메뉴 건너뛰기




Volumn 3, Issue , 2003, Pages 1987-1997

Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks

Author keywords

[No Author keywords available]

Indexed keywords

CHEAT-PROOF; CREDIT-BASED SYSTEM; FORMAL MODEL; MOBILE AD HOC NETWORKING; MOBILE NODES; PROTOTYPE IMPLEMENTATIONS; RESEARCH AREAS; SELFISH NODE; TAMPERPROOF;

EID: 0042933944     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2003.1209220     Document Type: Conference Paper
Times cited : (946)

References (35)
  • 5
    • 84954161437 scopus 로고    scopus 로고
    • Enforcing service availability in mobile ad-hoc WANs
    • Boston, MA, August [Online]. Available
    • L. Buttyan and J. P. Hubaux, "Enforcing service availability in mobile ad-hoc WANs," in IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC), Boston, MA, August 2000. [Online]. Available: http://icawww.epfl.ch/Publications/Buttyan/ButtyanH00.ps
    • (2000) IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC)
    • Buttyan, L.1    Hubaux, J.P.2
  • 8
    • 0242696192 scopus 로고    scopus 로고
    • Performance analysis of the CONFIDANT protocol: Cooperation of nodes - Fairness in dynamic ad-hoc networks
    • IEEE, June [Online]. Available
    • S. Buchegger and J.-Y. L. Boudec, "Performance analysis of the CONFIDANT protocol: Cooperation of nodes - fairness in dynamic ad-hoc networks," in Proceedings of IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC). IEEE, June 2002. [Online]. Available: http://lcawww.epfl.ch/Publications/LeBoudec/BucheggerL02.pdf
    • (2002) Proceedings of IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC)
    • Buchegger, S.1    Boudec, J.-Y.L.2
  • 11
    • 0036346205 scopus 로고    scopus 로고
    • Energy efficient communications in ad hoc networks using directional antennas
    • New York, NY, June [Online]. Available
    • A. Spyropoulos and C. Raghavendra, "Energy efficient communications in ad hoc networks using directional antennas," in Proceedings of IEEE INFOCOM '02, New York, NY, June 2002. [Online]. Available: http://www.ieee- infocom.org/2002/papers/289.pdf
    • (2002) Proceedings of IEEE INFOCOM '02
    • Spyropoulos, A.1    Raghavendra, C.2
  • 12
    • 0036349202 scopus 로고    scopus 로고
    • Energy-limited wireless networking with directional antennas: The case of session-based multicasting
    • New York, NY, June [Online]. Available
    • J. E. Wieselthier, G. Nguyen, and A. Ephremides, "Energy-limited wireless networking with directional antennas: The case of session-based multicasting," in Proceedings of IEEE INFOCOM '02, New York, NY, June 2002. [Online]. Available: http://www.ieee-infocom.org/2002/papers/303.pdf
    • (2002) Proceedings of IEEE INFOCOM '02
    • Wieselthier, J.E.1    Nguyen, G.2    Ephremides, A.3
  • 13
    • 0042209739 scopus 로고    scopus 로고
    • A micropayment scheme encouraging collaboration in multi-hop cellular networks
    • La Guadeloupe, January
    • M. Jakobsson, J. P. Hubaux, and L. Buttyan, "A micropayment scheme encouraging collaboration in multi-hop cellular networks," in Proceedings of Financial Crypto 2003, La Guadeloupe, January 2003.
    • (2003) Proceedings of Financial Crypto 2003
    • Jakobsson, M.1    Hubaux, J.P.2    Buttyan, L.3
  • 15
    • 0035101078 scopus 로고    scopus 로고
    • Towards self-organized mobile ad hoc networks: The terminodes project
    • January [Online]. Available
    • J. P. Hubaux, T. Gross, J. Y. L. Boudec, and M. Vetterli, "Towards self-organized mobile ad hoc networks: the Terminodes project," IEEE Communications Magazine, January 2001. [Online]. Available: http://www. terminodes.com/mics/getDoc.php?sessid=003b3dfc72e02704e92bee%31b2460643" &docid=31"&docnum=1
    • (2001) IEEE Communications Magazine
    • Hubaux, J.P.1    Gross, T.2    Boudec, J.Y.L.3    Vetterli, M.4
  • 17
    • 0000421874 scopus 로고    scopus 로고
    • Algorithmic mechanism design
    • N. Nisan and A. Ronen, "Algorithmic mechanism design," Games and Economic Behavior, vol. 35, no. 166-196, 2001.
    • (2001) Games and Economic Behavior , vol.35 , Issue.166-196
    • Nisan, N.1    Ronen, A.2
  • 20
    • 0035175911 scopus 로고    scopus 로고
    • Vickrey prices and shortest paths: What is an edge worth?
    • J. Hershberger and S. Suri, "Vickrey prices and shortest paths: What is an edge worth," in Proceedings of the 42nd Annual Symposium on Foudations of Computer Science 2001, Las Vegas, Nevada, Oct. 2001, pp. 252-259. [Online]. Available: http://theory.stanford.edu/focs2001/ (Pubitemid 33068385)
    • (2001) Annual Symposium on Foundations of Computer Science - Proceedings , pp. 252-259
    • Hershberger, J.1    Suri, S.2
  • 21
    • 0035416195 scopus 로고    scopus 로고
    • Sharing the cost of multicast transmissions
    • DOI 10.1006/jcss.2001.1754, Internet Algorithms
    • J. Feigenbaum, C. Papadimitriou, and S. Shenker, "Sharing the cost of multicast transmissions," Journal of Computer and System Sciences (Special issue on Internet Algorithms.), vol. 63, pp. 21-41, 2001. [Online]. Available: http://cs-www.cs.yale.edu/homes/jf/FPS.pdf (Pubitemid 32932560)
    • (2001) Journal of Computer and System Sciences , vol.63 , Issue.1 , pp. 21-41
    • Feigenbaum, J.1    Papadimitriou, C.H.2    Shenker, S.3
  • 24
    • 0038183237 scopus 로고    scopus 로고
    • How bad is selfish routing?
    • DOI 10.1145/506147.506153
    • T. Roughgarden and E. Tardos, "How bad is selfish routing?" Journal of ACM, vol. 49, no. 2, pp. 236-259, 2002. (Pubitemid 44159321)
    • (2002) Journal of the ACM , vol.49 , Issue.2 , pp. 236-259
    • Roughgarden, T.1    Tardos, E.2
  • 25
    • 0011317224 scopus 로고    scopus 로고
    • Vertical handoffs in wireless overlay networks
    • M. Stemm and R. H. Katz, "Vertical handoffs in wireless overlay networks," Mobile Networks and Applications, vol. 3, no. 4, pp. 335-350, 1998. [Online]. Available: http://citeseer.nj.nec.com/stemm96vertical.html (Pubitemid 128513929)
    • (1998) Mobile Networks and Applications , vol.3 , Issue.4 , pp. 335-350
    • Stemm, M.1    Katz, R.H.2
  • 26
    • 0033357103 scopus 로고    scopus 로고
    • Securing ad hoc networks
    • [Online]. Available
    • L. Zhou and Z. J. Haas, "Securing ad hoc networks," IEEE Network Magazine, 1999. [Online]. Available: http://citeseer.nj.nec.com/cache/ papers/cs/16984/http:zSzzSzwww.ee.corn%ell. eduzSz~haaszSzPublicationszSznetwork99.pdf/zhou99securing.pdf
    • (1999) IEEE Network Magazine
    • Zhou, L.1    Haas, Z.J.2
  • 27
    • 84883869163 scopus 로고    scopus 로고
    • Self-securing ad-hoc wireless networks
    • [Online]. Available
    • H. Luo, P. Zerfos, J. Kong, S. Lu, and L. Zhang, "Self-securing ad-hoc wireless networks," in ISCC, 2002. [Online]. Available: http://www.cs.ucla.edu/~jkong/publications/ISCC02.pdf
    • (2002) ISCC
    • Luo, H.1    Zerfos, P.2    Kong, J.3    Lu, S.4    Zhang, L.5
  • 28
    • 84855528281 scopus 로고    scopus 로고
    • Kluwer Academic Publishers ch. Dynamic Source Routing in Ad Hoc Wireless Networks, Chapter 5, (Tomasz Imielinski and Hank Korth, eds.). [Online]. Available
    • D. B. Johnson and D. A. Malt, Mobile Computing. Kluwer Academic Publishers, 1996, ch. Dynamic Source Routing in Ad Hoc Wireless Networks, Chapter 5, (Tomasz Imielinski and Hank Korth, eds.). [Online]. Available: http://www.monarch.cs.cmu.edu/monarch-papers/kluwer-adhoc.ps
    • (1996) Mobile Computing
    • Johnson, D.B.1    Malt, D.A.2
  • 29
    • 0004118143 scopus 로고    scopus 로고
    • A secure routing protocol for ad hoc networks
    • [Online]. Available
    • B. Dahill, B. N. Levine, E. Royer, and C. Shields, "A secure routing protocol for ad hoc networks," UMass, Tech. Rep., 2001. [Online]. Available: ftp://ftp.cs.umass.edu/pub/techrept/techreport/2001/UM-CS-2001-037.ps
    • (2001) UMass, Tech. Rep.
    • Dahill, B.1    Levine, B.N.2    Royer, E.3    Shields, C.4
  • 31
    • 0002098559 scopus 로고    scopus 로고
    • TCP congestion control with a misbehaving receiver
    • Oct. [Online]. Available
    • S. Savage, N. Cardwell, D. Wetherall, and T. Anderson, "TCP congestion control with a misbehaving receiver," ACM Computer Communication Review, vol. 29, no. 5, Oct. 1999. [Online]. Available: http://citeseer.nj.nec. com/savage99tcp.html
    • (1999) ACM Computer Communication Review , vol.29 , Issue.5
    • Savage, S.1    Cardwell, N.2    Wetherall, D.3    Anderson, T.4
  • 33
    • 0003629991 scopus 로고
    • Federal Information Processing Standards Publication 180-1
    • Secure hash standard, Federal Information Processing Standards Publication 180-1, 1995.
    • (1995) Secure Hash Standard
  • 34
    • 0043211984 scopus 로고    scopus 로고
    • Available at
    • W Dai, "Crypto++4.0," Available at http://www.eskimo.com/wei- dai/cryptlib.html.
    • Crypto++4.0
    • Dai, W.1
  • 35
    • 84855554615 scopus 로고    scopus 로고
    • I. P. Group Available at
    • I. P. Group, "IEEE P1363 standard," Available at http://grouper.ieee.org/groups/1363/index.html.
    • IEEE P1363 Standard


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.