IJRIT International Journal of Research in Information Technology, Volume 1, Issue 8, August, 2013, Pg. 197-203

International Journal of Research in Information Technology (IJRIT)

www.ijrit.com

ISSN 2001-5569

Encouraging Node Cooperation through Payment Incentive Mechanism M.Paramesh1, M.Venkateshwarlu2 1

M.Tech(SE), Sri Kottam Tulasi Reddy Memorial College of Engineering Kondair, Mahabubnagar, Andhra Pradesh, India 2 Associate Professor, Dept. of CSE, Sri Kottam Tulasi Reddy Memorial College of Engineering Kondair, Mahabubnagar, Andhra Pradesh, India 1

[email protected], 2 [email protected]

Abstract In multihop cellular networks, the mobile nodes usually relay others packets for enhancing the network performance and deployment. However, selfish nodes usually do not cooperate will have a negative effect on the network fairness and performance. Incentive protocols use credits to stimulate the selfish nodes cooperation, but the existing protocols usually rely on the heavyweight public-key operations to secure the payment. Security analysis and performance evaluation demonstrate that the proposed protocol is secure and the overhead is incomparable to the public-key-based incentive protocols because the efficient hashing operations dominate the nodes’ operations. Moreover, the average packet overhead is less than those of the public-keybased protocols with very high probability due to truncating the keyed hash values. Secure techniques are proposed to protect the receipt submission from collusion attacks and to reduce the number of transmitted receipts. In this paper, we study the proposal made regarding secure cooperation incentive protocol that uses the public-key operations only for the first packet in a series and uses the lightweight hashing operations in the next packets to reduce the overhead of the packet series converges for hashing operations.

Keywords: Paper main parts, Articles, Paper Specifications.

1. Introduction Most of popular internet applications depend on the existence of end-to-end link between source and destination, with moderate round trip time and small packet loss probability. This fundamental assumption does not hold in some challenged networks, which are often referred to as Delay/Disruption Tolerant Networks (DTNs). Typical applications of DTNs are different from traditional wireless ad hoc networks, in which data are opportunistically routed toward the destination by exploiting the temporary connection and store-carry-and-forward transmission fashion. Different types of multihop wireless networks like mobile ad hoc networks (MANETs), vehicular ad hoc networks (VANETs), multihop cellular networks (MCNs), and wireless mesh network (WMN) has been increasing significantly expanding their scope. In these networks, a node’s traffic is usually relayed through

M.Paramesh, IJRIT

197

other nodes to the destination and extends their communication range using a specific limit of transmit power. Multihop packet relay can enable new applications and enhance the network performance and deployment and improves area spectral efficiency by enhancing the network throughput and capacity. Moreover, multihop wireless networks can be deployed at a very low cost in their development and usage. Multihop cellular network (MCN) is a network architecture that incorporates the ad hoc characteristics into the cellular system. A node’s traffic is usually relayed through other nodes to the destination. The network nodes commit bandwidth, data storage, CPU cycles, battery power, etc., forming a pool of resources that can be shared by all of them. The utility that the nodes can obtain from the pooled resources is much higher than that they can obtain on their own. The considered MCN is used for civilian applications where the network has long life and the mobile nodes are supposed to have long-term relations with the network. Multihop packet relay can reduce the dead areas by extending the communication range of the base stations without additional costs. It can also reduce the energy consumption because packets are transmitted over shorter distances, and improve the area spectral efficiency and the network throughput and capacity. However, due to involving autonomous devices in packet relay, the packet routing process suffers from new security challenges that endanger the practical implementation of MCN. Hybrid ad hoc wireless networks, the other type of multihop wireless network in which mobile nodes usually act as routers to relay packets from other nodes. Selfish nodes moreover may not cooperate but make use of the honest ones to relay their packets, which has negative effect on fairness, security, and performance of the network. Fair payment can be achieved by rewarding and charging credits to balance between a node’s contributions and benefits. In order to reduce the overhead cost, a payment aggregation technique is applied to reduce the number of generated receipts. A hash chain is used to efficiently integrate the incentive mechanism in the routing protocol. But the routing process suffers from new security challenge that causes a great threat in the practical implementation of these networks. Secure techniques are proposed to protect the receipt submission from collusion attacks and to reduce the number of transmitted receipts. Extensive evaluation shows that the proposed mechanism is robust against rational and colluding attacks, and the nodes can be rewarded proportionally to their contributions.

2. Related Work Cooperation incentive protocols can be classified as tamper- proof-device (TPD), electronic coin, and centralbank-based protocols. For TPD-based protocols, a tamper-proof device (which cannot be tampered) is installed in each device to store its credits and secure its operation. For electronic-coin-based protocols, a network node buys electronic coins in advance from a centralized accounting center (AC) to pay for relaying its packets. In centralbank- based protocols; the intermediate nodes usually compose undeniable receipts and submit them to the AC to update their accounts. Nuglets, in his research made the self-generated and forwarding packets to be passed to the tamper-proof device to decrease and increase the credit account, respectively. Two models, called the packet purse model (PPM) and the packet trade model (PTM) have been proposed. In the PPM, the source node pays by loading some credits in the packet, and each intermediate node acquires its payment from the packet. In the PTM, each intermediate node buys the packets from the downstream node and sells them to the upstream nodes and thus the destination node pays the total cost. In CASHnet, for each data packet, the source node’s credit account is charged and its signature is attached. The destination node sends back a digitally signed ACK packet to increase the intermediate nodes credit accounts. The extensive use of digital signature operations for both the data and the ACK packets is not efficient for limited-resource nodes. For SIP, after receiving a packet, the destination node sends back a receipt to the source node that issues a REWARD packet which increments the intermediate nodes’ credit accounts. Each packet requires three trips between the source and the destination nodes. However, the TPD-based protocols suffer from the following problems: 1) The assumption that the TPD cannot be tampered is not secure for network with autonomous nodes where attackers can communicate freely in undetectable way and makes devices compromise and 2) A small number of trusted manufactures can make the network nodes, which is too restrictive for civilian networks. Each node in a session buys the packets from the downstream node and sells them to the upstream node. A packet’s buyer contacts the AC to get deposited coins, and the seller claims the coins by submitting them to the AC.

M.Paramesh, IJRIT

198

The nodes contact the AC interactively in each session to buy and claim the coins, which causes high latency. For Sprite, the source node appends its signature to each packet and each intermediate node uses the signature to compose a receipt per packet. Significant communication and computation overhead is implied due to using publickey operations in each packet and generating a receipt per packet. All the communication packets have to pass through the base station, which may causes suboptimal routes when the source and the destination nodes reside in the same cell. In SIP (Secure Incentive Protocol) after receiving a packet, the destination node sends a payment RECEIPT packet to the transmitter to issue a REWARD packet which increments the accounts of the intermediate nodes. The mechanism encourages the communicating nodes to issue REWARD packets by overcharging them for full payment, and they get the overcharged credits back after issuing them. The mechanism incurs high overhead because each packet needs three trips between the source and destination nodes. A fairness concern is that the intermediate nodes are not rewarded, and the payers pay more than the deserved credits when REWARD or RECEIPT packets are dropped, or when a data packet does not reach the destination node due to malicious or nonmalicious action. A probabilistic payment technique is applied to avoid generating a large number of receipts in the network. The sender appends payment tokens to its transmitted packets. The forwarding nodes check whether a token corresponds to a winning ticket. Winning tickets are sent to the accounting center (AC) to reward the winning nodes. Payers are charged per packet and forwarding nodes are paid per winning ticket. The mechanism encourages the nodes to relay the packets with losing tickets by rewarding not only the winning node but also its neighbors. The mechanism suffers from a security flaw that colluders can intercept and exchange collected tokens to be checked locally in each node to gain credits without contributing to the network. It is shown an attack which enables two attackers to communicate for free without being detected by the operator. Fairness issue arises when a node is not compensated for consuming its resources to relay a packet. In Sprite mechanism, an intermediate node stores a receipt for each relayed packet and submits the receipts when it has a connection to the accounting center to clear them. The mechanism incurs significant communication overhead because the number of submitted receipts is large due to generating a receipt for each packet and due to sending all the receipts by all the nodes. The size of the receipts is large, which consumes the network resources. Fairness issue arises when the amount of rewards is greatly reduced (to thwart cheating actions) if a packet is not reported to be received by the destination node due to malicious or non-malicious actions. The sender appends a signature to the full path identities and an initialization of a keyed hash chain. Each intermediate node verifies the signature and computes a new hash value. The recipient generates a receipt of the received amount of data and sends it to the last intermediate node to transmit to the AC. A security flaw is that two colluders can communicate freely by exchanging packets with in- valid hash values because the intermediate nodes cannot verify the received hash chain. The last intermediate node may collude with the payers, and it does not send the receipts to the AC to deprive the relaying nodes from their payments. In addition, the last intermediate node may not have the sufficient resources to submit the receipts, or this extra load may degrade its efficiency. The sender encrypts the payload and appends a receipt. Each uplink node re-encrypts the payload and stores the receipt. The base station removes the encryption layers and iteratively encrypts the payload with the keys shared with the downlink nodes. Each downlink node decrypts one layer, computes and stores the receipt. The iterative encryption and decryption operations protect the mechanism from free riding attack. The sender is charged and the uplink nodes are rewarded when the packet reaches the base station. The downlink nodes are rewarded when the base station receives an ACK from the receiver. In order to motivate the destination node to send ACK, it is charged a fee which is returned when the ACK is received. If a packet does not reach the base station, the intermediate nodes submit the receipts to claim the payments but they are re- warded only for the minimum packet length. It is shown that the mechanism suffers from the early duplicate attack to deny the service from the legitimate nodes. Two colluders can communicate for free because the intermediate nodes cannot verify the payment data. A large number of receipts are claimed because they are individually issued and claimed. If an ACK packet does not reach the base station due to malicious or non-malicious action, the destination node is over- charged.

