{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:08:37Z","timestamp":1761401317275,"version":"3.32.0"},"reference-count":30,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[2007,2,1]],"date-time":"2007-02-01T00:00:00Z","timestamp":1170288000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2007,2]]},"DOI":"10.1016\/j.comnet.2006.05.012","type":"journal-article","created":{"date-parts":[[2006,7,22]],"date-time":"2006-07-22T11:17:05Z","timestamp":1153567025000},"page":"853-865","source":"Crossref","is-referenced-by-count":19,"title":["Identity-based secure collaboration in wireless ad hoc networks"],"prefix":"10.1016","volume":"51","author":[{"given":"Jianping","family":"Pan","sequence":"first","affiliation":[]},{"given":"Lin","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Xuemin (Sherman)","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Jon W.","family":"Mark","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"year":"2001","series-title":"Ad hoc Networking","key":"10.1016\/j.comnet.2006.05.012_bib1"},{"key":"10.1016\/j.comnet.2006.05.012_bib2","series-title":"Encyclopedia of Telecommunications","article-title":"Wireless Ad hoc Networks","author":"Haas","year":"2002"},{"issue":"5","key":"10.1016\/j.comnet.2006.05.012_bib3","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MCOM.2002.1006968","article-title":"A brief overview of ad hoc networks: challenges and directions","volume":"40","author":"Ramanathan","year":"2002","journal-title":"IEEE Commun. Mag."},{"issue":"8","key":"10.1016\/j.comnet.2006.05.012_bib4","doi-asserted-by":"crossref","first-page":"1329","DOI":"10.1109\/JSAC.1999.779916","volume":"17","year":"1999","journal-title":"IEEE J. Selected Areas Commun."},{"key":"10.1016\/j.comnet.2006.05.012_bib5","doi-asserted-by":"crossref","unstructured":"S. Micali, T. Giuli, K. Lai, M. Baker, Mitigating routing misbehavior in mobile ad hoc networks, in: Proceedings of the 6th ACM MobiCom, 2000, pp. 255\u2013265.","DOI":"10.1145\/345910.345955"},{"key":"10.1016\/j.comnet.2006.05.012_bib6","doi-asserted-by":"crossref","unstructured":"Y. Zhang, W. Lee, Intrusion detection in wireless ad-hoc networks, in: Proceedings of the 6th ACM MobiCom, 2000, pp. 275\u2013283.","DOI":"10.1145\/345910.345958"},{"key":"10.1016\/j.comnet.2006.05.012_bib7","unstructured":"L. Buttyan, J.-P. Hubaux, Enforcing service availability in mobile ad-hoc WANs, in: Proceedings of the 1st ACM MobiHoc, 2000, pp. 87\u201396."},{"key":"10.1016\/j.comnet.2006.05.012_bib8","doi-asserted-by":"crossref","unstructured":"S. Buchegger, J. Le Boudec, Performance analysis of the confidant protocol: cooperation of nodes \u2013 fairness in distributed ad hoc networks, in: Proceedings of the 3rd MobiHoc, 2002, pp. 226\u2013236.","DOI":"10.1145\/513800.513828"},{"key":"10.1016\/j.comnet.2006.05.012_bib9","doi-asserted-by":"crossref","unstructured":"P. Michiardi, R. Movla, Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks, in: Proceedings of the 6th IFIP Conference on Communications and Multimedia Security, 2002, pp. 107\u2013121.","DOI":"10.1007\/978-0-387-35612-9_9"},{"key":"10.1016\/j.comnet.2006.05.012_bib10","doi-asserted-by":"crossref","unstructured":"M. Jakobsson, J.-P. Hubaux, L. Buttyan, A micropayment scheme encouraging collaboration in multi-hop cellular networks, in: Proceedings of the 7th Financial Cryptography (FC\u201903), 2003.","DOI":"10.1007\/978-3-540-45126-6_2"},{"key":"10.1016\/j.comnet.2006.05.012_bib11","doi-asserted-by":"crossref","unstructured":"S. Zhong, J. Chen, Y. Yang. Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks, in: Proceedings of the 22nd IEEE Infocom, 2003, pp. 1987\u20131997.","DOI":"10.1109\/INFCOM.2003.1209220"},{"key":"10.1016\/j.comnet.2006.05.012_bib12","doi-asserted-by":"crossref","unstructured":"N. Salem, L. Buttyan, J.-P. Hubaux, M. Jakobsson, A charging and rewarding scheme for packet forwarding in multi-hop cellular networks, in: Proceedings of the 4th MobiHoc, 2003, pp. 13\u201324.","DOI":"10.1145\/778416.778418"},{"issue":"1","key":"10.1016\/j.comnet.2006.05.012_bib13","first-page":"10","article-title":"Identity-based encryption: a survey","volume":"6","author":"Gagnee","year":"2003","journal-title":"RSA Labs Cryptobytes"},{"key":"10.1016\/j.comnet.2006.05.012_bib14","doi-asserted-by":"crossref","unstructured":"L. Buttyan, J.