ABSTRACT
In multi-hop cellular networks, data packets have to be relayed hop by hop from a given mobile station to a base station and vice-versa. This means that the mobile stations must accept to forward information for the benefit of other stations. In this paper, we propose an incentive mechanism that is based on a charging/rewarding scheme and that makes collaboration rational for selfish nodes. We base our solution on symmetric cryptography to cope with the limited resources of the mobile stations. We provide a set of protocols and study their robustness with respect to various attacks. By leveraging on the relative stability of the routes, our solution leads to a very moderate overhead.
- G. N. Aggélou and R. Tafazolli. On the Relaying Capacity of Next-Generation GSM Cellular Networks. IEEE Personal Communications, February 2001.Google Scholar
- Y. Bejerano. Efficient Integration of Multi-Hop Wireless and Wired Networks with QoS Constraints. In Proceedings of MobiCom, pages 215--226. ACM Press, September 2002. Google ScholarDigital Library
- L. Blazevic, L. Buttyán, S. Capkun, S. Giordano, J.-P. Hubaux, and J.-Y. Le Boudec. Self Organization in Mobile Ad-Hoc Networks: the Approach of Terminodes. IEEE Communications Magazine, 39(6), June 2001. Google ScholarDigital Library
- J. Broch, D. A. Maltz, D. B. Johnson, Y.-C. Hu, and J. Jetcheva. A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols. In Proceedings of MobiCom, pages 85--97, 1998. Google ScholarDigital Library
- S. Buchegger and J.-Y. Le Boudec. Performance Analysis of the CONFIDANT Protocol: Cooperation Of Nodes - Fairness In Distributed Ad Hoc NeTworks. In Proceedings of MobiHoc, June 2002. Google ScholarDigital Library
- L. Buttyán and J.-P. Hubaux. Enforcing Service Availability in Mobile Ad Hoc WANs. In Proceedings of MobiHocC, Boston, MA, USA, August 2000. Google ScholarDigital Library
- L. Buttyán and J.-P. Hubaux. Report on a Working Session on Security in Wireless Ad Hoc Networks. ACM Mobile Computing and Communications Review (MC2R), October 2002.Google Scholar
- L. Buttyán and J.-P. Hubaux. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks. ACM/Kluwer Mobile Networks and Applications (MONET), 8(5), October 2003. Google ScholarDigital Library
- T. Camp, J. Boleng, and V. Davies. A Survey of Mobility Models for Ad Hoc Network Research. Wireless Communication and Mobile Computing (WCMC): Special issue on Mobile Ad Hoc Networking: Research, Trends and Applications, 2(5):483--502, 2002.Google Scholar
- B. Goode. Voice Over Internet Protocol (VoIP). Proceedings of the IEEE, 90:1495--1517, September 2002.Google ScholarCross Ref
- V. Gupta, S. Krishnamurthy, and M. Faloutsos. Denial of Service Attacks at the MAC Layer in Wireless Ad Hoc Networks. In Proceedings of Milcom, 2002.Google ScholarCross Ref
- H. Holma and A. Toskala. WCDMA for UMTS: Radio Access for Third Generation Mobile Communications. Wiley, 2002. Google ScholarDigital Library
- H.-Y. Hsieh and R. Sivakumar. Towards a Hybrid Network Model for Wireless Packet Data Networks. In Proceedings of ISCC. IEEE, 2002. Google ScholarDigital Library
- http://www.eskimo.com/\verb+ +weidai/benchmarks.html.Google Scholar
- http://www.terminodes.org.Google Scholar
- Y. C. Hu, A. Perrig, and D. B. Johnson. Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. In Proceedings of MobiCom. ACM Press, September 2002. Google ScholarDigital Library
- Y.-C. Hu, A. Perrig, and D. B. Johnson. Packet Leashes: A Defense against Wormhole Attacks in Wireless Ad Hoc Networks. In Proceedings of INFOCOM. IEEE, 2003.Google ScholarCross Ref
- J.-P. Hubaux, T. Gross, J.-Y. Le Boudec, and M. Vetterli. Towards Self-Organizing Mobile Ad Hoc Networks: the Terminodes Project. IEEE Communications Magazine, 39(1):118 --124, January 2001. Google ScholarDigital Library
- M. Jakobsson, J.-P. Hubaux, and L. Buttyán. A Micro-Payment Scheme Encouraging Collaboration in Multi-Hop Cellular Networks. In Proceedings of Financial Cryptography, 2003.Google ScholarCross Ref
- D. B. Johnson and D. A. Maltz. Dynamic Source Routing in Ad Hoc Wireless Networks. In Mobile Computing edited by Tomasz Imielinski and Hank Korth, chapter 5, pages 153--181. Kluwer Academic Publishers, 1996.Google ScholarCross Ref
- M. Kubisch, S. Mengesha, D. Hollos, H. Karl, and A. Wolisz. Applying ad-hoc relaying to improve capacity, energy efficiency, and immission in infrastructure-based WLANs. In Proceedings of Kommunikation in Verteilten Systemen (KiVS 2003), Leipzig, Germany, February 2003.Google ScholarCross Ref
- B. Lamparter, K. Paul, and D. Westhoff. Charging Support for Ad Hoc Stub Networks. Journal of Computer Communication, Special Issue on 'Internet Pricing and Charging: Algorithms, Technology and Applications', Elsevier Science, Summer 2003. Google ScholarDigital Library
- Y.-D. Lin and Y.-C. Hsu. Multihop Cellular: A New Architecture for Wireless Communications. In Proceedings of INFOCOM. IEEE, 2000.Google Scholar
- O. C. Mantel, N. Scully, and A. Mawira. Radio Aspects of Hybrid Wireless Ad Hoc Networks. In Proceedings of VTC. IEEE, 2001.Google ScholarCross Ref
- S. Marti, T. Giuli, K. Lai, and M. Baker. Mitigating Routing Misbehavior in Mobile Ad Hoc Networks. In Proceedings of MobiCom, 2000. Google ScholarDigital Library
- S. Micali and R. L. Rivest. Micropayments Revisited. In Proceedings of the Cryptographer's Track at the RSA Conference 2002, pages 149--163, 2002. Google ScholarDigital Library
- P. Michiardi and R. Molva. Core: A Collaborative Reputation Mechanism To Enforce Node Cooperation In Mobile Ad hoc Networks. In Proceedings of The 6th IFIP Communications and Multimedia Security Conference, Portorosz, Slovenia, September 2002. Google ScholarDigital Library
- P. Papadimitratos and Z. J. Haas. Secure Routing for Mobile Ad Hoc Networks. In Proceedings of CNDS, January 2002.Google ScholarDigital Library
- K. Paul and D. Westhoff. Context Aware Inferencing to Rate a Selfish Node in DSR based Ad-hoc Network. In Proceedings of GLOBECOM, November 2002.Google Scholar
- A. Perrig, R. Szewczyk, V. Wen, D. Culler, and J. D. Tygar. SPINS: Security Protocols for Sensor Networks. In Proceedings of MobiCom, 2001. Google ScholarDigital Library
- H. Wu, C. Qios, S. De, and O. Tonguz. Integrated Cellular and Ad Hoc Relaying Systems: iCAR. IEEE Journal on Selected Areas in Communications, 19(10), October 2001.Google Scholar
- J. Yoon, M. Liu, and B. Noble. Random Waypoint Considered Harmful. In Proceedings of INFOCOM. IEEE, 2003.Google ScholarCross Ref
- A. N. Zadeh, B. Jabbari, R. Pickholtz, and B. Vojcic. Self-Organizing Packet Radio Ad Hoc Networks with Overlay (SOPRANO). IEEE Communications Magazine, June 2002. Google ScholarDigital Library
- S. Zhong, Y. R. Yang, and J. Chen. Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad Hoc Networks. In Proceedings of INFOCOM. IEEE, 2003.Google Scholar
Index Terms
- A charging and rewarding scheme for packet forwarding in multi-hop cellular networks
Recommendations
Game theoretic packet relaying model for wireless ad hoc networks
In wireless ad hoc networks, nodes are both routers and terminals, and they have to cooperate to communicate. Cooperation at the network layer means routing (finding a path for a packet) and forwarding (relaying packets for others). However, because ...
Multi-hop cellular networks: Architecture and protocols for best-effort and real-time communication
Until recently, research on cellular networks concentrated only in single-hop cellular networks. The demand for high throughput has driven to architectures that use multiple hops in the presence of infrastructure. We propose an architecture for multihop ...
Nash Equilibria of Packet Forwarding Strategies in Wireless Ad Hoc Networks
In self-organizing ad hoc networks, all the networking functions rely on the contribution of the participants. As a basic example, nodes have to forward packets for each other in order to enable multihop communication. In recent years, incentive ...
Comments