A Charging and Rewarding Scheme for Packet Forwarding in Multi-hop Cellular Networks N. Ben Salem*, L. Buttyán**, J.-P. Hubaux* and M. Jakobsson*** * Laboratory.

Slides:



Advertisements
Similar presentations
CSE 413: Computer Networks
Advertisements

Chris Karlof and David Wagner
EPFL, Lausanne, Switzerland Márk Félegyházi Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks – the Static Case Márk Félegyházi.
Incentive-Compatible Opportunistic Routing for Wireless Networks Fan Wu, Tingting Chen, Sheng Zhong (SUNY Buffalo) Li Erran Li Li Erran Li (Bell Labs)
Stimulation for Cooperation in Ad Hoc Networks: Beyond Nuglets Levente Buttyán, Jean-Pierre Hubaux, and Naouel Ben Salem Swiss Federal Institute of Technology.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
A Mobile Ad hoc Biosensor Network Muzammil KP S7,ECE Govt. Engg. College, Wayanad.
Hubaux Ne X tworking’03 June 23-25,2003, Chania, Crete, Greece The First COST-IST(EU)-NSF(USA) Workshop on EXCHANGES & TRENDS IN N ETWORKING 1 Self-organization.
802.11a/b/g Networks Herbert Rubens Some slides taken from UIUC Wireless Networking Group.
DSR The Dynamic Source Routing Protocol Students: Mirko Gilioli Mohammed El Allali.
Packet Leashes: Defense Against Wormhole Attacks Authors: Yih-Chun Hu (CMU), Adrian Perrig (CMU), David Johnson (Rice)
Defending Against Traffic Analysis Attacks in Wireless Sensor Networks Security Team
Stimulation for Cooperation in Ad Hoc and Multi-hop Cellular Networks N. Ben Salem*, L. Buttyán*, J.-P. Hubaux* and M. Jakobsson** * Laboratory of Computer.
MANETs Routing Dr. Raad S. Al-Qassas Department of Computer Science PSUT
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
Network Access Control for Mobile Ad Hoc Network Pan Wang North Carolina State University.
Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Secure Routing and Intrusion Detection For Mobile Ad Hoc Networks Anand Patwardhan Jim.
1 SOWER: Self-Organizing Wireless Network for Messaging Márk Félegyházi {mark.felegyhazi, srdan.capkun, Srdjan Čapkun Jean-Pierre.
Nov.6, 2002 Secure Routing Protocol for Ad Hoc Networks Li Xiaoqi.
Intercepting Mobiles Communications: The Insecurity of Danny Bickson ACNS Course, IDC Spring 2007.
Secure Data Communication in Mobile Ad Hoc Networks Authors: Panagiotis Papadimitratos and Zygmunt J Haas Presented by Sarah Casey Authors: Panagiotis.
1 Cross-Layer Scheduling for Power Efficiency in Wireless Sensor Networks Mihail L. Sichitiu Department of Electrical and Computer Engineering North Carolina.
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks Jeff Janies, Chin-Tser Huang, Nathan L. Johnson.
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Cooperation between Nodes in Multi-Hop Wireless Networks Jean-Pierre Hubaux 1 Joint work with Naouel Ben Salem 1, Levente Buttyan 2, Srdjan Čapkun 1, Mark.
Denial of Service Resilience in Ad Hoc Networks Imad Aad, Jean-Pierre Hubaux, and Edward W. Knightly Designed by Yao Zhao.
Encapsulation Security Payload Protocol Lan Vu. OUTLINE 1.Introduction and terms 2.ESP Overview 3.ESP Packet Format 4.ESP Fields 5.ESP Modes 6.ESP packet.
Milano, 4-5 Ottobre 2004 IS-MANET The Virtual Routing Protocol for Ad Hoc Networks ISTI – CNR S. Chessa.
Mobile IP Performance Issues in Practice. Introduction What is Mobile IP? –Mobile IP is a technology that allows a "mobile node" (MN) to change its point.
Does Packet Replication Along Multipath Really Help ? Swades DE Chunming QIAO EE Department CSE Department State University of New York at Buffalo Buffalo,
VIRTUAL ROUTER Kien A. Hua Data Systems Lab School of EECS University of Central Florida.
A Fair Scheduling for Wireless Mesh Networks Naouel Ben Salem and Jean-Pierre Hubaux Laboratory of Computer Communications and Applications (LCA) EPFL.
Secure Cell Relay Routing Protocol for Sensor Networks Xiaojiang Du, Fengiing Lin Department of Computer Science North Dakota State University 24th IEEE.
An efficient secure distributed anonymous routing protocol for mobile and wireless ad hoc networks Authors: A. Boukerche, K. El-Khatib, L. Xu, L. Korba.
