A Survey On Report Based Secure Payment Scheme For Multihop Wireless Networks

International Journal of Computer & Organization Trends (IJCOT)          
© 2013 by IJCOT Journal
Volume-3 Issue-5                           
Year of Publication : 2013
Authors : S.Maria Sobana


S.Maria Sobana. "A Survey On Report Based Secure Payment Scheme For Multihop Wireless Networks" . International Journal of Computer & organization Trends  (IJCOT), V3(5):6-10 Sep - Oct 2013, ISSN 2249-2593, www.ijcotjournal.org. Published by Seventh Sense Research Group.

Abstract—Multihop wireless networks (MWNs) composed of two end nodes is carried out through a number of intermediate nodes whose function is to relay information from one point to another, without using any kind of fixed wired infrastructure. Multihop wireless networks utilize multiple wireless nodes to provide coverage to a large area by forwarding and receiving data wirelessly between the nodes. In this paper will describe secure transmission of packets with low communication and processing overhead for multihop wireless networks. Receipt based scheme is used in existing system, packet transmission details are does not updated. So, we do not identified cheater node. During this problem we propose RACE, report based payment scheme will have the accounting center. In this scheme each and every state of secure payment will updated. The Evidences are generated for identifying valid and cheating node.


[1] G. Shen, J.Liu, D.Wang, J. Wang, and S. Jin, “Multi-Hop Relay for Next-Generation Wireless Access Networks,” Bell Labs Technical J., vol.13, no.4, pp.175-193,2009.
[2]C. Chou, D. Wei, C. Kuo, and K.Naik, “An Efficient Anonymous Communication Protocol for Peer-Peer Applications Over Mobile Ad-Hoc Networks,’’ IEEE J. selected areas in comm., vol. 25, no. 1, pp. 192-203, Jan. 2007.
[3] H. Gharavi, “Multichannel Mobile Ad Hoc Links for Multimedia Communications’’ proc. IEEE, vol. 96, no. 1, pp. 77-96, Jan. 2008.
[4]S. Marti, T. Giuli, K. Lai, and M. Basker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,’’ proc. Mobicom ’00, pp. 255-265, Aug. 2000.
[5]G. Marias, P. Georgiadis, D. Flitzanis, and K. Mandalas, “Cooperation Enforcement Schemes for MANETs: A Survey,’’ wiley’s J. Wireless Comm. and Mobile Computing, vol. 6, no. 3, pp. 319-332, 2006.
[6]J. Pan, L. Cai, X. Shen, and J. Mark, “Identity- Based Secure Collaborationin Wireless Ad Hoc Networks,’’ Computer Networks, vol. 51 no. 3 pp. 853-865, 2007.
[7] N. Salem, L. Buttyan, J. Hubaux, and M. Jakobsson, “Node Cooperationin Hybrid Ad Hoc Networks,’’ IEEE Trans. Mobile Computing, vol. 5, no. 4, pp. 365-376,Apr. 2006.
[8] H. Zhu, X. Lin, R. Lu, Y. Fan, and X. Shen, ”SMART: A Secure Multilayer Credit based Incentive Scheme for Delay-Tolerant Networks, ”IEEE Trans. Vehicular Technology, vol. 58, no. 8,pp.4628-4639, Oct. 2009.
[9] Y. Zhang and Y. Fang, “A Secure Authentication and Billing Architecture for Wireless Mess Networks,” ACM Wireless Networks, vol. 13, no. 5, pp.663-678, Oct. 2007.
[10] A. Weyland, “Cooperation and Accounting in Multi-Hop Cellular Networks,” PhD thesis, Univ. of Bem, Nov. 2005.
[11]A. Weyland, T.Staub, and T. Braun, “Comparison of Motivation Based Cooperation Mechanisms for Hybrid Wireless Networks,” J. Computer Comm., vol.29, pp. 2661-2670, 2006.
[12] H. Pagnia and F. Gartner, “On the Impossibility of Fair Exchange without a Trusted Third Party,” Technical Report TUD-BS-1999-02, Darmstadt Univ. of Technology, Mar. 1999.
[13] L. Buttyan and J. Hubaux, “Stimulating Cooperation in Self Organizing Mobile Ad Hoc Networks,” Mobile Networks and Applications, vol. 8, no. 5, pp. 579-592, Oct. 2004.
[14] Y. Zhang, W. Lou, and Y. Fang, “A Secure Incentive Protocol for Mobile Ad Hoc Networks, ”ACM Wireless Networks, vol. 13, vol. 13, no. 5, pp. 569-582, Oct. 2007.

Keywords— Multi-hop wireless networks, Payment scheme, Accounting center, Evidences.