Skip to main content

An Incentive-Based Secure Charging Scheme for Integrating Networks

  • Conference paper
Computer Supported Cooperative Work in Design IV (CSCWD 2007)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 5236))

  • 1430 Accesses

Abstract

The issue of secure charging must be solved before integrating networks are employed in commercial applications. In order to solve this problem, a secure incentive-based charging scheme for integrating networks is proposed. The scheme adopts charging receipt to thwart non-reputation attacks. Meanwhile, Message Authentication Code (MAC) and stream cipher mechanism are introduced to offer security guarantee. Security analysis shows that the proposed scheme not only grants the existence of selfish nodes to meet their rational demand, but also prevent various active attacks (e.g., denial of services (DoS), replay attacks, tampering attacks and impersonation attacks). Finally, simulation analysis indicates the influence of proposed scheme on routing stability and node incentive in low overhead.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Bharat, B., Wu, X.X., Lu, Y.: Integrating Heterogeneous Wireless Technologies: A Cellular Aided Mobile MANET Network (CAMA). Mobile Networks and Applications 9, 393–408 (2004)

    Article  Google Scholar 

  2. Luo, H.Y., Zerfos, P., Kong, J.J.: Self-securing MANET Wireless Networks. In: Proc. of the Seventh International Symposium On Computers and Communications, Italy, pp. 567–574 (2002)

    Google Scholar 

  3. Stach, J.F., Park, E.K.: Analysis of a Non Repudiation Authentication Protocol for Personal Communication Systems. In: Proc. of the International Conference on Computer Communications and Networks Lafayette, Louisiana, pp. 289–293 (1998)

    Google Scholar 

  4. Syverson, P.: A Taxonomy of Replay Attacks. In: Proc. of the Computer Security Foundations Workshop, Franconia New Hampshire, USA, pp. 187–191 (1994)

    Google Scholar 

  5. Barbeau, M., Hall, J., Kranakis, E.: Detecting Impersonation Attacks in Future Wireless and Mobile Networks. In: Proc. of MADNES Workshop, pp. 85–90 (2005)

    Google Scholar 

  6. Zhong, S., Chen, J., Yan, Y.R.: Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks. In: Proc. of the 22nd Annual Joint Conf. of the IEEE Computer and Communications Societies, San Francisco, pp. 1987–1997 (2003)

    Google Scholar 

  7. Zhang, Y.C., Lou, W.J., Fang, Y.G.: SIP: A Secure Incentive Protocol against Selfishness in Mobile MANET Networks. In: Proc. of IEEE Wireless Communications and Networking Conference, pp. 1679–1684 (2004)

    Google Scholar 

  8. Jakobsson, M., Hubaux, J.P., Buttyan, L.: A Micro-Payment Scheme Encouraging Collaboration in Multi-Hop Cellular Networks. In: Proc. of Conference of Financial Cryptography (2003)

    Google Scholar 

  9. Buttyan, L., Hubaux, J.P.: Stimulating Cooperation in Self-Organizing Mobile MANET Networks. ACM/Kluwer Mobile Networks and Applications (MONET) Special Issue on Mobile MANET Networks 8, 579–592 (2003)

    Article  Google Scholar 

  10. Salem, N.B., Buttyan, L., Hubaux, J.P.: Node Cooperation in Hybrid Ad Hoc Networks. IEEE Transactions on Mobile Computing 5, 365–376 (2006)

    Article  Google Scholar 

  11. Buttyan, L., Hubaux, J.P.: Nuglets: a virtual currency to stimulate cooperation in self-organized MANET networks. Technical Report DSC/2001/001, Swiss Federal Institute of Technology, Lausanne (2001)

    Google Scholar 

  12. Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)

    MATH  Google Scholar 

  13. Yoon, J., Liu, M., Noble, B.: Random waypoint considered harmful. In: Proc. of the 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Francisco, pp. 1312–1321 (2003)

    Google Scholar 

  14. Broch, J., Maltz, D.A., Johnson, D.B.: A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. In: Proc. of the 4th Annual International Conference on Mobile Computing and Networking, pp. 85–97 (1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, K., Wu, M., Xia, P., Shen, S. (2008). An Incentive-Based Secure Charging Scheme for Integrating Networks. In: Shen, W., Yong, J., Yang, Y., Barthès, JP.A., Luo, J. (eds) Computer Supported Cooperative Work in Design IV. CSCWD 2007. Lecture Notes in Computer Science, vol 5236. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-92719-8_39

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-92719-8_39

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-92718-1

  • Online ISBN: 978-3-540-92719-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics