Skip to main content
Top

2014 | OriginalPaper | Chapter

3. Efficient Incentive Scheme

Authors : Mohamed M. E. A. Mahmoud, Xuemin (Sherman) Shen

Published in: Security for Multi-hop Wireless Networks

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this chapter, we first explain the payment model that is specifically tailored to cooperation stimulation in MWNs. Then, we explain and evaluate an efficient and secure communication protocol called ESIP and an efficient payment receipt submission scheme called RACE. Using ESIP, the payment can be secured with limited use of public key cryptography in sending packets from a source node to a destination node. RACE is a scheme to efficiently submit and process the payment data to Tp.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference C. Gentry and Z. Ramzan. Microcredits for verifiable foreign service provider metering. Financial Cryptography, Lecture Notes in Computer Science, Springer Berlin/Heidelberg, 3110:9–23, 2004. C. Gentry and Z. Ramzan. Microcredits for verifiable foreign service provider metering. Financial Cryptography, Lecture Notes in Computer Science, Springer Berlin/Heidelberg, 3110:9–23, 2004.
2.
go back to reference I. Papaefstathiou and C. Manifavas. Evaluation of micropayment transaction costs. Journal of Electronic Commerce Research, 5(2):99–113, 2004. I. Papaefstathiou and C. Manifavas. Evaluation of micropayment transaction costs. Journal of Electronic Commerce Research, 5(2):99–113, 2004.
3.
go back to reference J. Palmer and L. Eriksen. Digital newspapers explore marketing on the internet. ACM Communications, 42(9):33–40, 1999.CrossRef J. Palmer and L. Eriksen. Digital newspapers explore marketing on the internet. ACM Communications, 42(9):33–40, 1999.CrossRef
4.
go back to reference L. Buttyan and J. Hubaux. Stimulating cooperation in self-organizing mobile ad hoc networks. Mobile Networks and Applications, 8(5):579–592, Oct. 2004.CrossRef L. Buttyan and J. Hubaux. Stimulating cooperation in self-organizing mobile ad hoc networks. Mobile Networks and Applications, 8(5):579–592, Oct. 2004.CrossRef
5.
go back to reference L. Buttyan and J. Hubaux. Enforcing service availability in mobile ad-hoc wans. Proc. of IEEE/ACM international symposium on Mobile Ad Hoc Networking and Computing (MobiHOC’00), Boston, Massachusetts, USA, pages 87–96, Aug. 11-2000. L. Buttyan and J. Hubaux. Enforcing service availability in mobile ad-hoc wans. Proc. of IEEE/ACM international symposium on Mobile Ad Hoc Networking and Computing (MobiHOC’00), Boston, Massachusetts, USA, pages 87–96, Aug. 11-2000.
6.
go back to reference A. Weyland. Cooperation and accounting in multi-hop cellular networks. Ph.D. thesis, University of Bern, Nov. 2005. A. Weyland. Cooperation and accounting in multi-hop cellular networks. Ph.D. thesis, University of Bern, Nov. 2005.
7.
go back to reference A. Weyland, T. Staub, and T. Braun. Comparison of motivation-based cooperation mechanisms for hybrid wireless networks. Computer Communications, 29:2661–2670, 2006.CrossRef A. Weyland, T. Staub, and T. Braun. Comparison of motivation-based cooperation mechanisms for hybrid wireless networks. Computer Communications, 29:2661–2670, 2006.CrossRef
8.
go back to reference S. Zhong, J. Chen, and R. Yang. Sprite: A simple, cheat-proof, credit based system for mobile ad-hoc networks. Proc. of IEEE INFOCOM, San Francisco, CA, USA, 3:1987–1997, Mar. 30 - Apr. 3 2003. S. Zhong, J. Chen, and R. Yang. Sprite: A simple, cheat-proof, credit based system for mobile ad-hoc networks. Proc. of IEEE INFOCOM, San Francisco, CA, USA, 3:1987–1997, Mar. 30 - Apr. 3 2003.
9.
go back to reference T. Chen and S. Zhong. Inpac: An enforceable incentive scheme for wireless networks using network coding. Proc. of IEEE INFOCOM, San Diego, CA, USA, Mar. 14–19 2010. T. Chen and S. Zhong. Inpac: An enforceable incentive scheme for wireless networks using network coding. Proc. of IEEE INFOCOM, San Diego, CA, USA, Mar. 14–19 2010.
10.
go back to reference H. Janzadeh, K. Fayazbakhsh, M. Dehghan, and M. Fallah. A secure credit-based cooperation stimulating mechanism for manets using hash chains. Future Generation Computer Systems, 25(8):926–934, Sep. 2009.CrossRef H. Janzadeh, K. Fayazbakhsh, M. Dehghan, and M. Fallah. A secure credit-based cooperation stimulating mechanism for manets using hash chains. Future Generation Computer Systems, 25(8):926–934, Sep. 2009.CrossRef
11.
go back to reference M. Mahmoud and X. Shen. Myrpa: An incentive system with reduced receipts for multi-hop wireless networks. Proc. of IEEE Vehicular Technology Conference (IEEE VTC’10-Fall), Ottawa, Canada, Sept. 6–9 2010. M. Mahmoud and X. Shen. Myrpa: An incentive system with reduced receipts for multi-hop wireless networks. Proc. of IEEE Vehicular Technology Conference (IEEE VTC’10-Fall), Ottawa, Canada, Sept. 6–9 2010.
12.
go back to reference Y. Zhang, W. Lou, and Y. Fang. A secure incentive protocol for mobile ad hoc networks. ACM Wireless Networks, 13(5):569–582, Oct. 2007.CrossRef Y. Zhang, W. Lou, and Y. Fang. A secure incentive protocol for mobile ad hoc networks. ACM Wireless Networks, 13(5):569–582, Oct. 2007.CrossRef
13.
go back to reference J. Pan, L. Cai, X. Shen, and J. Mark. Identity-based secure collaboration in wireless ad hoc networks. Computer Networks (Elsevier), 51(3):853–865, 2007. J. Pan, L. Cai, X. Shen, and J. Mark. Identity-based secure collaboration in wireless ad hoc networks. Computer Networks (Elsevier), 51(3):853–865, 2007.
14.
go back to reference M. Mahmoud and X. Shen. Fescim: Fair, efficient, and secure cooperation incentive mechanism for hybrid ad hoc networks. IEEE Transactions on Mobile Computing (IEEE TMC), 11(5):753–766, May 2012. M. Mahmoud and X. Shen. Fescim: Fair, efficient, and secure cooperation incentive mechanism for hybrid ad hoc networks. IEEE Transactions on Mobile Computing (IEEE TMC), 11(5):753–766, May 2012.
15.
go back to reference S. Zhong, L. Li, Y. G. Liu, and Y. R. Yang. On designing incentive compatible routing and forwarding protocols in wireless ad-hoc networks. Proc. of ACM MobiCom, New York, NY, USA, pages 117–131, Aug. 2005. S. Zhong, L. Li, Y. G. Liu, and Y. R. Yang. On designing incentive compatible routing and forwarding protocols in wireless ad-hoc networks. Proc. of ACM MobiCom, New York, NY, USA, pages 117–131, Aug. 2005.
16.
go back to reference L. Anderegg and S. Eidenbenz. Ad hoc-vcg: A trustful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents. Proc. of ACM MobiCom, San Diego, CA, USA, Sep. 2003. L. Anderegg and S. Eidenbenz. Ad hoc-vcg: A trustful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents. Proc. of ACM MobiCom, San Diego, CA, USA, Sep. 2003.
17.
go back to reference M. Jakobsson, J. Hubaux, and L. Buttyan. A micro-payment scheme encouraging collaboration in multi-hop cellular networks. Proc. of the 7th Financial Cryptography (FC’03), 2742:15–33, Jan. 2003. M. Jakobsson, J. Hubaux, and L. Buttyan. A micro-payment scheme encouraging collaboration in multi-hop cellular networks. Proc. of the 7th Financial Cryptography (FC’03), 2742:15–33, Jan. 2003.
18.
go back to reference M. Mahmoud and X. Shen. Stimulating cooperation in multi-hop wireless networks using cheating detection system. Proc. of IEEE INFOCOM, San Diego, California, USA, Mar. 14–19 2010. M. Mahmoud and X. Shen. Stimulating cooperation in multi-hop wireless networks using cheating detection system. Proc. of IEEE INFOCOM, San Diego, California, USA, Mar. 14–19 2010.
19.
go back to reference N. Salem, L. Buttyan, J. Hubaux, and M. Jakobsson. Node cooperation in hybrid ad hoc networks. IEEE Transactions on Mobile Computing, 5(4):365–376, Apr. 2006.CrossRef N. Salem, L. Buttyan, J. Hubaux, and M. Jakobsson. Node cooperation in hybrid ad hoc networks. IEEE Transactions on Mobile Computing, 5(4):365–376, Apr. 2006.CrossRef
20.
go back to reference B. Lamparter, K. Paul, and D. Westhoff. Charging support for ad hoc stub networks. Computer Communications, 26(13):1504–1514, 2003.CrossRef B. Lamparter, K. Paul, and D. Westhoff. Charging support for ad hoc stub networks. Computer Communications, 26(13):1504–1514, 2003.CrossRef
21.
go back to reference M. Mahmoud and X. Shen. Pis: A practical incentive system for multi-hop wireless networks. IEEE Transactions on Vehicular Technology, 59(8):4012–4025, 2010.CrossRef M. Mahmoud and X. Shen. Pis: A practical incentive system for multi-hop wireless networks. IEEE Transactions on Vehicular Technology, 59(8):4012–4025, 2010.CrossRef
22.
go back to reference M. Mahmoud and X. Shen. Dsc: Cooperation incentive mechanism for multi-hop cellular networks. Proc. of IEEE ICC’09, Germany, Jun. 14–18 2009. M. Mahmoud and X. Shen. Dsc: Cooperation incentive mechanism for multi-hop cellular networks. Proc. of IEEE ICC’09, Germany, Jun. 14–18 2009.
23.
go back to reference M. Mahmoud and X. Shen. Esip: Secure incentive protocol with limited use of public-key cryptography for multi-hop wireless networks. IEEE Transactions on Mobile Computing (IEEE TMC), 10(7):997–1010, July 2011. M. Mahmoud and X. Shen. Esip: Secure incentive protocol with limited use of public-key cryptography for multi-hop wireless networks. IEEE Transactions on Mobile Computing (IEEE TMC), 10(7):997–1010, July 2011.
24.
go back to reference M. Mahmoud and X. Shen. Secure cooperation incentive scheme with limited use of public key cryptography for multi-hop wireless network. Proc. of IEEE Global Communication Conference (IEEE GLOBECOM’10), Miami, Florida, USA, December 6–10 2010. M. Mahmoud and X. Shen. Secure cooperation incentive scheme with limited use of public key cryptography for multi-hop wireless network. Proc. of IEEE Global Communication Conference (IEEE GLOBECOM’10), Miami, Florida, USA, December 6–10 2010.
25.
go back to reference M. Mahmoud and X. Shen. A secure payment scheme with low communication and processing overhead for multihop wireless networks. IEEE Transactions on Parallel and Distributed Systems (IEEE TPDS), 24(2):209–224, Feb. 2013. M. Mahmoud and X. Shen. A secure payment scheme with low communication and processing overhead for multihop wireless networks. IEEE Transactions on Parallel and Distributed Systems (IEEE TPDS), 24(2):209–224, Feb. 2013.
26.
go back to reference M. Mahmoud and X. Shen. Rise: Receipt-free cooperation incentive scheme for multi-hops wireless networks. Proc. of IEEE ICC’11, Kyoto, Japan, June 5–9 2011. M. Mahmoud and X. Shen. Rise: Receipt-free cooperation incentive scheme for multi-hops wireless networks. Proc. of IEEE ICC’11, Kyoto, Japan, June 5–9 2011.
28.
go back to reference NIST. Digital hash standard. Federal Information Processing Standards Publication 180-1, Apr. 1995. NIST. Digital hash standard. Federal Information Processing Standards Publication 180-1, Apr. 1995.
29.
go back to reference K. Sanzgiri, D. LaFlamme, B. Dahill, B. Levine, C. Shields, and E. Belding-Royer. Authenticated routing for ad hoc networks. IEEE Selected Areas in Communications, 23(3):598–610, Mar. 2005.CrossRef K. Sanzgiri, D. LaFlamme, B. Dahill, B. Levine, C. Shields, and E. Belding-Royer. Authenticated routing for ad hoc networks. IEEE Selected Areas in Communications, 23(3):598–610, Mar. 2005.CrossRef
30.
go back to reference Y. Hu, A. Perrig, and D. Johnson. Ariadne: A secure on-demand routing protocol for ad hoc networks. Proc. of ACM MobiCom, Atlanta, GA, USA, Sep. 2002. Y. Hu, A. Perrig, and D. Johnson. Ariadne: A secure on-demand routing protocol for ad hoc networks. Proc. of ACM MobiCom, Atlanta, GA, USA, Sep. 2002.
31.
go back to reference National Institute of Standards and Technology (NIST). Recommendation for key management - part 1: general (revised). Special Publication 800–57 200, 2007. National Institute of Standards and Technology (NIST). Recommendation for key management - part 1: general (revised). Special Publication 800–57 200, 2007.
32.
go back to reference J. Yoon, M. Liu, and B. Nobles. Sound mobility models. Proc. of ACM MobiCom, San Diego, CA, USA, Sep. 2003. J. Yoon, M. Liu, and B. Nobles. Sound mobility models. Proc. of ACM MobiCom, San Diego, CA, USA, Sep. 2003.
34.
go back to reference N. Potlapally, S. Ravi, A. Raghunathan, and N. Jha. A study of the energy consumption characteristics of cryptographic algorithms and security protocols. IEEE Transactions on Mobile Computing, 5(2):128–143, Mar.-Apr. 2006.CrossRef N. Potlapally, S. Ravi, A. Raghunathan, and N. Jha. A study of the energy consumption characteristics of cryptographic algorithms and security protocols. IEEE Transactions on Mobile Computing, 5(2):128–143, Mar.-Apr. 2006.CrossRef
35.
go back to reference Y. Zhang, W. Liu, W. Lou, and Y. Fang. Location-based compromise-tolerant security mechanisms for wireless sensor networks. IEEE Journal Selected Areas Communication, 24(2):247–260, 2006.CrossRef Y. Zhang, W. Liu, W. Lou, and Y. Fang. Location-based compromise-tolerant security mechanisms for wireless sensor networks. IEEE Journal Selected Areas Communication, 24(2):247–260, 2006.CrossRef
36.
go back to reference A. Mitra el at. High-performance low power sensor platforms featuring gigabyte scale storage. Proc. of IEEE/ACM Measurement, Modeling, and Performance Analysis of Wireless Sensor Networks, 2005. A. Mitra el at. High-performance low power sensor platforms featuring gigabyte scale storage. Proc. of IEEE/ACM Measurement, Modeling, and Performance Analysis of Wireless Sensor Networks, 2005.
Metadata
Title
Efficient Incentive Scheme
Authors
Mohamed M. E. A. Mahmoud
Xuemin (Sherman) Shen
Copyright Year
2014
DOI
https://doi.org/10.1007/978-3-319-04603-7_3

Premium Partner