QoS-Differentiated Secure Charging in Ad-Hoc Environments

  • J. Girão
  • J. P. Barraca
  • B. Lamparter
  • D. Westhoff
  • R. Aguiar
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3124)

Abstract

In order to keep up with new networking needs, it is necessary to adopt mechanisms for charging network usage in a universal way. The Secure Charging Protocol (SCP) aims at answering this complex authentication, authorization, accounting and charging (AAAC) problem. SCP fits business models especially adequate for ad-hoc networks. This document discusses SCP as a possible solution to the AAAC problems in MANETs and presents the improvements made to this protocol in terms of Quality of Service (QoS). An implementation of this protocol on PDAs and the results achieved are discussed.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Corson, S., Macker, J.: Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations. RFC 2501 (January 1999)Google Scholar
  2. 2.
    Aboba, B., et al.: Criteria for Evaluating AAA Protocols for Network Access. RFC 2989 (November 2000) Google Scholar
  3. 3.
    Lamparter, B., Paul, K., Westhoff, D.: Charging Support for Ad Hoc Stub Networks. Elsevier Journal of Computer Communications Special Issue on Internet Pricing and Charging: Algorithms, Technology and Applications, Elsevier Science (August 2003)Google Scholar
  4. 4.
    Zhong, S., Chen, J., Yang, Y.R.: Sprite: A Simple, Cheat-Proof, Credit- Based System for Mobile Ad-Hoc Networks. In: Proceedings of IEEE Infocom 2003, San Francisco, USA (2003)Google Scholar
  5. 5.
    Salem, N.B., et al.: A Charging and Rewarding Scheme for Packet Forwarding in Multi-hop Cellular Networks. In: ACM MobiHoc 2003 (2003)Google Scholar
  6. 6.
    Riedel, I.: Security in Ad-hoc Networks: Protocols and Elliptic Curve Cryptography on an Embedded Platform, Diploma Thesis, Ruhr-Universität Bochum (March 2003) Google Scholar
  7. 7.
    Menezes, A.J., van Oorschot, P.C., Vanston, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)CrossRefGoogle Scholar
  8. 8.
    Web: Trolltech Creator of QT, Trolltech corp, http://www.trolltech.com, as in 14-10- 2003
  9. 9.
    Web: OpenSSL Project, http://www.openssl.org, as in 14-10-2003

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • J. Girão
    • 1
    • 2
  • J. P. Barraca
    • 1
    • 2
  • B. Lamparter
    • 1
  • D. Westhoff
    • 1
  • R. Aguiar
    • 2
  1. 1.NEC EuropeNetworking LabsGermany
  2. 2.D.E.T.-I.T.Universidade de AveiroPortugal

Personalised recommendations