Title :
Node cooperation in hybrid ad hoc networks
Author :
Ben Salem, Naouel ; Buttyán, Levente ; Hubaux, Jean-Pierre ; Jakobsson, Markus
Author_Institution :
Lab. of Comput. Commun. & Applications, EPFL-Laussane, Lausanne, Switzerland
fDate :
4/1/2006 12:00:00 AM
Abstract :
A hybrid ad hoc network is a structure-based network that is extended using multihop communications. Indeed, in this kind of network, the existence of a communication link between the mobile station and the base station is not required: A mobile station that has no direct connection with a base station can use other mobile stations as relays. Compared with conventional (single-hop) structure-based networks, this new generation can lead to a better use of the available spectrum and to a reduction of infrastructure costs. However, these benefits would vanish if the mobile nodes did not properly cooperate and forward packets for other nodes. In this paper, we propose a charging and rewarding scheme to encourage the most fundamental operation, namely packet forwarding. We use "MAC layering" to reduce the space overhead in the packets and a stream cipher encryption mechanism to provide "implicit. authentication" of the nodes involved in the communication. We analyze the robustness of our protocols against rational and malicious attacks. We show that-using our solution-collaboration is rational for selfish nodes. We also show that our protocols thwart rational attacks and detect malicious attacks.
Keywords :
access protocols; ad hoc networks; cryptography; mobile radio; telecommunication security; MAC layering; base station; charging scheme; hybrid ad hoc networks; infrastructure cost reduction; malicious attacks; mobile station; multihop communications; node cooperation; packet forwarding; rewarding scheme; stream cipher encryption mechanism; structure-based networks; Ad hoc networks; Authentication; Base stations; Costs; Cryptography; Mobile communication; Protocols; Relays; Robustness; Spread spectrum communication; Network-level security and protection; authentication security; payment schemes.; wireless communication;
Journal_Title :
Mobile Computing, IEEE Transactions on
DOI :
10.1109/TMC.2006.1599405