Title : 
Node cooperation in hybrid ad hoc networks
         
        
            Author : 
Ben Salem, Naouel ; Buttyán, Levente ; Hubaux, Jean-Pierre ; Jakobsson, Markus
         
        
            Author_Institution : 
Lab. of Comput. Commun. & Applications, EPFL-Laussane, Lausanne, Switzerland
         
        
        
        
        
            fDate : 
4/1/2006 12:00:00 AM
         
        
        
        
            Abstract : 
A hybrid ad hoc network is a structure-based network that is extended using multihop communications. Indeed, in this kind of network, the existence of a communication link between the mobile station and the base station is not required: A mobile station that has no direct connection with a base station can use other mobile stations as relays. Compared with conventional (single-hop) structure-based networks, this new generation can lead to a better use of the available spectrum and to a reduction of infrastructure costs. However, these benefits would vanish if the mobile nodes did not properly cooperate and forward packets for other nodes. In this paper, we propose a charging and rewarding scheme to encourage the most fundamental operation, namely packet forwarding. We use "MAC layering" to reduce the space overhead in the packets and a stream cipher encryption mechanism to provide "implicit. authentication" of the nodes involved in the communication. We analyze the robustness of our protocols against rational and malicious attacks. We show that-using our solution-collaboration is rational for selfish nodes. We also show that our protocols thwart rational attacks and detect malicious attacks.
         
        
            Keywords : 
access protocols; ad hoc networks; cryptography; mobile radio; telecommunication security; MAC layering; base station; charging scheme; hybrid ad hoc networks; infrastructure cost reduction; malicious attacks; mobile station; multihop communications; node cooperation; packet forwarding; rewarding scheme; stream cipher encryption mechanism; structure-based networks; Ad hoc networks; Authentication; Base stations; Costs; Cryptography; Mobile communication; Protocols; Relays; Robustness; Spread spectrum communication; Network-level security and protection; authentication security; payment schemes.; wireless communication;
         
        
        
            Journal_Title : 
Mobile Computing, IEEE Transactions on
         
        
        
        
        
            DOI : 
10.1109/TMC.2006.1599405