Disclaimer: This is an example of a student written essay.
Click here for sample essays written by our professional writers.

Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of UKEssays.com.

Reducing Communication and Processing Overhead

Paper Type: Free Essay Subject: Computer Science
Wordcount: 2910 words Published: 9th Apr 2018

Reference this

RACE: Reducing Communication And Processing Overhead And Ensuring Security

  • Milu Sayed
  • Liyamol Aliyar

 

Abstract

RACE, Report based payment scheme for multi-hop wireless network. Race is a secure incentive protocol which used for the multi-hop wireless network, helps packet transmission and enforce fairness. The protocol uses the concept of evidences and the regularity of the nodes. The trusted party evaluates the nodes competence and reliability. The payment method recompenses nodes that impart packets and toll the send incentives and are present in the reports. It submits the light weight payment reports to trusted party for update the credit incentives. AC(accounting center) verifies the regularity of the reports. For fair reports it has less processing overhead and for cheating reports it find the cheating nodes and evicts it. RACE finds the cheating nodes by requesting evidences.For reducing the overhead, the evidence aggregation technique is used. The evaluation of performance and analysis of security demonstrates it has less overhead and less payment clearance delay. Extensive evaluation of RACE provides that it’s robust against the unauthorized access. Extensive study for restraining fraudulent is in progress.

Keywords—Incentive, payment, RACE, Accounting center

Introduction (Heading 1)

INTRODUCTION

Now-a-days the multi-hop wireless n/w application is tremendously increased. The more technology advances the more vastness of the subject increases. Multi-hop wireless n/w there are number of hop exits from origin to destination. To reduce the flooding attacks. The nodes in cooperates in imparting information from one node to another. The nodes can be malicious or selfish.

In multi-hop wireless networks (MWNs), the traffic originated from a node is usually relayed through the other nodes to the destination for enabling new applications and enhancing the network performance and deployment. MWNs can be deployed readily at low cost in developing and rural areas. Multi-hop packet relay can extend the network coverage using limited transmit power, improve area spectral efficiency, and enhance the network throughput and capacity. MWNs can also implement many useful applications such as data sharing and multimedia data transmission. For example, users in one area (residential neighborhood, university campus, etc.) having different wireless- enabled devices, e.g., PDAs, laptops, tablets, cell phones, etc., can establish a network to communicate, distribute files, and share information.[1]

Get Help With Your Essay

If you need assistance with writing your essay, our professional essay writing service is here to help!

Essay Writing Service

Now-a-days the interest in multi-hop wireless networks is increasing MWNs and can be deployed readily at low cost in developing and rural areas. Multi-hop packet relay can extend the network coverage using limited transmit power, improve area spectral efficiency, and enhance the network throughput and capacity. A good payment scheme should be secure, and require low overhead. However, the existing receipt-based payment schemes impose significant processing and communication overhead and implementation complexity.

The incentive schemes can be divides into two and are reputation and credit based system.

Reputation based scheme

Reputation schemes mainly depend on sending information from one node to the neighboring nodes and keep a track of these nodes so that can eventually helps to find the node which is corrupted or malicious. In reputation based the selfish nodes are punished.

Credit based scheme

Here a node relying the packets from one to other is service. In this unlike reputed scheme, the nodes are not punished when they do not cooperate. It prompts nodes to collaborate with the other nodes for transaction

Multi-hop Wireless Networks

Mainly develop a suite of efficient security mechanisms and protocols for mobile ad-hoc and multi-hop cellular networks. Specifically, we focus on thwarting packet-dropping and selfishness attacks, privacy preserving for user , and creating more determined routes to reduce the breaking of the routes , thus boosting the network performance in terms of end -to- end packet delay, packet delivery ratio, throughput, etc.[10]

Efficient and Secure Credit-Based Incentive Mechanism

We develop a fair efficient secure credit-based incentive mechanism that uses credits (or micropayment) to charge the nodes that impart the packets, and to toll those relaying packets. In this network origin to destination transfer of the node is shown.

Here from origin to destination the node forms a path and the form a hop .Thus for moving from origin to destination there creates a number of hops .for multi-hop network there are number of hops from origin to destination.

cellular networks. Specifically, we focus on thwarting packet-dropping and selfishness attacks, privacy preserving for user , and creating more determined routes to reduce the breaking of the routes , thus boosting the network performance in terms of end -to- end packet delay, packet delivery ratio, throughput, etc.

We develop a fair efficient secure credit-based incentive mechanism that uses credits (or micropayment) to charge the nodes that impart the packets, and to toll those relaying packets. In this network origin to destination transfer of the node is shown.

