{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:52:21Z","timestamp":1750308741524,"version":"3.41.0"},"reference-count":26,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2005,7,1]],"date-time":"2005-07-01T00:00:00Z","timestamp":1120176000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGMOBILE Mob. Comput. Commun. Rev."],"published-print":{"date-parts":[[2005,7]]},"abstract":"<jats:p>Wi-Fi networks have a very strong potential: They are easy to deploy, they use unlicensed frequencies and they provide internet connectivity that is several times faster than by cable modem. However, two major problems still need to be solved: the lack of a seamless roaming scheme and the variable quality of service experienced by the users. The reputation-based solution presented in this paper solves both problems: It allows a mobile node to connect to a foreign Wireless Internet Service Provider (WISP) in a secure way while preserving its anonymity and it encourages the WISPs to provide the users with good QoS. We analyze the robustness of our solution against various attacks and we prove by means of simulations that our reputation model indeed encourages the WISPs to behave correctly. We also propose a simple mechanism that allows the WISPs to predict the QoS they are able to offer to the (mobile) clients.<\/jats:p>","DOI":"10.1145\/1094549.1094559","type":"journal-article","created":{"date-parts":[[2007,1,17]],"date-time":"2007-01-17T18:32:02Z","timestamp":1169058722000},"page":"69-81","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Reputation-based Wi-Fi deployment"],"prefix":"10.1145","volume":"9","author":[{"given":"Naouel Ben","family":"Salem","sequence":"first","affiliation":[{"name":"Laboratory of Computer Communications and Applications (LCA), EPFL, Switzerland"}]},{"given":"Jean-Pierre","family":"Hubaux","sequence":"additional","affiliation":[{"name":"Laboratory of Computer Communications and Applications (LCA), EPFL, Switzerland"}]},{"given":"Markus","family":"Jakobsson","sequence":"additional","affiliation":[{"name":"Indiana University at Bloomington, IN"}]}],"member":"320","published-online":{"date-parts":[[2005,7]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2002.986457"},{"key":"e_1_2_1_2_1","volume-title":"Proceedings of EUROCRYPT","author":"Bellare M.","year":"1995","unstructured":"M. Bellare and P. Rogaway . Extended abstract in Advances in Cryptology . Proceedings of EUROCRYPT , 1995 . M. Bellare and P. Rogaway. Extended abstract in Advances in Cryptology. Proceedings of EUROCRYPT, 1995."},{"key":"e_1_2_1_3_1","volume-title":"Proceedings of WiOpt","author":"Salem N. Ben","year":"2004","unstructured":"N. Ben Salem , J.-P. Hubaux , and M. Jakobsson . Fuelling WiFi deployment: A reputation-based solution . In Proceedings of WiOpt , 2004 . N. Ben Salem, J.-P. Hubaux, and M. Jakobsson. Fuelling WiFi deployment: A reputation-based solution. In Proceedings of WiOpt, 2004."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1024733.1024738"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.840210"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/513800.513828"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1049\/el:20000163"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/647087.715827"},{"key":"e_1_2_1_9_1","volume-title":"Online Reputation Mechanisms - A Roadmap for Future Research. In Ist Interdisciplinary Symposium on Online Reputation Mechanism","author":"Dellacrocas C.","year":"2003","unstructured":"C. Dellacrocas and P. Resnick . Online Reputation Mechanisms - A Roadmap for Future Research. In Ist Interdisciplinary Symposium on Online Reputation Mechanism , 2003 . C. Dellacrocas and P. Resnick. Online Reputation Mechanisms - A Roadmap for Future Research. In Ist Interdisciplinary Symposium on Online Reputation Mechanism, 2003."},{"key":"e_1_2_1_10_1","volume-title":"Ist Interdisciplinary Symposium on Online Reputation Mechanism","author":"Despotovic Z.","year":"2003","unstructured":"Z. Despotovic and K. Aberer . Trust and Reputation in P2P networks . In Ist Interdisciplinary Symposium on Online Reputation Mechanism , 2003 . Z. Despotovic and K. Aberer. Trust and Reputation in P2P networks. In Ist Interdisciplinary Symposium on Online Reputation Mechanism, 2003."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/941326.941329"},{"issue":"4","key":"e_1_2_1_12_1","volume":"31","author":"ElGamal T.","year":"1985","unstructured":"T. ElGamal . A public key cryptosystem and a signature scheme based on discrete logarithms. In IEEE Transactions on Information Theory , 31 ( 4 ), 1985 . T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. In IEEE Transactions on Information Theory, 31(4), 1985.","journal-title":"IEEE Transactions on Information Theory"},{"key":"e_1_2_1_13_1","volume-title":"Reputation in Auctions: Theory, and Evidence from eBay. Working Paper 00-01","author":"Houser D.","year":"2001","unstructured":"D. Houser and J. Wooders . Reputation in Auctions: Theory, and Evidence from eBay. Working Paper 00-01 , University of Arizona , 2001 . D. Houser and J. Wooders. Reputation in Auctions: Theory, and Evidence from eBay. Working Paper 00-01, University of Arizona, 2001."