4.7 Article

Charging support for ad hoc stub networks

Journal

COMPUTER COMMUNICATIONS
Volume 26, Issue 13, Pages 1504-1514

Publisher

ELSEVIER
DOI: 10.1016/S0140-3664(03)00034-3

Keywords

ad hoc stub network; business model; security for charging; Internet server provider

Ask authors/readers for more resources

Wired equivalent security is difficult to provide in ad hoc networks due to high dynamics, wireless link vulnerability, and the requirement of complete decentralization. Especially mutual authentication among nodes in a self-organized mode of ad hoc network, where a single definition of trust is hard to build, is very difficult. This leads to several loopholes in previously established security architectures and intrusion detection systems if employed to ad hoc networks. Also, typical to ad hoc routing major security lacks are unfair participation of nodes in the system, and frequent attacks to the routing protocols by ad hoc nodes that do not want to forward foreign packets but use other nodes to forward their own packets. Contrary to detection-based approaches to tackle this situation, we propose a motivation-based approach, which does not require mutual authentication. We enable this by providing (a) a realistic architecture of ad hoc access network to an Internet Service Provider, (b) a workable business model for charging in this architecture and (c) a necessary security protocol to implement the charging scheme. For the latter we give a formal validation. (C) 2003 Elsevier Science B.V. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available