Denial of Service (DoS) Attacks in Green Mobile Ad–hoc Networks Ashok M.Kanthe*, Dina Simunic**and Marijan Djurek*** MIPRO 2012, May 21-25,2012, Opatija,
GZ06 : Mobile and Adaptive Systems A Secure On-Demand Routing Protocol for Ad Hoc Networks Allan HUNT Wandao PUNYAPORN Yong CHENG Tingting OUYANG.
CELLULAR DATA NETWORKS Mr. Husnain Sherazi Lecture 5.
A Micro-Payment Scheme Encouraging Collaboration in Multi-Hop Cellular Networks Markus Jakobsson 1 Jean- Pierre Hubaux 2 Levente Buttyán 2,3 1 RSA Laboratories.
MARCH : A Medium Access Control Protocol For Multihop Wireless Ad Hoc Networks 성 백 동
Dynamic Source Routing in ad hoc wireless networks Alexander Stojanovic IST Lisabon 1.
A Power Saving MAC Protocol for Wireless Networks Technical Report July 2002 Eun-Sun Jung Texas A&M University, College Station Nitin H. Vaidya University.
1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida.
Dynamic Source Routing (DSR) Sandeep Gupta M.Tech - WCC.
Secure routing in wireless sensor network: attacks and countermeasures Presenter: Haiou Xiang Author: Chris Karlof, David Wagner Appeared at the First.
Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University, Australia.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
A Multiplex-Multicast Scheme that Improves System Capacity of Voice- over-IP on Wireless LAN by 100% * B 葉仰廷 B 陳柏煒 B 林易增 B
Security in Mobile Ad Hoc Networks: Challenges and Solutions (IEEE Wireless Communications 2004) Hao Yang, et al. October 10 th, 2006 Jinkyu Lee.
A Scalable Routing Protocol for Ad Hoc Networks Eric Arnaud Id:
Security in Wireless Ad Hoc Networks. 2 Outline  wireless ad hoc networks  security challenges  research directions  two selected topics – rational.
Mitigating Routing Misbehavior in Mobile Ad Hoc Networks Sergio Marti, T.J. Giuli, Kevin.
Stretchable Architectures for Next Generation Cellular Networks Presented By Shashidhar Lakkavalli, Ansuya Negi and Dr. Suresh Singh Portland State University.
Tufts Wireless Laboratory School Of Engineering Tufts University Paper Review “An Energy Efficient Multipath Routing Protocol for Wireless Sensor Networks”,
Muhammad Mahmudul Islam Ronald Pose Carlo Kopp School of Computer Science & Software Engineering Monash University Australia.
Shambhu Upadhyaya 1 Sensor Networks – Hop- by-Hop Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 22)
Cross-Layer Scheduling for Power Efficiency in Wireless Sensor Networks Mihail L. Sichitiu Department of Electrical and Computer Engineering North Carolina.
SHORT: Self-Healing and Optimizing Routing Techniques for Mobile Ad Hoc Networks Presenter: Sheng-Shih Wang October 30, 2003 Chao Gui and Prasant Mohapatra.
1 An Interleaved Hop-by-Hop Authentication Scheme for Filtering of Injected False Data in Sensor Networks Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng.
1 Routing security against Threat models CSCI 5931 Wireless & Sensor Networks CSCI 5931 Wireless & Sensor Networks Darshan Chipade.
Pune, India, 13 – 15 December 2010 ITU-T Kaleidoscope 2010 Beyond the Internet? - Innovations for future networks and services Guowei CHEN GITS, Waseda.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 27 November 23, 2004.
Mobile Networks and Applications (January 2007) Presented by J.H. Su ( 蘇至浩 ) 2016/3/21 OPLab, IM, NTU 1 Joint Design of Routing and Medium Access Control.
Performance Comparison of Ad Hoc Network Routing Protocols Presented by Venkata Suresh Tamminiedi Computer Science Department Georgia State University.
Cryptography CSS 329 Lecture 13:SSL.
-1/16- Maximum Battery Life Routing to Support Ubiquitous Mobile Computing in Wireless Ad Hoc Networks C.-K. Toh, Georgia Institute of Technology IEEE.
SYNERGY: A Game-Theoretical Approach for Cooperative Key Generation in Wireless Networks Jingchao Sun, Xu Chen, Jinxue Zhang, Yanchao Zhang, and Junshan.
CSE 4905 Network Security Overview
Authors: Chun-Ta Li and Min-Shiang Hwang Reporter: Chun-Ta Li (李俊達)
Lecture 36.
Lecture 36.
Presentation transcript:

A Charging and Rewarding Scheme for Packet Forwarding in Multi-hop Cellular Networks N. Ben Salem*, L. Buttyán**, J.-P. Hubaux* and M. Jakobsson*** * Laboratory of Computer Communications and Applications (LCA) Swiss Federal Institute of Technology – Lausanne (EPFL), Switzerland ** Department of Telecommunications, Budapest University of Technology and Economics, Hungary *** RSA Laboratories, Hoboken, NJ, USA NCCR/MICS

2 Outline 1.Multi-hop Cellular Networks 6. Conclusions and future work 2. Model a.System and trust model b.Adversarial model 3. The protocol a.Session setup b.Packet sending c.Payment redemption 4.Security analysis 5. Overhead of the solution a.Communication Overhead b.Computation Overhead

3 Cell = The geographical area under the control of a base station A node beyond the reach of the base station coverage can use other mobile stations as relays Multi-hop cellular networks Combine the characteristics of cellular and ad hoc networks Backbone A B Set of base stations connected to a backbone Backbone Advantages: – Increase the coverage of the network – Small number of base stations (fixed antennas) – Reduce the energy consumption of the sending mobile station – Reduced interference

4 Problem statement Multi-hop cellular networks represent a new and promising paradigm, but … No cooperation = the network does not work We exclusively consider the packet forwarding service Charge the initiator A of the communication Reward the cooperative forwarding nodes (and the operator) Why would the intermediate nodes use their battery to relay packets for other nodes? A i 1 BS A B j 1 BS B InitiatorCorrespondent

5 Model A i 1 BS A B j 1 BS B The initiator A wants to communicate with the correspondent B End-to-end session A has to establish an end-to-end session with B (a session is a secure route on which all the nodes are authenticated) This is done by establishing: –An initiator session between A and BS A Initiator session –A correspondent session between BS B and B Correspondent session The operator charges A for the traffic (in both directions) Then, A and B exchange packets Packet exchange System model:

6 Model Node i shares a symmetric key K i with the operator The nodes trust the operator for: – not revealing secret keys – correctly transmitting packets – correctly performing billing and auditing The nodes do not trust each other The underlying routing protocol is secure All the communications go through a base station Nodes are mobile but we have a certain level of route stability Trust model and assumptions: Adversarial Model: The nodes are rational: – they are potential attackers if cheating is beneficial – they will cooperate if they expect a gain Collusions are possible We consider the pessimistic case where all the attackers are under the control of a single entity

7 Session Setup A i BS A B BS B j AReqIDoldASIDARouteTrafficInfo AReq 0 MAC A MAC i AReqIDoldASIDARouteTrafficInfo AReq i AReqIDoldASIDARouteTrafficInfoMAC i-1 AReq i-1 AReqIDoldASIDARouteTrafficInfo AReq a MAC a A layered MAC that BS A can verify

8 Session Setup A i BS A B BS B j Req Layered MAC authentication BReqIDoldBSIDBRouteTrafficInfo BReq 0 SID KiKi Stream Cipher Generation seed i MaxLength PAD i,1 PAD i,2 PAD i, MAC A … MAC 1 MAC a AReqIDASID AConf BReqIDBSID BConf MAC 1 …MAC b MAC B

9 Packet Sending S i BS S D BS D j SSID Payload SPkt 0, MAC S Body 0, SSID Body i-1, SPkt i-1, SSID Body i, SPkt i, = Encrypted data that BS S can decrypt SPkt s, SSID Body s, PAD i, 

