메뉴 건너뛰기




Volumn 6, Issue 3, 2006, Pages 333-346

A secure incentive architecture for ad hoc networks

Author keywords

Incentive; Non cooperative ad hoc networks; Packet forwarding; Reputation; Security techniques and systems; Selfish behavior

Indexed keywords

INCENTIVE; NON-COOPERATIVE AD HOC NETWORKS; PACKET FORWARDING; REPUTATION; SECURITY TECHNIQUES AND SYSTEMS; SELFISH BEHAVIOR;

EID: 33646823968     PISSN: 15308669     EISSN: None     Source Type: Journal    
DOI: 10.1002/wcm.399     Document Type: Article
Times cited : (34)

References (16)
  • 1
    • 0034541756 scopus 로고    scopus 로고
    • Mitigating routing misbehavior in mobile ad hoc networks
    • Boston, MA, USA, August
    • Marti S, Giuli T, Lai K, Baker M. Mitigating routing misbehavior in mobile ad hoc networks. Proceedings of Mobicom 2000, Boston, MA, USA, August 2000.
    • (2000) Proceedings of Mobicom 2000
    • Marti, S.1    Giuli, T.2    Lai, K.3    Baker, M.4
  • 3
    • 0042209739 scopus 로고    scopus 로고
    • A micro-payment scheme encouraging collaboration in multi-hop cellular networks
    • Gosier, Guadeloupe, January
    • Jakobsson M, Hubaux J, Buttyan L. A micro-payment scheme encouraging collaboration in multi-hop cellular networks. Proceedings of Financial Crypto 2003, Gosier, Guadeloupe, January 2003.
    • (2003) Proceedings of Financial Crypto 2003
    • Jakobsson, M.1    Hubaux, J.2    Buttyan, L.3
  • 4
    • 0042933944 scopus 로고    scopus 로고
    • Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks
    • San Francisco, CA, USA, April
    • Zhong S, Chen J, Yang Y. Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks. IEEE INFOCOM 2003, San Francisco, CA, USA, April 2003.
    • (2003) IEEE INFOCOM 2003
    • Zhong, S.1    Chen, J.2    Yang, Y.3
  • 6
    • 0242696192 scopus 로고    scopus 로고
    • Performance analysis of the CONFIDANT protocol: Cooperation of nodes - Fairness in distributed ad-hoc networks
    • Lausanne, Switzerland, June
    • Buchegger S, Le Boudec J. Performance analysis of the CONFIDANT protocol: cooperation of nodes - fairness in distributed ad-hoc networks. IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC), Lausanne, Switzerland, June 2002.
    • (2002) IEEE/ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHOC)
    • Buchegger, S.1    Le Boudec, J.2
  • 7
    • 0019634370 scopus 로고
    • Password authentication with secure communication
    • Lamport L. Password authentication with secure communication. Communications of the ACM 1981; 24(11): 770-772.
    • (1981) Communications of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 9
    • 2942662944 scopus 로고    scopus 로고
    • Simulation-based analysis of security exposures in mobile ad hoc networks
    • Florence, Italy, February
    • Michiardi P, Movla R. Simulation-based analysis of security exposures in mobile ad hoc networks. European Wireless 2002 Conference, Florence, Italy, February 2002.
    • (2002) European Wireless 2002 Conference
    • Michiardi, P.1    Movla, R.2
  • 11
    • 0031096869 scopus 로고    scopus 로고
    • Associativity-based routing for ad-hoc mobile networks
    • Toh CK. Associativity-based routing for ad-hoc mobile networks. Wireless Personal Communications 1997; 4(2): 1-36.
    • (1997) Wireless Personal Communications , vol.4 , Issue.2 , pp. 1-36
    • Toh, C.K.1
  • 14
    • 0038675868 scopus 로고    scopus 로고
    • A survey of mobility models for ad hoc network research
    • Special issue on Mobile Ad Hoc Networking: Research, Trends and Applications
    • Camp T, Boleng J, Davies V. A survey of mobility models for ad hoc network research. Wireless Communication & Mobile Computing, Special issue on Mobile Ad Hoc Networking: Research, Trends and Applications 2002; 2(5): 483-502.
    • (2002) Wireless Communication & Mobile Computing , vol.2 , Issue.5 , pp. 483-502
    • Camp, T.1    Boleng, J.2    Davies, V.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.