Abstract
The issue of secure charging must be solved before integrating networks are employed in commercial applications. In order to solve this problem, a secure incentive-based charging scheme for integrating networks is proposed. The scheme adopts charging receipt to thwart non-reputation attacks. Meanwhile, Message Authentication Code (MAC) and stream cipher mechanism are introduced to offer security guarantee. Security analysis shows that the proposed scheme not only grants the existence of selfish nodes to meet their rational demand, but also prevent various active attacks (e.g., denial of services (DoS), replay attacks, tampering attacks and impersonation attacks). Finally, simulation analysis indicates the influence of proposed scheme on routing stability and node incentive in low overhead.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Bharat, B., Wu, X.X., Lu, Y.: Integrating Heterogeneous Wireless Technologies: A Cellular Aided Mobile MANET Network (CAMA). Mobile Networks and Applications 9, 393–408 (2004)
Luo, H.Y., Zerfos, P., Kong, J.J.: Self-securing MANET Wireless Networks. In: Proc. of the Seventh International Symposium On Computers and Communications, Italy, pp. 567–574 (2002)
Stach, J.F., Park, E.K.: Analysis of a Non Repudiation Authentication Protocol for Personal Communication Systems. In: Proc. of the International Conference on Computer Communications and Networks Lafayette, Louisiana, pp. 289–293 (1998)
Syverson, P.: A Taxonomy of Replay Attacks. In: Proc. of the Computer Security Foundations Workshop, Franconia New Hampshire, USA, pp. 187–191 (1994)
Barbeau, M., Hall, J., Kranakis, E.: Detecting Impersonation Attacks in Future Wireless and Mobile Networks. In: Proc. of MADNES Workshop, pp. 85–90 (2005)
Zhong, S., Chen, J., Yan, Y.R.: Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks. In: Proc. of the 22nd Annual Joint Conf. of the IEEE Computer and Communications Societies, San Francisco, pp. 1987–1997 (2003)
Zhang, Y.C., Lou, W.J., Fang, Y.G.: SIP: A Secure Incentive Protocol against Selfishness in Mobile MANET Networks. In: Proc. of IEEE Wireless Communications and Networking Conference, pp. 1679–1684 (2004)
Jakobsson, M., Hubaux, J.P., Buttyan, L.: A Micro-Payment Scheme Encouraging Collaboration in Multi-Hop Cellular Networks. In: Proc. of Conference of Financial Cryptography (2003)
Buttyan, L., Hubaux, J.P.: Stimulating Cooperation in Self-Organizing Mobile MANET Networks. ACM/Kluwer Mobile Networks and Applications (MONET) Special Issue on Mobile MANET Networks 8, 579–592 (2003)
Salem, N.B., Buttyan, L., Hubaux, J.P.: Node Cooperation in Hybrid Ad Hoc Networks. IEEE Transactions on Mobile Computing 5, 365–376 (2006)
Buttyan, L., Hubaux, J.P.: Nuglets: a virtual currency to stimulate cooperation in self-organized MANET networks. Technical Report DSC/2001/001, Swiss Federal Institute of Technology, Lausanne (2001)
Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)
Yoon, J., Liu, M., Noble, B.: Random waypoint considered harmful. In: Proc. of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Francisco, pp. 1312–1321 (2003)
Broch, J., Maltz, D.A., Johnson, D.B.: A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. In: Proc. of the 4th Annual International Conference on Mobile Computing and Networking, pp. 85–97 (1998)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wang, K., Wu, M., Xia, P., Shen, S. (2008). An Incentive-Based Secure Charging Scheme for Integrating Networks. In: Shen, W., Yong, J., Yang, Y., Barthès, JP.A., Luo, J. (eds) Computer Supported Cooperative Work in Design IV. CSCWD 2007. Lecture Notes in Computer Science, vol 5236. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-92719-8_39
Download citation
DOI: https://doi.org/10.1007/978-3-540-92719-8_39
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-92718-1
Online ISBN: 978-3-540-92719-8
eBook Packages: Computer ScienceComputer Science (R0)