10 Packet Sending S i BS S D BS D j DSID Payload MAC D Body’ 0, PAD 1,  DSID Body 0, DPkt i, = Iterative XOR The Body is decrypted DPkt d, DSID Body d, Payload MAC D Acknowledgement for the packet  PAD 1,

11 Payment Redemption Charging and rewarding mechanism: - When the packet SPkt of length L reaches BS S A is charged n (L ) The forwarders in the up-stream are rewarded  (L ) each The operator is rewarded - When the packet DAck is received by a base station The forwarders in the down-stream are rewarded  (L ) each D is refunded  for each packet it acknowledges - When the packet DPkt is injected in the down-stream D is charged a small amount  A=S i 1 BS A B=D j 1 BS B

12 Payment Redemption –D maintains: Batch =  MAC K D (DSID | | Payload )  LastPkt;  LostPkts – DAck is sent offline after the session is closed – One acknowledgement per session: DAck = [ DSID | Batch | lastPkt | LostPkts | MAC K D (DSID | Batch | lastPkt | LostPkts ) ] DPkt d, DSID Payload MAC D Acknowledgement for the packet Destination Acknowledgment:

13 Security Analysis Incentive to cooperate: The up-stream nodes get rewarded only if SPkt reaches BS S The down-stream nodes get rewarded only if D acknowledges DPkt D is refunded only if it acknowledges DPkt Disincentive against cheating: Refusal to pay: –The MAC in the packet uniquely identifies S Incorrect reward claims: –A node i is credited if it is part of both the session setup and the packet sending phases –A node i is the only node that is able to correctly compute the layered MAC in the session setup and the PAD in the packet sending Free-riding: –The packets are encrypted at each hop –The nodes are not rewarded and the transmitted data is garbled Emulated nodes: –A node is in several physical locations simultaneously –Some nodes seem to be always neighbors –Capture a rogue device

14 Communication Overhead Sizes of the fields: Field NameReqIDSIDoldSIDRouteTrafficInfoMAC LostPkts Size (bytes)444NbFwdrs*1616 2NbLostPkts*2 – Session Setup Phase: 144+NbFwdrs*64 bytes – Packet Sending Phase: 20 bytes per packet – Sending the Acknowledgement: 38+2*NbLostPkts bytes per session  Numerical values? Simulations: –100 nodes in a 500x500 m 2 cell with one base station in the center –Fixed power range of 100 m –RWP: uniform speed  [0,20] m/s; pause time  {0,60,120,300,600} s –We discard the first 1000 s of simulation time –100 simulations for each value of the pause time Figures of interest: – Average lifetime of a route (AverageLifeTime) – Average number of forwarding nodes (NbFwdrs) – Average percentage of disconnected nodes (NotConnected).

15 Simulation Results: Communication Overhead Pause Time (s) NotConnected0.22%0.06%0.25%0.16%0.22% NbFwdrs AverageLifeTime (s) % Confidence Interval Numerical example: –Mobility = 0s Pause time –Application = Voice over IP Codec G.711 frame size = 200 bytes Values of the overhead: During the 8.2s, it is possible to transmit 410 packets (= 65.6 kbytes) Session setup: 0.3% of the total payload of the session Packet sending: 11% of the packet size Payment redemption: 0.3% of the total payload of the session for the pessimistic case where NbLostPkts=100

16 Computation Overhead Session Setup Phase (per session): –2 MAC operations for each node Packet Sending Phase (per packet): –1 stream cipher encryption for each node (except D) –1 MAC operation for S and D Acknowledgment computation (for D): –1 XOR operation per packet –1 MAC computation per session NameSpeed (Mbytes/sec) MAC Computation MD5-MAC HMAC/MD Stream Cipher Encryption SEAL WAKE RC What is the cost of a stream cipher encryption?

17 Conclusions and future work Conclusions: We have addressed the problem of cooperation for packet forwarding in multi-hop cellular networks We have proposed a solution based of a charging and rewarding mechanism We have shown that the protocol encourages cooperation and that it resists to number of rational attacks We have quantified the life time of the sessions and shown that the usage of our scheme leads to a very moderate overhead Future work: Malicious attacks Several operators Charge the correspondent