{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:08:39Z","timestamp":1761401319398,"version":"3.32.0"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2006,10,23]],"date-time":"2006-10-23T00:00:00Z","timestamp":1161561600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2007,12]]},"DOI":"10.1007\/s11276-006-9855-1","type":"journal-article","created":{"date-parts":[[2006,10,26]],"date-time":"2006-10-26T11:29:09Z","timestamp":1161862149000},"page":"799-816","source":"Crossref","is-referenced-by-count":62,"title":["On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks"],"prefix":"10.1007","volume":"13","author":[{"given":"Sheng","family":"Zhong","sequence":"first","affiliation":[]},{"given":"Li Erran","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yanbin Grace","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yang Richard","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,10,23]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"D. Aguayo, J. Bicket, S. Biswas, G. Judd and R. Morris, Link-level measurements from an 802.11b mesh network, in: Proceedings of ACM SIGCOMM \u201904 (2004) pp. 121\u2013132.","key":"9855_CR1","DOI":"10.1145\/1015467.1015482"},{"doi-asserted-by":"crossref","unstructured":"L. Anderegg and S. Eidenbenz, Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents, in: Proceedings of the Ninth International Conference on Mobile Computing and Networking (Mobicom) (2003) pp. 245\u2013259.","key":"9855_CR2","DOI":"10.1145\/938985.939011"},{"doi-asserted-by":"crossref","unstructured":"N. Ben Salem, L. Buttyan, J. P. Hubaux and M. Jakobsson, A charging and rewarding scheme for packet forwarding in multi-hop cellular networks, in: Proceedings of the Fourth ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc) (2003) pp. 13\u201324.","key":"9855_CR3","DOI":"10.1145\/778415.778418"},{"doi-asserted-by":"crossref","unstructured":"S. Buchegger and J.-Y. Le Boudec, Nodes bearing grudges: Towards routing security, fairness, and robustness in mobile ad hoc networks, in: Proceedings of the Tenth Euromicro Workshop on Parallel, Distributed and Network-based Processing (2002) pp. 403\u2013410.","key":"9855_CR4","DOI":"10.1109\/EMPDP.2002.994321"},{"doi-asserted-by":"crossref","unstructured":"S. Buchegger and J.-Y. Le Boudec, Performance analysis of the CONFIDANT protocol: Cooperation of nodes\u2014Fairness in dynamic ad-hoc networks, in: Proceedings of the Third ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc) (2002).","key":"9855_CR5","DOI":"10.1145\/513800.513828"},{"doi-asserted-by":"crossref","unstructured":"L. Buttyan and J. P. Hubaux, Enforcing service availability in mobile ad-hoc WANs, in: Proceedings of the First ACM Workshop on Mobile Ad Hoc Networking and Computing (MobiHoc) (2000) pp. 87\u201396.","key":"9855_CR6","DOI":"10.1109\/MOBHOC.2000.869216"},{"unstructured":"L. Buttyan and J. P. Hubaux, Stimulating cooperation in self-organizing mobile ad hoc networks, ACM Journal for Mobile Networks (MONET), special issue on Mobile Ad Hoc Networks, 8 (2003) 579\u2013592.","key":"9855_CR7"},{"unstructured":"M. Cagalj, S. Ganeriwal, I. Aad and J. P. Hubaux, On selfish behavior in CSMA\/CA networks, in: Proceedings of IEEE INFOCOM \u201905 (2005) pp. 2513\u20132524.","key":"9855_CR8"},{"unstructured":"Cisco Systems Inc, Data sheet for cisco aironet (2004).","key":"9855_CR9"},{"key":"9855_CR10","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/BF01726210","volume":"11","author":"E. Clarke","year":"1971","unstructured":"E. Clarke, Multipart pricing of public goods, Public Choice 11 (1971) 