-P. Hubaux (Eds.), Report on a working session on security in wireless ad hoc networks, Mobile Comput. Commun. Rev. 7(1) (2003) 74\u201394.","DOI":"10.1145\/881978.882002"},{"key":"10.1016\/j.comnet.2006.05.012_bib15","doi-asserted-by":"crossref","unstructured":"A. Shamir, Identity-based cryptosystems and signature schemes, in: Proceedings of the 4th IACR Conference on Cryptology (Crypto\u201984), 1984, pp. 47\u201353.","DOI":"10.1007\/3-540-39568-7_5"},{"key":"10.1016\/j.comnet.2006.05.012_bib16","doi-asserted-by":"crossref","unstructured":"D. Boneh, M. Franklin, Identity-based encryption from the Weil pairing, in: Proceedings of the 21st IACR Crypto, 2001, pp. 213\u2013229.","DOI":"10.1007\/3-540-44647-8_13"},{"key":"10.1016\/j.comnet.2006.05.012_bib17","doi-asserted-by":"crossref","unstructured":"D. Boneh, X. Boyen, Secure identity based encryption without random oracles, in: Proceedings of 24th IACR Cryptology (Crypto\u201904), 2004.","DOI":"10.1007\/978-3-540-28628-8_27"},{"key":"10.1016\/j.comnet.2006.05.012_bib18","doi-asserted-by":"crossref","unstructured":"S. Capkun, J.-P. Hubaux, L. Buttyan, Mobility helps security in ad hoc networks, in: Proceedings of 4th ACM Mobile Ad Hoc Networking and Computing (MobiHoc\u201903), 2003, pp. 46\u201356.","DOI":"10.1145\/778421.778422"},{"issue":"6","key":"10.1016\/j.comnet.2006.05.012_bib19","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/65.806983","article-title":"Securing ad hoc networks","volume":"13","author":"Zhou","year":"1999","journal-title":"IEEE Network"},{"key":"10.1016\/j.comnet.2006.05.012_bib20","doi-asserted-by":"crossref","unstructured":"C. Gentry, A. Silverberg, Hierarchical ID-based cryptography, in: Proceedings of the 3rd AsiaCrypt, 2002, pp. 548\u2013566.","DOI":"10.1007\/3-540-36178-2_34"},{"key":"10.1016\/j.comnet.2006.05.012_bib21","doi-asserted-by":"crossref","unstructured":"J.-P. Hubaux, L. Buttyan, S. Capkun, The quest for security in mobile ad hoc networks, in: Proceedings of the 2nd ACM MobiHoc, 2001, pp. 146\u2013155.","DOI":"10.1145\/501416.501437"},{"key":"10.1016\/j.comnet.2006.05.012_bib22","unstructured":"G. Montenegro, C. Castelluccia, Statistically unique and cryptographically verifiable (SUCV) identifiers and addresses, in: Proceedings of the 9th ISOC Conference on Network & Distributed Systems Security (NDSS\u201902), 2002."},{"key":"10.1016\/j.comnet.2006.05.012_bib23","doi-asserted-by":"crossref","unstructured":"Y.-C. Hu, A. Perrig, D. Johnson, Ariadne: a secure on-demand routing protocol for ad hoc networks, in: Proceedings of the 8th ACM MobiCom, 2002, pp. 12\u201323.","DOI":"10.1145\/570645.570648"},{"key":"10.1016\/j.comnet.2006.05.012_bib24","doi-asserted-by":"crossref","unstructured":"P. Papadimitratos, Z. Haas, Secure routing for mobile ad hoc networks, in: Proceedings of the SCS Conference on Communication Networks & Distributed Systems (CNDS\u201902), 2002.","DOI":"10.1201\/9781420040401.ch31"},{"key":"10.1016\/j.comnet.2006.05.012_bib25","unstructured":"Y.-C. Hu, D. Johnson, A. Perrig, SEAD: secure efficient distance vector routing in mobile wireless ad hoc networks, in: Proceedings of the 4th IEEE WMCSA, 2002, pp. 3\u201313."},{"key":"10.1016\/j.comnet.2006.05.012_bib26","unstructured":"K. Sanzgiri, B. Dahill, B. Levine, C. Shields, E. Belding-Royer, A secure routing protocol for ad hoc networks, in: Proceedings of the 10th IEEE ICNP, 2002, pp. 78\u201387."},{"key":"10.1016\/j.comnet.2006.05.012_bib27","doi-asserted-by":"crossref","unstructured":"R. Rivest, Electronic lottery tickets as micropayments, in: Proceedings of 1st IFCA FC\u201997, 1997.","DOI":"10.1007\/3-540-63594-7_87"},{"key":"10.1016\/j.comnet.2006.05.012_bib28","doi-asserted-by":"crossref","unstructured":"R. Rivest, A. Shamir, PayWord and MicroMint: two simple micropayment schemes, in: Proceedings of the International Workshop on Security Protocols, 1997, pp. 69\u201387.","DOI":"10.1007\/3-540-62494-5_6"},{"key":"10.1016\/j.comnet.2006.05.012_bib29","doi-asserted-by":"crossref","unstructured":"A. Khalili, J. Katz, W. Arbaugh, Toward secure key distribution in truly ad-hoc networks, in: Proceedings of the IEEE Security and Assurance in Ad-Hoc Networks at International Symposium on Applications and the Internet (SAINT\u201903), 2003, pp. 342\u2013346.","DOI":"10.1109\/SAINTW.2003.1210183"},{"key":"10.1016\/j.comnet.2006.05.012_bib30","doi-asserted-by":"crossref","unstructured":"T. Stading, Secure communication in a distributed system using identity based encryption, in: Proceedings of the 3rd IEEE\/ACM Cluster Computing and Grid (CCGRID\u201903), 2003, pp. 414\u2013420.","DOI":"10.1109\/CCGRID.2003.1199395"}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128606001496?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128606001496?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T01:25:14Z","timestamp":1736472314000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128606001496"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,2]]},"references-count":30,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2007,2]]}},"alternative-id":["S1389128606001496"],"URL":"https:\/\/doi.org\/10.1016\/j.comnet.2006.05.012","relation":{},"ISSN":["1389-1286"],"issn-type":[{"type":"print","value":"1389-1286"}],"subject":[],"published":{"date-parts":[[2007,2]]}}}