A performance comparison of multi-hop wireless ad hoc network routing protocols
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Enforcing service availability in mobile ad-hoc WANs
MobiHoc '00 Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computing
WCDMA for UMTS: Radio Access for Third Generation Mobile Communications
WCDMA for UMTS: Radio Access for Third Generation Mobile Communications
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Efficient integration of multi-hop wireless and wired networks with QoS constraints
Proceedings of the 8th annual international conference on Mobile computing and networking
CT-RSA '02 Proceedings of the The Cryptographer's Track at the RSA Conference on Topics in Cryptology
Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security
Towards a Hybrid Network Model for Wireless Packet Data Networks
ISCC '02 Proceedings of the Seventh International Symposium on Computers and Communications (ISCC'02)
Stimulating cooperation in self-organizing mobile ad hoc networks
Mobile Networks and Applications
Charging support for ad hoc stub networks
Computer Communications
Toward self-organized mobile ad hoc networks: the terminodes project
IEEE Communications Magazine
Self organization in mobile ad hoc networks: the approach of Terminodes
IEEE Communications Magazine
Self-organizing packet radio ad hoc networks with overlay (SOPRANO)
IEEE Communications Magazine
Mobility helps security in ad hoc networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
UCAN: a unified cellular and ad-hoc network architecture
Proceedings of the 9th annual international conference on Mobile computing and networking
BISS: building secure routing out of an incomplete set of security associations
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Solving billing issues in ad hoc networks
ACM-SE 42 Proceedings of the 42nd annual Southeast regional conference
SECTOR: secure tracking of node encounters in multi-hop wireless networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
Market sharing games applied to content distribution in ad-hoc networks
Proceedings of the 5th ACM international symposium on Mobile ad hoc networking and computing
DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots
Proceedings of the 2nd international conference on Mobile systems, applications, and services
JANUS: towards robust and malicious resilient routing in hybrid wireless networks
Proceedings of the 3rd ACM workshop on Wireless security
Reputation-based Wi-Fi deployment protocols and security analysis
Proceedings of the 2nd ACM international workshop on Wireless mobile applications and services on WLAN hotspots
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 12 - Volume 13
Improving TCP performance over wireless networks with collaborative multi-homed mobile hosts
Proceedings of the 3rd international conference on Mobile systems, applications, and services
Proceedings of the 11th annual international conference on Mobile computing and networking
MoB: a mobile bazaar for wide-area wireless services
Proceedings of the 11th annual international conference on Mobile computing and networking
Allowing multi-hops in cellular networks: an economic analysis
MSWiM '05 Proceedings of the 8th ACM international symposium on Modeling, analysis and simulation of wireless and mobile systems
Node Cooperation in Hybrid Ad Hoc Networks
IEEE Transactions on Mobile Computing
Low-Cost Routing in Selfish and Rational Wireless Ad Hoc Networks
IEEE Transactions on Mobile Computing
Toward Secure Low Rate Wireless Personal Area Networks
IEEE Transactions on Mobile Computing
Incentive mechanism design for selfish hybrid wireless relay networks
Mobile Networks and Applications
LARS: a locally aware reputation system for mobile ad hoc networks
Proceedings of the 44th annual Southeast regional conference
A price-based reliable routing game in wireless networks
GameNets '06 Proceeding from the 2006 workshop on Game theory for communications and networks
A game-theoretic study of CSMA/CA under a backoff attack
IEEE/ACM Transactions on Networking (TON)
Identity-based secure collaboration in wireless ad hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
A game-theoretic look at simple relay channel
Wireless Networks
Aggregating Bandwidth for Multihomed Mobile Collaborative Communities
IEEE Transactions on Mobile Computing
On designing collusion-resistant routing schemes for non-cooperative wireless ad hoc networks
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Secure incentives for commercial ad dissemination in vehicular networks
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
Maximum-lifetime routing: system optimization & game-theoretic perspectives
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
On improving the efficiency of truthful routing in MANETs with selfish nodes
Pervasive and Mobile Computing
A secure incentive protocol for mobile ad hoc networks
Wireless Networks
A mobile bazaar for wide-area wireless services
Wireless Networks
PRISM: Improving the Performance of Inverse-Multiplexed TCP in Wireless Networks
IEEE Transactions on Mobile Computing
Verifying Delivered QoS in Multihop Wireless Networks
IEEE Transactions on Mobile Computing
The COMMIT Protocol for Truthful and Cost-Efficient Routing in Ad Hoc Networks with Selfish Nodes
IEEE Transactions on Mobile Computing
The impact of incentive mechanisms in multi-channel mobile music distribution
Multimedia Tools and Applications
Wireless networking security: open issues in trust, management, interoperation and measurement
International Journal of Security and Networks
Truthful multipath routing for ad hoc networks with selfish nodes
Journal of Parallel and Distributed Computing
Multihop cellular networks: Technology and economics
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hidden information and actions in multi-hop wireless ad hoc networks
Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing
Cooperation among peers in an ad hoc network to support an energy efficient IM service
Pervasive and Mobile Computing
Incentive-compatible opportunistic routing for wireless networks
Proceedings of the 14th ACM international conference on Mobile computing and networking
Routing game in hybrid wireless mesh networks with selfish mesh clients
International Journal of Autonomous and Adaptive Communications Systems
A light-weight scalable truthful routing protocol in MANETs with selfish nodes
International Journal of Ad Hoc and Ubiquitous Computing
Identification of Multiple Invalid Signatures in Pairing-Based Batched Signatures
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
Game Theory and Cognitive Radio Based Wireless Networks
KES-AMSTA '09 Proceedings of the Third KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications
Comparison of motivation-based cooperation mechanisms for hybrid wireless networks
Computer Communications
Location-based incentive pricing for tree-based relaying in multi-hop cellular networks
Computer Communications
Impact of a simple load balancing approach and an incentive-based scheme on MANET performance
Journal of Parallel and Distributed Computing
A finite-state-model scheme for efficient cooperation enforcement in mobile ad hoc networks
International Journal of Wireless and Mobile Computing
Building a trusted community for mobile ad hoc networks using friend recommendation
ADHOC-NOW'07 Proceedings of the 6th international conference on Ad-hoc, mobile and wireless networks
Secure unified cellular ad hoc network routing
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
A collusion-resistant routing scheme for noncooperative wireless ad hoc networks
IEEE/ACM Transactions on Networking (TON)
The controversy of selfish nodes in ad hoc networks
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
INPAC: an enforceable incentive scheme for wireless networks using network coding
INFOCOM'10 Proceedings of the 29th conference on Information communications
An optimal, strategy-proof scheme for multi-path traffic assignment in non-cooperative networks
IEEE Transactions on Wireless Communications
Two secure and energy-saving spontaneous ad-hoc protocol for wireless mesh client networks
Journal of Network and Computer Applications
AnonySense: A system for anonymous opportunistic sensing
Pervasive and Mobile Computing
Wireless Personal Communications: An International Journal
LSTOP: a light-weight scalable truthful routing protocol in MANETs with selfish nodes
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
Towards cheat-proof cooperative relay for cognitive radio networks
MobiHoc '11 Proceedings of the Twelfth ACM International Symposium on Mobile Ad Hoc Networking and Computing
ICOIN'05 Proceedings of the 2005 international conference on Information Networking: convergence in broadband and mobile networking
Quantifying security in hybrid cellular networks
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
OPODIS'04 Proceedings of the 8th international conference on Principles of Distributed Systems
A quality of relay-based routing scheme in multi-hop cellular networks
ICOIN'06 Proceedings of the 2006 international conference on Information Networking: advances in Data Communications and Wireless Networks
Peer collaboration in wireless ad hoc networks
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
Comparison of incentive-based cooperation strategies for hybrid networks
WWIC'05 Proceedings of the Third international conference on Wired/Wireless Internet Communications
Packet forwarding strategies for cooperation enforcement in mobile ad hoc wireless networks
ICDCIT'12 Proceedings of the 8th international conference on Distributed Computing and Internet Technology
International Journal of Network Management
Mobile music distribution: a multichannel approach
Advances in Multimedia
A study of multi-hop cellular networks
Wireless Communications & Mobile Computing
An incentive-based forwarding protocol for mobile ad hoc networks with anonymous packets
NEW2AN'07 Proceedings of the 7th international conference on Next Generation Teletraffic and Wired/Wireless Advanced Networking
Personal and Ubiquitous Computing
Hi-index | 0.00 |
In multi-hop cellular networks, data packets have to be relayed hop by hop from a given mobile station to a base station and vice-versa. This means that the mobile stations must accept to forward information for the benefit of other stations. In this paper, we propose an incentive mechanism that is based on a charging/rewarding scheme and that makes collaboration rational for selfish nodes. We base our solution on symmetric cryptography to cope with the limited resources of the mobile stations. We provide a set of protocols and study their robustness with respect to various attacks. By leveraging on the relative stability of the routes, our solution leads to a very moderate overhead.