Cheating Resistance of a Secure Incentive Protocol for Mobile Ad Hoc Networks

被引:0
作者
Phan, Raphael C. -W. [1 ]
机构
[1] Univ Loughborough, Sch Elect Elect & Syst Engn, Loughborough LE11 3TU, Leics, England
关键词
Mobile ad hoc networks; Security; Incentive; Selfishness; Cheating; Authentication; AUTHENTICATION; ARCHITECTURE; SCHEME;
D O I
10.1007/s11277-011-0410-8
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The idea of rewarding good behaviour instead of penalizing bad or selfish nodes is the underlying concept behind the design of protocols to encourage intermediary nodes in multi-hop mobile ad hoc networks to forward packets from source to destination. We investigate the security of such a secure incentive protocol and show that contrary to its design objective, the protocol allows adversaries to cheat honest parties and furthermore falls to an attack on its entity authentication and key establishment. We analyze the design choices to explore why the protocol exhibits these limitations.
引用
收藏
页码:803 / 809
页数:7
相关论文
共 16 条
[1]  
[Anonymous], 2016, HDB APPL CRYPTOGRAPH
[2]  
Boyd Colin., 2003, INF SECUR CRYTOGR
[3]  
Diffie W., 1992, Designs, Codes and Cryptography, V2, P107, DOI 10.1007/BF00124891
[4]   Mutual authentication and key exchange protocols for roaming services in wireless mobile networks [J].
Jiang, Yixin ;
Lin, Chuang ;
Shen, Xuemin ;
Shi, Minghui .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2006, 5 (09) :2569-2577
[5]  
Just M., 1996, Advances in Cryptology - ASIACRYPT'96 International Conference on the Theory and Applications of Cryptology and Information Security. Proceedings, P36, DOI 10.1007/BFb0034833
[6]  
Kaliski B. S. Jr., 2001, ACM Transactions on Information and Systems Security, V4, P275, DOI 10.1145/501978.501981
[7]   TUA: A novel compromise-resilient authentication architecture for wireless mesh networks [J].
Lin, Xiaodong ;
Lu, Rongxing ;
Ho, Pin-Han ;
Shen, Xuemin Sherman ;
Cao, Zhenfu .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (04) :1389-1399
[8]  
Phan R. C.-W., 2007, WIREL NETW, V17, P1055
[9]   On broadcast authentication in wireless sensor networks [J].
Ren, Kui ;
Lou, Wenjing ;
Zeng, Kai ;
Moran, Patrick J. .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2007, 6 (11) :4136-4144
[10]  
Tang CM, 2008, IEEE T WIREL COMMUN, V7, P1408, DOI [10.1109/TWC.2008.061080, 10.1109/TWC.2008.06I080]