Skip to main content

Linking Ad Hoc Charging Schemes to AAAC Architectures

  • Conference paper
Security in Ad-hoc and Sensor Networks (ESAS 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 3313))

Included in the following conference series:

Abstract

The current state of today’s networks allows us to take one step further in merging the research community’s work with every day’s life. Wireless ad hoc networks are already well developed for specific scenarios. This work shows how to build the link between the wired network and a wireless ad hoc infrastructure, in particular routing and AAAC aspects. Such integration might lead, for example, to a better spacial and resource distributed hotspot solution.

We provide the basis for inter-operation of AAAC protocols known for the fixed network, with the accounting protocol that performs the accounting and charging functions in the ad hoc network.

This paper further describes the implementation of the Secured Charging Protocol as an instantiation of a charging protocol for ad hoc networks and the features which were added to improve the interface to an external accounting system. It covers the interaction with the MANET routing protocol and how to deal with routes to or from outside the ad hoc cloud.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Buchegger, S., Boudec, J.Y.L.: Performance analysis of the CONFIDANT protocol (cooperation of nodes: Fairness in dynamic ad-hoc NeTworks), pp. 226–236

    Google Scholar 

  2. Marti, S., Giuli, T., Lai, K., Baker, M.: Mitigating routing misbehaviour in mobile ad hoc networks. In: 6th International Conference on Mobile Computing and Networking, ACM MobiCom 2000 Conference, pp. 255–265 (2000)

    Google Scholar 

  3. Buttyan, L., Hubaux, J.P.: Nuglets: a virtual currency to stimulate cooperation in self-organized mobile ad hoc networks. Technical Report DSC/2001/001, Swiss Federal Institute of Technology, Lausanne (2001)

    Google Scholar 

  4. Zhong, S., Yang, Y., Chen, J.: Sprite: A simple, cheat-proof, credit-based system for mobile ad hoc networks (2002)

    Google Scholar 

  5. Lamparter, B., Paul, K., Westhoff, D.: Charging support for ad hoc stub networks. Elsevier Journal of Computer Communications, Special Issue on Internet Pricing and Charging: Algorithms, Technology and Applications (2003)

    Google Scholar 

  6. de Laat, C., Gross, G., Gommans, L., Vollbrecht, J., Spence, D.: Technical report

    Google Scholar 

  7. Johnson, D.B., Maltz, D.A.: Dynamic source routing in ad hoc wireless networks. In: Imielinski, Korth (eds.) Mobile Computing. The Kluwer International Series in Engineering and Computer Science, vol. 353. Kluwer Academic Publishers, Dordrecht (1996), http://athos.rutgers.edu/imielins/book.html

    Google Scholar 

  8. Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems (reprint). Communications of the ACM 26, 96–99 (1983)

    Article  Google Scholar 

  9. Koblitz, N.: Elliptic curve cryptosystems. Mathematics of Computation 48, 203–209 (1987)

    Article  MATH  MathSciNet  Google Scholar 

  10. Riedel, I.: Security in ad hoc networks: Protocols and elliptice curve cryptography on an embedded platform. Diploma thesis at NEC, University of Bochum (2003)

    Google Scholar 

  11. Lamparter, B., Paar, C., Weimerskirch, A., Westhoff, D.: On digital signatures in ad hoc networks. IEEE Journal on Selected Areas in Communications ‘Wireless Ad Hoc Networks’ (submitted, 2004)

    Google Scholar 

  12. de Laat, C., Gross, G., Gommans, L., Vollbrecht, J., Spence, D.: Generic AAA architecture. Internet Request for Comment RFC 2903, Internet Engineering Task Force (2000)

    Google Scholar 

  13. Hickman, K.E.B.: The SSL protocol. RFC draft, Netscape Communications Corp., Version 1.0 (1994)

    Google Scholar 

  14. Perkins, C., Belding-Royer, E., Das, S.: Ad hoc on-demand distance vector (AODV) routing for ip version 6, Internet-Draft draft-perkins-aodv6-01.txt (2001) (work in progress)

    Google Scholar 

  15. Jelger, C., Noel, T., Frey, A.: draft-jelger-manet-gateway-autoconf-v6-01.txt. Internet-Draft draft-jelger-manet-gateway-autoconf-v6-01.txt (2003) (work in progress)

    Google Scholar 

  16. Cha, H.W., Park, J.S., Kim, H.J.: Support of internet connectivity for aodv. Internet-Draft draft-cha-manet-AODV-internet-00.txt (2004) (work in progress)

    Google Scholar 

  17. Calhoun, P., Loughney, J., Guttman, E., Zorn, G., Arkko, J.: Diameter base protocol. Internet Request for Comment RFC 2903, Internet Engineering Task Force (2003)

    Google Scholar 

  18. Mgen - the multi-generator toolset (2004), http://manimac.itd.nrl.navy.mil/MGEN/

  19. The public netperf homepage (2004), http://www.netperf.org/netperf/NetperfPage.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Girao, J., Lamparter, B., Westhoff, D., Aguiar, R.L., Barraca, J.P. (2005). Linking Ad Hoc Charging Schemes to AAAC Architectures. In: Castelluccia, C., Hartenstein, H., Paar, C., Westhoff, D. (eds) Security in Ad-hoc and Sensor Networks. ESAS 2004. Lecture Notes in Computer Science, vol 3313. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30496-8_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30496-8_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-24396-0

  • Online ISBN: 978-3-540-30496-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics