IJIRST –International Journal for Innovative Research in Science & Technology| Volume 1 | Issue 6 | November 2014 ISSN (online): 2349-6010
Fair, Efficient, and Secure Cooperation Incentive Mechanism for Multihop Cellular Networks M.Sasikumar PG and Research Department of Computer Science Indo-American College, Cheyyar-604407, Thiruvannamalai District
C.Parthiban PG and Research Department of Computer Science Indo-American College, Cheyyar-604407, Thiruvannamalai District
Abstract We propose a fair and efficient incentive mechanism to stimulate the node cooperation. Our mechanism applies a fair charging policy by charging the source and destination nodes when both of them benefit from the communication. To implement this charging policy efficiently, hashing operations are used in the ACK packets to reduce the number of public-key-cryptography operations. Moreover, reducing the overhead of the payment checks is essential for the efficient implementation of the incentive mechanism due to the large number of payment transactions. Instead of generating a check per message, a small-size check can be generated per route, and a check submission scheme is proposed to reduce the number of submitted checks and protect against collusion attacks. Extensive analysis and simulations demonstrate that our mechanism can secure the payment and significantly reduce the checks’ overhead, and the fair charging policy can be implemented almost computationally free by using hashing operations. Keywords: Cryptography FESCIM, MCN,RREQ, RREP, SCN _______________________________________________________________________________________________________
I. INTRODUCTION Network Security has become more important to personal computer users, organizations, and the military. With the advent of the internet, security became a major concern and the history of security allows a better understanding of the emergence of security technology. The internet structure itself allowed for many security threats to occur. The architecture of the internet, when modified can reduce the possible attacks that can be sent across the network. Network security is generally taken as providing protection at the boundaries of an organization by keeping out intruders (hackers).Information security, however, explicitly focuses on protecting data resources from malware attack or simple mistakes by people within an organization by use of data loss prevention techniques. Network security measures are needed to protect data during their transmission because virtually all business, Government and academic organizations are interconnected their systems with a collection of networks referred as Internet. A. Multihop Cellular Networks Hybrid ad hoc network (also called multi-hop cellular network (MCN)) is a network architecture which incorporates the ad hoc characteristics into the cellular system. The packets originated from a node are relayed through the mobile nodes to the receiver or to a base station which delivers them to the receiver. The network nodes commit bandwidth, data Multihop cellular networks (MCNs), or the next-generation networks, can significantly improve network performance and deployment and help implement many novel applications and services. However, when compared to wired and single-hop wireless networks, MCNs are highly vulnerable to serious security threats because packets may be relayed through integrated networks and autonomous devices. My research has been focusing on developing security protocols for securing MCNs. Specifically, we are interested in securing route establishment and data transmission processes, establishing stable routes, and preserving users’ anonymity and location privacy. We propose FESCIM, a Fair, Efficient, and Secure Cooperation Incentive Mechanism, to stimulate the node cooperation in MCN. In order to efficiently and securely charge the source and destination nodes, the lightweight hashing operations are used in the ACK packets to reduce the number of public-key-cryptography operations. The destination node generates a hash chain and signs its root, and acknowledges message reception by releasing a hash value from the hash chain. In this way, the destination node generates a signature per group of messages instead of generating a signature per message. Multihop Cellular Network (MCN), for wireless communications. MCN preserves the bandwidth of conventional Single-hop cellular networks (SCN) where the service infrastructure is constructed by fixed bases, and it also incorporates the flexibility of ad-hoc networks where wireless transmission through mobile stations in multiple hops are allowed. MCN can reduce the required number of bases or improve the throughput performance, while limiting path vulnerability encountered in adhoc networks. The considered MCN includes an accounting center, a set of base stations, and mobile nodes.
All rights reserved by www.ijirst.org
202