This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
FESCIM: Fair, Efficient, and Secure Cooperation Incentive Mechanism for Multihop Cellular Networks
May 2012 (vol. 11 no. 5)
pp. 753-766
Mohamed M. E. A. Mahmoud, Dept. of Electr. & Comput. Eng., Univ. of Waterloo, Waterloo, ON, Canada
Xuemin Shen, Dept. of Electr. & Comput. Eng., Univ. of Waterloo, Waterloo, ON, Canada
In multihop cellular networks, the mobile nodes usually relay others' packets for enhancing the network performance and deployment. However, selfish nodes usually do not cooperate but make use of the cooperative nodes to relay their packets, which has a negative effect on the network fairness and performance. In this paper, we propose a fair and efficient incentive mechanism to stimulate the node cooperation. Our mechanism applies a fair charging policy by charging the source and destination nodes when both of them benefit from the communication. To implement this charging policy efficiently, hashing operations are used in the ACK packets to reduce the number of public-key-cryptography operations. Moreover, reducing the overhead of the payment checks is essential for the efficient implementation of the incentive mechanism due to the large number of payment transactions. Instead of generating a check per message, a small-size check can be generated per route, and a check submission scheme is proposed to reduce the number of submitted checks and protect against collusion attacks. Extensive analysis and simulations demonstrate that our mechanism can secure the payment and significantly reduce the checks' overhead, and the fair charging policy can be implemented almost computationally free by using hashing operations.

[1] Y. Lin and Y. Hsu, "Multihop Cellular: A New Architecture for Wireless Communications," Proc. IEEE INFOCOM, vol. 3, pp. 1273-1282, Mar. 2000.
[2] X. Li, B. Seet, and P. Chong, "Multihop Cellular Networks: Technology and Economics," Computer Networks, vol. 52, no. 9, pp. 1825-1837, June 2008.
[3] C. Gomes and J. Galtier, "Optimal and Fair Transmission Rate Allocation Problem in Multi-Hop Cellular Networks," Proc. Int'l Conf. Ad-Hoc, Mobile and Wireless Networks, pp. 327-340, Aug. 2009.
[4] H. Wu, C. Qios, S. De, and O. Tonguz, "Integrated Cellular and Ad Hoc Relaying Systems: iCAR," IEEE J. Selected Areas in Comm., vol. 19, no. 10, pp. 2105-2115, Oct. 2001.
[5] G. Shen, J. Liu, D. Wang, J. Wang, and S. Jin, "Multi-Hop Relay for Next-Generation Wireless Access Networks," Bell Labs Technical J., vol. 13, no. 4, pp. 175-193, 2009.
[6] R. Schoenen, R. Halfmann, and B. Walke, "MAC Performance of a 3GPP-LTE Multihop Cellular Network," Proc. IEEE Int'l Conf. Comm. (ICC), pp. 4819-4824, May 2008.
[7] 3rd Generation Partnership Project, Technical Specification Group Radio Access Network, "Opportunity Driven Multiple Access," 3G Technical Report 25.924, Version 1.0.0, Dec. 1999.
[8] S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," Proc. ACM MobiCom, pp. 255-265, Aug. 2000.
[9] P. Michiardi and R. Molva, "Simulation-Based Analysis of Security Exposures in Mobile Ad Hoc Networks," Proc. European Wireless Conf., Feb. 2002.
[10] J. Hu, "Cooperation in Mobile Ad Hoc Networks," Technical Report TR-050111, Computer Science Dept., Florida State Univ., Jan. 2005.
[11] G. Marias, P. Georgiadis, D. Flitzanis, and K. Mandalas, "Cooperation Enforcement Schemes for MANETs: A Survey," J. Wireless Comm. and Mobile Computing, vol. 6, no. 3, pp. 319-332, 2006.
[12] C. Song and Q. Zhang, "OMH-Suppressing Selfish Behavior in Ad Hoc Networks with One More Hop," Mobile Networks and Applications, vol. 14, no. 2, pp. 178-187, Feb. 2009.
[13] D. Djenouri and N. Badache, "On Eliminating Packet Droppers in MANET: A Modular Solution," Ad Hoc Networks, vol. 7, no. 6, pp. 1243-1258, Aug. 2009.
[14] G. Bella, G. Costantino, and S. Riccobene, "Evaluating the Device Reputation Through Full Observation in MANETs," J. Information Assurance and Security, vol. 4, no. 5, pp. 458-465, Mar. 2009.
[15] L. Feeney, "An Energy-Consumption Model for Performance Analysis of Routing Protocols for Mobile Ad Hoc Networks," Mobile Networks and Applications, vol. 3, no. 6, pp. 239-249, 2001.
[16] M. Peirce and D. O'Mahony, "Micropayments for Mobile Networks," technical report, Dept. of Computer Science, Trinity College, 1999.
[17] L. Buttyan and J. Hubaux, "Enforcing Service Availability in Mobile Ad-Hoc WANs," Proc. ACM MobiHoc, pp. 87-96, Aug. 2000.
[18] L. Buttyan and J. Hubaux, "Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks," Mobile Networks and Applications, vol. 8, no. 5, pp. 579-592, Oct. 2004.
[19] Y. Zhang, W. Lou, and Y. Fang, "A Secure Incentive Protocol for Mobile Ad Hoc Networks," ACM Wireless Networks, vol. 13, no. 5, pp. 569-582, Oct. 2007.
[20] A. Weyland and T. Braun, "Cooperation and Accounting Strategy for Multi-Hop Cellular Networks," Proc. IEEE Local and Metropolitan Area Networks (LANMAN '04), pp. 193-198, Apr. 2004.
[21] A. Weyland, "Cooperation and Accounting in Multi-Hop Cellular Networks," PhD thesis, Univ. of Bern, Nov. 2005.
[22] J. Hubaux, L. Buttyán, and S. Capkun, "The Quest for Security in Mobile Ad Hoc Networks," Proc. ACM Symp. Mobile Ad Hoc Networking and Computing, Oct. 2001.
[23] A. Weyland, T. Staub, and T. Braun, "Comparison of Motivation-Based Cooperation Mechanisms for Hybrid Wireless Networks," J. Computer Comm., vol. 29, pp. 2661-2670, 2006.
[24] M. Jakobsson, J. Hubaux, and L. Buttyan, "A Micro-Payment Scheme Encouraging Collaboration in Multi-Hop Cellular Networks," Proc. Seventh Financial Cryptography (FC '03), pp. 15-33, Jan. 2003.
[25] M. Mahmoud and X. Shen, "Stimulating Cooperation in Multi-Hop Wireless Networks Using Cheating Detection System," Proc. IEEE INFOCOM, pp. 776-784, Mar. 2010.
[26] J. Pan, L. Cai, X. Shen, and J. Mark, "Identity-Based Secure Collaboration in Wireless Ad Hoc Networks," Computer Networks, vol. 51, no. 3, pp. 853-865, 2007.
[27] N. Salem, L. Buttyan, J. Hubaux, and M. Jakobsson, "Node Cooperation in Hybrid Ad Hoc Networks," IEEE Trans. Mobile Computing, vol. 5, no. 4, pp. 365-376, Apr. 2006.
[28] S. Zhong, J. Chen, and R. Yang, "Sprite: A Simple, Cheat-Proof, Credit Based System for Mobile Ad-Hoc Networks," Proc. IEEE INFOCOM, vol. 3, pp. 1987-1997, Mar./Apr. 2003.
[29] H. Janzadeh, K. Fayazbakhsh, M. Dehghan, and M. Fallah, "A Secure Credit-Based Cooperation Stimulating Mechanism for MANETs Using Hash Chains," Future Generation Computer Systems, vol. 25, no. 8, pp. 926-934, Sept. 2009.
[30] B. Lamparter, K. Paul, and D. Westhoff, "Charging Support for Ad Hoc Stub Networks," J. Computer Comm., vol. 26, no. 13, pp. 1504-1514, 2003.
[31] S. Miner and J. Staddon, "Graph-Based Authentication of Digital Streams," Proc. IEEE Symp. Security and Privacy, pp. 232-246, May 2001.
[32] D. Johnson and D. Maltz, "Dynamic Source Routing in Ad Hoc Wireless Networks," Mobile Computing, pp. 153-181, chapter 5, Kluwer Academic, 1996.
[33] C. Perkins and E. Royer, "Ad-Hoc On-Demand Distance Vector Routing," Proc. IEEE Workshop Mobile Computing Systems and Applications, pp. 90-100, Feb. 1999.
[34] H. Pagnia and F. Gartner, "On the Impossibility of Fair Exchange without a Trusted Third Party," Technical Report TUD-BS-1999-02, Darmstadt Univ. of Tech nology, Mar. 1999.
[35] L. Anderegg and S. Eidenbenz, "Ad Hoc-VCG: A Trustful and Cost-Efficient Routing Protocol for Mobile Ad Hoc Networks with Selfish Agents," Proc. ACM MobiCom, Sept. 2003.
[36] K. Sanzgiri, D. LaFlamme, B. Dahill, B. Levine, C. Shields, and E. Belding-Royer, "Authenticated Routing for Ad Hoc Networks," IEEE Selected Areas in Comm., vol. 23, no. 3, pp. 598-610, Mar. 2005.
[37] Y. Hu, A. Perrig, and D. Johnson, "Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks," Proc. ACM MobiCom, Sept. 2002.
[38] A. Mitra et al., "High-Performance Low Power Sensor Platforms Featuring Gigabyte Scale Storage," Proc. IEEE/ACM Measurement, Modeling, and Performance Analysis of Wireless Sensor Networks, 2005.
[39] A. Menzies, P. Oorschot, and S. Vanstone, Handbook of Applied Cryptography, http://www.cacr.math.uwaterloo.cahac, CRC Press, 1996.
[40] Nat'l Inst. Standards and Technology (NIST), "Digital Hash Standard," Fed. Information Processing Standards Publication 180-1, Apr. 1995.
[41] M. Wiener, "Performance Comparison of Public-Key Cryptosystems," Technical Newsletter of RSA Laboratories' CryptoBytes, vol. 4, no. 1, pp. 3-5, 1998.
[42] Nat'l Inst. of Standards and Technology (NIST), "Recommendation for Key Management - Part 1: General (Revised)," Special Publication 800-57 200, 2007.
[43] W. Dai, "Crypto++ Library 5.6.0," http:/www.cryptopp.com, 2011.
[44] N. Potlapally, S. Ravi, A. Raghunathan, and N. Jha, "A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols," IEEE Trans. Mobile Computing, vol. 5, no. 2, pp. 128-143, Mar./Apr. 2006.
[45] J. Yoon, M. Liu, and B. Nobles, "Sound Mobility Models," Proc. ACM MobiCom, Sept. 2003.

Index Terms:
public key cryptography,cellular radio,packet radio networks,public-key-cryptography,FESCIM,multihop cellular networks,mobile nodes,cooperative nodes,Relays,Base stations,Mobile computing,Security,Mobile communication,Silicon,Ad hoc networks,hybrid systems.,Network-level security and protection,wireless communication,payment schemes
Citation:
Mohamed M. E. A. Mahmoud, Xuemin Shen, "FESCIM: Fair, Efficient, and Secure Cooperation Incentive Mechanism for Multihop Cellular Networks," IEEE Transactions on Mobile Computing, vol. 11, no. 5, pp. 753-766, May 2012, doi:10.1109/TMC.2011.92
Usage of this product signifies your acceptance of the Terms of Use.