Charging support for ad hoc stub networks
نویسندگان
چکیده
Wired equivalent security is difficult to provide in ad hoc networks due to high dynamics, wireless link vulnerability, and requirement of complete decentralization. Especially mutual authentication among nodes in a self-organized mode of ad hoc network, where a single definition of trust is hard to build, is very difficult. This leads to several loopholes in previously established security architectures and intrusion detection systems if employed to ad hoc networks. Also, typical to ad hoc routing major security lacks are unfair participation of nodes in the system, and frequent attacks to the routing protocols by ad hoc nodes that do not want to forward foreign packets but use other nodes to forward their own packets. Contrary to detection based approaches to tackle this situation, we propose a motivation based approach which does not require mutual authentication. We enable this by providing a) a realistic architecture of ad hoc access network to an ISP, b) a workable business model for charging in this architecture and c) necessary security protocol to implement the charging scheme. We propose for the latter a protocol specification and give a formal validation.
منابع مشابه
Literature Review Resource Management in Suburban Ad-Hoc Networks with Decentralized Capabilities
3 Availability techniques 3 3.1 Detection approaches . . . . . . . . . . . . . . . . . . . . . . . 3 3.1.1 Distributed and Cooperative Intrusion Detection . . . 3 3.1.2 Watchdog and Pathrater . . . . . . . . . . . . . . . . . 4 3.1.3 CONFIDANT (Cooperation Of Nodes, Fairness In Dynamic Ad-hoc NeTworks) . . . . . . . . . . . . . . . . 5 3.1.4 CORE (Collaborative Reputation) . . . . . . . . . . ....
متن کاملAssessment of DSACC and QPART Algorithms in Ad Hoc Networks
The rapid advancement in wireless over wired has augmented the need for improving theQuality of Service (QoS) over such wireless links. However, the wireless ad hoc networkshave too low bandwidth, and establishing a QoS in these networks is a difficult issue. So,support of quality of service in ad hoc networks is the topical issue among the networkscience researchers. In this research we are go...
متن کاملMobile IP for Ad Hoc Networks:
Mobile ad hoc networks are temporary networks, with varying network topologies. They communicate beyond transmitter range and are supported by multi hop communication through IP routing. Since Mobile Ad Hoc Network is a roaming network, where the host may be connected through various means to the Internet other than it’s fixed-address domain space, it becomes important for the host to have dyna...
متن کاملLinking Ad Hoc Charging Schemes to AAAC Architectures
The current state of today’s networks allows us to take one step further in merging the research community’s work with every day’s life. Wireless ad hoc networks are already well developed for specific scenarios. This work shows how to build the link between the wired network and a wireless ad hoc infrastructure, in particular routing and AAAC aspects. Such integration might lead, for example, ...
متن کاملEnergy Efficient Routing in Mobile Ad Hoc Networks by Using Honey Bee Mating Optimization
Mobile Ad hoc networks (MANETs) are composed of mobile stations communicating through wireless links, without any fixed backbone support. In these networks, limited power energy supply, and frequent topology changes caused by node mobility, makes their routing a challenging problem. TORA is one of the routing protocols that successfully copes with the nodes’ mobility side effects, but it do...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Computer Communications
دوره 26 شماره
صفحات -
تاریخ انتشار 2003