},{"key":"e_1_2_1_14_1","unstructured":"http:\/\/www.boingo.com\/.  http:\/\/www.boingo.com\/."},{"key":"e_1_2_1_15_1","unstructured":"http:\/\/www.isi.edu\/nsnam\/ns\/.  http:\/\/www.isi.edu\/nsnam\/ns\/."},{"key":"e_1_2_1_16_1","unstructured":"http:\/\/www.rsasecurity.com\/products\/securid\/.  http:\/\/www.rsasecurity.com\/products\/securid\/."},{"key":"e_1_2_1_17_1","volume-title":"Enhancements for QoS, 802.11e Draft 4.1","author":"IEEE","year":"2003","unstructured":"IEEE 802.11 WG , Draft Supplement to Standard for Telecommunications and Information Exchange between Systems-LAN\/MAN Specific Requirements- Part 11: Wireless LAN MAC and Physical Layer (PHY) Specifications: Medium Access Control (MAC) , Enhancements for QoS, 802.11e Draft 4.1 , February 2003 . IEEE 802.11 WG, Draft Supplement to Standard for Telecommunications and Information Exchange between Systems-LAN\/MAN Specific Requirements- Part 11: Wireless LAN MAC and Physical Layer (PHY) Specifications: Medium Access Control (MAC), Enhancements for QoS, 802.11e Draft 4.1, February 2003."},{"issue":"4","key":"e_1_2_1_18_1","doi-asserted-by":"crossref","DOI":"10.1007\/s00145-001-0009-4","volume":"14","author":"Lenstra A. K.","year":"2001","unstructured":"A. K. Lenstra and E. R. Verheul . Selecting Cryptographic Key Sizes. Journal of Cryptology: the journal of the International Association for Cryptologic Research , 14 ( 4 ), 2001 . A. K. Lenstra and E. R. Verheul. Selecting Cryptographic Key Sizes. Journal of Cryptology: the journal of the International Association for Cryptologic Research, 14(4), 2001.","journal-title":"Journal of Cryptology: the journal of the International Association for Cryptologic Research"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/647802.737297"},{"key":"e_1_2_1_20_1","volume-title":"The 3rd Usenix Internet Technical Symposium","author":"Miu A.","year":"2001","unstructured":"A. Miu and P. Bahl . Dynamic Host Configuration for Managing Mobility between Public and Private Networks . In The 3rd Usenix Internet Technical Symposium , 2001 . A. Miu and P. Bahl. Dynamic Host Configuration for Managing Mobility between Public and Private Networks. In The 3rd Usenix Internet Technical Symposium, 2001."},{"key":"e_1_2_1_21_1","unstructured":"Boingo Wi-Fi Industry White Paper. Towards Ubiquitous Wireless Broad-band. http:\/\/www.boingo.com\/wi-fi-industry-basics.pdf 2003.  Boingo Wi-Fi Industry White Paper. Towards Ubiquitous Wireless Broad-band. http:\/\/www.boingo.com\/wi-fi-industry-basics.pdf 2003."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/262116.262150"},{"key":"e_1_2_1_23_1","volume-title":"NBER workshop on empirical studies of electronic commerce","author":"Resnick P.","year":"2001","unstructured":"P. Resnick and R. Zeckhauser . Trust Among Strangers in Internet Transactions: Empirical Analysis of eBay's Reputation System . In NBER workshop on empirical studies of electronic commerce , 2001 . P. Resnick and R. Zeckhauser. Trust Among Strangers in Internet Transactions: Empirical Analysis of eBay's Reputation System. In NBER workshop on empirical studies of electronic commerce, 2001."},{"key":"e_1_2_1_24_1","volume-title":"ESA Conference","author":"Resnick P.","year":"2002","unstructured":"P. Resnick , R. Zeckhauser , J. Swanson , and K. Lockwood . The Value of Reputation on eBay: A Controlled Experiment . In ESA Conference , 2002 . P. Resnick, R. Zeckhauser, J. Swanson, and K. Lockwood. The Value of Reputation on eBay: A Controlled Experiment. In ESA Conference, 2002."},{"key":"e_1_2_1_25_1","volume-title":"MIT Laboratory for Computer Science","author":"Rivest R.","year":"1996","unstructured":"R. Rivest and A. Shamir . PayWord and MicroMint: Two simple micro-payment schemes. Technical report , MIT Laboratory for Computer Science , 1996 . R. Rivest and A. Shamir. PayWord and MicroMint: Two simple micro-payment schemes. Technical report, MIT Laboratory for Computer Science, 1996."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/581291.581297"}],"container-title":["ACM SIGMOBILE Mobile Computing and Communications Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1094549.1094559","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1094549.1094559","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:22:13Z","timestamp":1750278133000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1094549.1094559"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,7]]},"references-count":26,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2005,7]]}},"alternative-id":["10.1145\/1094549.1094559"],"URL":"https:\/\/doi.org\/10.1145\/1094549.1094559","relation":{},"ISSN":["1559-1662","1931-1222"],"issn-type":[{"type":"print","value":"1559-1662"},{"type":"electronic","value":"1931-1222"}],"subject":[],"published":{"date-parts":[[2005,7]]},"assertion":[{"value":"2005-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}