1 |
V. Srinivasan, P. Nuggehalli, C. F. Chiasserini, and R. R. Rao, 'Cooperation in wireless ad-hoc networks,' in Proc. IEEE INFOCOM, 2003
|
2 |
B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, 'An on-demand secure routing protocol resilient to byzantine failures,' in Proc. ACM WiSe, 2002
|
3 |
Y. Hu, D. B. Johnson, and A. Perrig, 'SEAD: Secure efficient distance vector routing for mobile wireless ad-hoc networks,' in Proc. WMCSA, June 2002
|
4 |
G. Theodorakopoulos and J. S. Baras, 'Trust evaluation in ad-hoc networks:' in Proc. ACM WiSe, 2004
|
5 |
X. Zeng, R. Bagrodia, and M. Gerla, 'GloMoSim: A library for parallel simulation of large-scale wireless networks,' in Proc. PADS, May 26-29, 1998
|
6 |
Y. Hu, A. Perrig, and D. B. Johnson, 'Ariadne: A secure on-demand routing protocol for ad-hoc networks,' Dept. Computer Sci., Rice Univ., Tech. Rep. TR01-383, Dec. 2001
|
7 |
P. Michiardi and R. Molva, 'A game theoretical approach to evaluate cooperation enforcement mechanisms in mobile ad-hoc networks,' in Proc. WiOpt: Modeling and Optimization in Mobile, Ad-Hoc and Wireless Networks, 2003
|
8 |
P. Papadimitratos and Z. J. Haas, 'Secure data transmission in mobile ad-hoc networks,' in Proc. ACM WiSe, 2003
|
9 |
P. Michiardi and R. Molva, 'CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad-hoc networks,' in Proc. CMS, 2002
|
10 |
N. Jiang, S. Sheu, K. A. Hua, and O. Ozyer, 'A finite-state-model scheme for efficient cooperation enforcement in mobile ad-hoc networks,' in Proc. ICPADS, 2005
|
11 |
ANSI/IEEE Standard 802.11 (1999). [Online]. Available: http://standards. ieee.org/catalog/olis/lanman.html
|
12 |
P. Michiardi and R. Molva, 'Simulation-based analysis of security exposures in mobile ad-hoc networks,' in Proc. European Wireless Conf, 2002
|
13 |
D. Johnson and D. A. Maltz, 'Dynamic source routing in ad-hoc wireless networks,' in Mobile Computing, T. Imielinski and H. F. Korth, Ed., Dordrecht, The Netherlands: Kluwer Academic Publishers, 1996, pp. 153-181
|
14 |
W. Zhao, X. Li, and Y. Wang, 'Design multicast protocols for noncooperative networks,' in Proc. IEEE INFOCOM, 2005
|
15 |
P. Michiardi and R. Molva, 'Prevention of denial of service attacks and selfishness in mobile ad-hoc networks,' Res. Rep. RR-02-63, Jan. 2002
|
16 |
J. Kong, X. Hong, Y. Yi, J. S. Park, and M. Gerla, 'A secure ad-hoc routing approach using localized self-healing communities,' in Proc. IEEE/ACM MobiHoc, 2005
|
17 |
R. Axelrod, The Evolution of Cooperation. New York: Basic Books, 1984
|
18 |
L. Zhou and Z. Haas, 'Securing ad-hoc networks,' IEEE Network Mag., Special Issue on Networking Security, vol. 13, no. 6, Nov./Dec., pp. 24-30, 1999
|
19 |
S. Marti, T. J. Giuli, K. Lai, and M. Baker, 'Mitigating routing misbehavior in mobile ad-hoc networks,' in Proc. MobiCom, 2000, pp. 255-265
|
20 |
J. Wright, GCIH, and CCNA, 'Detecting wireless LAN MAC address spoofing. [Online]. Available: http://home.jwu.edu/jwright/papers/wlanmac-spoof.pdf
|
21 |
K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, 'A secure routing protocol for ad-hoc networks,' in Proc. ICNP, Nov. 2002
|
22 |
S. Buchegger and J. L. Boudec, 'IBM research report: The selfish node: Increasing routing security in mobile ad-hoc networks,' Res. Rep. RR-3354, 2001
|
23 |
S. Buchegger and J. L. Boudec, 'Performance analysis of the CONFIDANT protocol: Cooperation of nodes-fairness in dynamic ad-hoc networks,' in Proc. IEEE/ACM MobiHoc, June 2002
|
24 |
I. S. Committee, 'Wireless LAN medium access control (MAC) and physical layer (PHY) specification.' IEEE 802.11 Standard, ISBN 1-55937-935-9, 1997
|
25 |
P. Papadimitratos and Z. J. Haas, 'Secure routing for mobile ad-hoc networks,' in Proc. CNDS, Jan. 2002
|
26 |
S. Buchegger and J. L. Boudec, 'Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad-hoc networks,' in Proc. the Tenth Euromicro Workshop on Parallel, Distributed, and Nework-based Processing, Jan. 2002, pp. 403-410
|
27 |
H. Yang, X. Meng, and S. Lu, 'Self-organized network-layer security in mobile ad-hoc networks,' in Proc. ACM WiSe, 2002
|
28 |
Information Technology Laboratory, National Institute of Standards and Technology, 'The keyed-hash message authentication code (HMAC)'
|
29 |
R. B. Myerson, Game Theory: Analysis of Conflict. Cambridge, Mass.: Harvard University Press, 1991
|
30 |
Q. He, D. Wu, P. Khosla, 'SORI: A secure and objective reputation-based incentive scheme for ad-hoc networks,' in Proc. WCNC, 2004
|
31 |
L. Buttyan and J. Hubaux, 'Stimulating cooperation in self-organizing mobile ad-hoc networks,' EPFL-DI-ICA, Tech. Rep. DSC/2001/046, Aug. 2001
|
32 |
Y. Zhang and W. Lee, 'Intrusion detection in wireless ad-hoc networks,' in Proc. MobiCom, 2000, pp. 275-283
|
33 |
J. Hubaux, L. Buttyan, and S. Capkun, 'The quest for security in mobile ad-hoc networks,' in Proc. IEEE/ACM MobiHoc, 2001
|
34 |
N. B. Salem, L. Buttyan, J. P. Hubaux, and M. Jakobsson, 'A charging and rewarding scheme for packet forwarding,' in Proc. IEEE/ACM MobiHoc, 2003
|
35 |
S. Buchegger and J. L. Boudec, 'Coping with false accusations in misbehavior reputation systems for mobile ad-hoc networks,' EPFL, Tech. Rep. IC/2003/31
|
36 |
S. Zhong, J. Chen, and Y. R. Yang, 'Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks,' in Proc. IEEE INFOCOM, 2003
|
37 |
W. Zhao, X. Li, and Y. Wang, 'Truthful multicast routing in selfish wireless networks,' in Proc. MobiCom, 2004, pp. 245-259
|
38 |
V. Karpijoki, 'Security in ad-hoc networks:' in Proc. the Helsinki University of Technology, Seminar on Network Security, 2000
|
39 |
S. Eidenbenz and L. Anderegg, 'Ad-hoc-VCG: A truthful and cost-efficient routing protocol for mobile ad-hoc networks with selfish agents,' in Proc. MobiCom, Sept. 2003
|
40 |
E. M. Royer and C. Toh, 'A review of current routing protocols for ad-hoc mobile wireless networks,' IEEE Pers. Commun., Apr. 1999
|
41 |
L. Buttyan and J. Hubaux, 'Enforcing service availability in mobile ad-hoc WANs,' in Proc. IEEE/ACM MobiHoc, Aug. 2000
|