17\u201333.","journal-title":"Public Choice"},{"doi-asserted-by":"crossref","unstructured":"D. D. Couto, D. Aguayo, J. Bicket and R. Morris, A high-throughput path metric for multi-hop wireless routing, in: Proceedings of the Ninth International Conference on Mobile Computing and Networking (Mobicom) (2003) pp. 134\u2013146.","key":"9855_CR11","DOI":"10.1145\/938985.939000"},{"doi-asserted-by":"crossref","unstructured":"S. Eidenbenz, V. S. A. Kumar and S. Zust, Equilibria in topology control games for ad hoc networks, in: Proceedings of the Joint Workshop on Foundations of Mobile Computing (2003) pp. 2\u201311.","key":"9855_CR12","DOI":"10.1145\/941079.941081"},{"doi-asserted-by":"crossref","unstructured":"J. Feigenbaum, C. Papadimitriou, R. Sami and S. Shenker, A BGP-based mechanism for lowest-cost routing, in: Proceedings of the 21st Symposium on Principles of Distributed Computing (2002) pp. 173\u2013182.","key":"9855_CR13","DOI":"10.1145\/571825.571856"},{"doi-asserted-by":"crossref","unstructured":"J. Feigenbaum, C. Papadimitriou and S. Shenker, Sharing the cost of multicast transmissions, Journal of Computer and System Sciences (Special issue on Internet Algorithms) 63 (2001) 21\u201341.","key":"9855_CR14","DOI":"10.1006\/jcss.2001.1754"},{"doi-asserted-by":"crossref","unstructured":"J. Feigenbaum and S. Shenker, Distributed algorithmic mechanism design: Recent results and future directions, in: Proceedings of the Sixth International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications (2002) pp. 1\u201313.","key":"9855_CR15","DOI":"10.1145\/570810.570812"},{"unstructured":"J. Feigenbaum and S. Shenker, Incentives and Internet algorithms, Tutorial given at PODC 2003. Available at http:\/\/www.cs.yale.edu\/jf\/PODC03.ppt (July 2003).","key":"9855_CR16"},{"doi-asserted-by":"crossref","unstructured":"M. Felegyhazi, L. Buttyan and J. P. Hubaux, Equilibrium analysis of packet forwarding strategies in wireless ad hoc networks\u2014the static case, in: Proceedings of Personal Wireless Communications (PWC \u201803) (2003).","key":"9855_CR17","DOI":"10.1007\/978-3-540-39867-7_70"},{"unstructured":"D. Ganesan, B. Krishnamachari, A. Woo, D. Culler, D. Estrin and S. Wicker, Complex behavior at scale: An experimental study of low-power wireless sensor networks, Technical Report UCLA\/CSD-TR 02-0013, Computer Science Department, UCLA (July 2002).","key":"9855_CR18"},{"unstructured":"GloMoSim, http:\/\/pcl.cs.ucla.edu\/projects\/glomosim\/","key":"9855_CR19"},{"doi-asserted-by":"crossref","unstructured":"M. Goemans, L.E. Li, V. S. Mirrokni and M. Thottan, Market sharing games applied to content distribution in ad-hoc networks (2004) pp. 55\u201366.","key":"9855_CR20","DOI":"10.1145\/989459.989467"},{"doi-asserted-by":"crossref","unstructured":"O. Goldreich, Foundations of Cryptography: Volume 1, Basic Tools, Cambridge University Press (August 2001).","key":"9855_CR21","DOI":"10.1017\/CBO9780511546891"},{"key":"9855_CR22","doi-asserted-by":"crossref","first-page":"617","DOI":"10.2307\/1914085","volume":"41","author":"T. Groves","year":"1973","unstructured":"T. Groves, Incentives in teams, Econometrica vol. 41 (1973) pp. 617\u2013663.","journal-title":"Econometrica"},{"doi-asserted-by":"crossref","unstructured":"J. Hershberger and S. Suri, Vickrey prices and shortest paths: What is an edge worth?, in: Proceedings of the 42nd Annual Symposium on Foudations of Computer Science (2001) pp. 252\u2013259.","key":"9855_CR23","DOI":"10.1109\/SFCS.2001.959899"},{"doi-asserted-by":"crossref","unstructured":"E. Huang, J. Crowcroft and I. Wassell, Rethinking incentives for mobile ad hoc networks, in: Proceedings of ACM SIGCOMM \u201904 Workshop on Practice and Theory of Incentives and Game Theory in Networked Systems (2004) pp. 191\u2013196.","key":"9855_CR24","DOI":"10.1145\/1016527.1016532"},{"doi-asserted-by":"crossref","unstructured":"K. Jain, J. Padhye, V. N. Padmanabhan and L. Qiu, Impact of interference on multi-hop wireless network performance, in: Proceedings of the Ninth International Conference on Mobile Computing and Networking (Mobicom) (2003) pp. 66\u201380.","key":"9855_CR25","DOI":"10.1145\/938985.938993"},{"unstructured":"M. Jakobsson, Ripping coins for a fair exchange, in: Advances in cryptology, EUROCRYPT \u201995 (1995) pp. 220\u2013230.","key":"9855_CR26"},{"unstructured":"M. Jakobsson, J. P. Hubaux and L. Buttyan, A micropayment scheme encouraging collaboration in multi-hop cellular networks, in: Proceedings of Financial Crypto 2003 (2003) pp. 15\u201333.","key":"9855_CR27"},{"unstructured":"M. Jakobsson, S. Wetzel and B. Yener, Stealth attacks on ad hoc wireless networks, in: Proceedings of IEEE VTC\u201903 (2003) pp. 2103\u20132111.","key":"9855_CR28"},{"doi-asserted-by":"crossref","unstructured":"D.M. Kreps, Game Theory and Economic Modelling, Oxford Press (1991).","key":"9855_CR29","DOI":"10.1093\/0198283814.001.0001"},{"unstructured":"Y.-B. Lin and I. Chlamtac, Wireless and Mobile Network Architectures, John Wiley and Sons (2000).","key":"9855_CR30"},{"doi-asserted-by":"crossref","unstructured":"H. Luo, R. Ramjee, P. Sinha, L. Li and S. Lu, UCAN: a unified cellular and ad-hoc network architecture, in: Proceedings of the Ninth International Conference on Mobile Computing and Networking (Mobicom) (2003) pp. 353\u2013367.","key":"9855_CR31","DOI":"10.1145\/938985.939021"},{"doi-asserted-by":"crossref","unstructured":"R. Mahajan, M. Rodrig, D. Wetherall and J. Zahorjan, Experiences applying game theory to system design, in: Proceedings of ACM SIGCOMM \u201904 Workshop on Practice and Theory of Incentives and Game Theory in Networked Systems (2004) pp. 183\u2013190.","key":"9855_CR32","DOI":"10.1145\/1016527.1016531"},{"doi-asserted-by":"crossref","unstructured":"S. Marti, T. Giuli, K. Lai and M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, in: Proceedings of the Sixth International Conference on Mobile Computing and Networking (Mobicom) (2000) pp. 255\u2013265.","key":"9855_CR33","DOI":"10.1145\/345910.345955"},{"doi-asserted-by":"crossref","unstructured":"P. Michiardi and R. Molva, Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc network, in: Proceedings of Communications and Multimedia Security Conference (CMS) (2002) pp. 107\u2013121.","key":"9855_CR34","DOI":"10.1007\/978-0-387-35612-9_9"},{"key":"9855_CR35","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1006\/game.1999.0790","volume":"35","author":"N. Nisan","year":"2001","unstructured":"N. Nisan and A. Ronen, Algorithmic mechanism design, Games and Economic Behavior 35 (2001) 166\u2013196.","journal-title":"Games and Economic Behavior"},{"unstructured":"M. J. Osborne and A. Rubenstein, A Course in Game Theory, The MIT Press (1994).","key":"9855_CR36"},{"doi-asserted-by":"crossref","unstructured":"C. Papadimitriou, Algorithms, games, and the Internet, in: Proceedings of the 33rd Annual Symposium on Theory of Computing (2001) pp. 749\u2013753.","key":"9855_CR37","DOI":"10.1145\/380752.380883"},{"unstructured":"C. Perkins, Ad Hoc Networking, Addison-Wesley (2000).","key":"9855_CR38"},{"key":"9855_CR39","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1145\/844340.844345","volume":"3","author":"I. Ray","year":"2002","unstructured":"I. Ray and I. Ray, Fair exchange in e-commerce, SIGecom Exchange 3 (2002) 9\u201317.","journal-title":"SIGecom Exchange"},{"doi-asserted-by":"crossref","unstructured":"J. Shneidman and D. C. Parkes, Specification faithfulness in networks with rational nodes, in: Proceedings of 23rd ACM Symposium on Principles of Distributed Computing (PODC) (2004) pp. 88\u201397.","key":"9855_CR40","DOI":"10.1145\/1011767.1011781"},{"doi-asserted-by":"crossref","unstructured":"V. Srinivasan, P. Nuggehalli, C.-F. Chiasserini and R. Rao, Cooperation in wireless ad hoc networks, in: Proceedings of IEEE INFOCOM \u201903 (2003) pp. 808\u2013817.","key":"9855_CR41","DOI":"10.1109\/INFCOM.2003.1208918"},{"unstructured":"D.R. Stinson, Cryptography: Theory and Practice, CRC Press (1995).","key":"9855_CR42"},{"unstructured":"C.-K. Toh, Ad Hoc Mobile Wireless Networks: Protocols and Systems, Prentice Hall PTR, 2001.","key":"9855_CR43"},{"key":"9855_CR44","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1111\/j.1540-6261.1961.tb02789.x","volume":"16","author":"W. Vickrey","year":"1961","unstructured":"W. Vickrey, Counterspeculation, auctions, and competitive sealed tenders, Journal of Finance 16 (1961) 8\u201337.","journal-title":"Journal of Finance"},{"unstructured":"W. Wan, X.-Y. Li and Y. Wang, Truthful multicast routing in selfish wireless networks, in: Proceedings of the Tenth International Conference on Mobile Computing and Networking (Mobicom) (2004) pp. 245\u2013259.","key":"9855_CR45"},{"doi-asserted-by":"crossref","unstructured":"A. Woo and D. Culler, Taming the underlying challenges of reliable multihop routing in sensor networks, in: Proceedings of the First ACM Conference on Embedded Networked Sensor Systems (SenSys) (2003) pp. 14\u201327.","key":"9855_CR46","DOI":"10.1145\/958491.958494"},{"doi-asserted-by":"crossref","unstructured":"J. Zhao and R. Govindan, Understanding packet delivery performance in dense wireless sensor networks, in: Proceedings of the First ACM Conference on Embedded Networked Sensor Systems (SenSys) (2003) pp. 1\u201313.","key":"9855_CR47","DOI":"10.1145\/958491.958493"},{"doi-asserted-by":"crossref","unstructured":"S. Zhong, J. Chen and Y.R. Yang, Sprite, a simple, cheat-proof, credit-based system for mobile ad-hoc networks, pp. 1987\u20131997.","key":"9855_CR48","DOI":"10.1109\/INFCOM.2003.1209220"},{"doi-asserted-by":"crossref","unstructured":"S. Zhong, L.E. Li, Y. Liu and Y. Yang, On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks: an integrated approach using game theoretical and cryptographic techniques, in: Proceedings of The Eleventh International Conference on Mobile Computing and Networking (Mobicom) (2005) pp. 117\u2013131.","key":"9855_CR49","DOI":"10.1145\/1080829.1080841"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-006-9855-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11276-006-9855-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-006-9855-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T17:49:12Z","timestamp":1736617752000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11276-006-9855-1"}},"subtitle":["An integrated approach using game theoretic and cryptographic techniques"],"short-title":[],"issued":{"date-parts":[[2006,10,23]]},"references-count":49,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2007,12]]}},"alternative-id":["9855"],"URL":"https:\/\/doi.org\/10.1007\/s11276-006-9855-1","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"type":"print","value":"1022-0038"},{"type":"electronic","value":"1572-8196"}],"subject":[],"published":{"date-parts":[[2006,10,23]]}}}