Charging support for ad hoc stub networks

نویسندگان

  • Bernd Lamparter
  • Krishna Paul
  • Dirk Westhoff
چکیده

Wired equivalent security is difficult to provide in ad hoc networks due to high dynamics, wireless link vulnerability, and requirement of complete decentralization. Especially mutual authentication among nodes in a self-organized mode of ad hoc network, where a single definition of trust is hard to build, is very difficult. This leads to several loopholes in previously established security architectures and intrusion detection systems if employed to ad hoc networks. Also, typical to ad hoc routing major security lacks are unfair participation of nodes in the system, and frequent attacks to the routing protocols by ad hoc nodes that do not want to forward foreign packets but use other nodes to forward their own packets. Contrary to detection based approaches to tackle this situation, we propose a motivation based approach which does not require mutual authentication. We enable this by providing a) a realistic architecture of ad hoc access network to an ISP, b) a workable business model for charging in this architecture and c) necessary security protocol to implement the charging scheme. We propose for the latter a protocol specification and give a formal validation.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Literature Review Resource Management in Suburban Ad-Hoc Networks with Decentralized Capabilities

3 Availability techniques 3 3.1 Detection approaches . . . . . . . . . . . . . . . . . . . . . . . 3 3.1.1 Distributed and Cooperative Intrusion Detection . . . 3 3.1.2 Watchdog and Pathrater . . . . . . . . . . . . . . . . . 4 3.1.3 CONFIDANT (Cooperation Of Nodes, Fairness In Dynamic Ad-hoc NeTworks) . . . . . . . . . . . . . . . . 5 3.1.4 CORE (Collaborative Reputation) . . . . . . . . . . ....

متن کامل

Assessment of DSACC and QPART Algorithms in Ad Hoc Networks

The rapid advancement in wireless over wired has augmented the need for improving theQuality of Service (QoS) over such wireless links. However, the wireless ad hoc networkshave too low bandwidth, and establishing a QoS in these networks is a difficult issue. So,support of quality of service in ad hoc networks is the topical issue among the networkscience researchers. In this research we are go...

متن کامل

Mobile IP for Ad Hoc Networks:

Mobile ad hoc networks are temporary networks, with varying network topologies. They communicate beyond transmitter range and are supported by multi hop communication through IP routing. Since Mobile Ad Hoc Network is a roaming network, where the host may be connected through various means to the Internet other than it’s fixed-address domain space, it becomes important for the host to have dyna...

متن کامل

Linking Ad Hoc Charging Schemes to AAAC Architectures

The current state of today’s networks allows us to take one step further in merging the research community’s work with every day’s life. Wireless ad hoc networks are already well developed for specific scenarios. This work shows how to build the link between the wired network and a wireless ad hoc infrastructure, in particular routing and AAAC aspects. Such integration might lead, for example, ...

متن کامل

Energy Efficient Routing in Mobile Ad Hoc Networks by Using Honey Bee Mating Optimization

Mobile Ad hoc networks (MANETs) are composed of mobile stations communicating through wireless links, without any fixed backbone support. In these networks, limited power energy supply, and frequent topology changes caused by node mobility, makes their routing a challenging problem. TORA is one of the routing protocols that successfully copes with the nodes’ mobility side effects, but it do...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Computer Communications

دوره 26  شماره 

صفحات  -

تاریخ انتشار 2003