Charging support for ad hoc stub networks

  • Authors:
  • B. Lamparter;K. Paul;D. Westhoff

  • Affiliations:
  • NEC Europe Ltd, Kurfürsten-Anlage 36, D-69115 Heidelberg, Germany;Indian Institute of Technology, Bombay 400076, India;NEC Europe Ltd, Kurfürsten-Anlage 36, D-69115 Heidelberg, Germany

  • Venue:
  • Computer Communications
  • Year:
  • 2003

Quantified Score

Hi-index 0.24

Visualization

Abstract

Wired equivalent security is difficult to provide in ad hoc networks due to high dynamics, wireless link vulnerability, and the requirement of complete decentralization. Especially mutual authentication among nodes in a self-organized mode of ad hoc network, where a single definition of trust is hard to build, is very difficult. This leads to several loopholes in previously established security architectures and intrusion detection systems if employed to ad hoc networks. Also, typical to ad hoc routing major security lacks are unfair participation of nodes in the system, and frequent attacks to the routing protocols by ad hoc nodes that do not want to forward foreign packets but use other nodes to forward their own packets. Contrary to detection-based approaches to tackle this situation, we propose a motivation-based approach, which does not require mutual authentication. We enable this by providing (a) a realistic architecture of ad hoc access network to an Internet Service Provider, (b) a workable business model for charging in this architecture and (c) a necessary security protocol to implement the charging scheme. For the latter we give a formal validation.