메뉴 건너뛰기




Volumn 58, Issue 8, 2009, Pages 4628-4639

SMART: A secure multilayer credit-based incentive scheme for delay-tolerant networks

Author keywords

Delay tolerant networks (DTNs); Incentive scheme; Security

Indexed keywords

COMMUNICATION PATH; DATA-FORWARDING; DELAY TOLERANT NETWORKS; DELAY-TOLERANT NETWORKS (DTNS); EFFICIENCY OPTIMIZATION; END-TO-END NETWORK; EXTENSIVE SIMULATIONS; FORWARD PACKETS; FORWARDING COOPERATION; INCENTIVE SCHEME; INCENTIVE SCHEMES; INTERMEDIATE NODE; MALICIOUS NODES; OVERALL EFFICIENCY; SECURITY; TAMPERPROOF; VARIOUS ATTACKS; WIDE-RANGING APPLICATIONS; WIRELESS RESOURCES;

EID: 70350238158     PISSN: 00189545     EISSN: None     Source Type: Journal    
DOI: 10.1109/TVT.2009.2020105     Document Type: Article
Times cited : (233)

References (37)
  • 1
    • 51349159708 scopus 로고    scopus 로고
    • Anonymity and security in delay tolerant networks
    • Sep
    • A. Kate, G. Zaverucha, and U. Hengartner, "Anonymity and security in delay tolerant networks," in Proc. SecureComm, Sep. 2007, pp. 504-513.
    • (2007) Proc. SecureComm , pp. 504-513
    • Kate, A.1    Zaverucha, G.2    Hengartner, U.3
  • 2
    • 70350330400 scopus 로고    scopus 로고
    • H. Zhu, R. Lu, X. Lin, and X. Shen, Security in service-oriented vehicular networks, IEEE Wireless Commun., Special Issue on Service-Oriented Broadband Wireless Network Architecture, 16, no. 4, Aug. 2009, to be published.
    • H. Zhu, R. Lu, X. Lin, and X. Shen, "Security in service-oriented vehicular networks," IEEE Wireless Commun., Special Issue on Service-Oriented Broadband Wireless Network Architecture, vol. 16, no. 4, Aug. 2009, to be published.
  • 3
    • 51349156734 scopus 로고    scopus 로고
    • ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications
    • Phoenix, AZ, Apr. 14-18
    • R. Lu, X. Lin, H. Zhu, P. H. Ho, and X. Shen, "ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications," in Proc. IEEE Infocom, Phoenix, AZ, Apr. 14-18, 2008, pp. 1229-1237.
    • (2008) Proc. IEEE Infocom , pp. 1229-1237
    • Lu, R.1    Lin, X.2    Zhu, H.3    Ho, P.H.4    Shen, X.5
  • 4
    • 34248646800 scopus 로고    scopus 로고
    • VADD: Vehicle-assisted data delivery in vehicular ad hoc networks
    • J. Zhao and G. Cao, "VADD: Vehicle-assisted data delivery in vehicular ad hoc networks," in Proc. Infocom, 2006, pp. 1-12.
    • (2006) Proc. Infocom , pp. 1-12
    • Zhao, J.1    Cao, G.2
  • 5
    • 57349133691 scopus 로고    scopus 로고
    • Bubble rap: Social-based forwarding in delay tolerant networks
    • P. Hui, J. Crowcroft, and E. Yoneki, "Bubble rap: Social-based forwarding in delay tolerant networks," in Proc. MobiHoc, 2008, pp. 241-250.
    • (2008) Proc. MobiHoc , pp. 241-250
    • Hui, P.1    Crowcroft, J.2    Yoneki, E.3
  • 6
    • 42649142915 scopus 로고    scopus 로고
    • Coupons: A multilevel incentive scheme for information dissemination in mobile networks
    • Jun
    • A. Garyfalos and K. C. Almeroth, "Coupons: A multilevel incentive scheme for information dissemination in mobile networks," IEEE Trans. Mobile Comput., vol. 7, no. 6, pp. 792-804, Jun. 2008.
    • (2008) IEEE Trans. Mobile Comput , vol.7 , Issue.6 , pp. 792-804
    • Garyfalos, A.1    Almeroth, K.C.2
  • 8
    • 33745111889 scopus 로고    scopus 로고
    • Challenges: Building scalable mobile underwater wireless sensor networks for aquatic applications
    • May
