The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.07 - July (2011 vol.10)
pp: 997-1010
Mohamed Elsalih Mahmoud , University of Waterloo, Waterloo
Xuemin (Sherman) Shen , University of Waterloo, Waterloo
ABSTRACT
In multihop wireless networks, selfish nodes do not relay other nodes' packets and make use of the cooperative nodes to relay their packets, which has negative impact on the network fairness and performance. Incentive protocols use credits to stimulate the selfish nodes' cooperation, but the existing protocols usually rely on the heavyweight public-key operations to secure the payment. In this paper, we propose secure cooperation incentive protocol that uses the public-key operations only for the first packet in a series and uses the lightweight hashing operations in the next packets, so that the overhead of the packet series converges to that of the hashing operations. Hash chains and keyed hash values are used to achieve payment nonrepudiation and thwart free riding attacks. Security analysis and performance evaluation demonstrate that the proposed protocol is secure and the overhead is incomparable to the public-key-based incentive protocols because the efficient hashing operations dominate the nodes' operations. Moreover, the average packet overhead is less than those of the public-key-based protocols with very high probability due to truncating the keyed hash values.
INDEX TERMS
Network-level security and protection, mobile communication systems, routing protocols, payment schemes.
CITATION
Mohamed Elsalih Mahmoud, Xuemin (Sherman) Shen, "ESIP: Secure Incentive Protocol with Limited Use of Public-Key Cryptography for Multihop Wireless Networks", IEEE Transactions on Mobile Computing, vol.10, no. 7, pp. 997-1010, July 2011, doi:10.1109/TMC.2010.211
REFERENCES
[1] G. Shen, J. Liu, D. Wang, J. Wang, and S. Jin, "Multi-Hop Relay for Next-Generation Wireless Access Networks," Bell Labs Technical J., vol. 13, no. 4, pp. 175-193, 2009.
[2] X. Li, B. Seet, and P. Chong, "Multihop Cellular Networks: Technology and Economics," Computer Networks, vol. 52, no. 9, pp. 1825-1837, June 2008.
[3] A. Abdrabou and W. Zhuang, "Statistical QoS Routing for IEEE 802.11 Multihop Ad Hoc Networks," IEEE Trans. Wireless Comm., vol. 8, no. 3, pp. 1542-1552, Mar. 2009.
[4] Y. Jiang, M. Shi, X. Shen, and C. Lin, "BAT: A Robust Signature Scheme for Vehicular Networks Using Binary Authentication Tree," IEEE Trans. Wireless Comm., vol. 8, no. 4, pp. 1974-1983, Apr. 2009.
[5] P. Gupta and P. Kumar, "The Capacity of Wireless Networks," IEEE Trans. Information Theory, vol. 46, no. 2, pp. 388-404, Mar. 2000.
[6] S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," Proc. IEEE/ACM MobiCom, pp. 255-265, Aug. 2000.
[7] D.B. Johnson, D.A. Maltz, and Y.C. Hu, "The Dynamic Source Routing Protocol for Mobile Ad Hoc Networks (DSR)," technical report, IETF MANET Working Group, Feb. 2007.
[8] P. Michiardi and R. Molva, "Simulation-Based Analysis of Security Exposures in Mobile Ad Hoc Networks," Proc. European Wireless Conf., Feb. 2002.
[9] J. Hu, "Cooperation in Mobile Ad Hoc Networks," Technical Report TR-050111, Computer Science Dept., Florida State Univ., Jan. 2005.
[10] G. Marias, P. Georgiadis, D. Flitzanis, and K. Mandalas, "Cooperation Enforcement Schemes for MANETs: A Survey," Wireless Comm. and Mobile Computing, vol. 6, no. 3, pp. 319-332, 2006.
[11] J. Jaramillo and R. Srikant, "DARWIN: Distributed and Adaptive Reputation Mechanism for Wireless Networks," Proc. ACM MobiCom, pp 87-98, Sept. 2007.
[12] Q. He, D. Wu, and P. Khosla, "A Secure Incentive Architecture for Ad-Hoc Networks," Wireless Comm. and Mobile Computing, vol. 6, no. 3, pp. 333-346, May 2006.
[13] N. Jiang, K. Hua, and D. Liu, "A Scalable and Robust Approach to Collaboration Enforcement in Mobile Ad-Hoc Networks," Comm. and Networks, vol. 9, no. 1, pp. 56-66, 2007.
[14] L. Xie and S. Zhu, "Message Dropping Attacks in Overlay Networks: Attack Detection and Attacker Identification," ACM Trans. Information and System Security, vol. 11, no. 3, Mar. 2008.
[15] Y. Zhang and Y. Fang, "A Secure Authentication and Billing Architecture for Wireless Mesh Networks," ACM Wireless Networks, vol. 13, no. 5, pp. 569-582, Oct. 2007.
[16] L. Buttyan and J. Hubaux, "Nuglets: A Virtual Currency to Stimulate Cooperation in Self Organized Ad Hoc Networks," Technical Report DSC/2001/001, Swiss Federal Inst. of Tech nology, Jan. 2001.
[17] L. Buttyan and J. Hubaux, "Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks," Mobile Networks and Applications, vol. 8, no. 5, pp. 579-592, Oct. 2004.
[18] A. Weyland and T. Braun, "Cooperation and Accounting Strategy for Multi-Hop Cellular Networks," Proc. IEEE Workshop Local and Metropolitan Area Networks (LANMAN), pp. 193-198, Apr. 2004.
[19] A. Weyland, "Cooperation and Accounting in Multi-Hop Cellular Networks," PhD thesis, Univ. of Bern, Nov. 2005.
[20] Y. Zhang, W. Lou, and Y. Fang, "A Secure Incentive Protocol for Mobile Ad Hoc Networks," ACM Wireless Networks, vol. 13, no. 5, pp. 569-582, Oct. 2007.
[21] J. Pan, L. Cai, X. Shen, and J. Mark, "Identity-Based Secure Collaboration in Wireless Ad Hoc Networks," Computer Networks, vol. 51, no. 3, pp. 853-865, 2007.
[22] S. Zhong, J. Chen, and R. Yang, "Sprite: A Simple, Cheat-Proof, Credit Based System for Mobile Ad-Hoc Networks," Proc. IEEE INFOCOM, vol. 3, pp. 1987-1997, 2003.
[23] N. Salem, L. Buttyan, J. Hubaux, and M. Jakobsson, "Node Cooperation in Hybrid Ad Hoc Networks," IEEE Trans. Mobile Computing, vol. 5, no. 4, pp. 365-376, Apr. 2006.
[24] M. Jakobsson, J. Hubaux, and L. Buttyan, "A Micro-Payment Scheme Encouraging Collaboration in Multi-Hop Cellular Networks," Proc. Seventh Financial Cryptography, pp. 15-33, Jan. 2003.
[25] B. Lamparter, K. Paul, and D. Westhoff, "Charging Support for Ad Hoc Stub Networks," Computer Comm., vol. 26, no. 13, pp. 1504-1514, 2003.
[26] M. Mahmoud and X. Shen, "DSC: Cooperation Incentive Mechanism for Multi-Hop Cellular Networks," Proc. IEEE Int'l Conf. Comm. (ICC '09), pp. 569-574, June 2009.
[27] M. Mahmoud and X. Shen, "Stimulating Cooperation in Multi-Hop Wireless Networks Using Cheating Detection System," Proc. IEEE INFOCOM, pp. 776-785, Mar. 2010.
[28] L. Anderegg and S. Eidenbenz, "Ad Hoc-VCG: A Trustful and Cost-Efficient Routing Protocol for Mobile Ad Hoc Networks with Selfish Agents," Proc. ACM MobiCom, Sept. 2003.
[29] H. Pagnia and F. Gartner, "On the Impossibility of Fair Exchange without a Trusted Third Party," Technical Report TUD-BS-1999-02, Darmstadt Univ. of Tech nology, Mar. 1999.
[30] D. Boneh and M. Franklin, "Identity Based Encryption from the Weil Pairing," Proc. 21st Ann. Int'l Cryptology Conf. Advances in Cryptology (Crypto '01), pp. 213-229, 2001.
[31] National Inst. of Standards and Technology (NIST), "Recommendation for Key Management—Part 1: General (Revised)," Special Publication 800-57 200, 2007.
[32] A. Menzies, P. Orschot, and S. Vanstone, Handbook of Applied Cryptography, http://www.cacr.math.uwaterloo.cahac, CRC Press, 1996.
[33] J. Yoon, M. Liu, and B. Nobles, "Sound Mobility Models," Proc. ACM MobiCom, Sept. 2003.
[34] W. Dai, "Crypto++ Library 5.6.0," http:/www.cryptopp.com, 2009.
[35] N. Potlapally, S. Ravi, A. Raghunathan, and N. Jha, "A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols," IEEE Trans. Mobile Computing, vol. 5, no. 2, pp. 128-143, Mar.-Apr. 2006.
[36] Y. Zhang, W. Liu, W. Lou, and Y. Fang, "Location-Based Compromise-Tolerant Security Mechanisms for Wireless Sensor Networks," IEEE J. Selected Areas Comm., vol. 24, no.2, pp. 247-260, Feb. 2006.
21 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool