Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
GloMoSim: a library for parallel simulation of large-scale wireless networks
PADS '98 Proceedings of the twelfth workshop on Parallel and distributed simulation
Mitigating routing misbehavior in mobile ad hoc networks
MobiCom '00 Proceedings of the 6th annual international conference on Mobile computing and networking
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Space/time trade-offs in hash coding with allowable errors
Communications of the ACM
Performance analysis of the CONFIDANT protocol
Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computing
Ariadne: a secure on-demand routing protocol for ad hoc networks
Proceedings of the 8th annual international conference on Mobile computing and networking
Efficient Algorithms for Pairing-Based Cryptosystems
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security
A charging and rewarding scheme for packet forwarding in multi-hop cellular networks
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Secret Handshakes from Pairing-Based Key Agreements
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Proceedings of the 9th annual international conference on Mobile computing and networking
Proceedings of the 9th annual international conference on Mobile computing and networking
Stimulating cooperation in self-organizing mobile ad hoc networks
Mobile Networks and Applications
The AD-MIX Protocol for Encouraging Participation in Mobile Ad Hoc Networks
ICNP '03 Proceedings of the 11th IEEE International Conference on Network Protocols
Truthful multicast routing in selfish wireless networks
Proceedings of the 10th annual international conference on Mobile computing and networking
Secure Multipath Routing for Mobile Ad Hoc Networks
WONS '05 Proceedings of the Second Annual Conference on Wireless On-demand Network Systems and Services
Tamper resistance: a cautionary note
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Authenticated routing for ad hoc networks
IEEE Journal on Selected Areas in Communications
BikeNet: A mobile sensing system for cyclist experience mapping
ACM Transactions on Sensor Networks (TOSN)
Pi: a practical incentive protocol for delay tolerant networks
IEEE Transactions on Wireless Communications
Stimulating cooperation in multi-hop wireless networks using cheating detection system
INFOCOM'10 Proceedings of the 29th conference on Information communications
AOS: an anonymous overlay system for mobile ad hoc networks
Wireless Networks
ADHOC-NOW'11 Proceedings of the 10th international conference on Ad-hoc, mobile, and wireless networks
Review: Security threats and solutions in MANETs: A case study using AODV and SAODV
Journal of Network and Computer Applications
Hi-index | 0.00 |
The proper functioning of mobile ad hoc networks depends on the hypothesis that each individual node is ready to forward packets for others. This common assumption, however, might be undermined by the existence of selfish users who are reluctant to act as packet relays in order to save their own resources. Such non-cooperative behavior would cause the sharp degradation of network throughput. To address this problem, we propose a credit-based Secure Incentive Protocol (SIP) to stimulate cooperation among mobile nodes with individual interests. SIP can be implemented in a fully distributed way and does not require any pre-deployed infrastructure. In addition, SIP is immune to a wide range of attacks and is of low communication overhead by using a Bloom filter. Detailed simulation studies have confirmed the efficacy and efficiency of SIP.