    • J.-H. Cui, J. Kong, M. Gerla, and S. Zhou, "Challenges: Building scalable mobile underwater wireless sensor networks for aquatic applications," IEEE Netw. - Special Issue Wireless Sensor Netw., vol. 20, no. 3, pp. 12-18, May 2006.
    • (2006) IEEE Netw. - Special Issue Wireless Sensor Netw , vol.20 , Issue.3 , pp. 12-18
    • Cui, J.-H.1    Kong, J.2    Gerla, M.3    Zhou, S.4
  • 9
    • 40749113163 scopus 로고    scopus 로고
    • Efficient routing in intermittently connected mobile networks: The multiple-copy cast
    • Feb
    • T. Spyropoulos, K. Psounis, and C. S. Raghavendra, "Efficient routing in intermittently connected mobile networks: The multiple-copy cast," IEEE/ACM Trans. Netw., vol. 16, no. 1, pp. 77-90, Feb. 2008.
    • (2008) IEEE/ACM Trans. Netw , vol.16 , Issue.1 , pp. 77-90
    • Spyropoulos, T.1    Psounis, K.2    Raghavendra, C.S.3
  • 10
    • 40749157530 scopus 로고    scopus 로고
    • Efficient routing in intermittently connected mobile networks: The single-copy cast
    • Feb
    • T. Spyropoulos, K. Psounis, and C. S. Raghavendra, "Efficient routing in intermittently connected mobile networks: The single-copy cast," IEEE/ACM Trans. Netw., vol. 16, no. 1, pp. 63-76, Feb. 2008.
    • (2008) IEEE/ACM Trans. Netw , vol.16 , Issue.1 , pp. 63-76
    • Spyropoulos, T.1    Psounis, K.2    Raghavendra, C.S.3
  • 11
    • 21844451437 scopus 로고    scopus 로고
    • Routing in a delay tolerant network
    • S. Jain, K. Fall, and R. Patra, "Routing in a delay tolerant network," in Proc. ACM SIGCOMM, 2004, pp. 145-158.
    • (2004) Proc. ACM SIGCOMM , pp. 145-158
    • Jain, S.1    Fall, K.2    Patra, R.3
  • 13
    • 34347251103 scopus 로고    scopus 로고
    • Probabilistic routing in intermittently connected networks
    • A. Lindgren, A. Doria, and O. Schelen, "Probabilistic routing in intermittently connected networks," in Proc. SAPIR, 2004, pp. 239-254.
    • (2004) Proc. SAPIR , pp. 239-254
    • Lindgren, A.1    Doria, A.2    Schelen, O.3
  • 14
    • 0034541756 scopus 로고    scopus 로고
    • Mitigating routing misbehavior in mobile ad hoc networks
    • Boston, MA, Aug
    • S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating routing misbehavior in mobile ad hoc networks," in Proc. ACM Mobicom, Boston, MA, Aug. 2000, pp. 255-265.
    • (2000) Proc. ACM Mobicom , pp. 255-265
    • Marti, S.1    Giuli, T.2    Lai, K.3    Baker, M.4
  • 15
    • 4544283175 scopus 로고    scopus 로고
    • SORI: A secure and objective reputation-based incentive scheme for ad hoc networks
    • Atlanta, GA, Mar
    • Q. He, D. Wu, and P. Khosla, "SORI: A secure and objective reputation-based incentive scheme for ad hoc networks," in Proc. WCNC, Atlanta, GA, Mar. 2004, pp. 825-830.
    • (2004) Proc. WCNC , pp. 825-830
    • He, Q.1    Wu, D.2    Khosla, P.3
  • 16
    • 34548211355 scopus 로고    scopus 로고
    • A fine-grained reputation system for reliable service selection in peer-to-peer networks
    • Aug
    • Y. Zhang and Y. Fang, "A fine-grained reputation system for reliable service selection in peer-to-peer networks," IEEE Trans. Parallel Distrib. Syst., vol. 18, no. 8, pp. 1134-1145, Aug. 2007.
    • (2007) IEEE Trans. Parallel Distrib. Syst , vol.18 , Issue.8 , pp. 1134-1145
    • Zhang, Y.1    Fang, Y.2
  • 17
    • 0242696192 scopus 로고    scopus 로고
    • Performance analysis of the CONFIDANT protocol: Cooperation of nodes-fairness in distributed ad-hoc networks
    • Lausanne, Switzerland, Jun
    • S. Buchegger and J. Le Boudec, "Performance analysis of the CONFIDANT protocol: Cooperation of nodes-fairness in distributed ad-hoc networks," in Proc. IEEE/ACM MobiHoc, Lausanne, Switzerland, Jun. 2002, pp. 226-236.
    • (2002) Proc. IEEE/ACM MobiHoc , pp. 226-236
    • Buchegger, S.1    Le Boudec, J.2
  • 18
    • 34547532527 scopus 로고    scopus 로고
    • A secure incentive protocol for mobile ad hoc networks
    • Oct
    • Y. Zhang, W. Lou, W. Liu, and Y. Fang, "A secure incentive protocol for mobile ad hoc networks," Wirel. Netw., vol. 13, no. 5, pp. 569-582, Oct. 2007.
    • (2007) Wirel. Netw , vol.13 , Issue.5 , pp. 569-582
    • Zhang, Y.1    Lou, W.2    Liu, W.3    Fang, Y.4
  • 19
    • 37849009419 scopus 로고    scopus 로고
    • Secure incentives for commercial ad dissemination in vehicular networks
    • Sep
    • S. B. Lee, G. Pan, J.-S. Park, M. Gerla, and S. Lu, "Secure incentives for commercial ad dissemination in vehicular networks," in Proc. MobiHoc, Sep. 2007, pp. 150-159.
    • (2007) Proc. MobiHoc , pp. 150-159
    • Lee, S.B.1    Pan, G.2    Park, J.-S.3    Gerla, M.4    Lu, S.5
  • 20
    • 51649130466 scopus 로고    scopus 로고
    • A novel fair incentive protocol for mobile ad hoc networks
    • Las Vegas, NV, Mar. 31-Apr. 3
    • R. Lu, X. Lin, H. Zhu, C. Zhang, P. H. Ho, and X. Shen, "A novel fair incentive protocol for mobile ad hoc networks," in Proc. IEEE WCNC. Las Vegas, NV, Mar. 31-Apr. 3 2008, pp. 3237-3242.
    • (2008) Proc. IEEE WCNC , pp. 3237-3242
    • Lu, R.1    Lin, X.2    Zhu, H.3    Zhang, C.4    Ho, P.H.5    Shen, X.6
  • 21
    • 33645673382 scopus 로고    scopus 로고
    • Nash equilibria of packet forwarding strategies in wireless ad hoc networks
    • May
    • M. Felegyhazi, J.-P. Hubaux, and L. Buttyan, "Nash equilibria of packet forwarding strategies in wireless ad hoc networks," IEEE Trans. Mobile Comput., vol. 5, no. 5, pp. 463-476, May 2006.
    • (2006) IEEE Trans. Mobile Comput , vol.5 , Issue.5 , pp. 463-476
    • Felegyhazi, M.1    Hubaux, J.-P.2    Buttyan, L.3
  • 22
    • 42649121690 scopus 로고    scopus 로고
    • Security in vehicular ad hoc networks
    • Apr
    • X. Lin, R. Lu, C. Zhang, H. Zhu, P. H. Ho, and X. Shen, "Security in vehicular ad hoc networks," IEEE Commun. Mag., vol. 46, no. 4, pp. 88-95, Apr. 2008.
    • (2008) IEEE Commun. Mag , vol.46 , Issue.4 , pp. 88-95
    • Lin, X.1    Lu, R.2    Zhang, C.3    Zhu, H.4    Ho, P.H.5    Shen, X.6
  • 23
    • 33749041735 scopus 로고    scopus 로고
    • Practical security for disconnected nodes
    • Nov
    • A. Seth, U. Hengartner, and S. Keshav, "Practical security for disconnected nodes," in Proc. NPSec, Nov. 2005, pp. 31-36.
    • (2005) Proc. NPSec , pp. 31-36
    • Seth, A.1    Hengartner, U.2    Keshav, S.3
  • 24
    • 0042933944 scopus 로고    scopus 로고
    • Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks
    • S. Zhong, J. Chen, and Y. Yang, "Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks," in Proc. IEEE Infocom, 2003, pp. 1987-1997.
    • (2003) Proc. IEEE Infocom , pp. 1987-1997
    • Zhong, S.1    Chen, J.2    Yang, Y.3
  • 25
    • 34548493227 scopus 로고    scopus 로고
    • On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks
    • Dec
    • S. Zhong, L. Li, Y. Liu, and Y. Yang, "On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks," Wirel. Netw., vol. 13, no. 6, pp. 799-816, Dec. 2007.
    • (2007) Wirel. Netw , vol.13 , Issue.6 , pp. 799-816
    • Zhong, S.1    Li, L.2    Liu, Y.3    Yang, Y.4
  • 27
    • 84874324906 scopus 로고    scopus 로고
    • Identity based encryption from the Weil pairing
    • Proc. Crypto. New York: Springer-Verlag
    • D. Boneh and M. Franklin, "Identity based encryption from the Weil pairing," in Proc. Crypto. New York: Springer-Verlag, 2001, vol. 2139, LNCS, pp. 213-229.
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 28
    • 66449108023 scopus 로고    scopus 로고
    • PPAB: A privacy preserving authentication and billing architecture for metropolitan area sharing networks
    • Jun
    • H. Zhu, X. Lin, M. Shi, P.-H. Ho, and X. Shen, "PPAB: A privacy preserving authentication and billing architecture for metropolitan area sharing networks," IEEE Trans. Veh. Technol., vol. 58, no. 5, pp. 2529-2543, Jun. 2009.
    • (2009) IEEE Trans. Veh. Technol , vol.58 , Issue.5 , pp. 2529-2543
    • Zhu, H.1    Lin, X.2    Shi, M.3    Ho, P.-H.4    Shen, X.5
  • 29
    • 55149100626 scopus 로고    scopus 로고
    • SLAB: Secure localized authentication and billing scheme for wireless mesh networks
    • Oct
    • H. Zhu, X. Lin, R. Lu, P. H. Ho, and X. Sheng, "SLAB: Secure localized authentication and billing scheme for wireless mesh networks," IEEE Trans. Wireless Commun., vol. 17, no. 10, pp. 3858-3868, Oct. 2008.
    • (2008) IEEE Trans. Wireless Commun , vol.17 , Issue.10 , pp. 3858-3868
    • Zhu, H.1    Lin, X.2    Lu, R.3    Ho, P.H.4    Sheng, X.5
  • 30
    • 23044435711 scopus 로고    scopus 로고
    • Short signatures from the Weil pairing
    • Sep
    • D. Boneh, B. Lynn, and H. Shacham, "Short signatures from the Weil pairing," J. Cryptol., vol. 17, no. 4, pp. 297-319, Sep. 2004.
    • (2004) J. Cryptol , vol.17 , Issue.4 , pp. 297-319
    • Boneh, D.1    Lynn, B.2    Shacham, H.3
  • 31
    • 44649172478 scopus 로고    scopus 로고
    • DTN: An architectural retrospective
    • Jun
    • S. Farrell and V. Cahill, "DTN: An architectural retrospective," IEEE J. Sel. Areas Commun., vol. 26, no. 5, pp. 828-836, Jun. 2008.
    • (2008) IEEE J. Sel. Areas Commun , vol.26 , Issue.5 , pp. 828-836
    • Farrell, S.1    Cahill, V.2
  • 32
    • 52049092314 scopus 로고    scopus 로고
    • Message fragmentation in opportunistic DTNs
    • M. Pitkanen, M. Keranen, and J. Ott, "Message fragmentation in opportunistic DTNs," in Proc. WoWMoM, 2008, pp. 1-7.
    • (2008) Proc. WoWMoM , pp. 1-7
    • Pitkanen, M.1    Keranen, M.2    Ott, J.3
  • 33
    • 84920380941 scopus 로고
    • Protocols for public key cryptosystems
    • R. Merkle, "Protocols for public key cryptosystems," in Proc. IEEE SP, 1980, pp. 122-133.
    • (1980) Proc. IEEE SP , pp. 122-133
    • Merkle, R.1
  • 35
    • 35448931599 scopus 로고    scopus 로고
    • Applicability of identity-based cryptography for disruption-tolerant networking
    • Jun
    • N. Asokan, K. Kostiainen, P. Ginzboorg, J. Ott, and C. Luo, "Applicability of identity-based cryptography for disruption-tolerant networking," in Proc. 1st Int. MobiOpp, Jun. 2007, pp. 52-56.
    • (2007) Proc. 1st Int. MobiOpp , pp. 52-56
    • Asokan, N.1    Kostiainen, K.2    Ginzboorg, P.3    Ott, J.4    Luo, C.5
  • 36
  • 37
    • 35248844436 scopus 로고    scopus 로고
    • An identity-based signature from gap Diffie-Hellman groups
    • J. C. Cha and J. H. Cheon, "An identity-based signature from gap Diffie-Hellman groups," in Proc. PKC, 2003, vol. 2567, pp. 18-30.
    • (2003) Proc. PKC , vol.2567 , pp. 18-30
    • Cha, J.C.1    Cheon, J.H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.