메뉴 건너뛰기




Volumn 10, Issue 7, 2011, Pages 997-1001

ESIP: Secure incentive protocol with limited use of public-key cryptography for multihop wireless networks

Author keywords

mobile communication systems; Network level security and protection; Payment schemes; routing protocols

Indexed keywords

AUTHENTICATION PROTOCOL;

EID: 79960991600     PISSN: 15361233     EISSN: None     Source Type: Journal    
DOI: 10.1109/TMC.2010.211     Document Type: Article
Times cited : (40)

References (36)
  • 1
    • 63449129290 scopus 로고    scopus 로고
    • Multi-Hop Relay for Next-Generation Wireless Access Networks,
    • G. Shen J. Liu D. Wang J. Wang S. Jin Multi-Hop Relay for Next-Generation Wireless Access Networks, Bell Labs Technical J., 13 4 175 193 2009
    • (2009) Bell Labs Technical J., , vol.13 , Issue.4 , pp. 175-193
  • 2
    • 43449084339 scopus 로고    scopus 로고
    • Multihop Cellular Networks: Technology and Economics,
    • X. Li B. Seet P. Chong Multihop Cellular Networks: Technology and Economics, Computer Networks, 52 9 1825 1837 June 2008
    • (2008) Computer Networks, , vol.52 , Issue.9 , pp. 1825-1837
  • 3
    • 62949086368 scopus 로고    scopus 로고
    • Statistical QoS Routing for IEEE 802.11 Multihop Ad Hoc Networks,
    • A. Abdrabou W. Zhuang Statistical QoS Routing for IEEE 802.11 Multihop Ad Hoc Networks, IEEE Trans. Wireless Comm., 8 3 1542 1552 Mar. 2009
    • (2009) IEEE Trans. Wireless Comm., , vol.8 , Issue.3 , pp. 1542-1552
  • 4
    • 67349168446 scopus 로고    scopus 로고
    • BAT: A Robust Signature Scheme for Vehicular Networks Using Binary Authentication Tree,
    • Y. Jiang M. Shi X. Shen C. Lin BAT: A Robust Signature Scheme for Vehicular Networks Using Binary Authentication Tree, IEEE Trans. Wireless Comm., 8 4 1974 1983 Apr. 2009
    • (2009) IEEE Trans. Wireless Comm., , vol.8 , Issue.4 , pp. 1974-1983
  • 5
    • 33747142749 scopus 로고    scopus 로고
    • The Capacity of Wireless Networks,
    • P. Gupta P. Kumar The Capacity of Wireless Networks, IEEE Trans. Information Theory, 46 2 388 404 Mar. 2000
    • (2000) IEEE Trans. Information Theory, , vol.46 , Issue.2 , pp. 388-404
  • 6
    • 85176996358 scopus 로고    scopus 로고
    • S. Marti T. Giuli K. Lai M. Baker Mitigating Routing Misbehavior in Mobile Ad Hoc Networks, Proc. IEEE/ACM MobiCom, 255 265 Proc. IEEE/ACM MobiCom, 2000-Aug.
    • (2000) , pp. 255-265
  • 7
    • 85177017527 scopus 로고    scopus 로고
    • D.B. Johnson D.A. Maltz Y.C. Hu The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR), Feb. 2007
    • (2007)
  • 8
    • 85176999319 scopus 로고    scopus 로고
    • P. Michiardi R. Molva Simulation-Based Analysis of Security Exposures in Mobile Ad Hoc Networks, Proc. European Wireless Conf., Proc. European Wireless Conf., 2002-Feb.
    • (2002)
  • 9
    • 85177022012 scopus 로고    scopus 로고
    • J. Hu Cooperation in Mobile Ad Hoc Networks, Jan. 2005
    • (2005)
  • 10
    • 33646845802 scopus 로고    scopus 로고
    • Cooperation Enforcement Schemes for MANETs: A Survey,
    • G. Marias P. Georgiadis D. Flitzanis K. Mandalas Cooperation Enforcement Schemes for MANETs: A Survey, Wireless Comm. and Mobile Computing, 6 3 319 332 2006
    • (2006) Wireless Comm. and Mobile Computing, , vol.6 , Issue.3 , pp. 319-332
  • 11
    • 85177015000 scopus 로고    scopus 로고
    • J. Jaramillo R. Srikant DARWIN: Distributed and Adaptive Reputation Mechanism for Wireless Networks, Proc. ACM MobiCom, 87 98 Proc. ACM MobiCom, 2007-Sept.
    • (2007) , pp. 87-98
  • 12
    • 33646823968 scopus 로고    scopus 로고
    • A Secure Incentive Architecture for Ad-Hoc Networks,
    • Q. He D. Wu P. Khosla A Secure Incentive Architecture for Ad-Hoc Networks, Wireless Comm. and Mobile Computing, 6 3 333 346 May 2006
    • (2006) Wireless Comm. and Mobile Computing, , vol.6 , Issue.3 , pp. 333-346
  • 13
    • 34247167001 scopus 로고    scopus 로고
    • A Scalable and Robust Approach to Collaboration Enforcement in Mobile Ad-Hoc Networks,
    • N. Jiang K. Hua D. Liu A Scalable and Robust Approach to Collaboration Enforcement in Mobile Ad-Hoc Networks, Comm. and Networks, 9 1 56 66 2007
    • (2007) Comm. and Networks, , vol.9 , Issue.1 , pp. 56-66
  • 14
    • 41549123255 scopus 로고    scopus 로고
    • Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification,
    • L. Xie S. Zhu Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification, ACM Trans. Information and System Security, 11 3 Mar. 2008
    • (2008) ACM Trans. Information and System Security, , vol.11 , Issue.3
  • 15
    • 34547545598 scopus 로고    scopus 로고
    • A Secure Authentication and Billing Architecture for Wireless Mesh Networks,
    • Y. Zhang Y. Fang A Secure Authentication and Billing Architecture for Wireless Mesh Networks, ACM Wireless Networks, 13 5 569 582 Oct. 2007
    • (2007) ACM Wireless Networks, , vol.13 , Issue.5 , pp. 569-582
  • 16
    • 85177016193 scopus 로고    scopus 로고
    • L. Buttyan J. Hubaux Nuglets: A Virtual Currency to Stimulate Cooperation in Self Organized Ad Hoc Networks, Jan. 2001
    • (2001)
  • 17
    • 0042660545 scopus 로고    scopus 로고
    • Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks,
    • L. Buttyan J. Hubaux Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks, Mobile Networks and Applications, 8 5 579 592 Oct. 2004
    • (2004) Mobile Networks and Applications, , vol.8 , Issue.5 , pp. 579-592
  • 18
    • 85177013614 scopus 로고    scopus 로고
    • A. Weyland T. Braun Cooperation and Accounting Strategy for Multi-Hop Cellular Networks, Proc. IEEE Workshop Local and Metropolitan Area Networks (LANMAN), 193 198 Proc. IEEE Workshop Local and Metropolitan Area Networks (LANMAN), 2004-Apr.
    • (2004) , pp. 193-198
  • 19
    • 85177018156 scopus 로고    scopus 로고
    • A. Weyland Cooperation and Accounting in Multi-Hop Cellular Networks, Nov. 2005
    • (2005)
  • 20
    • 34547532527 scopus 로고    scopus 로고
    • A Secure Incentive Protocol for Mobile Ad Hoc Networks,
    • Y. Zhang W. Lou Y. Fang A Secure Incentive Protocol for Mobile Ad Hoc Networks, ACM Wireless Networks, 13 5 569 582 Oct. 2007
    • (2007) ACM Wireless Networks, , vol.13 , Issue.5 , pp. 569-582
  • 21
    • 33751255669 scopus 로고    scopus 로고
    • Identity-Based Secure Collaboration in Wireless Ad Hoc Networks,
    • J. Pan L. Cai X. Shen J. Mark Identity-Based Secure Collaboration in Wireless Ad Hoc Networks, Computer Networks, 51 3 853 865 2007
    • (2007) Computer Networks, , vol.51 , Issue.3 , pp. 853-865
  • 22
    • 85177019446 scopus 로고    scopus 로고
    • S. Zhong J. Chen R. Yang Sprite: A Simple, Cheat-Proof, Credit Based System for Mobile Ad-Hoc Networks, Proc. IEEE INFOCOM, 3 1987 1997 Proc. IEEE INFOCOM, 2003
    • (2003) , vol.3 , pp. 1987-1997
  • 23
    • 33644643460 scopus 로고    scopus 로고
    • Node Cooperation in Hybrid Ad Hoc Networks,
    • N. Salem L. Buttyan J. Hubaux M. Jakobsson Node Cooperation in Hybrid Ad Hoc Networks, IEEE Trans. Mobile Computing, 5 4 365 376 Apr. 2006
    • (2006) IEEE Trans. Mobile Computing, , vol.5 , Issue.4 , pp. 365-376
  • 24
    • 85177002163 scopus 로고    scopus 로고
    • M. Jakobsson J. Hubaux L. Buttyan A Micro-Payment Scheme Encouraging Collaboration in Multi-Hop Cellular Networks, Proc. Seventh Financial Cryptography, 15 33 Proc. Seventh Financial Cryptography, 2003-Jan.
    • (2003) , pp. 15-33
  • 25
    • 0037715383 scopus 로고    scopus 로고
    • Charging Support for AdHoc Stub Networks,
    • B. Lamparter K. Paul D. Westhoff Charging Support for AdHoc Stub Networks, Computer Comm., 26 13 1504 1514 2003
    • (2003) Computer Comm., , vol.26 , Issue.13 , pp. 1504-1514
  • 26
    • 85176991905 scopus 로고    scopus 로고
    • M. Mahmoud X. Shen DSC: Cooperation Incentive Mechanism for Multi-Hop Cellular Networks, Proc. IEEE Int'l Conf. Comm. (ICC '09), 569 574 Proc. IEEE Int'l Conf. Comm. (ICC '09), 2009-June
    • (2009) , pp. 569-574
  • 27
    • 85176992065 scopus 로고    scopus 로고
    • M. Mahmoud X. Shen Stimulating Cooperation in Multi-Hop Wireless Networks Using Cheating Detection System, Proc. IEEE INFOCOM, 776 785 Proc. IEEE INFOCOM, 2010-Mar.
    • (2010) , pp. 776-785
  • 28
    • 85177015727 scopus 로고    scopus 로고
    • L. Anderegg S. Eidenbenz Ad Hoc-VCG: A Trustful and Cost-Efficient Routing Protocol for Mobile Ad Hoc Networks with Selfish Agents, Proc. ACM MobiCom, Proc. ACM MobiCom, 2003-Sept.
    • (2003)
  • 29
    • 85177013291 scopus 로고    scopus 로고
    • H. Pagnia F. Gartner On the Impossibility of Fair Exchange without a Trusted Third Party, Mar. 1999
    • (1999)
  • 30
    • 85176994853 scopus 로고    scopus 로고
    • D. Boneh M. Franklin Identity Based Encryption from the Weil Pairing, Proc. 21st Ann. Int'l Cryptology Conf. Advances in Cryptology (Crypto '01), 213 229 Proc. 21st Ann. Int'l Cryptology Conf. Advances in Cryptology (Crypto '01), 2001
    • (2001) , pp. 213-229
  • 31
    • 85176998743 scopus 로고    scopus 로고
    • Recommendation for Key ManagementPart 1: General (Revised), 2007
    • (2007)
  • 32
    • 0003923962 scopus 로고    scopus 로고
    • Handbook of Applied Cryptography,
    • A. Menzies P. Orschot S. Vanstone Handbook of Applied Cryptography, 1996 http://www.cacr.math.uwaterloo.ca/hac
    • (1996)
  • 33
    • 85177019966 scopus 로고    scopus 로고
    • J. Yoon M. Liu B. Nobles Sound Mobility Models, Proc. ACM MobiCom, Proc. ACM MobiCom, 2003-Sept.
    • (2003)
  • 34
    • 85176995571 scopus 로고    scopus 로고
    • W. Dai Crypto++ Library 5.6.0, 2009 http://www.cryptopp.com
    • (2009)
  • 35
    • 33646382089 scopus 로고    scopus 로고
    • A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols,
    • N. Potlapally S. Ravi A. Raghunathan N. Jha A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols, IEEE Trans. Mobile Computing, 2 128 143 Mar.-Apr. 2006
    • (2006) IEEE Trans. Mobile Computing, , Issue.2 , pp. 128-143
  • 36
    • 33144476837 scopus 로고    scopus 로고
    • Location-Based Compromise-Tolerant Security Mechanisms for Wireless Sensor Networks,
    • Y. Zhang W. Liu W. Lou Y. Fang Location-Based Compromise-Tolerant Security Mechanisms for Wireless Sensor Networks, IEEE J. Selected Areas Comm., 24 2 247 260 Feb. 2006
    • (2006) IEEE J. Selected Areas Comm., , vol.24 , Issue.2 , pp. 247-260


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.