References
- V. Srinivasan, P. Nuggehalli, C. F. Chiasserini, and R. R. Rao, 'Cooperation in wireless ad-hoc networks,' in Proc. IEEE INFOCOM, 2003
- P. Michiardi and R. Molva, 'Prevention of denial of service attacks and selfishness in mobile ad-hoc networks,' Res. Rep. RR-02-63, Jan. 2002
- R. B. Myerson, Game Theory: Analysis of Conflict. Cambridge, Mass.: Harvard University Press, 1991
- B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens, 'An on-demand secure routing protocol resilient to byzantine failures,' in Proc. ACM WiSe, 2002
- R. Axelrod, The Evolution of Cooperation. New York: Basic Books, 1984
- P. Papadimitratos and Z. J. Haas, 'Secure routing for mobile ad-hoc networks,' in Proc. CNDS, Jan. 2002
- Y. Hu, D. B. Johnson, and A. Perrig, 'SEAD: Secure efficient distance vector routing for mobile wireless ad-hoc networks,' in Proc. WMCSA, June 2002
- J. Hubaux, L. Buttyan, and S. Capkun, 'The quest for security in mobile ad-hoc networks,' in Proc. IEEE/ACM MobiHoc, 2001
- V. Karpijoki, 'Security in ad-hoc networks:' in Proc. the Helsinki University of Technology, Seminar on Network Security, 2000
- G. Theodorakopoulos and J. S. Baras, 'Trust evaluation in ad-hoc networks:' in Proc. ACM WiSe, 2004
- S. Buchegger and J. L. Boudec, 'Performance analysis of the CONFIDANT protocol: Cooperation of nodes-fairness in dynamic ad-hoc networks,' in Proc. IEEE/ACM MobiHoc, June 2002
- S. Buchegger and J. L. Boudec, 'Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad-hoc networks,' in Proc. the Tenth Euromicro Workshop on Parallel, Distributed, and Nework-based Processing, Jan. 2002, pp. 403-410
- S. Buchegger and J. L. Boudec, 'IBM research report: The selfish node: Increasing routing security in mobile ad-hoc networks,' Res. Rep. RR-3354, 2001
- X. Zeng, R. Bagrodia, and M. Gerla, 'GloMoSim: A library for parallel simulation of large-scale wireless networks,' in Proc. PADS, May 26-29, 1998
- Y. Hu, A. Perrig, and D. B. Johnson, 'Ariadne: A secure on-demand routing protocol for ad-hoc networks,' Dept. Computer Sci., Rice Univ., Tech. Rep. TR01-383, Dec. 2001
- S. Buchegger and J. L. Boudec, 'Coping with false accusations in misbehavior reputation systems for mobile ad-hoc networks,' EPFL, Tech. Rep. IC/2003/31
- H. Yang, X. Meng, and S. Lu, 'Self-organized network-layer security in mobile ad-hoc networks,' in Proc. ACM WiSe, 2002
- Information Technology Laboratory, National Institute of Standards and Technology, 'The keyed-hash message authentication code (HMAC)'
- P. Michiardi and R. Molva, 'A game theoretical approach to evaluate cooperation enforcement mechanisms in mobile ad-hoc networks,' in Proc. WiOpt: Modeling and Optimization in Mobile, Ad-Hoc and Wireless Networks, 2003
- P. Papadimitratos and Z. J. Haas, 'Secure data transmission in mobile ad-hoc networks,' in Proc. ACM WiSe, 2003
- S. Zhong, J. Chen, and Y. R. Yang, 'Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks,' in Proc. IEEE INFOCOM, 2003
- L. Zhou and Z. Haas, 'Securing ad-hoc networks,' IEEE Network Mag., Special Issue on Networking Security, vol. 13, no. 6, Nov./Dec., pp. 24-30, 1999
- N. B. Salem, L. Buttyan, J. P. Hubaux, and M. Jakobsson, 'A charging and rewarding scheme for packet forwarding,' in Proc. IEEE/ACM MobiHoc, 2003
- P. Michiardi and R. Molva, 'CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad-hoc networks,' in Proc. CMS, 2002
- L. Buttyan and J. Hubaux, 'Enforcing service availability in mobile ad-hoc WANs,' in Proc. IEEE/ACM MobiHoc, Aug. 2000
- L. Buttyan and J. Hubaux, 'Stimulating cooperation in self-organizing mobile ad-hoc networks,' EPFL-DI-ICA, Tech. Rep. DSC/2001/046, Aug. 2001
- N. Jiang, S. Sheu, K. A. Hua, and O. Ozyer, 'A finite-state-model scheme for efficient cooperation enforcement in mobile ad-hoc networks,' in Proc. ICPADS, 2005
- S. Eidenbenz and L. Anderegg, 'Ad-hoc-VCG: A truthful and cost-efficient routing protocol for mobile ad-hoc networks with selfish agents,' in Proc. MobiCom, Sept. 2003
- J. Kong, X. Hong, Y. Yi, J. S. Park, and M. Gerla, 'A secure ad-hoc routing approach using localized self-healing communities,' in Proc. IEEE/ACM MobiHoc, 2005
- K. Sanzgiri, B. Dahill, B. N. Levine, C. Shields, and E. M. Belding-Royer, 'A secure routing protocol for ad-hoc networks,' in Proc. ICNP, Nov. 2002
- ANSI/IEEE Standard 802.11 (1999). [Online]. Available: http://standards. ieee.org/catalog/olis/lanman.html
- J. Wright, GCIH, and CCNA, 'Detecting wireless LAN MAC address spoofing. [Online]. Available: http://home.jwu.edu/jwright/papers/wlanmac-spoof.pdf
- I. S. Committee, 'Wireless LAN medium access control (MAC) and physical layer (PHY) specification.' IEEE 802.11 Standard, ISBN 1-55937-935-9, 1997
- P. Michiardi and R. Molva, 'Simulation-based analysis of security exposures in mobile ad-hoc networks,' in Proc. European Wireless Conf, 2002
- E. M. Royer and C. Toh, 'A review of current routing protocols for ad-hoc mobile wireless networks,' IEEE Pers. Commun., Apr. 1999
- S. Marti, T. J. Giuli, K. Lai, and M. Baker, 'Mitigating routing misbehavior in mobile ad-hoc networks,' in Proc. MobiCom, 2000, pp. 255-265
- Q. He, D. Wu, P. Khosla, 'SORI: A secure and objective reputation-based incentive scheme for ad-hoc networks,' in Proc. WCNC, 2004
- D. Johnson and D. A. Maltz, 'Dynamic source routing in ad-hoc wireless networks,' in Mobile Computing, T. Imielinski and H. F. Korth, Ed., Dordrecht, The Netherlands: Kluwer Academic Publishers, 1996, pp. 153-181
- W. Zhao, X. Li, and Y. Wang, 'Truthful multicast routing in selfish wireless networks,' in Proc. MobiCom, 2004, pp. 245-259
- Y. Zhang and W. Lee, 'Intrusion detection in wireless ad-hoc networks,' in Proc. MobiCom, 2000, pp. 275-283
- W. Zhao, X. Li, and Y. Wang, 'Design multicast protocols for noncooperative networks,' in Proc. IEEE INFOCOM, 2005