Friday 22 November 2013

A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks

Abstract:

A secure payment scheme, called as the Report based pAyment sChemE(RACE) is used in multi hop wireless networks to stimulate node cooperation, regulate packet transmission and enforce fairness. The nodes submit lightweight payment reports (instead of receipts) to the Trusted Authority to update their credit accounts and temporarily store the evidences. The report includes the session information. The Trusted Party verifies the payment by investigating the consistency of the report and clears the fair reports with almost no cryptographic operations or computational overhead. The nodes which do not pass or relay others’ packets are called selfish nodes. But it makes use of neighbor or cooperative nodes to relay its packets. This degrades the network connectivity and fairness. Such type of nodes also submits reports to the trusted party. But when tested for consistency, it is found to be a cheating node. For such reports, the evidences are requested from the Trusted Party to identify and evict the cheating nodes or selfish nodes. RACE is the first payment scheme that uses the concept of evidences to secure the payments. It requires cryptographic operations in clearing the payment only in the case of cheating. Also this is the first system that can verify the payment by investigating the consistency of the node’s reports without submitting and processing security tokens and without false accusations. To prevent the multi hop communications from failing due to insufficient credits, the source node can borrow credits from the Trusted Authority. After evicting the selfish nodes, communication can be efficiently established again with increased throughput and less amount of processing and communication overhead. This is done by establishing a route between the source and the destination by sending a route request to the destination and the destination replies with path, a hash element from the hash chain and the signature. All these details are provided by the Trusted Party.

No comments:

Post a Comment