skip to main content
10.1145/778415.778418acmconferencesArticle/Chapter ViewAbstractPublication PagesmobihocConference Proceedingsconference-collections
Article

A charging and rewarding scheme for packet forwarding in multi-hop cellular networks

Published:01 June 2003Publication History

ABSTRACT

In multi-hop cellular networks, data packets have to be relayed hop by hop from a given mobile station to a base station and vice-versa. This means that the mobile stations must accept to forward information for the benefit of other stations. In this paper, we propose an incentive mechanism that is based on a charging/rewarding scheme and that makes collaboration rational for selfish nodes. We base our solution on symmetric cryptography to cope with the limited resources of the mobile stations. We provide a set of protocols and study their robustness with respect to various attacks. By leveraging on the relative stability of the routes, our solution leads to a very moderate overhead.

References

  1. G. N. Aggélou and R. Tafazolli. On the Relaying Capacity of Next-Generation GSM Cellular Networks. IEEE Personal Communications, February 2001.Google ScholarGoogle Scholar
  2. Y. Bejerano. Efficient Integration of Multi-Hop Wireless and Wired Networks with QoS Constraints. In Proceedings of MobiCom, pages 215--226. ACM Press, September 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. L. Blazevic, L. Buttyán, S. Capkun, S. Giordano, J.-P. Hubaux, and J.-Y. Le Boudec. Self Organization in Mobile Ad-Hoc Networks: the Approach of Terminodes. IEEE Communications Magazine, 39(6), June 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. J. Broch, D. A. Maltz, D. B. Johnson, Y.-C. Hu, and J. Jetcheva. A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. In Proceedings of MobiCom, pages 85--97, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. S. Buchegger and J.-Y. Le Boudec. Performance Analysis of the CONFIDANT Protocol: Cooperation Of Nodes - Fairness In Distributed Ad Hoc NeTworks. In Proceedings of MobiHoc, June 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. L. Buttyán and J.-P. Hubaux. Enforcing Service Availability in Mobile Ad Hoc WANs. In Proceedings of MobiHocC, Boston, MA, USA, August 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. L. Buttyán and J.-P. Hubaux. Report on a Working Session on Security in Wireless Ad Hoc Networks. ACM Mobile Computing and Communications Review (MC2R), October 2002.Google ScholarGoogle Scholar
  8. L. Buttyán and J.-P. Hubaux. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks. ACM/Kluwer Mobile Networks and Applications (MONET), 8(5), October 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. T. Camp, J. Boleng, and V. Davies. A Survey of Mobility Models for Ad Hoc Network Research. Wireless Communication and Mobile Computing (WCMC): Special issue on Mobile Ad Hoc Networking: Research, Trends and Applications, 2(5):483--502, 2002.Google ScholarGoogle Scholar
  10. B. Goode. Voice Over Internet Protocol (VoIP). Proceedings of the IEEE, 90:1495--1517, September 2002.Google ScholarGoogle ScholarCross RefCross Ref
  11. V. Gupta, S. Krishnamurthy, and M. Faloutsos. Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks. In Proceedings of Milcom, 2002.Google ScholarGoogle ScholarCross RefCross Ref
  12. H. Holma and A. Toskala. WCDMA for UMTS: Radio Access for Third Generation Mobile Communications. Wiley, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. H.-Y. Hsieh and R. Sivakumar. Towards a Hybrid Network Model for Wireless Packet Data Networks. In Proceedings of ISCC. IEEE, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. http://www.eskimo.com/\verb+ +weidai/benchmarks.html.Google ScholarGoogle Scholar
  15. http://www.terminodes.org.Google ScholarGoogle Scholar
  16. Y. C. Hu, A. Perrig, and D. B. Johnson. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. In Proceedings of MobiCom. ACM Press, September 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Y.-C. Hu, A. Perrig, and D. B. Johnson. Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks. In Proceedings of INFOCOM. IEEE, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  18. J.-P. Hubaux, T. Gross, J.-Y. Le Boudec, and M. Vetterli. Towards Self-Organizing Mobile Ad Hoc Networks: the Terminodes Project. IEEE Communications Magazine, 39(1):118 --124, January 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. M. Jakobsson, J.-P. Hubaux, and L. Buttyán. A Micro-Payment Scheme Encouraging Collaboration in Multi-Hop Cellular Networks. In Proceedings of Financial Cryptography, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  20. D. B. Johnson and D. A. Maltz. Dynamic Source Routing in Ad Hoc Wireless Networks. In Mobile Computing edited by Tomasz Imielinski and Hank Korth, chapter 5, pages 153--181. Kluwer Academic Publishers, 1996.Google ScholarGoogle ScholarCross RefCross Ref
  21. M. Kubisch, S. Mengesha, D. Hollos, H. Karl, and A. Wolisz. Applying ad-hoc relaying to improve capacity, energy efficiency, and immission in infrastructure-based WLANs. In Proceedings of Kommunikation in Verteilten Systemen (KiVS 2003), Leipzig, Germany, February 2003.Google ScholarGoogle ScholarCross RefCross Ref
  22. B. Lamparter, K. Paul, and D. Westhoff. Charging Support for Ad Hoc Stub Networks. Journal of Computer Communication, Special Issue on 'Internet Pricing and Charging: Algorithms, Technology and Applications', Elsevier Science, Summer 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Y.-D. Lin and Y.-C. Hsu. Multihop Cellular: A New Architecture for Wireless Communications. In Proceedings of INFOCOM. IEEE, 2000.Google ScholarGoogle Scholar
  24. O. C. Mantel, N. Scully, and A. Mawira. Radio Aspects of Hybrid Wireless Ad Hoc Networks. In Proceedings of VTC. IEEE, 2001.Google ScholarGoogle ScholarCross RefCross Ref
  25. S. Marti, T. Giuli, K. Lai, and M. Baker. Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In Proceedings of MobiCom, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. S. Micali and R. L. Rivest. Micropayments Revisited. In Proceedings of the Cryptographer's Track at the RSA Conference 2002, pages 149--163, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. P. Michiardi and R. Molva. Core: A Collaborative Reputation Mechanism To Enforce Node Cooperation In Mobile Ad hoc Networks. In Proceedings of The 6th IFIP Communications and Multimedia Security Conference, Portorosz, Slovenia, September 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. P. Papadimitratos and Z. J. Haas. Secure Routing for Mobile Ad Hoc Networks. In Proceedings of CNDS, January 2002.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. K. Paul and D. Westhoff. Context Aware Inferencing to Rate a Selfish Node in DSR based Ad-hoc Network. In Proceedings of GLOBECOM, November 2002.Google ScholarGoogle Scholar
  30. A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security Protocols for Sensor Networks. In Proceedings of MobiCom, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. H. Wu, C. Qios, S. De, and O. Tonguz. Integrated Cellular and Ad Hoc Relaying Systems: iCAR. IEEE Journal on Selected Areas in Communications, 19(10), October 2001.Google ScholarGoogle Scholar
  32. J. Yoon, M. Liu, and B. Noble. Random Waypoint Considered Harmful. In Proceedings of INFOCOM. IEEE, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  33. A. N. Zadeh, B. Jabbari, R. Pickholtz, and B. Vojcic. Self-Organizing Packet Radio Ad Hoc Networks with Overlay (SOPRANO). IEEE Communications Magazine, June 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. S. Zhong, Y. R. Yang, and J. Chen. Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad Hoc Networks. In Proceedings of INFOCOM. IEEE, 2003.Google ScholarGoogle Scholar

Index Terms

  1. A charging and rewarding scheme for packet forwarding in multi-hop cellular networks

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      MobiHoc '03: Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
      June 2003
      324 pages
      ISBN:1581136846
      DOI:10.1145/778415

      Copyright © 2003 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 1 June 2003

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • Article

      Acceptance Rates

      MobiHoc '03 Paper Acceptance Rate27of192submissions,14%Overall Acceptance Rate296of1,843submissions,16%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader