproof mechanisms towards dynamic topology formation in autonomous networks
Mobile Networks and Applications
OURS: optimal unicast routing systems in non-cooperative wireless networks
Proceedings of the 12th annual international conference on Mobile computing and networking
LARS: a locally aware reputation system for mobile ad hoc networks
Proceedings of the 44th annual Southeast regional conference
Inner-Circle Consistency for Wireless Ad Hoc Networks
IEEE Transactions on Mobile Computing
Identity-based secure collaboration in wireless ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Backbone construction in selfish wireless networks
Proceedings of the 2007 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
DARWIN: distributed and adaptive reputation mechanism for wireless ad-hoc networks
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
On designing collusion-resistant routing schemes for non-cooperative wireless ad hoc networks
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Secure incentives for commercial ad dissemination in vehicular networks
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
On improving the efficiency of truthful routing in MANETs with selfish nodes
Pervasive and Mobile Computing
A mobile bazaar for wide-area wireless services
Wireless Networks
A formal model of rational exchange and its application to the analysis of Syverson's protocol
Journal of Computer Security - Special issue on CSFW15
Disruption-aware service composition and recovery in dynamic networking environments
Proceedings of the 2007 workshop on Automating service quality: Held at the International Conference on Automated Software Engineering (ASE)
The COMMIT Protocol for Truthful and Cost-Efficient Routing in Ad Hoc Networks with Selfish Nodes
IEEE Transactions on Mobile Computing
Enabling a cooperative strategy in mobile ad-hoc networks
EATIS '07 Proceedings of the 2007 Euro American conference on Telematics and information systems
Wireless networking security: open issues in trust, management, interoperation and measurement
International Journal of Security and Networks
Collaborative Dynamic Source Routing using transitional trust filters
International Journal of Information and Computer Security
Swarm intelligent power-aware detection of unauthorized and compromised nodes in MANETs
Journal of Artificial Evolution and Applications - Regular issue
Truthful multipath routing for ad hoc networks with selfish nodes
Journal of Parallel and Distributed Computing
Hidden information and actions in multi-hop wireless ad hoc networks
Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing
Cooperative packet relaying model for wireless ad hoc networks
Proceedings of the 1st ACM international workshop on Foundations of wireless ad hoc and sensor networking and computing
Une approche robuste pour la prolongation de la durée de vie des réseaux ad hoc multimédias
UbiMob '08 Proceedings of the 4th French-speaking conference on Mobility and ubiquity computing
Swarm intelligent power-aware detection of unauthorized and compromised nodes in MANETs
Journal of Artificial Evolution and Applications - Regular issue
Trust-based evolutionary game model assisting AODV routing against selfishness
Journal of Network and Computer Applications
Incentive-compatible opportunistic routing for wireless networks
Proceedings of the 14th ACM international conference on Mobile computing and networking
Dynamic reputation-based incentive mechanism considering heterogeneous networks
Proceedings of the 3nd ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks
Trust management for secure information flows
Proceedings of the 15th ACM conference on Computer and communications security
Routing game in hybrid wireless mesh networks with selfish mesh clients
International Journal of Autonomous and Adaptive Communications Systems
Optimal forwarding for wireless ad hoc networks with game theory
International Journal of Autonomous and Adaptive Communications Systems
A light-weight scalable truthful routing protocol in MANETs with selfish nodes
International Journal of Ad Hoc and Ubiquitous Computing
Game theoretic packet relaying model for wireless ad hoc networks
International Journal of Communication Networks and Distributed Systems
Game Theory and Cognitive Radio Based Wireless Networks
KES-AMSTA '09 Proceedings of the Third KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications
Mitigating routing vulnerabilities in ad hoc networks using reputations
International Journal of Information and Computer Security
Covert channels in ad-hoc wireless networks
Ad Hoc Networks
A framework for detecting selfish misbehavior in wireless mesh community networks
Proceedings of the 5th ACM symposium on QoS and security for wireless and mobile networks
Comparison of motivation-based cooperation mechanisms for hybrid wireless networks
Computer Communications
Location-based incentive pricing for tree-based relaying in multi-hop cellular networks
Computer Communications
Controlling resource hogs in mobile delay-tolerant networks
Computer Communications
Cooperation in ad hoc networks with noisy channels
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
Impact of a simple load balancing approach and an incentive-based scheme on MANET performance
Journal of Parallel and Distributed Computing
A finite-state-model scheme for efficient cooperation enforcement in mobile ad hoc networks
International Journal of Wireless and Mobile Computing
Pricing, competition, and routing in relay networks
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
Generalized second price auction in multi-path routing with selfish nodes
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
A collusion-resistant routing scheme for noncooperative wireless ad hoc networks
IEEE/ACM Transactions on Networking (TON)
Pi: a practical incentive protocol for delay tolerant networks
IEEE Transactions on Wireless Communications
INPAC: an enforceable incentive scheme for wireless networks using network coding
INFOCOM'10 Proceedings of the 29th conference on Information communications
A cross-layer route discovery strategy for virtual currency systems in mobile ad hoc networks
WONS'10 Proceedings of the 7th international conference on Wireless on-demand network systems and services
An efficient reputation-based mechanism to enforce cooperation in MANETs
CIT'10 Proceedings of the 4th international conference on Communications and information technology
A game theoretic trust model for on-line distributed evolution of cooperation inMANETs
Journal of Network and Computer Applications
IEEE Transactions on Communications
Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks
EUROMICRO-PDP'02 Proceedings of the 10th Euromicro conference on Parallel, distributed and network-based processing
A hierarchical architecture for detecting selfish behaviour in community wireless mesh networks
Computer Communications
A reputation system for wireless mesh networks using network coding
Journal of Network and Computer Applications
Vehicular networks and the future of the mobile internet
Computer Networks: The International Journal of Computer and Telecommunications Networking
A novel reputation computation model based on subjective logic for mobile ad hoc networks
Future Generation Computer Systems
Detecting misbehaving nodes in MANETs
Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services
Distributed self-policing architecture for fostering node cooperation in wireless mesh networks
PWC'06 Proceedings of the 11th IFIP TC6 international conference on Personal Wireless Communications
LSTOP: a light-weight scalable truthful routing protocol in MANETs with selfish nodes
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
Compact stimulation mechanism for routing discovery protocols in civilian ad-hoc networks
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
ICOIN'05 Proceedings of the 2005 international conference on Information Networking: convergence in broadband and mobile networking
OPODIS'04 Proceedings of the 8th international conference on Principles of Distributed Systems
Peer collaboration in wireless ad hoc networks
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
Robust routing in malicious environment for ad hoc networks
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
Dynamics of learning algorithms for the on-demand secure byzantine routing protocol
ESAS'06 Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Multipath routing protocols for mobile ad hoc networks: security issues and performance evaluation
WAC'05 Proceedings of the Second international IFIP conference on Autonomic Communication
Packet forwarding strategies for cooperation enforcement in mobile ad hoc wireless networks
ICDCIT'12 Proceedings of the 8th international conference on Distributed Computing and Internet Technology
IEEE/ACM Transactions on Networking (TON)
Journal of Network and Computer Applications
A strategic reputation-based mechanism for mobile ad hoc networks
Canadian AI'12 Proceedings of the 25th Canadian conference on Advances in Artificial Intelligence
An incentive scheme in wireless access networks through a game based on trust prediction
International Journal of Ad Hoc and Ubiquitous Computing
Journal of Network and Computer Applications
Security rationale for a cooperative backup service for mobile devices
LADC'07 Proceedings of the Third Latin-American conference on Dependable Computing
Bio-inspired enhancement of reputation systems for intelligent environments
Information Sciences: an International Journal
Availability modelling of a virtual black box for automotive systems
Proceedings of the 2nd International Workshop on Software Engineering for Resilient Systems
Cross-layer metrics for reliable routing in wireless mesh networks
IEEE/ACM Transactions on Networking (TON)
On the credit evolution of credit-based incentive protocols in wireless mesh networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
A multi-hop advertising discovery and delivering protocol for multi administrative domain MANET
Mobile Information Systems
Hi-index | 0.00 |
In this paper, we address the problem of service availability in mobile ad-hoc WANs. We present a secure mechanism to stimulate end users to keep their devices turned on, to refrain from overloading the network, and to thwart tampering aimed at converting the device into a "selfish" one. Our solution is based on the application of a tamper resistant security module in each device and cryptographic protection of messages.