Abstract
The current state of today’s networks allows us to take one step further in merging the research community’s work with every day’s life. Wireless ad hoc networks are already well developed for specific scenarios. This work shows how to build the link between the wired network and a wireless ad hoc infrastructure, in particular routing and AAAC aspects. Such integration might lead, for example, to a better spacial and resource distributed hotspot solution.
We provide the basis for inter-operation of AAAC protocols known for the fixed network, with the accounting protocol that performs the accounting and charging functions in the ad hoc network.
This paper further describes the implementation of the Secured Charging Protocol as an instantiation of a charging protocol for ad hoc networks and the features which were added to improve the interface to an external accounting system. It covers the interaction with the MANET routing protocol and how to deal with routes to or from outside the ad hoc cloud.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Buchegger, S., Boudec, J.Y.L.: Performance analysis of the CONFIDANT protocol (cooperation of nodes: Fairness in dynamic ad-hoc NeTworks), pp. 226–236
Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing misbehaviour in mobile ad hoc networks. In: 6th International Conference on Mobile Computing and Networking, ACM MobiCom 2000 Conference, pp. 255–265 (2000)
Buttyan, L., Hubaux, J.P.: Nuglets: a virtual currency to stimulate cooperation in self-organized mobile ad hoc networks. Technical Report DSC/2001/001, Swiss Federal Institute of Technology, Lausanne (2001)
Zhong, S., Yang, Y., Chen, J.: Sprite: A simple, cheat-proof, credit-based system for mobile ad hoc networks (2002)
Lamparter, B., Paul, K., Westhoff, D.: Charging support for ad hoc stub networks. Elsevier Journal of Computer Communications, Special Issue on Internet Pricing and Charging: Algorithms, Technology and Applications (2003)
de Laat, C., Gross, G., Gommans, L., Vollbrecht, J., Spence, D.: Technical report
Johnson, D.B., Maltz, D.A.: Dynamic source routing in ad hoc wireless networks. In: Imielinski, Korth (eds.) Mobile Computing. The Kluwer International Series in Engineering and Computer Science, vol. 353. Kluwer Academic Publishers, Dordrecht (1996), http://athos.rutgers.edu/imielins/book.html
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems (reprint). Communications of the ACM 26, 96–99 (1983)
Koblitz, N.: Elliptic curve cryptosystems. Mathematics of Computation 48, 203–209 (1987)
Riedel, I.: Security in ad hoc networks: Protocols and elliptice curve cryptography on an embedded platform. Diploma thesis at NEC, University of Bochum (2003)
Lamparter, B., Paar, C., Weimerskirch, A., Westhoff, D.: On digital signatures in ad hoc networks. IEEE Journal on Selected Areas in Communications ‘Wireless Ad Hoc Networks’ (submitted, 2004)
de Laat, C., Gross, G., Gommans, L., Vollbrecht, J., Spence, D.: Generic AAA architecture. Internet Request for Comment RFC 2903, Internet Engineering Task Force (2000)
Hickman, K.E.B.: The SSL protocol. RFC draft, Netscape Communications Corp., Version 1.0 (1994)
Perkins, C., Belding-Royer, E., Das, S.: Ad hoc on-demand distance vector (AODV) routing for ip version 6, Internet-Draft draft-perkins-aodv6-01.txt (2001) (work in progress)
Jelger, C., Noel, T., Frey, A.: draft-jelger-manet-gateway-autoconf-v6-01.txt. Internet-Draft draft-jelger-manet-gateway-autoconf-v6-01.txt (2003) (work in progress)
Cha, H.W., Park, J.S., Kim, H.J.: Support of internet connectivity for aodv. Internet-Draft draft-cha-manet-AODV-internet-00.txt (2004) (work in progress)
Calhoun, P., Loughney, J., Guttman, E., Zorn, G., Arkko, J.: Diameter base protocol. Internet Request for Comment RFC 2903, Internet Engineering Task Force (2003)
Mgen - the multi-generator toolset (2004), http://manimac.itd.nrl.navy.mil/MGEN/
The public netperf homepage (2004), http://www.netperf.org/netperf/NetperfPage.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Girao, J., Lamparter, B., Westhoff, D., Aguiar, R.L., Barraca, J.P. (2005). Linking Ad Hoc Charging Schemes to AAAC Architectures. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds) Security in Ad-hoc and Sensor Networks. ESAS 2004. Lecture Notes in Computer Science, vol 3313. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30496-8_7
Download citation
DOI: https://doi.org/10.1007/978-3-540-30496-8_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-24396-0
Online ISBN: 978-3-540-30496-8
eBook Packages: Computer ScienceComputer Science (R0)