The Community for Technology Leaders
RSS Icon
Issue No.02 - Feb. (2013 vol.24)
pp: 209-224
M.M.E.A. Mahmoud , Dept. of Electr. & Comput. Eng., Univ. of Waterloo, Waterloo, ON, Canada
Xuemin Shen , Dept. of Electr. & Comput. Eng., Univ. of Waterloo, Waterloo, ON, Canada
We propose RACE, a report-based payment scheme for multihop wireless networks to stimulate node cooperation, regulate packet transmission, and enforce fairness. The nodes submit lightweight payment reports (instead of receipts) to the accounting center (AC) and temporarily store undeniable security tokens called Evidences. The reports contain the alleged charges and rewards without security proofs, e.g., signatures. The AC can verify the payment by investigating the consistency of the reports, and clear the payment of the fair reports with almost no processing overhead or cryptographic operations. For cheating reports, the Evidences are requested to identify and evict the cheating nodes that submit incorrect reports. Instead of requesting the Evidences from all the nodes participating in the cheating reports, RACE can identify the cheating nodes with requesting few Evidences. Moreover, Evidence aggregation technique is used to reduce the Evidences' storage area. Our analytical and simulation results demonstrate that RACE requires much less communication and processing overhead than the existing receipt-based schemes with acceptable payment clearance delay and storage area. This is essential for the effective implementation of a payment scheme because it uses micropayment and the overhead cost should be much less than the payment value. Moreover, RACE can secure the payment and precisely identify the cheating nodes without false accusations.
packet radio networks, computer network security, cooperation incentive scheme, RACE, report-based payment scheme, multihop wireless networks, node cooperation stimulation, packet transmission regulation, undeniable security tokens, signatures, payment verification, AC, report consistency investigation, fair reports, cheating nodes, incorrect reports, Evidence aggregation technique, Evidence storage area reduction, communication overhead, processing overhead, micropayment, overhead cost, secure payment scheme, Delay, Relays, Spread spectrum communication, Data communication, Public key cryptography, and selfishness attacks, Cooperation incentive schemes, network-level security and protection, payment schemes
M.M.E.A. Mahmoud, Xuemin Shen, "A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks", IEEE Transactions on Parallel & Distributed Systems, vol.24, no. 2, pp. 209-224, Feb. 2013, doi:10.1109/TPDS.2012.106
[1] G. Shen, J. Liu, D. Wang, J. Wang, and S. Jin, "Multi-Hop Relay for Next-Generation Wireless Access Networks," Bell Labs Technical J., vol. 13, no. 4, pp. 175-193, 2009.
[2] C. Chou, D. Wei, C. Kuo, and K. Naik, "An Efficient Anonymous Communication Protocol for Peer-to-Peer Applications Over Mobile Ad-Hoc Networks," IEEE J. Selected Areas in Comm., vol. 25, no. 1, pp. 192-203, Jan. 2007.
[3] H. Gharavi, "Multichannel Mobile Ad Hoc Links for Multimedia Communications," Proc. IEEE, vol. 96, no. 1, pp. 77-96, Jan. 2008.
[4] S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," Proc. MobiCom '00, pp. 255-265, Aug. 2000.
[5] G. Marias, P. Georgiadis, D. Flitzanis, and K. Mandalas, "Cooperation Enforcement Schemes for MANETs: A Survey," Wiley's J. Wireless Comm. and Mobile Computing, vol. 6, no. 3, pp. 319-332, 2006.
[6] Y. Zhang and Y. Fang, "A Secure Authentication and Billing Architecture for Wireless Mesh Networks," ACM Wireless Networks, vol. 13, no. 5, pp. 663-678, Oct. 2007.
[7] L. Buttyan and J. Hubaux, "Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks," Mobile Networks and Applications, vol. 8, no. 5, pp. 579-592, Oct. 2004.
[8] Y. Zhang, W. Lou, and Y. Fang, "A Secure Incentive Protocol for Mobile Ad Hoc Networks," ACM Wireless Networks, vol. 13, no. 5, pp. 569-582, Oct. 2007.
[9] A. Weyland, "Cooperation and Accounting in Multi-Hop Cellular Networks," PhD thesis, Univ. of Bern, Nov. 2005.
[10] A. Weyland, T. Staub, and T. Braun, "Comparison of Motivation-Based Cooperation Mechanisms for Hybrid Wireless Networks," J. Computer Comm., vol. 29, pp. 2661-2670, 2006.
[11] S. Zhong, J. Chen, and R. Yang, "Sprite: A Simple, Cheat-Proof, Credit Based System for Mobile Ad-Hoc Networks," Proc. IEEE INFOCOM '03, vol. 3, pp. 1987-1997, Mar./Apr. 2003.
[12] M. Mahmoud and X. Shen, "FESCIM: Fair, Efficient, and Secure Cooperation Incentive Mechanism for Hybrid Ad Hoc Networks," IEEE Trans. Mobile Computing, vol. 11, no. 5, pp. 753-766, May 2012.
[13] M. Mahmoud and X. Shen, "PIS: A Practical Incentive System for Multi-Hop Wireless Networks," IEEE Trans. Vehicular Technology, vol. 59, no. 8, pp. 4012-4025, Oct. 2010.
[14] M. Mahmoud and X. Shen, "Stimulating Cooperation in Multi-hop Wireless Networks Using Cheating Detection System," Proc. IEEE INFOCOM '10, Mar. 2010.
[15] N. Salem, L. Buttyan, J. Hubaux, and M. Jakobsson, "Node Cooperation in Hybrid Ad Hoc Networks," IEEE Trans. Mobile Computing, vol. 5, no. 4, pp. 365-376, Apr. 2006.
[16] J. Pan, L. Cai, X. Shen, and J. Mark, "Identity-Based Secure Collaboration in Wireless Ad Hoc Networks," Computer Networks, vol. 51, no. 3, pp. 853-865, 2007.
[17] M. Mahmoud and X. Shen, "ESIP: Secure Incentive Protocol with Limited Use of Public-Key Cryptography for Multi-Hop Wireless Networks," IEEE Trans. Mobile Computing, vol. 10, no. 7, pp. 997-1010, July 2011.
[18] M. Mahmoud and X. Shen, "An Integrated Stimulation and Punishment Mechanism for Thwarting Packet Drop in Multihop Wireless Networks," IEEE Trans. Vehicular Technology, vol. 60, no. 8, pp. 3947-3962, Oct. 2011.
[19] H. Zhu, X. Lin, R. Lu, Y. Fan, and X. Shen, "SMART: A Secure Multilayer Credit Based Incentive Scheme for Delay-Tolerant Networks," IEEE Trans. Vehicular Technology, vol. 58, no. 8, pp. 4628-4639, Oct. 2009.
[20] R. Lu, X. Lin, H. Zhu, X. Shen, and B.R. Preiss, "Pi: A Practical Incentive Protocol for Delay Tolerant Networks," IEEE Trans. Wireless Comm., vol. 9, no. 4, pp. 1483-1493, Apr. 2010.
[21] B. Wehbi, A. Laouiti, and A. Cavalli, "Efficient Time Synchronization Mechanism for Wireless Multi Hop Networks," Proc. IEEE Personal, Indoor and Mobile Radio Comm. (PIMRC), 2008.
[22] D. Johnson and D. Maltz, "Dynamic Source Routing in Ad Hoc Wireless Networks," Mobile Computing, Chapter 5, pp. 153-181, Kluwer Academic Publishers, 1996.
[23] L. Anderegg and S. Eidenbenz, "Ad Hoc-VCG: A Trustful and Cost-Efficient Routing Protocol for Mobile Ad Hoc Networks with Selfish Agents," Proc. ACM MobiCom, Sept. 2003.
[24] H. Pagnia and F. Gartner, "On the Impossibility of Fair Exchange Without a Trusted Third Party," Technical Report TUD-BS-1999-02, Darmstadt Univ. of Tech nology, Mar. 1999.
[25] K. Sanzgiri, D. LaFlamme, B. Dahill, B. Levine, C. Shields, and E. Belding-Royer, "Authenticated Routing for Ad Hoc Networks," IEEE Selected Areas in Comm., vol. 23, no. 3, pp. 598-610, Mar. 2005.
[26] Y. Hu, A. Perrig, and D. Johnson, "Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks," Proc. ACM MobiCom, Sept. 2002.
[27] B. Wu, J. Chen, J. Wu, and M. Cardei, "A Survey of Attacks and Countermeasures in Mobile Ad Hoc Networks," Wireless Network Security, Springer Network Theory and Applications, vol. 17, pp 103-135, 2007.
[28] S. Even, O. Goldreich, and S. Micali, "On-Line/off-line Digital Signatures," Crypto '89: Proc. Advances in Cryptology, pp. 263-277, 1990.
[29] O. Nibouche, M. Nibouche, A. Bouridane, and A. Belatreche, "Fast Architectures for FPGA-Based Implementation of RSA Encryption Algorithm," Proc. IEEE Field-Programmable Technology Conf., Dec. 2004.
[30] J. Yoon, M. Liu, and B. Nobles, "Sound Mobility Models," Proc. ACM MobiCom, Sept. 2003.
[31] A. Menzies, P. Oorschot, and S. Vanstone, Handbook of Applied Cryptography. CRC Press, http://www.cacr.math.uwaterloo.cahac, 1996.
[32] Nat'l Inst. of Standards and Technology (NIST), "Recommendation for Key Management - Part 1: General (Revised)," Special Publication 800-57 200, 2007.
[33] NIST, "Digital Hash Standard," Fed. Information Processing Standards Publication 180-1, Apr. 1995.
[34] D. Wei, "Crypto++ Library 5.6.0," http:/, Oct. 2011.
[35] N. Potlapally, S. Ravi, A. Raghunathan, and N. Jha, "A Study of the Energy Consumption Characteristics of Cryptographic Algorithms and Security Protocols," IEEE Trans. Mobile Computing, vol. 5, no. 2, pp. 128-143, Mar./Apr. 2006.
[36] P. Desnoyers, D. Ganesan, H. Li, M. Li, and P. Shenoy, "PRESTO: A Predictive Storage Architecture for Sensor Networks," Proc. 10th Workshop Hot Topics in Operating Systems (USENIX HotOS), June 2005.
[37] A. Mitra, A. Banerjee, W. Najjar, D. Zeinalipour-Yazti, V. Kalogeraki, and D. Gunopulos, "High-Performance Low Power Sensor Platforms Featuring Gigabyte Scale Storage," Proc. IEEE/ACM Third Int'l Workshop Measurement, Modeling, and Performance Analysis of Wireless Sensor Networks (SenMetrics '05), July 2005.
58 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool