14
1 A secure routing protocol with payment mechanism to prevent node selfishness in mobile ad hoc networks Authors: Chun-Ta Li and Min-Shiang Hwang Reporter: Chun-Ta Li ( 李李李 )

Authors: Chun-Ta Li and Min-Shiang Hwang Reporter: Chun-Ta Li ( 李俊達 )

Embed Size (px)

DESCRIPTION

A secure routing protocol with payment mechanism to prevent node selfishness in mobile ad hoc networks. Authors: Chun-Ta Li and Min-Shiang Hwang Reporter: Chun-Ta Li ( 李俊達 ). Outline. Motivation Preliminaries The proposed scheme Performance evaluation. 2. 2. Selfishness. Motivation. - PowerPoint PPT Presentation

Citation preview

Page 1: Authors: Chun-Ta Li and Min-Shiang Hwang Reporter:  Chun-Ta Li  ( 李俊達 )

1

A secure routing protocol with payment mechanism to prevent node selfishness in mobile ad hoc networks

Authors: Chun-Ta Li and Min-Shiang Hwang

Reporter: Chun-Ta Li (李俊達 )

Page 2: Authors: Chun-Ta Li and Min-Shiang Hwang Reporter:  Chun-Ta Li  ( 李俊達 )

222

Outline Motivation Preliminaries The proposed scheme Performance evaluation

Page 3: Authors: Chun-Ta Li and Min-Shiang Hwang Reporter:  Chun-Ta Li  ( 李俊達 )

3

Motivation Ad hoc communications

Communication nodes must act as routers (routing) for themselves

Rely on other nodes to relay communication data Resource-constrained devices The behavior of node selfishness

Refuse to forward packets to others (stop forwarding attack)

Discard route-discovery requests from others

S DI1 ImI2 …

intermediate nodes

Selfishness

Page 4: Authors: Chun-Ta Li and Min-Shiang Hwang Reporter:  Chun-Ta Li  ( 李俊達 )

4

Motivation (cont.) Payment system Nuglets (virtual currency)

Source node pays for the transmission request Intermediate nodes all gained from the request Advantage:

Prevent networks from packet flooding attacks Promote a selfless environment and enforce node cooperation in

MANETs

Requirements Non-repudiation, impersonation/tampering attacks Generate a dynamic session key Detection of malicious intermediate nodes

Page 5: Authors: Chun-Ta Li and Min-Shiang Hwang Reporter:  Chun-Ta Li  ( 李俊達 )

5

Page 6: Authors: Chun-Ta Li and Min-Shiang Hwang Reporter:  Chun-Ta Li  ( 李俊達 )

6

Preliminaries Identity-based encryption (IBE) scheme

Setup (KGC, Key Generator Center)

Extract

Publish the public parameters

Page 7: Authors: Chun-Ta Li and Min-Shiang Hwang Reporter:  Chun-Ta Li  ( 李俊達 )

7

Preliminaries (cont.) Identity-based encryption (IBE) scheme

Encrypt (message M)

Decrypt

Page 8: Authors: Chun-Ta Li and Min-Shiang Hwang Reporter:  Chun-Ta Li  ( 李俊達 )

8

The proposed scheme

Page 9: Authors: Chun-Ta Li and Min-Shiang Hwang Reporter:  Chun-Ta Li  ( 李俊達 )

9

The proposed scheme

Page 10: Authors: Chun-Ta Li and Min-Shiang Hwang Reporter:  Chun-Ta Li  ( 李俊達 )

10

The proposed scheme

Page 11: Authors: Chun-Ta Li and Min-Shiang Hwang Reporter:  Chun-Ta Li  ( 李俊達 )

11

Page 12: Authors: Chun-Ta Li and Min-Shiang Hwang Reporter:  Chun-Ta Li  ( 李俊達 )

12

The proposed scheme Data transfer phase with payment mechanism

Page 13: Authors: Chun-Ta Li and Min-Shiang Hwang Reporter:  Chun-Ta Li  ( 李俊達 )

13

Performance evaluation

Page 14: Authors: Chun-Ta Li and Min-Shiang Hwang Reporter:  Chun-Ta Li  ( 李俊達 )

14

THa:

TSym:

TSig:

TVer:

TEn:

TDe:

TEC: