Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
SPINS: security protocols for sensor networks
Proceedings of the 7th annual international conference on Mobile computing and networking
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Handbook of Applied Cryptography
Handbook of Applied Cryptography
WCDMA for UMTS: Radio Access for Third Generation Mobile Communications
WCDMA for UMTS: Radio Access for Third Generation Mobile Communications
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Efficient integration of multi-hop wireless and wired networks with QoS constraints
Proceedings of the 8th annual international conference on Mobile computing and networking
Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security
A charging and rewarding scheme for packet forwarding in multi-hop cellular networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Stimulating cooperation in self-organizing mobile ad hoc networks
Mobile Networks and Applications
Almost optimal hash sequence traversal
FC'02 Proceedings of the 6th international conference on Financial cryptography
Charging support for ad hoc stub networks
Computer Communications
Toward self-organized mobile ad hoc networks: the terminodes project
IEEE Communications Magazine
Self-organizing packet radio ad hoc networks with overlay (SOPRANO)
IEEE Communications Magazine
A survey on peer-to-peer key management for mobile ad hoc networks
ACM Computing Surveys (CSUR)
Experimental evaluation of the usage of ad hoc networks as stubs for multiservice networks
EURASIP Journal on Wireless Communications and Networking
Profit-Based Routing for Multihop Coverage Extension in Wireless Networks
Wireless Personal Communications: An International Journal
Protocols for mobility management in heterogeneous multi-hop wireless networks
Pervasive and Mobile Computing
Trust management for secure information flows
Proceedings of the 15th ACM conference on Computer and communications security
An Incentive-Based Secure Charging Scheme for Integrating Networks
Computer Supported Cooperative Work in Design IV
Game Theory and Cognitive Radio Based Wireless Networks
KES-AMSTA '09 Proceedings of the Third KES International Symposium on Agent and Multi-Agent Systems: Technologies and Applications
A Cross Layer Routing Protocol for Multihop Cellular Networks
Wireless Personal Communications: An International Journal
Pricing, competition, and routing in relay networks
Allerton'09 Proceedings of the 47th annual Allerton conference on Communication, control, and computing
Stimulating cooperation in multi-hop wireless networks using cheating detection system
INFOCOM'10 Proceedings of the 29th conference on Information communications
An experimental analysis of biased parallel greedy approximation for combinatorial auctions
International Journal of Intelligent Information and Database Systems
Review: A survey on content-centric technologies for the current Internet: CDN and P2P solutions
Computer Communications
Hi-index | 0.01 |
A hybrid ad hoc network is a structure-based network that is extended using multihop communications. Indeed, in this kind of network, the existence of a communication link between the mobile station and the base station is not required: A mobile station that has no direct connection with a base station can use other mobile stations as relays. Compared with conventional (single-hop) structure-based networks, this new generation can lead to a better use of the available spectrum and to a reduction of infrastructure costs. However, these benefits would vanish if the mobile nodes did not properly cooperate and forward packets for other nodes. In this paper, we propose a charging and rewarding scheme to encourage the most fundamental operation, namely packet forwarding. We use "MAC layering” to reduce the space overhead in the packets and a stream cipher encryption mechanism to provide "implicit authentication” of the nodes involved in the communication. We analyze the robustness of our protocols against rational and malicious attacks. We show that—using our solution—collaboration is rational for selfish nodes. We also show that our protocols thwart rational attacks and detect malicious attacks.