A performance comparison of multi-hop wireless ad hoc network routing protocols
MobiCom '98 Proceedings of the 4th annual ACM/IEEE international conference on Mobile computing and networking
The designer's perspective to atomic noncooperative networks
IEEE/ACM Transactions on Networking (TON)
Wireless integrated network sensors
Communications of the ACM
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
A game theoretic framework for bandwidth allocation and pricing in broadband networks
IEEE/ACM Transactions on Networking (TON)
Ad hoc networking: an introduction
Ad hoc networking
The quest for security in mobile ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Enforcing service availability in mobile ad-hoc WANs
MobiHoc '00 Proceedings of the 1st ACM international symposium on Mobile ad hoc networking & computing
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Tamper resistance: a cautionary note
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Toward self-organized mobile ad hoc networks: the terminodes project
IEEE Communications Magazine
Self organization in mobile ad hoc networks: the approach of Terminodes
IEEE Communications Magazine
Self-Organized Public-Key Management for Mobile Ad Hoc Networks
IEEE Transactions on Mobile Computing
A charging and rewarding scheme for packet forwarding in multi-hop cellular networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Mobility helps security in ad hoc networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Securing Mobile Ad hoc Networks — A Motivational Approach
BT Technology Journal
Proceedings of the 9th annual international conference on Mobile computing and networking
UCAN: a unified cellular and ad-hoc network architecture
Proceedings of the 9th annual international conference on Mobile computing and networking
Equilibria in topology control games for ad hoc networks
DIALM-POMC '03 Proceedings of the 2003 joint workshop on Foundations of mobile computing
BISS: building secure routing out of an incomplete set of security associations
WiSe '03 Proceedings of the 2nd ACM workshop on Wireless security
Cooperation Issues in Mobile Ad Hoc Networks
ICDCSW '04 Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW'04) - Volume 7
Solving billing issues in ad hoc networks
ACM-SE 42 Proceedings of the 42nd annual Southeast regional conference
Secure multicast groups on ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
A cooperative intrusion detection system for ad hoc networks
Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks
DOMINO: a system to detect greedy behavior in IEEE 802.11 hotspots
Proceedings of the 2nd international conference on Mobile systems, applications, and services
Experiences applying game theory to system design
Proceedings of the ACM SIGCOMM workshop on Practice and theory of incentives in networked systems
Rethinking incentives for mobile ad hoc networks
Proceedings of the ACM SIGCOMM workshop on Practice and theory of incentives in networked systems
Security in wireless mobile and sensor networks
Wireless communications systems and networks
Truthful multicast routing in selfish wireless networks
Proceedings of the 10th annual international conference on Mobile computing and networking
SOWER: self-organizing wireless network for messaging
Proceedings of the 2nd ACM international workshop on Wireless mobile applications and services on WLAN hotspots
Providing Fault-Tolerant Ad hoc Routing Service in Adversarial Environments
Wireless Personal Communications: An International Journal
An Adaptive and Predictive Security Model for Mobile Ad hoc Networks
Wireless Personal Communications: An International Journal
URSA: ubiquitous and robust access control for mobile ad hoc networks
IEEE/ACM Transactions on Networking (TON)
Cooperative Packet Forwarding in Multi-Domain Sensor Networks
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 12 - Volume 13
Energy efficient communication in ad hoc networks from user's and designer's perspective
ACM SIGMOBILE Mobile Computing and Communications Review
A Game-Theoretic Analysis on the Conditions of Cooperation in a Wireless Ad Hoc Network
WIOPT '05 Proceedings of the Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
Hidden-action in multi-hop routing
Proceedings of the 6th ACM conference on Electronic commerce
Proceedings of the 11th annual international conference on Mobile computing and networking
MoB: a mobile bazaar for wide-area wireless services
Proceedings of the 11th annual international conference on Mobile computing and networking
PeopleNet: engineering a wireless virtual social network
Proceedings of the 11th annual international conference on Mobile computing and networking
Allowing multi-hops in cellular networks: an economic analysis
MSWiM '05 Proceedings of the 8th ACM international symposium on Modeling, analysis and simulation of wireless and mobile systems
A quantitative trust establishment framework for reliable data packet delivery in MANETs
Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks
Cooperation in wireless ad hoc networks: a market-based approach
IEEE/ACM Transactions on Networking (TON)
Optimal Resource Allocation in Wireless Ad Hoc Networks: A Price-Based Approach
IEEE Transactions on Mobile Computing
Node Cooperation in Hybrid Ad Hoc Networks
IEEE Transactions on Mobile Computing
Nash Equilibria of Packet Forwarding Strategies in Wireless Ad Hoc Networks
IEEE Transactions on Mobile Computing
Low-Cost Routing in Selfish and Rational Wireless Ad Hoc Networks
IEEE Transactions on Mobile Computing
Performance Comparison of Trust-Based Reactive Routing Protocols
IEEE Transactions on Mobile Computing
Cooperation in ad hoc networks: enhancing the virtual currency based models
InterSense '06 Proceedings of the first international conference on Integrated internet ad hoc and sensor networks
Equilibria in topology control games for ad hoc networks
Mobile Networks and Applications
Small-scale peer-to-peer overlays
ACM SIGOPS Operating Systems Review
rDCF: A Relay-Enabled Medium Access Control Protocol for Wireless Ad Hoc Networks
IEEE Transactions on Mobile Computing
Towards designing a trusted routing solution in mobile ad hoc networks
Mobile Networks and Applications
A framework for incentive compatible topology control in non-cooperative wireless multi-hop networks
DIWANS '06 Proceedings of the 2006 workshop on Dependability issues in wireless ad hoc networks and sensor networks
OURS: optimal unicast routing systems in non-cooperative wireless networks
Proceedings of the 12th annual international conference on Mobile computing and networking
DOMINO: Detecting MAC Layer Greedy Behavior in IEEE 802.11 Hotspots
IEEE Transactions on Mobile Computing
Robust cooperative trust establishment for MANETs
Proceedings of the fourth ACM workshop on Security of ad hoc and sensor networks
Achieving cooperation in multihop wireless networks of selfish nodes
GameNets '06 Proceeding from the 2006 workshop on Game theory for communications and networks
A price-based reliable routing game in wireless networks
GameNets '06 Proceeding from the 2006 workshop on Game theory for communications and networks
Reputation in self-organized communication systems and beyond
Interperf '06 Proceedings from the 2006 workshop on Interdisciplinary systems approach in performance evaluation and design of computer & communications sytems
A survey on peer-to-peer key management for mobile ad hoc networks
ACM Computing Surveys (CSUR)
A game-theoretic look at simple relay channel
Wireless Networks
Cross-layer adaptive control for wireless mesh networks
Ad Hoc Networks
Sustaining cooperation in multi-hop wireless networks
NSDI'05 Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2
Adaptive security design with malicious node detection in cluster-based sensor networks
Computer Communications
DARWIN: distributed and adaptive reputation mechanism for wireless ad-hoc networks
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
On designing collusion-resistant routing schemes for non-cooperative wireless ad hoc networks
Proceedings of the 13th annual ACM international conference on Mobile computing and networking
Secure incentives for commercial ad dissemination in vehicular networks
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
Maximum-lifetime routing: system optimization & game-theoretic perspectives
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
On improving the efficiency of truthful routing in MANETs with selfish nodes
Pervasive and Mobile Computing
A secure incentive protocol for mobile ad hoc networks
Wireless Networks
A mobile bazaar for wide-area wireless services
Wireless Networks
A formal model of rational exchange and its application to the analysis of Syverson's protocol
Journal of Computer Security - Special issue on CSFW15
Stimulating cooperation in route discovery of ad hoc networks
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
Verifying Delivered QoS in Multihop Wireless Networks
IEEE Transactions on Mobile Computing
The COMMIT Protocol for Truthful and Cost-Efficient Routing in Ad Hoc Networks with Selfish Nodes
IEEE Transactions on Mobile Computing
ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks
ACM Transactions on Information and System Security (TISSEC)
Analysis of a reputation system for Mobile Ad-Hoc Networks with liars
Performance Evaluation
Enabling a cooperative strategy in mobile ad-hoc networks
EATIS '07 Proceedings of the 2007 Euro American conference on Telematics and information systems
The impact of incentive mechanisms in multi-channel mobile music distribution
Multimedia Tools and Applications
Secure routing protocol for mobile ad-hoc networks
Proceedings of the 2007 Summer Computer Simulation Conference
International Journal of Security and Networks
Wireless networking security: open issues in trust, management, interoperation and measurement
International Journal of Security and Networks
Collaborative Dynamic Source Routing using transitional trust filters
International Journal of Information and Computer Security
How to avoid packet droppers with proactive routing protocols for ad hoc networks
International Journal of Network Management
Truthful multipath routing for ad hoc networks with selfish nodes
Journal of Parallel and Distributed Computing
Hermes: A quantitative trust establishment framework for reliable data packet delivery in MANETs
Journal of Computer Security - Special Issue on Security of Ad-hoc and Sensor Networks
Hidden information and actions in multi-hop wireless ad hoc networks
Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing
Exploring semantic interference in heterogeneous sensor networks
Proceedings of the 1st ACM international workshop on Heterogeneous sensor and actor networks
Cross-Layer Distributed Diversity for Heterogeneous Wireless Networks
WWIC '07 Proceedings of the 5th international conference on Wired/Wireless Internet Communications
EcoRare: An Economic Incentive Scheme for Efficient Rare Data Accessibility in Mobile-P2P Networks
DEXA '08 Proceedings of the 19th international conference on Database and Expert Systems Applications
Cooperative Security Schemes for Mobile Ad-Hoc Networks
CDVE '08 Proceedings of the 5th international conference on Cooperative Design, Visualization, and Engineering
Dynamic reputation-based incentive mechanism considering heterogeneous networks
Proceedings of the 3nd ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks
Trust management for secure information flows
Proceedings of the 15th ACM conference on Computer and communications security
Routing game in hybrid wireless mesh networks with selfish mesh clients
International Journal of Autonomous and Adaptive Communications Systems
An Incentive-Based Secure Charging Scheme for Integrating Networks
Computer Supported Cooperative Work in Design IV
Proceedings of the second ACM conference on Wireless network security
A light-weight scalable truthful routing protocol in MANETs with selfish nodes
International Journal of Ad Hoc and Ubiquitous Computing
On eliminating packet droppers in MANET: A modular solution
Ad Hoc Networks
A secure credit-based cooperation stimulating mechanism for MANETs using hash chains
Future Generation Computer Systems
Game theoretic packet relaying model for wireless ad hoc networks
International Journal of Communication Networks and Distributed Systems
Trading Paper Clips --An Analysis of “Trading Up” in Artificial Societies without Altruists
Proceedings of the 2008 conference on Artificial Intelligence Research and Development: Proceedings of the 11th International Conference of the Catalan Association for Artificial Intelligence
Game Theory and Cognitive Radio Based Wireless Networks
KES-AMSTA '09 Proceedings of the Third KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications
A trust model based on fuzzy recommendation for mobile ad-hoc networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Barter trade improves message delivery in opportunistic networks
Ad Hoc Networks
Reliable and efficient forwarding in ad hoc networks
Ad Hoc Networks
Comparison of motivation-based cooperation mechanisms for hybrid wireless networks
Computer Communications
Location-based incentive pricing for tree-based relaying in multi-hop cellular networks
Computer Communications
Controlling resource hogs in mobile delay-tolerant networks
Computer Communications
A stochastic fluid model for an ad hoc mobile network
Queueing Systems: Theory and Applications
Cooperation in ad hoc networks with noisy channels
SECON'09 Proceedings of the 6th Annual IEEE communications society conference on Sensor, Mesh and Ad Hoc Communications and Networks
Impact of a simple load balancing approach and an incentive-based scheme on MANET performance
Journal of Parallel and Distributed Computing
Coexistence with malicious nodes: a game theoretic approach
GameNets'09 Proceedings of the First ICST international conference on Game Theory for Networks
Cooperation in underwater sensor networks
GameNets'09 Proceedings of the First ICST international conference on Game Theory for Networks
Incentives for P2P file sharing in mobile ad hoc networks
CCNC'09 Proceedings of the 6th IEEE Conference on Consumer Communications and Networking Conference
Natural selection of message forwarding algorithms in multihop wireless networks
WiOPT'09 Proceedings of the 7th international conference on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks
Design issues and performance analysis for DSR routing with reclaim-based caching in MANETs
International Journal of Network Management
The lightweight currency and file share in geography-aware ad hoc networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Differential game model with coupling constraint for routing in ad hoc networks
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Optimal pricing in a free market wireless network
Wireless Networks
Promoting cooperation among strangers to access Internet services from an ad hoc network
Pervasive and Mobile Computing
REDMAN: An optimistic replication middleware for read-only resources in dense MANETs
Pervasive and Mobile Computing
Security issues in opportunistic networks
MobiOpp '10 Proceedings of the Second International Workshop on Mobile Opportunistic Networking
Studying on economic-inspired mechanisms for routing and forwarding in wireless ad hoc network
TAMC'07 Proceedings of the 4th international conference on Theory and applications of models of computation
DNIS'07 Proceedings of the 5th international conference on Databases in networked information systems
MSN'07 Proceedings of the 3rd international conference on Mobile ad-hoc and sensor networks
DASFAA'07 Proceedings of the 12th international conference on Database systems for advanced applications
Resilience to dropping nodes in mobile ad hoc networks with link-state routing
NETWORKING'08 Proceedings of the 7th international IFIP-TC6 networking conference on AdHoc and sensor networks, wireless networks, next generation internet
Emergency connectivity in ad-hoc networks with selfish nodes
LATIN'08 Proceedings of the 8th Latin American conference on Theoretical informatics
Pricing, competition, and routing in relay networks
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
Competition of wireless providers for atomic users: equilibrium and social optimality
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
Stimulating cooperation in self-organized vehicular networks
APCC'09 Proceedings of the 15th Asia-Pacific conference on Communications
Generalized second price auction in multi-path routing with selfish nodes
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Cooperative strategy by Stackelberg games under energy constraint in multi-hop relay networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Comparison of access control methods in mobile as-hoc networks
IMSAA'09 Proceedings of the 3rd IEEE international conference on Internet multimedia services architecture and applications
A collusion-resistant routing scheme for noncooperative wireless ad hoc networks
IEEE/ACM Transactions on Networking (TON)
FRAME: an innovative incentive scheme in vehicular networks
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Game-theoretic approach for improving cooperation in wireless multihop networks
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics - Special issue on game theory
Attack and flee: game-theory-based analysis on interactions among nodes in MANETs
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics - Special issue on game theory
Bandwidth exchange: an energy conserving incentive mechanism for cooperation
IEEE Transactions on Wireless Communications
Distributed and Parallel Databases
Stimulating cooperation in multi-hop wireless networks using cheating detection system
INFOCOM'10 Proceedings of the 29th conference on Information communications
Mobicent: a credit-based incentive system for disruption tolerant network
INFOCOM'10 Proceedings of the 29th conference on Information communications
INPAC: an enforceable incentive scheme for wireless networks using network coding
INFOCOM'10 Proceedings of the 29th conference on Information communications
International Journal of Communication Networks and Distributed Systems
Trust based security in MANET routing protocols: a survey
Proceedings of the 1st Amrita ACM-W Celebration on Women in Computing in India
An efficient reputation-based mechanism to enforce cooperation in MANETs
CIT'10 Proceedings of the 4th international conference on Communications and information technology
A gradual solution to detect selfish nodes in mobile ad hoc networks
International Journal of Wireless and Mobile Computing
The design of a reliable reputation system
Electronic Commerce Research
Protocols for stimulating packet forwarding in wireless ad hoc networks
IEEE Wireless Communications
Improving data availability via an economic lease model in mobile-P2P networks
International Journal of Computational Science and Engineering
Vehicular networks and the future of the mobile internet
Computer Networks: The International Journal of Computer and Telecommunications Networking
AnonySense: A system for anonymous opportunistic sensing
Pervasive and Mobile Computing
A novel reputation computation model based on subjective logic for mobile ad hoc networks
Future Generation Computer Systems
Secure routing in ad hoc networks and a related intrusion detection problem
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume II
Network trust management in emergency situations
Journal of Computer and System Sciences
A combinational perspective in stimulating cooperation in mobile ad hoc networks
Journal of Computer Science and Technology
EcoTop: an economic model for dynamic processing of top-k queries in mobile-P2P networks
DASFAA'11 Proceedings of the 16th international conference on Database systems for advanced applications: Part II
Wireless Personal Communications: An International Journal
An algorithm for prediction of overhead messages in client-server based wireless networks
ICCSA'11 Proceedings of the 2011 international conference on Computational science and its applications - Volume Part IV
ADHOC-NOW'11 Proceedings of the 10th international conference on Ad-hoc, mobile, and wireless networks
Proactive resilience to dropping nodes in mobile ad hoc networks
AINTEC'06 Proceedings of the Second Asian international conference on Technologies for Advanced Heterogeneous Networks
Reputation based localized access control for mobile ad-hoc networks
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
LSTOP: a light-weight scalable truthful routing protocol in MANETs with selfish nodes
ADHOC-NOW'06 Proceedings of the 5th international conference on Ad-Hoc, Mobile, and Wireless Networks
Compact stimulation mechanism for routing discovery protocols in civilian ad-hoc networks
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
Spontaneous cooperation in multi-domain sensor networks
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
ICOIN'05 Proceedings of the 2005 international conference on Information Networking: convergence in broadband and mobile networking
Cross-layer approach to detect data packet droppers in mobile ad-hoc networks
IWSOS'06/EuroNGI'06 Proceedings of the First international conference, and Proceedings of the Third international conference on New Trends in Network Architectures and Services conference on Self-Organising Systems
Efficient node forwarding strategies via non-cooperative game for wireless ad hoc networks
ICCNMC'05 Proceedings of the Third international conference on Networking and Mobile Computing
Data management in mobile peer-to-peer networks
DBISP2P'04 Proceedings of the Second international conference on Databases, Information Systems, and Peer-to-Peer Computing
OPODIS'04 Proceedings of the 8th international conference on Principles of Distributed Systems
Service allocation in selfish mobile ad hoc networks using vickrey auction
EDBT'04 Proceedings of the 2004 international conference on Current Trends in Database Technology
Engineering incentive schemes for ad hoc networks
EDBT'04 Proceedings of the 2004 international conference on Current Trends in Database Technology
An incentive driven lookup protocol for chord-based peer-to-peer (p2p) networks
HiPC'04 Proceedings of the 11th international conference on High Performance Computing
Robust routing in malicious environment for ad hoc networks
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
Advanced detection of selfish or malicious nodes in ad hoc networks
ESAS'04 Proceedings of the First European conference on Security in Ad-hoc and Sensor Networks
IPTPS'04 Proceedings of the Third international conference on Peer-to-Peer Systems
Comparison of incentive-based cooperation strategies for hybrid networks
WWIC'05 Proceedings of the Third international conference on Wired/Wireless Internet Communications
Fighting against packet dropping misbehavior in multi-hop wireless ad hoc networks
Journal of Network and Computer Applications
Random feedbacks for selfish nodes detection in mobile ad hoc networks
IPOM'05 Proceedings of the 5th IEEE international conference on Operations and Management in IP-Based Networks
DNIS'10 Proceedings of the 6th international conference on Databases in Networked Information Systems
A novel acknowledgment-based approach against collude attacks in MANET
Expert Systems with Applications: An International Journal
Anonymous agreed order multicast: performance and free riding
ICDCIT'06 Proceedings of the Third international conference on Distributed Computing and Internet Technology
Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks
Packet forwarding strategies for cooperation enforcement in mobile ad hoc wireless networks
ICDCIT'12 Proceedings of the 8th international conference on Distributed Computing and Internet Technology
Mobile music distribution: a multichannel approach
Advances in Multimedia
Full length article: Minority game for cognitive radios: Cooperating without cooperation
Physical Communication
On effectiveness of cooperation enforcement mechanisms in wireless ad hoc networks
International Journal of Communication Networks and Distributed Systems
Cooperative game-based routing approach for wireless sensor network
International Journal of Computer Applications in Technology
How do we encourage an egoist to act socially in an ad hoc mobile network?
Computer Networks: The International Journal of Computer and Telecommunications Networking
An incentive scheme in wireless access networks through a game based on trust prediction
International Journal of Ad Hoc and Ubiquitous Computing
A transmission scheme for opportunistic networks with social selfish nodes
Proceedings of the 4th International Conference on Internet Multimedia Computing and Service
CRISP: collusion-resistant incentive-compatible routing and forwarding in opportunistic networks
Proceedings of the 15th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems
UIC'07 Proceedings of the 4th international conference on Ubiquitous Intelligence and Computing
An incentive-based forwarding protocol for mobile ad hoc networks with anonymous packets
NEW2AN'07 Proceedings of the 7th international conference on Next Generation Teletraffic and Wired/Wireless Advanced Networking
Security rationale for a cooperative backup service for mobile devices
LADC'07 Proceedings of the Third Latin-American conference on Dependable Computing
Bio-inspired enhancement of reputation systems for intelligent environments
Information Sciences: an International Journal
A Collaborative Replication Approach for Mobile-P2P Networks
International Journal of Handheld Computing Research
ALiSR: Agent Based Link Stability Aware Routing Protocol for Ad Hoc Networks
International Journal of Agent Technologies and Systems
Impact of trust model on on-demand multi-path routing in mobile ad hoc networks
Computer Communications
AODV-based technique for quick and secure local recovery from link failures in MANETs
International Journal of Communication Networks and Distributed Systems
Secure scheme against data dropping
Proceedings of the 16th Communications & Networking Symposium
On the credit evolution of credit-based incentive protocols in wireless mesh networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
A multi-hop advertising discovery and delivering protocol for multi administrative domain MANET
Mobile Information Systems
Hi-index | 0.00 |
In military and rescue applications of mobile ad hoc networks, all the nodes belong to the same authority; therefore, they are motivated to cooperate in order to support the basic functions of the network. In this paper, we consider the case when each node is its own authority and tries to maximize the benefits it gets from the network. More precisely, we assume that the nodes are not willing to forward packets for the benefit of other nodes. This problem may arise in civilian applications of mobile ad hoc networks. In order to stimulate the nodes for packet forwarding, we propose a simple mechanism based on a counter in each node. We study the behavior of the proposed mechanism analytically and by means of simulations, and detail the way in which it could be protected against misuse.