M.Paramesh, IJRIT

199

3. Incentive Mechanisms In general, the conventional incentive schemes can be classified into the following two categories: creditbased and reputation-based. Credit-based incentive schemes introduce some virtual currency to regulate the packetforwarding relationships among different nodes. Reputation-based incentive schemes rely on individual nodes to monitor neighboring nodes’ traffic and keep track of each other’s reputation so that uncooperative nodes are eventually detected and then excluded from the networks. In practice, reputation-based incentive systems have already been widely used in most of the successful commercial online applications such as eBay and Amazon. In this section we study about incentive protocols and its mechanisms to implement in multi-hop wireless networks, multi-hop wireless cellular networks and hybrid ad-hoc networks.

3.1 Incentive Protocols A practical incentive protocol should achieve two essential requirements: lightweight overhead and security. Heavy- overhead protocol degrades the network performance and exhausts the nodes’ resources, which stimulates the nodes to behave selfishly. Due to involving virtual currency in the network, insecure protocol lures the nodes to misbehave to steal credits. Secure incentive protocol usually uses public- key cryptography to thwart various attacks such as payment repudiation and free riding. In Fig. 1, if the message integrity is checked only by the destination node, nodes A and C can launch free riding attack by adding their data to the session packets to communicate freely. Signature-based protocols can thwart this attack because the message integrity is checked in each hop, i.e., node B can detect the message manipulation and drop the packet. Signature is also necessary to achieve payment non repudiation, i.e., to ensure the nodes’ approvals to pay to secure the payment.

Figure 1: Source Node sharing a key with each node in the route. However, the public-key operations require much more complicated computations than the hashing operations. In addition, secure public-key cryptosystems usually have long signature tags which increase the packet overhead. Therefore, if we can replace the public-key operations with hashing operations and reduce the packet overhead, the network performance can be improved significantly. In ESIP, the source and the destination nodes generate hash chains by iteratively hashing random values to obtain final hash values called the hash chains’ roots. The two communicating nodes authenticate their hash chains by digitally signing the roots and sending the signatures to the intermediate nodes in the route reply and the first data packets. From the second data packet, only the efficient hashing operations are required. Payment non repudiation can be achieved by releasing the pre image of the last sent hash value because the hash function is one-way, i.e., only the source and destination nodes can generate the hash chains. In order to thwart free riding attack, the hop-byhop message integrity can be checked by attaching a truncated keyed hash value for each node in the route. Each node in the session can compute a shared key with the source node by one inexpensive bilinear pairing operation using identity-based key exchange protocol. Each inter- mediate node verifies the hash chain element to ensure that it will be rewarded for relaying the packet, verifies the keyed hash value to ensure the message integrity, and relays the packet after dropping its keyed hash value. Comparing with signature-based protocols, ESIP invests more overhead in the first data packet, but from the second packet, only the lightweight hashing operations are used, so for a group of packets, the heavyweight overhead of the first packet vanishes, and the overall overhead converges to the lightweight overhead of the hashing operations. Therefore, from the second packet, we gain the revenue of the investment of the first packet. Moreover, for a group of 13 packets, ESIP requires only 10 and 12 percent of the cryptographic delay in DSA and RSA-based protocols, respectively.

M.Paramesh, IJRIT

200

For the packet overhead, it is obvious that if the number of intermediate nodes is large, the packet overhead will be long, so for the efficient implementation of ESIP, the keyed hash values are truncated significantly, and each inter- mediate node drops its keyed hash value.

3.2 Incentive Mechanisms In this section we limited our study to how incentive mechanisms are implemented for hybrid ad-hoc networks. 3.2.1 Incentive Mechanisms for Hybrid Ad-Hoc Networks In this section, we propose FESCIM (Fair, Efficient, and Secure Cooperation Incentive Mechanism) for stimulating the nodes’ cooperation in hybrid ad hoc networks. In FESCIM, the payers (both the sender and receiver) generate cheques by digitally signing a piece of data that identifies the transaction. The cheques are transmitted to the AC to reward the intermediate nodes and to charge the communicating entities. Table (1) gives the useful notations.

Table 1: Useful Notations

An on-demand routing protocol (such as DSR) can be used to discover an optimal route between the source and destination nodes. The source node broadcasts a Route Request Packet (RREQ) after attaching its certificate and authentication tag (e.g. signature) to offer the relaying service only to the legitimate users and to thwart external attacks. The intermediate nodes (which are interested in cooperation) add their identities before re-broadcasting the packet. The source base station re- lays the request to the destination base station which rebroadcasts it. The destination node replies to the first received RREQ with unicasting a Route Reply Packet (RREP) to inform the intermediate nodes that they have been chosen in the session. As shown in Fig. (2), the destination node generates a hash chain of size N by iteratively hashing nonce N times. The hash chain is generated in the direction from HD1(Nonce) to HDN(Nonce) but the hash values are released in the opposite direction. The hash chain is used to improve the network performance by replacing the destination’s signature with a hash value, and to aggregate the payment by generating a cheque for a series of packets. In RREQ and RREP packets, the source and destination nodes agree on the ratio of payment which is proportional to their interest of the communication. In RREP, the destination node (if it pays) attaches its certificate, the session establishment time stamp (TS), the last value in the

M.Paramesh, IJRIT

201

hash chain (HDN(Nonce)), and a signature to the payment data (PD), the TS, and the last value in the hash chain (SigD(PD|TS|HDN(Nonce))). The destination’s signature is an approval from one payer to pay for the session, and it also authenticates the destination node and the hash chain. The payment data contain the identities of the nodes on the route (the payers and payees) and the ratio of payment between the sender and receiver. After establishing a session, the source and destination nodes know their payment ratios and the identities of the intermediate nodes. The intermediate nodes know the public keys of the communicating ones (the payers).

Figure 2: Designation node generated hash chain The source node initiates a series of packets (with maximum size of N packets) by attaching its signature to the payment data (PD), session establishment time stamp (TS), counter to the number of transmitted packets (X), and the hash value of the message. The signature is an approval from one payer to pay for X packets. It also ensures the message authenticity and integrity, and thwarts free riding, packet replay, packet and payment repudiation, and impersonation attacks. The source node initiates a new packet series (with a new cheque) when the route is broken, or N packets have already been transmitted. After transmitting a packet, the sender turns on a timer waiting for ACK, NACK, or Timeout. Before relaying a packet, an intermediate node verifies the signature to ensure the message’s integrity and authenticity, and to ensure that the payment data and the number of relayed packets are correct. In case of the first packet in a series (X=1), an intermediate node composes the single approval cheque (SAC) (which contains payment approval from one payer) as a proof of receiving the packet. Storing the hash of the signatures significantly reduces the cheque size but with extra overhead on the AC which is powerful party. The nodes claim the SAC if the packet does not reach the destination node. For the successive packets in a series (X>1), each node composes aggregated double approval cheque with a single approved packet (ADAC_S(X)) which contains payment data for (X-1) successfully delivered packets and one received packet. The payment approval of the destination node in ADAC_S(X) lags that of the source node by one packet. Upon receiving a packet in a series, the destination node attaches a new hash value from the hash chain to its acknowledgement (ACK) packet (if it pays for the session). The hash value is an approval from the second payer to pay for the received packet. Since the base stations are involved in the sessions, they submit the cheques to the AC for redemption. If a session was broken and the BS does not have the latest cheque, the nodes claim it. Once the AC receives a cheque, it checks that it has not been deposited before using its unique identifier (the identities of the payers and payees, and the time stamp), then it verifies the payers’ payment approvals (the signatures of the payers, and X hashing operations to get HDN (Nonce) from HDN-X (Nonce)). The AC clears the cheque by crediting the source and destination nodes with the listed ratios, and rewarding the relaying nodes. The AC periodically sends clearance confirmation messages to the nodes, showing the identifiers of the cleared cheques and their updated accounts. After receiving the messages, the nodes delete the cleared cheques and adjust their local account counters. If a cheque is not cleared in a certain time, the node can claim it.

4. Conclusions In this paper, we have proposed a fair, efficient, and secure cooperation incentive mechanism for MCN. Inorder to fairly and efficiently charge the source and destination nodes, the lightweight hashing operations are used to reduce the number of public-key-cryptography operations. Moreover, to reduce the overhead of the payment checks, one small-size check is generated per session instead of generating a check per message, and the Probabilistic-Check-Submission scheme has been proposed to reduce the number of submitted checks and protect against the collusion attack. Extensive analysis and simulations have demonstrated that our incentive mechanism can secure the payment and significantly reduce the overhead of storing, submitting, and processing the checks. In

M.Paramesh, IJRIT

202

addition, replacing the destination node’s signatures with the hashing operations can charge the source and destination nodes almost computationally free.

5. References [1] Mohamed Elsalih Mahmoud and Xuemin (Sherman) Shen – “ESIP: Secure Incentive Protocol with Limited Use of Public-Key Cryptography for Multihop Wireless Networks”, IEEE Transactions on Mobile Computing, Vol. 10, No. 7, July 2011, p.p.no 997-1010. [2] Mohamed Mohamed Elsalih Abdelsalam Mahmoud, Sherman Shen – “FESCIM: Fair, Efficient, and Secure Cooperation Incentive Mechanism for Hybrid Ad Hoc Networks”, IEEE Transaction of Mobile Computing, p.p.no 1-36. [3] Mohamed M.E.A. Mahmoud, and Xuemin (Sherman) Shen – “FESCIM: Fair, Efficient, and Secure Cooperation Incentive Mechanism for Multihop Cellular Networks”, IEEE Transactions on Mobile Computing, Vol. 11, No. 5, May 2012, p.p.no 753-766. [4] Lifei Wei, Haojin Zhu, Zhenfu Cao, Xuemin (SHERMAN) SHEN – “SUCCESS: A Secure User-centric and Social-aware Reputation based Incentive Scheme for DTNs”, Received 15 October 2011, p.p.no 1-25.

M.Paramesh, IJRIT

203

Encouraging Node Cooperation through Payment Incentive ... - IJRIT

Incentive protocols use credits to stimulate the selfish nodes cooperation, but the .... The extensive use of digital signature operations for both the data and the ...

918KB Sizes 2 Downloads 233 Views

Recommend Documents

Encouraging Node Cooperation through Payment Incentive ... - IJRIT
The extensive use of digital signature operations for both the data and the ACK packets ... Sprite, the source node appends its signature to each packet and each ...

Payment of incentive Bonus.PDF
Carriage & Wagon Repair Workshop Perambur on Southern Railway - pNVf ... Payment of incentive Bonus.PDF. Payment of incentive Bonus.PDF. Open. Extract.

Do incentive contracts crowd out voluntary cooperation?
Swiss National Science Foundation under project number 1214-051000.97 and from the MacArthur. Foundation ... on Contract Theory in Brussels, the First Asian Conference on Experimental Business Economics in ... Fax: 0041-71-224-2880.

Sustaining Cooperation through Strategic Self ...
Norwegian Business School, email: [email protected]. .... office. Unlike the model presented here, they do not allow members to exert self-interested actions ...

Intertemporal Cooperation and Symmetry through ...
It is easy to see that the denominator of (B11) is positive. For the numerator, either t − s ... inator of (19) are positive when (8) and (9) hold. Therefore, we have.

pdf-175\innovation-through-cooperation-the-emergence-of-an-idea ...
... Science and Philosophy. Page 3 of 8. pdf-175\innovation-through-cooperation-the-emergenc ... my-management-for-professionals-by-georg-weiers.pdf.

Process to Quickbooks Payment through online using quickbooks help ...
The association benefit connects the records and educates you. once it is finished. Congratulations! You're all linked up. That's all with the account linking process and still you are not able to link to. QuickBooks online and want some help contact

Regarding Payment of Fees through - SB Collect.pdf
Page 2 of 15. Form No : ACA – 01. APPLICATION FOR ADDITIONAL GRADE SHEETS / TRANSCRIPTS. Instructions : (i) Application shall be forwarded by the Principal / Director of the respective College. specifying the reason / purpose for additional Grade S

Cooperation in Social Dilemmas through Position ...
Jun 7, 2017 - Keywords: Social Dilemmas; Public Goods; Position Uncertainty; Voluntary Con- tributions .... our mechanism applies to other social dilemmas.

Encouraging Forensics Pedagogy
"Fantasy Theme Analysis in Competitive Rhetorical Criticism." National .... greatly benefit from resources which build a common language, add efficiency to ...

Detecting the Impact of landslide through Wireless Sensor ... - IJRIT
IJRIT International Journal of Research in Information Technology, Volume 3, Issue 1, ... Wireless Sensor Network (WSN) has come forth as an important new.

Detecting the Impact of landslide through Wireless Sensor ... - IJRIT
Fig 1.1 Illustration of a Wireless Sensor Network ... topology of the WSNs can vary from a simple star network to an advanced multi-hop wireless mesh network. ... techniques organize the sensor nodes into the clusters in which sensors can be ...

Effectual User Navigation through Advance Website Organization - IJRIT
In spite of the heavy and ever growing investments in the design of a website, ... In view of the fact that our assessment is simulation based, a usability learning.

Facilitating Effective User Navigation through Web Site Usability - IJRIT
reports that the overall internet-site operations making payments increased in ... is not an unimportant or everyday work Galletta et giving an idea of that connected ... those of brick and army fighting device stores and at least part of the nothing

Effectual User Navigation through Advance Website Organization - IJRIT
structure [9]. In spite of the heavy and ever growing investments in the design of a website, it is still exposed. On ... In view of the fact that our assessment is simulation based, a usability learning ... and the components of online personalizati

typedef struct node
6. 5. 7. 4. 2. 9. 8. Root. Leaves ... bool search(node* root, int val). { if root is NULL return false. if root->n is val return true. if val is less than root->n search left child.

Node Security.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Node Security.

The Down Payment Report - Down Payment Resource
Mar 1, 2017 - Development Authority and the Tennessee Housing Development ... agencies pioneering the targeted application of down payment ... WHEDA's Capital Access Advantage provides a $3,500 loan to be used for a down.

Encouraging Essentials for a Dynamic Ministry
Keep your eyes open, hold tight to your convictions, give it all you've got, .... its own way. ... For these and related resources, visit www.insightworld.org/store.

Encouraging Students Toward Computer Science ... Services
Research suggests1 that biases — social stereotypes about certain groups of people that individuals hold consciously ..... Encouraging Students Toward Computer. Science Learning. Data Tables. Google commissioned Gallup to conduct a multiyear, compr

Guaranteed Node Overage
Every renewal period our customers purchase a certain number of nodes that their subscription covers. However, with changes in your organization such as new employees, PC refresh projects, or acquisitions – your node count increases and you incur o