Ticket based service access for the mobile user
MobiCom '97 Proceedings of the 3rd annual ACM/IEEE international conference on Mobile computing and networking
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Virtual operator based AAA in wireless LAN hot spots with ad-hoc networking support
ACM SIGMOBILE Mobile Computing and Communications Review
Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security
A charging and rewarding scheme for packet forwarding in multi-hop cellular networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Time-lock Puzzles and Timed-release Crypto
Time-lock Puzzles and Timed-release Crypto
A peer-to-peer approach to wireless LAN roaming
Proceedings of the 1st ACM international workshop on Wireless mobile applications and services on WLAN hotspots
Dynamic host configuration for managing mobility between public and private networks
USITS'01 Proceedings of the 3rd conference on USENIX Symposium on Internet Technologies and Systems - Volume 3
PAWNs: Satisfying the need for ubiquitos secure connectivity and location services
IEEE Wireless Communications
An approach to enhance inter-provider roaming through secret sharing and its application to WLANs
Proceedings of the 3rd ACM international workshop on Wireless mobile applications and services on WLAN hotspots
Balancing auditability and privacy in vehicular networks
Proceedings of the 1st ACM international workshop on Quality of service & security in wireless and mobile networks
Reputation-based Wi-Fi deployment
ACM SIGMOBILE Mobile Computing and Communications Review
Improved access point selection
Proceedings of the 4th international conference on Mobile systems, applications and services
A framework for incentive compatible topology control in non-cooperative wireless multi-hop networks
DIWANS '06 Proceedings of the 2006 workshop on Dependability issues in wireless ad hoc networks and sensor networks
The case for intentional networking
Proceedings of the 10th workshop on Mobile Computing Systems and Applications
Wifi-reports: improving wireless network selection with collaboration
Proceedings of the 7th international conference on Mobile systems, applications, and services
Game Theory and Cognitive Radio Based Wireless Networks
KES-AMSTA '09 Proceedings of the Third KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications
Intentional networking: opportunistic exploitation of mobile network diversity
Proceedings of the sixteenth annual international conference on Mobile computing and networking
Hi-index | 0.00 |
In recent years, wireless Internet service providers (WISPs) have established thousands of WiFi hot spots in cafes, hotels and airports in order to offer to travelling Internet users access to email, web or other Internet service. However, two major problems still slow down the deployment of this kind of networks: the lack of a seamless roaming scheme and the variable quality of service experienced by the users. This paper provides a response to these two problems: We present a solution that, on the one hand, allows a mobile node to connect to a foreign WISP in a secure way while preserving its anonymity and, on the other hand, encourages the WISPs to provide the users with good QoS. We analyse the robustness of our solution against various attacks and we prove by means of simulations that our reputation model indeed encourages the WISPs to behave correctly.