Here from origin to destination the node forms a path and the form a hop .Thus for moving from origin to destination there creates a number of hops .for multi-hop network there are number of hops from origin to destination.

MICROPAYMENT

Micropayment is a online and e commerce payment for transferring money from one system to one another node .A micropayment is a incentive transaction involving sum of money and usually one that occurs online. PayPal defines a micropayment as a transaction of less than 12 USD

Applications

Mesh networks may involve either fixed or mobile devices. The solutions are as diverse as communication needs, for example in difficult environments such as emergency situations, tunnels, oil rigs, battlefield surveillance, high speed mobile video applications on board public transport or real time racing car telemetry. An important possible application for wireless mesh networks is VoIP. By using a Quality of Service scheme, the wireless mesh may support local telephone calls to be routed through the mesh.

Some current applications:

  • U.S. military forces are now using wireless mesh networking to connect their computers, mainly ruggedized laptops, in field operations.
  • Electric meters now being deployed on residences transfer their readings from one to another and eventually to the central office for billing without the need for human meter readers or the need to connect the meters with cables.
  • The laptops in the One Laptop per Child program use wireless mesh networking to enable students to exchange files and get on the Internet even though they lack wired or cell phone or other physical connections in their area.

The 66-satellite Iridium constellation operates as a mesh network, with wireless links between adjacent satellites. Calls between two satellite phones are routed through the mesh, from one satellite to another across the constellation, without having to go through an earth station. This makes for a smaller travel distance for the signal, reducing latency, and also allows for the constellation to operate with far fewer earth stations that would be required for 66 traditional communications satellite

II SYSTEM DESIGN

Contribution: is the first to verify the payment by investigating the consistency of the nodes’ reports without:

  • Systematically relenting
  • Processing security tokens
  • imprecise allegation

Proposed System

Security was emphasized both for merchants and customers. Server has end to end transaction. It does not handle with public key only with the private key and message digest. Mutual authentication between users is for security purposes. Valid signature gives a recipient reason to believe that the message was created by non sender.

Message digest the representation of the text in the form of single string of digit created using a formula. The comparison factors between the other existing system are symmetric key ,falcified data, duplicated data

Race mechanism

In the scheme it supports the concepts of reports and evidences. In the reports its of format R={R,F,X} where it gives sessions ids and flag bits and the number of packets sent through the medium. The evidences include E={R, X, Ts, H (MX), h (0), h(X), H (SigS(R, X, Ts,H(MX)), SigD(R, Ts, h(0)))}In race mechanism the portable node will send the the data to the other [10].Each node keeps information about the details of it with it temporarily. When the trusted party asks for the evidences the nodes will sent the evidences. The different phases of the architecture do different duties such as classifier classify the nodes with fair and cheating reports .the cheating reports testified and evicted from the node base on different rules. The evicted nodes are evicted from the network. While cheating occurs the trusted party asks for the evidences and the node will submit the evidences and these evidences are verified .if verified evidences are falcified data the node cannot be able sent the data to the data.

III IMPLEMENTATION

In the proposed system the system consists of different phases such as

Communication phase

Classifier phase

Identifying cheaters phase

Credit update

In communication phase it divides into different modules such as rout establishment, data transmission evidence composition, payment report composition/submission

Communication phase

Communication phase is divides into different sections as shown in below. In this phase communication from one phase to other takes place. In this it temporarily stores the evidences and the reports in this phase. In communication phase it end to end communication. It uses DSR algorithm to transfer the information from one to another. It first sends the route request message (RREQ) and then its session ID’s such as origin and destination. It then send the route reply message send from the destination node. Here it contains the TTL value where TTL is the maximum number of intermediate nodes in the network. When we sent the data from one node to the intermediate node then the TTL value gets decreased. Here a hash chain root is created to send the information from origin to destination. The hash chain authenticated with the signature helps to route the data. Here the evidences are present where the evidences are unmodifiable and undeniable.

  1. Network Model & Route establishment
  2. Data transmission
  3. Evidence composition
  4. Payment report composition

Network Model & Route establishment:

The mobile nodes are probable assailant but the TP is fully solid. The mobile nodes are autonomous and self-interested and thus motivated to misbehave. The TP is run by an operator that is prompt to make certain the network proper operation. In order to establish an end-to-end route, the origin node broadcasts the Route Request(RREQ) packet containing the identities of the origin (IDS) and the destination (IDD) nodes, time stamp (Ts), and Time-To-Live (TTL). The destination node devises the Route Reply (RREP) packet for the nodes beam the first received RREQ packet, and sends the packet back to the origin node.

Data transmission:

The origin node sends data packets to the destination node through the established route and the destination node replies with ACK packets. For the Xth data packet, the origin node appends the message MX and its signature to R, X, Ts, and the hash value of the message and sends the packet to the first node in the route. The security tokens of the Xth data and ACK packets are illustrated. The origin node’s signature is an undeniable proof for relying X messages and ensures the message’s authenticity and rectitude.

Evidence composition:

Evidence is defined as information that is used to establish proof about the eventuality of an event or action, the time of eventuality, the parties involved in the incident, and the outcome of the incident. The impetus of Evidence is to resolve a dispute about the amount of the payment resulted from data transmission.

Payment report composition/submission:

A payment report is updated by the Trusted Party. After the Trusted Party verification any transaction is updated. By using the Certificate, Public Key, Symmetric Key, the transaction is approved. If the transaction is faulty or fraud, then the Trusted Party verifies it and the transaction is cancelled. The transaction amount will not be updated in the receiver account.

Classifier

In classifier the nodes consistency is determined. The fair reports and the cheating reports are investigated. Here in cheating reports it will steal the credits . The fair reports are rather complete or broken sessions.

Identifying cheaters :

In this phase the cheaters are identified using some rules. Our main objective of secured payment is identifying the ones who steals the credit and one who pays less. So for this the TP determines the evidences and the evidences are verified. The evidences consists PROOF where by investigating the proof we can find the cheaters. PROOF is composed by the onion hashing technique. Cheating nodes are evicted from the network.

Update credits

In this phase credits are updated to the account. The fair reports update in the account. Hera the public/private key pair is use for the communication and the symmetric key is used for the submission of the fair reports.

After identifying the duplicated and falcified data from the network they are evicted from the network. Here when first cheating action occurs the cheating node is investigated . In my area of research the identified node is evicted from the network so that they to register again to the trusted party as well as each node is provided with trusted value ie, the node with high trust value helps to transfer the data such as the path in which the data passed is of high trust value it considered as valid path

IV CONCLUSION

It is of 24 bytes length. Small size reports (≈ 24 bytes).Fair reports are clear with almost no cryptographic operations or processing overhead. It reduce communication and processing overheads significantly. It effective implementation due to little storage required. In this secure values are given t each nodes is considered as future work

V REFERENCES

[1] Mahmoud And Shen: A Secure Payment Scheme With Low Communication And Processing Overhead For Multihop wireless networks., IEEE Transactions On Parallel And Distributed Systems, Vol. 24,No. 2, pp. 209-224, February 2013.

[2] G. Shen, J. Liu, D. Wang, J. Wang, and S. Jin, “Multi-Hop Relay for Next-Generation Wireless Access Networks,” Bell Labs Technical J., vol. 13, no. 4, pp. 175-193, 2009.

[3] C. Chou, D. Wei, C. Kuo, and K. Naik, “An Efficient Anonymous Communication Protocol for Peer-to-Peer Applications Over Mobile Ad-Hoc Networks,” IEEE J. Selected Areas in Comm., vol. 25, no. 1, pp. 192-203, Jan. 2007.

[4] H. Gharavi, “Multichannel Mobile Ad Hoc Links for Multimedia Communications,” Proc. IEEE, vol. 96, no. 1, pp. 77-96, Jan. 2008.

[5] S. Marti, T. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” Proc. MobiCom ‟00, pp. 255-265, Aug. 2000.

[6] G. Marias, P. Georgiadis, D. Flitzanis, and K. Mandalas, “Cooperation Enforcement Schemes for MANETs: A Survey,” Wiley‟s J. Wireless Comm. and Mobile Computing, vol. 6, no. 3, pp. 319-332, 2006.

[7] Y. Zhang and Y. Fang, “A Secure Authentication and Billing Architecture for Wireless Mesh Networks,” ACM Wireless Networks, vol. 13, no. 5, pp. 663-678, Oct. 2007.

[8] L. Buttyan and J. Hubaux, “Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks,” Mobile Networks and Applications, vol. 8, no. 5, pp. 579-592, Oct. 2004.

[9] Y. Zhang, W. Lou, and Y. Fang, “A Secure Incentive Protocol for Mobile Ad Hoc Networks,” ACM Wireless Networks, vol. 13, no. 5, pp. 569-582, Oct. 2007.

[10] P.Visalakshi1, R. Dineshbabu2 and K. Vijayalakshmi3 1,2SRM University, MCA Department, Kattankulathur, Kanchipuram, India 3St. Peter’s University, Department of Computer Science & Engineering, Avadi, Chennai, India

 

Cite This Work

To export a reference to this article please select a referencing stye below:

Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.

Related Services

View all

DMCA / Removal Request

If you are the original writer of this essay and no longer wish to have your work published on UKEssays.com then please: