Authentication, authorization, and accounting of services in multi-hop mobile networks through rewarding

This paper treats the problem of authentication through the multi-hop communication, authorization to services access, and efficient collaboration between ad hoc nodes in order to assure efficient packet relaying during services access, thus alleviating major problems in ad hoc networks deployment. A novel solution is proposed allowing for authentication and authorization of services, while coupling the accounting process for each user (ad hoc node) with his level of collaboration in terms of participation in packets relaying for other nodes. The billing of services takes a novel notion, where it concerns not only ‘debit’, which classically happens, but also ‘credit’ as a reward for collaborative users. The authentication and authorization for services access mechanism has been implemented and integrated in an ad hoc mesh platform, where multimedia applications have been tested, and performance evaluation has been done.

[1]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[2]  George C. Polyzos,et al.  Stimulating Participation in Wireless Community Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[3]  John T. Kohl,et al.  The Kerberos Network Authentication Service (V5 , 2004 .

[4]  Gilles Bourdon,et al.  Authentication and services access control in a cooperative ad hoc environment , 2008, 2008 5th International Conference on Broadband Communications, Networks and Systems.

[5]  John Mitsianis Free trade for hybrid multihop wireless networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.

[6]  Srdjan Capkun,et al.  Mobility helps peer-to-peer security , 2006, IEEE Transactions on Mobile Computing.

[7]  Torsten Braun,et al.  Cooperation and accounting strategy for multi-hop cellular networks , 2004, The 13th IEEE Workshop on Local and Metropolitan Area Networks, 2004. LANMAN 2004..

[8]  Chris McDonald,et al.  A Review of Secure Routing Protocols for Ad hoc Mobile Wireless Networks , 2003 .

[9]  Jean-Pierre Hubaux,et al.  The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.

[10]  J.-P. Hubaux,et al.  Enforcing service availability in mobile ad-hoc WANs , 2000, 2000 First Annual Workshop on Mobile and Ad Hoc Networking and Computing. MobiHOC (Cat. No.00EX444).

[11]  Levente Buttyán,et al.  Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..

[12]  Laurie L. Joiner,et al.  Solving billing issues in ad hoc networks , 2004, ACM-SE 42.

[13]  Chris McDonald,et al.  Kerberos Assisted Authentication in Mobile Ad-hoc Networks , 2004, ACSC.