- Anderegg, L., Eidenbenz, S.: Ad hoc-vcg: A truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents. In: Proceedings of the 9th Annual International Conference on Mobile Computing and Networking. pp. 245--259. MobiCom '03, ACM, New York, NY, USA (2003) Google ScholarDigital Library
- Balakrishnan, K., Deng, J., Varshney, V.K.: Twoack: preventing selfishness in mobile ad hoc networks. In: IEEE Wireless Communications and Networking Conference, 2005. vol. 4, pp. 2137--2142 Vol. 4 (March 2005)Google Scholar
- Biryukov, A., Pustogarov, I.: Proof-of-work as anonymous micropayment: Rewarding a tor relay. In: Böhme, R., Okamoto, T. (eds.) FC 2015. LNCS, vol. 8975, pp. 445--455. Springer, Heidelberg (Jan 2015)Google Scholar
- Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 416--432. Springer, Heidelberg (May 2003) Google ScholarDigital Library
- Buchegger, S., Le Boudec, J.Y.: Performance analysis of the confidant protocol. In: Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing. pp. 226--236. MobiHoc '02, ACM, New York, NY, USA (2002) Google ScholarDigital Library
- Clausen, T., Jacquet, P.: Optimized link state routing protocol (olsr) (2003)Google Scholar
- Corson, S., Macker, J.: Mobile ad hoc networking (manet): Routing protocol performance issues and evaluation considerations (1999)Google Scholar
- Garay, J.A., Kiayias, A., Leonardos, N.: The bitcoin backbone protocol: Analysis and applications. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015, Part II. LNCS, vol. 9057, pp. 281--310. Springer, Heidelberg (Apr 2015)Google Scholar
- Hu, Y.C., Perrig, A.: A survey of secure wireless ad hoc routing. IEEE Security and Privacy 2(3), 28--39 (May 2004) Google ScholarDigital Library
- Kannhavong, B., Nakayama, H., Nemoto, Y., Kato, N., Jamalipour, A.: A survey of routing attacks in mobile ad hoc networks. IEEE Wireless Communications 14(5), 85--91 (October 2007) Google ScholarDigital Library
- Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. In: Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003. pp. 113--127 (May 2003)Google ScholarCross Ref
- Kiayias, A., Russell, A., David, B., Oliynykov, R.: Ouroboros: A provably secure proof-of-stake blockchain protocol. In: Katz, J., Shacham, H. (eds.) Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part I. Lecture Notes in Computer Science, vol. 10401, pp. 357--388. Springer (2017)Google Scholar
- Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: Proceedings of the 6th Annual International Conference on Mobile Computing and Networking. pp. 255--265. MobiCom '00, ACM, New York, NY, USA (2000) Google ScholarDigital Library
- Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2008)Google Scholar
- Perkins, C., Belding-Royer, E., Das, S.: Ad hoc on-demand distance vector (aodv) routing (2003)Google Scholar
- Saxena, A., Misra, J., Dhar, A.: Increasing anonymity in bitcoin. In: Böhme, R., Brenner, M., Moore, T., Smith, M. (eds.) FC 2014 Workshops. LNCS, vol. 8438, pp. 122--139. Springer, Heidelberg (Mar 2014)Google Scholar
- Zhong, S., Chen, J., Yang, Y.R.: Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks. In: IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428). vol. 3, pp. 1987--1997 vol.3 (March 2003)Google ScholarCross Ref
Index Terms
- MARS: Monetized Ad-hoc Routing System (A Position Paper)
Recommendations
Performance evaluation of routing protocols in vehicular ad-hoc networks
This paper presents a reactive location routing algorithm that uses cluster-based flooding for Vehicular Ad-hoc Networks (VANET). We compare both position-based and non-position-based routing strategies in typical urban and motorway traffic scenarios. A ...
Modeling the performance of flooding in wireless multi-hop Ad hoc networks
One feature common to most existing routing protocols for wireless mobile ad hoc networks, or MANETs, is the need to flood control messages network-wide during the route acquisition and maintenance process. Flooding of control messages may result in ...
Performance analysis of the CONFIDANT protocol
MobiHoc '02: Proceedings of the 3rd ACM international symposium on Mobile ad hoc networking & computingMobile ad-hoc networking works properly only if the participating nodes cooperate in routing and forwarding. However,it may be advantageous for individual nodes not to cooperate. We propose a protocol, called CONFIDANT, for making misbehavior ...
Comments