This Article 
 Bibliographic References 
 Add to: 
Node Cooperation in Hybrid Ad Hoc Networks
April 2006 (vol. 5 no. 4)
pp. 365-376
A hybrid ad hoc network is a structure-based network that is extended using multihop communications. Indeed, in this kind of network, the existence of a communication link between the mobile station and the base station is not required: A mobile station that has no direct connection with a base station can use other mobile stations as relays. Compared with conventional (single-hop) structure-based networks, this new generation can lead to a better use of the available spectrum and to a reduction of infrastructure costs. However, these benefits would vanish if the mobile nodes did not properly cooperate and forward packets for other nodes. In this paper, we propose a charging and rewarding scheme to encourage the most fundamental operation, namely packet forwarding. We use "MAC layering” to reduce the space overhead in the packets and a stream cipher encryption mechanism to provide "implicit authentication” of the nodes involved in the communication. We analyze the robustness of our protocols against rational and malicious attacks. We show that—using our solution—collaboration is rational for selfish nodes. We also show that our protocols thwart rational attacks and detect malicious attacks.

[1] G.N. Aggélou and R. Tafazolli, “On the Relaying Capacity of Next-Generation GSM Cellular Networks,” IEEE Personal Comm., Feb. 2001.
[2] F. Bai, N. Sadagopan, and A. Helmy, “IMPORTANT: A Framework to Systematically Analyze the Impact of Mobility on Performance of RouTing protocols for Adhoc NeTworks,” Proc. INFOCOM Conf., 2003.
[3] Y. Bejerano, “Efficient Integration of Multi-Hop Wireless and Wired Networks with QoS Constraints,” Proc. Mobicom Conf., 2002.
[4] N. Ben Salem, L. Buttyán, J.-P. Hubaux, and M. Jakobsson, “A Charging and Rewarding Scheme for Packet Forwarding in Multihop Cellular Networks,” Proc. MobiHOC Conf., 2003.
[5] S. Buchegger and J.-Y. Le Boudec, “Performance Analysis of the CONFIDANT Protocol: Cooperation of Nodes— Fairness in Distributed Ad Hoc NeTworks,” Proc. MobiHOC Conf., 2002.
[6] L. Buttyán and J.-P. Hubaux, “Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks,” ACM/Kluwer Mobile Networks and Applications (MONET), vol. 8, no. 5, 2003.
[7] T. Camp, J. Boleng, and V. Davies, “A Survey of Mobility Models for Ad Hoc Network Research,” Wireless Comm. and Mobile Computing, vol. 2, no. 5, 2002.
[8] D. Coppersmith and M. Jakobsson, “Almost Optimal Hash Sequence Traversal,” Proc. Conf. Financial Cryptography, 2002.
[9] M. Félegyházi, J.-P. Hubaux, and L. Buttyán, “Nash Equilibria of Packet Forwarding Strategies in Wireless Ad Hoc Networks,” to appear.
[10] B. Goode, “Voice Over Internet Protocol (VoIP),” Proc. IEEE, vol. 90, Sept. 2002.
[11] H. Holma and A. Toskala, WCDMA for UMTS: Radio Access for Third Generation Mobile Communications. Wiley, 2002.
[12] , 2004.
[13] Y.-C. Hu, A. Perrig, and D.B. Johnson, “Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks,” Proc. Mobicom Conf., 2002.
[14] J.-P. Hubaux, T. Gross, J.-Y. Le Boudec, and M. Vetterli, “Towards Self-Organizing Mobile Ad-Hoc Networks: the Terminodes Project,” IEEE Comm. Magazine, vol. 39, no. 1, pp. 118-124, Jan. 2001.
[15] M. Jakobsson, J.-P. Hubaux, and L. Buttyán, “A Micro-Payment Scheme Encouraging Collaboration in Multi-Hop Cellular Networks,” Proc. Conf. Financial Cryptography, 2003.
[16] D.B. Johnson and D.A. Maltz, “Dynamic Source Routing in Ad Hoc Wireless Networks,” Mobile Computing, 1996.
[17] B. Lamparter, K. Paul, and D. Westhoff, “Charging Support for Ad Hoc Stub Networks,” J. Computer Comm., Summer 2003.
[18] Y.-D. Lin and Y.-C. Hsu, “Multihop Cellular: A New Architecture for Wireless Communications,” Proc. INFOCOM Conf., 2000.
[19] O.C. Mantel, N. Scully, and A. Mawira, “Radio Aspects of Hybrid Wireless Ad Hoc Networks,” Proc. Vehicular Technology Conf., 2001.
[20] S. Marti, T. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” Proc. Mobicom Conf., 2000.
[21] A.J. Menezes, P.C. van Oorschot, and S.A. Vanstone, Handbook of Applied Cryptography. CRC Press, 1997.
[22] P. Michiardi and R. Molva, “Core: A Collaborative Reputation Mechanism to Enforce Node Cooperation in Mobile AD HOC Networks,” Proc. Conf. Comm. Multimedia Security, 2002.
[23] A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J.D. Tygar, “SPINS: Security Protocols for Sensor Networks,” Proc. Mobicom Conf., 2001.
[24] V.W. Kipp, “The Battle of NIMBY,” http://www.findarticles. com/p/articles/ mi_m0LEF/is_2002_August_1ai_91033662, 2002.
[25] H. Wu, C. Qios, S. De, and O. Tonguz, “Integrated Cellular and Ad Hoc Relaying Systems: iCAR,” IEEE J. Selected Areas in Comm., vol. 19, no. 10, Oct. 2001.
[26] J. Yoon, M. Liu, and B. Noble, “Random Waypoint Considered Harmful,” Proc. INFOCOM Conf. , 2003.
[27] A.N. Zadeh, B. Jabbari, R. Pickholtz, and B. Vojcic, “Self-Organizing Packet Radio Ad Hoc Networks with Overlay (SOPRANO),” IEEE Comm, Magazine, June 2002.
[28] S. Zhong, Y.R. Yang, and J. Chen, “Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad Hoc Networks,” Proc. INFOCOM Conf., 2003.

Index Terms:
Network-level security and protection, wireless communication, authentication security, payment schemes.
Naouel Ben Salem, Levente Butty?, Jean-Pierre Hubaux, Markus Jakobsson, "Node Cooperation in Hybrid Ad Hoc Networks," IEEE Transactions on Mobile Computing, vol. 5, no. 4, pp. 365-376, April 2006, doi:10.1109/TMC.2006.50
Usage of this product signifies your acceptance of the Terms of Use.