A SECURE CREDITING PROTOCOL FOR HYBRID CELLULAR AND AD-HOC NETWORKS

Bogdan Carbunar, Ioannis Ioannidis, Ananth Grama, Jan Vitek

2004

Abstract

While wireless networking seems to be the way of the future, no definite architecture for large scale deployment of such networks has emerged. This can be attributed to financial reasons (a specialized infrastructure is too expensive to build) as well as to the lack of solutions that could work with an existing infrastructure or, in an ad hoc manner, without one. A viable alternative seems to be hybrid wireless networks. Such networks use the existing cellular telephony infrastructure as basis and enhance it by building ad hoc networks of traffic relayers around each cell, improving the overall throughtput and reliability of the network. These relayers are users of the network that are willing to operate as such. In this setting, both efficiency and security are vital properties. We propose SCP as an integrated solution for secure routing and crediting in hybrid networks. We describe how a secure environment can be established efficiently by financially motivating users to avoid attacks. Finally, we show that SCP imposes minimal load both in communication and computation, so that even regular cellular phones can function as relayers, without demanding infrastructure upgrades.

References

  1. Aggelou, G. and Tafazolli, R. (February 2001). On the relaying capacity of next-generation gsm cellular networks. In IEEE Personal Communications Magazine, 8(1):40-47.
  2. Akyildiz, I., Yen, W., and B.Yener (1997). A new hierarchical routing protocol for dynamic multihop wireless networks. In Proceedings of IEEE INFOCOM.
  3. Dahill, B., Levine, B. N., Royer, E., and Shields, C. (2002). A secure routing protocol for ad hoc networks. In Proceedings of ICNP.
  4. De, S., Tonguz, O., Wu, H., and Qiao, C. (2002). Integrated cellular and ad hoc relay (icar) systems: Pushing the performance limits of conventional wireless networks. In Proceedings of HICSS-37.
  5. Hsieh, H.-Y. and Sivakumar, R. (2002). On using the adhoc network model in wireless packet data networks. In Proceedings of ACM MOBIHOC.
  6. Hu, Y.-C., Perrig, A., and Johnson, D. (2002). Ariadne: A secure on-demand routing protocol for ad hoc networks. In Proceedings of ACM MOBICOM.
  7. Lee, S., Banerjee, S., and Bhattacharjee, B. (2004). The case for a multi-hop wireless local area network. In Proceedings of IEEE INFOCOM.
  8. Lin, Y.-D. and Hsu, Y.-C. (2000). Mulithop cellular: A new architecture for wireless communications. In Proceedings of IEEE INFOCOM.
  9. Luo, H., Ramjee, R., Sinha, P., Li, L., and Lu, S. (2003). Ucan: A unified cellular and ad-hoc network architecture. In Proceedings of ACM MOBICOM.
  10. Paul, K. and Westhoff, D. (2002). Context aware inferencing to rate a selfish node in dsr based ad-hoc networks. In Proceedings of IEEE GLOBECOM.
  11. Rousse, T., Band, I., and McLaughlin, S. (2002). Capacity and power investigation of opportunity driven multiple access (odma) networks in tdd-cdma based systems. In Proceedings of IEEE ICC.
  12. Salem, N., Buttyan, L., Hubaux, J.-P., and Jakobsson, M. (2003). A charging and rewarding scheme for packet forwarding in multi-hop cellular networks. In Proceedings of ACM MOBIHOC.
  13. Wu, X., Chan, S.-H., and Mukherjee, B. (2000). Madf: A novel approach to add an ad-hoc overlay on a fixed cellular infrastructure. In Proceedings of IEEE WCWN.
  14. Yoon, J., Liu, M., and Noble, B. (2003). Random waypoint considered harmful. In Proceedings of IEEE INFOCOM.
Download


Paper Citation


in Harvard Style

Carbunar B., Ioannidis I., Grama A. and Vitek J. (2004). A SECURE CREDITING PROTOCOL FOR HYBRID CELLULAR AND AD-HOC NETWORKS . In Proceedings of the First International Conference on E-Business and Telecommunication Networks - Volume 3: ICETE, ISBN 972-8865-15-5, pages 142-149. DOI: 10.5220/0001389901420149


in Bibtex Style

@conference{icete04,
author={Bogdan Carbunar and Ioannis Ioannidis and Ananth Grama and Jan Vitek},
title={A SECURE CREDITING PROTOCOL FOR HYBRID CELLULAR AND AD-HOC NETWORKS},
booktitle={Proceedings of the First International Conference on E-Business and Telecommunication Networks - Volume 3: ICETE,},
year={2004},
pages={142-149},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001389901420149},
isbn={972-8865-15-5},
}


in EndNote Style

TY - CONF
JO - Proceedings of the First International Conference on E-Business and Telecommunication Networks - Volume 3: ICETE,
TI - A SECURE CREDITING PROTOCOL FOR HYBRID CELLULAR AND AD-HOC NETWORKS
SN - 972-8865-15-5
AU - Carbunar B.
AU - Ioannidis I.
AU - Grama A.
AU - Vitek J.
PY - 2004
SP - 142
EP - 149
DO - 10.5220/0001389901420149