SlideShare una empresa de Scribd logo
1 de 7
Descargar para leer sin conexión
International Journal of Computer science and Engineering Research and Development (IJCSERD),
ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 4, Number 2, April-June (2014)
34
A SECURE PAYMENT SCHEME IN MULTIHOP WIRELESS
NETWORK BY TRUSTED NODE IDENTIFICATION METHOD
[1]
Soumya A V, [2]
Mrs.Prajna M R
[1]
Dept of CS&E VTU, Belgaum KVGCE, SULLIA, DK-574327
[2]
Assoc.prof, Dept of CSE VTU, Belgaum KVGCE, SULLIA, DK-574327
ABSTRACT
The papers propose an improvised version of the report based payment scheme by
adopting a trust system which will assign trust value for each and every node in the network. In
report based payment scheme the nodes submit light weight payment report to the Trusted
Third party .By checking the consistency of the report the third party classify the reports to fair
report and cheating report. If it is a fair report means there is an immediate payment clearance.
Otherwise trusted party will ask evidence from all the nodes and cheater nodes are evicted. To
increase the performance the proposed system will assign trust value for all the nodes in the
network. The nodes have high trust value if they relay more messages successfully in the past.
So that packet transmission will be through highly trusted nodes which will reduce probability
of dropping messages. Thus increase packet delivery ratio and through put and hence network
performance.
Index Terms: Payment schemes; Trust value; Trust centre; cheater node.
I. INTRODUCTION
In Multihop wireless Network the packets from a node is usually transmitted through
the intermediate node to reach to the destination [1]. There will be some selfish nodes that will
not relay others packets but they make use of others to relay their messages which will give a
negative effect hence, there is performance degradation [2]. Payment scheme will give credit to
all the nodes participated in the packet transmission which motivate the nodes [3]. This scheme
treats the packet forwarding task as a service which can be charged and valuated. This scheme
enforces fairness, node cooperation, regulate packet transmission.
IJCSERD
© PRJ PUBLICATION
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE
ENGINEERING RESEARCH AND DEVELOPMENT
(IJCSERD)
ISSN 2248 – 9363(Print)
ISSN 2248 – 9371(Online),
Volume 4, Number 2, April- June (2014), pp: 34-40
© PRJ Publication, http://www.prjpublication.com/IJCSERD.asp
International Journal of Computer science and Engineering Research and Development (IJCSERD),
ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 4, Number 2, April-June (2014)
35
A high-quality payment scheme should be secure and need less communication and
processing overhead. MWNs can’t be implemented without a secured payment scheme because
the nodes are autonomous and aim to maximize their welfare. Since a trusted party may not be
involved in communication session, the nodes create proofs of other’s packets of the
transmitting called receipts, and for getting the payment they will submit receipts to the
Accounting Centre (AC).Here the receipt carries security proof so they are large in size. The
AC must carry out large number of cryptographic operations to certify the receipts which leads
to communication and processing overhead. In report based schemes the nodes submit light
payment reports to the trusted third party to update the credits. The reports contain the alleged
charges and the rewards of different sessions without security proofs. The trusted third party
verifies the consistency of the report and categorizes them into fair or cheating report. Without
any cryptographic operations trusted party will clear the payment for fair report. If it is a
cheating report then evidences is requested to discover and evict the cheater node.
To increase the performance of report based payment scheme the trust centre will give a
trust value for the nodes in the network. Trust values are assigned based on the past
performance of the nodes. Thus communication is always routed through the nodes
with higher trust values which will reduce the probability of message failure and enhance the
delivery ratio and throughput.
The rest of the paper is structured as follows. Section 2 describes related works of this
area .Section 3 presents the proposed system. Section 4 discusses the experimental work .Then
description of the performance discussion in section 5 and conclusion in section 6.
II. RELATED WORKS
In these days several researches have come up with several payment schemes including
tamper-proof-device (TPD)-based [4] and receipt-based schemes. In TPD-based payment
schemes, a TPD is installed in each node to store and manage its credit account and secure its
operation. In tamper proof-device (TPD) is any payment-based approach require some kind of
tamper proofness essential for guaranteeing the security process of the payment.
In Nuglets [4], the forwarded packets by a node are passed to the TPD to decrease and
increase the node’s credit account. In SIP [5] after getting data packets, the destination node
sends a RECEIPT packet to the source to issue a REWARD packet to increment credit count of
intermediate node.
In CASHnet [6], the credit account of the source node is charged and a signature is
attached to each packet. When the packet is received, the credit account of the destination
node is charged, and a digitally signed acknowledgement (ACK) packet is send back to the
source.TPD based schemes have lot of limitations. First the assumption that TPD can’t be
tampered with. But if the attacker can compromise with the TPD then he can communicate with
the TPD in an unnoticeable way.
To eliminate the use of TPDs, an offline central bank called the Accounting Center is
used to store and administer the nodes credit accounts. Different receipt based schemes [12] are
SPRITE, PIS, CDS, FESCIM, ESIP.
International Journal of Computer science and Engineering Research and Development (IJCSERD),
ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 4, Number 2, April-June (2014)
36
In sprite [7] the source node signs the identities of the nodes in the route and the
message, and sends the signature as a proof for sending a message. The intermediate nodes
verify the signature, create receipts which contain the identities of the nodes in the path and the
source’s signature, and submit the receipts to the AC to get the payment. After verification AC
give the payments. The problem is the communication overhead
In FESCIM [8] the source and destination is charged, if they are interested in
communication. In PIS [9], the source adds a signature to each message and the destination
node acknowledges with a signed packet.
CDS [10] uses statistical methods to find the cheater nodes. Due to the nature of
statistical method some sincere node may incorrectly accused as cheater. Some cheaters may
not be recognized.
ESIP [11] suggests communication protocol that can be used for a payment scheme.
ESIP transmits messages from the source to destination node with limited number of public key
cryptography operation by integrating public key cryptography, identity based cryptography
and hash function. Comparing to PIS, ESIP needs less public key cryptography operations but
larger receipt size.
In proposed paper to avoid the communication and processing overhead of the existing
schemes introducing report based payment scheme and using a trust system to improve the
performance.
III. PROPOSED SYSTEM
In the proposed system the considered Multihop Wireless Network has an offline
Trusted party(TP), responsible for maintaining the nodes credit account.TP is also responsible
for cancel and update the certificate for nodes.ie, TP has Accounting Centre, Certificate
Authority and Trust centre. Trust centre is responsible for maintaining the trust value of the
node according to the no of relayed and dropped messages. Each node has to register with TP to
get symmetric key, public key/private key and certificate. Only registered nodes can
communicate each other. After the communication session the TP will verify the payment
report submitted by the nodes and clear the payments if the report is consistent. This scheme
can be used with any dynamic source routing protocol which set up end to end route before
sending the data.
As shown in fig.1 the payment scheme has 5 main phases. The first phase is
communication phase. In this Route is established through highly trusted nodes and data is
transmitted. Second is classifier which classifies the report into fair or cheating. From the
cheating report the trusted party will discover the cheaters by asking evidences from the
suspicious nodes. .This is fourth phase called Identifying cheaters. Then the trusted party evicts
the cheaters from the network. The next is credit account update .In this phase the correct credit
is assigned to all the nodes by trusted party. After the packet transmission the trust centre
assigns the trust value for the nodes, participated in the packet transmission.
International Journal of Computer science and Engineering Research and Development (IJCSERD),
ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 4, Number 2, April-June (2014)
37
Fig.1 Architecture of proposed scheme
A. Communication
The communication phase includes 4 processes: Route establishment, Data
transmission, Evidence composition, payment composition/submission. The source node
broadcasts the route request which contains the source identity, Destination identity, Time
stamp and Time To live. Time To live means maximum number of intermediate nodes. The
route is established by considering the nodes that have high trust values. The node that relay
more messages in the past have high trust values. So during route establishment instead of
considering shortest path they will consider the route with nodes having high trust values as in
figure.2. So that chance of message dropping is less. The nodes that relay more messages have
high trust value. After route establishment data is transmitted and destination node replies with
acknowledgement. Then the intermediate node composes the evidences for data transmission.
All the nodes participated in data transmission compose payment report and submitted to the
trusted party.
Figure 2. Data transmission through high trusted nodes
International Journal of Computer science and Engineering Research and Development (IJCSERD),
ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 4, Number 2, April-June (2014)
38
B. Classifier
When Accounting Centre obtains the session’s payment report it verifies them by
checking the consistency of the report and categorize them into fair or cheating. In the case of
fair report all the nodes will be submitting the correct payment report so all will be asking for
equal credits but for cheating report at least one node will submit incorrect payment report. Fair
report can be for complete and broken sessions. For fair report the trusted party will do payment
clearance immediately. The evidence is legal if the calculated proof is similar to the evidences.
C. Identifying Cheaters
The Trusted party processes the cheating report to identify the cheaters. The objective is
to avoid the attackers from stealing credits. The Trusted party asks evidence from the node
which requests more payment. In this way, the AC can precisely identify the cheating nodes
with requesting few Evidences .To verify the evidences the Trusted party creates the proof by
generating the nodes signature and hashing them. After identifying the cheaters the cheater
node is evicted from the network.
D. Credit Account Update
The Credit-Account Update phase obtains fair and corrected payment reports to update
the credit of the nodes.The payment clearance is done by charging and rewarding policy. For
the payment clearance the trusted party needs reports from all the nodes in the communication
session. When registration the trusted party will give a Public and Private Key pair, a
symmetric key and a certificate. The public and private key pair is used in communication are
required to act as source or destination node. The symmetric key is used to submit the payment
reports.
E. Trust Value Update
The Trust centre assigns the trust value to the nodes that relayed the packets success fully in
the communication session. This trust value of the node is considered during the next route
establishment phase. Stationary nodes and nodes with large resources to spare will have higher
trust value .Nodes at the boundary are more likely to have lower trust value.
IV. EXPERIMENTAL WORK
All the nodes must be registered with the trusted third party, in order to issue
certificate for the nodes. In order to transmit the packets from source to destination the source
node produces route request which contains source node identity, destination identity, Time
stamp and TTL. Then the source node broadcast the request to all the intermediate nodes. The
intermediate node forwards this route request to the next intermediate node until it reaches the
destination. The destination node send route selection request to the trusted party to get a path
which has a high trust value. Once the path is established by the destination node the source
node transmit the packets to the destination node through the established route.
After transmitting the packets the nodes can request for the payment .So all the nodes
submit the payment report together to the trusted third party. The trusted third party verifies it.
If it is consistent means the report will be fair. But the attacker or cheater they will always
request for more payment without relaying the packet .So the trusted party can easily find out
the cheater by checking the consistency. The trusted party can ask for the evidence and if it is
International Journal of Computer science and Engineering Research and Development (IJCSERD),
ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 4, Number 2, April-June (2014)
39
not valid then trusted party can assign a cheating count to the node. So during the next route
establishment the nodes having high cheating count is rarely considered.
V. PERFORMANCE DISCUSSION
The performance of proposed scheme is more in terms of throughput and packet
delivery ratio. Since this method assigns a trust value for the nodes according to the number of
messages relayed in the past and the packet transmission is through the high trust valued nodes,
the probability of dropping of messages will reduce. Since the payment clearance in report
based scheme is with almost no cryptographic operations, the processing overhead is less and
less payment delay is less. Since all the nodes submit the report together the report based
payment scheme reduces the communication overhead.
VI. CONCLUSION
The proposed system improves the performance of the network and provides a secure
payment scheme. In this there is a trust system which will assign trust value to each node that
relayed the packets more successfully in the past. The report based payment scheme eliminates
the communication and processing overhead of other payment schemes and the inclusion of
trust centre significantly improves the performance of the network since the data transmission
is routed through highly trusted nodes whenever possible.
REFERENCES
[1] G. Shen, J. Liu, D. Wang, J. Wang, and S. Jin, “Multi-Hop Relay for Next-Generation
Wireless Access Networks,” Bell Labs Technical J.,vol. 13, no. 4, pp. 175-193, 2009
[2] S. Marti, T. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile
Ad Hoc Networks,” Proc. MobiCom ’00, pp. 255-265, Aug. 2000.
[3] G. Marias, P. Georgiadis, D. Flitzanis, and K. Mandalas,“Cooperation Enforcement
Schemes for MANETs: A Survey,” Wiley’s J. Wireless Comm. and Mobile
Computing, vol. 6, no. 3,pp. 319-332, 2006.
[4] L. Buttyan and J. Hubaux, “Stimulating Cooperation in Self-Organizing Mobile Ad
Hoc Networks,” Mobile Networks and Applications, vol. 8, no. 5, pp. 579-592, Oct.
2004.
[5] Y. Zhang, W. Lou, and Y. Fang, “A Secure Incentive Protocol for Mobile Ad Hoc
Networks,” ACM Wireless Networks, vol. 13, no. 5,pp. 569-582, Oct. 2007.
[6] A. Weyland, “Cooperation and Accounting in Multi-Hop Cellular etworks,” PhD
thesis, Univ. of Bern, Nov. 2005.
[7] S. Zhong, J. Chen, and R. Yang, “Sprite: A Simple, Cheat-Proof, Credit based System
for Mobile Ad-Hoc Networks,” Proc. IEEE INFOCOM ’03, vol. 3, pp. 1987-1997,
Mar./Apr. 2003.
[8] M. Mahmoud and X. Shen, “FESCIM: Fair, Efficient, and Secure ooperation Incentive
Mechanism for Hybrid Ad Hoc Networks,”IEEE Trans. Mobile Computing, vol. 11,
no. 5, pp. 753-766, May 2012.
International Journal of Computer science and Engineering Research and Development (IJCSERD),
ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 4, Number 2, April-June (2014)
40
[9] M. Mahmoud and X. Shen, “PIS: A Practical Incentive System for Multi-Hop Wireless
Networks,” IEEE Trans. Vehicular Technology,vol. 59, no. 8, pp. 4012-4025, Oct.
2010.
[10] M. Mahmoud and X. Shen, “Stimulating Cooperation in Multihop Wireless Networks
Using Cheating Detection System,” Proc.IEEE INFOCOM ’10, Mar. 2010.
[11] Networks,” IEEE Trans. Mobile Computing, vol. 10, no. 7, pp. 997-1010, July 2011
[12] N. Salem, L. Buttyan, J. Hubaux, and M. Jakobsson, “Node Cooperation in Hybrid Ad
Hoc Networks,” IEEE Trans. Mobile Computing, vol. 5, no. 4, pp. 365-376, Apr.
2006.
[13] J. Pan, L. Cai, X. Shen, and J. Mark, “Identity-Based Secure Collaboration in Wireless
Ad Hoc Networks,” Computer Networks, vol. 51, no. 3, pp. 853-865, 2007

Más contenido relacionado

La actualidad más candente

ELLIPTIC CURVE CRYPTOGRAPHY IN SECURING NETWORKS BY MOBILE AUTHENTICATION
ELLIPTIC CURVE CRYPTOGRAPHY IN SECURING NETWORKS BY MOBILE AUTHENTICATIONELLIPTIC CURVE CRYPTOGRAPHY IN SECURING NETWORKS BY MOBILE AUTHENTICATION
ELLIPTIC CURVE CRYPTOGRAPHY IN SECURING NETWORKS BY MOBILE AUTHENTICATIONijcisjournal
 
A NOVEL CHARGING AND ACCOUNTING SCHEME IN MOBILE AD-HOC NETWORKS
A NOVEL CHARGING AND ACCOUNTING SCHEME IN MOBILE AD-HOC NETWORKSA NOVEL CHARGING AND ACCOUNTING SCHEME IN MOBILE AD-HOC NETWORKS
A NOVEL CHARGING AND ACCOUNTING SCHEME IN MOBILE AD-HOC NETWORKSIJNSA Journal
 
FAULT TOLERANT LEADER ELECTION IN DISTRIBUTED SYSTEMS
FAULT TOLERANT LEADER ELECTION IN DISTRIBUTED SYSTEMSFAULT TOLERANT LEADER ELECTION IN DISTRIBUTED SYSTEMS
FAULT TOLERANT LEADER ELECTION IN DISTRIBUTED SYSTEMSijcseit
 
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...Ijcem Journal
 
Covid19 ContactTracing - Privacy Preserving Proximity Protocols
Covid19 ContactTracing - Privacy Preserving Proximity ProtocolsCovid19 ContactTracing - Privacy Preserving Proximity Protocols
Covid19 ContactTracing - Privacy Preserving Proximity ProtocolsGokul Alex
 
ONC Direct Project Boot Camp
ONC Direct Project Boot CampONC Direct Project Boot Camp
ONC Direct Project Boot CampBrian Ahier
 
Machine Learning Applications in Grid Computing
Machine Learning Applications in Grid ComputingMachine Learning Applications in Grid Computing
Machine Learning Applications in Grid Computingbutest
 
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...ijp2p
 
07 coms 525 tcpip - udp [autosaved]
07    coms 525 tcpip - udp [autosaved]07    coms 525 tcpip - udp [autosaved]
07 coms 525 tcpip - udp [autosaved]Palanivel Kuppusamy
 
Towards Statistical Queries over Distributed Private User Data
Towards Statistical Queries over Distributed Private User Data Towards Statistical Queries over Distributed Private User Data
Towards Statistical Queries over Distributed Private User Data Serafeim Chatzopoulos
 
DDoS Attack and Defense Scheme in Wireless Ad hoc Networks
DDoS Attack and Defense Scheme in Wireless Ad hoc NetworksDDoS Attack and Defense Scheme in Wireless Ad hoc Networks
DDoS Attack and Defense Scheme in Wireless Ad hoc NetworksIJNSA Journal
 

La actualidad más candente (11)

ELLIPTIC CURVE CRYPTOGRAPHY IN SECURING NETWORKS BY MOBILE AUTHENTICATION
ELLIPTIC CURVE CRYPTOGRAPHY IN SECURING NETWORKS BY MOBILE AUTHENTICATIONELLIPTIC CURVE CRYPTOGRAPHY IN SECURING NETWORKS BY MOBILE AUTHENTICATION
ELLIPTIC CURVE CRYPTOGRAPHY IN SECURING NETWORKS BY MOBILE AUTHENTICATION
 
A NOVEL CHARGING AND ACCOUNTING SCHEME IN MOBILE AD-HOC NETWORKS
A NOVEL CHARGING AND ACCOUNTING SCHEME IN MOBILE AD-HOC NETWORKSA NOVEL CHARGING AND ACCOUNTING SCHEME IN MOBILE AD-HOC NETWORKS
A NOVEL CHARGING AND ACCOUNTING SCHEME IN MOBILE AD-HOC NETWORKS
 
FAULT TOLERANT LEADER ELECTION IN DISTRIBUTED SYSTEMS
FAULT TOLERANT LEADER ELECTION IN DISTRIBUTED SYSTEMSFAULT TOLERANT LEADER ELECTION IN DISTRIBUTED SYSTEMS
FAULT TOLERANT LEADER ELECTION IN DISTRIBUTED SYSTEMS
 
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
Reliability and-efficient-protocol-for-position-based-routing-in-vehicular-ad...
 
Covid19 ContactTracing - Privacy Preserving Proximity Protocols
Covid19 ContactTracing - Privacy Preserving Proximity ProtocolsCovid19 ContactTracing - Privacy Preserving Proximity Protocols
Covid19 ContactTracing - Privacy Preserving Proximity Protocols
 
ONC Direct Project Boot Camp
ONC Direct Project Boot CampONC Direct Project Boot Camp
ONC Direct Project Boot Camp
 
Machine Learning Applications in Grid Computing
Machine Learning Applications in Grid ComputingMachine Learning Applications in Grid Computing
Machine Learning Applications in Grid Computing
 
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
INFRINGEMENT PRECLUSION SYSTEM VIA SADEC: STEALTHY ATTACK DETECTION AND COUNT...
 
07 coms 525 tcpip - udp [autosaved]
07    coms 525 tcpip - udp [autosaved]07    coms 525 tcpip - udp [autosaved]
07 coms 525 tcpip - udp [autosaved]
 
Towards Statistical Queries over Distributed Private User Data
Towards Statistical Queries over Distributed Private User Data Towards Statistical Queries over Distributed Private User Data
Towards Statistical Queries over Distributed Private User Data
 
DDoS Attack and Defense Scheme in Wireless Ad hoc Networks
DDoS Attack and Defense Scheme in Wireless Ad hoc NetworksDDoS Attack and Defense Scheme in Wireless Ad hoc Networks
DDoS Attack and Defense Scheme in Wireless Ad hoc Networks
 

Destacado

Review of three categories of fingerprint recognition
Review of three categories of fingerprint recognitionReview of three categories of fingerprint recognition
Review of three categories of fingerprint recognitionprjpublications
 
03 agricultural information to the farmers in tamil nadu 2
03 agricultural information to the farmers in tamil nadu 203 agricultural information to the farmers in tamil nadu 2
03 agricultural information to the farmers in tamil nadu 2prjpublications
 
Effect of controlled temperature (27°c 42°c)
Effect of controlled temperature (27°c  42°c)Effect of controlled temperature (27°c  42°c)
Effect of controlled temperature (27°c 42°c)prjpublications
 
Preparation gade and idol model for preventing multiple spoofing attackers in...
Preparation gade and idol model for preventing multiple spoofing attackers in...Preparation gade and idol model for preventing multiple spoofing attackers in...
Preparation gade and idol model for preventing multiple spoofing attackers in...prjpublications
 
Distribution of the number of times m m 2 n
Distribution of the number of times m m 2 nDistribution of the number of times m m 2 n
Distribution of the number of times m m 2 nprjpublications
 
Implementation and analysis of multiple criteria decision routing algorithm f...
Implementation and analysis of multiple criteria decision routing algorithm f...Implementation and analysis of multiple criteria decision routing algorithm f...
Implementation and analysis of multiple criteria decision routing algorithm f...prjpublications
 
An empirical study on skewness of test scores of a management subject in an a...
An empirical study on skewness of test scores of a management subject in an a...An empirical study on skewness of test scores of a management subject in an a...
An empirical study on skewness of test scores of a management subject in an a...prjpublications
 
Mems based optical sensor for salinity measurement
Mems based optical sensor for salinity measurementMems based optical sensor for salinity measurement
Mems based optical sensor for salinity measurementprjpublications
 

Destacado (9)

Review of three categories of fingerprint recognition
Review of three categories of fingerprint recognitionReview of three categories of fingerprint recognition
Review of three categories of fingerprint recognition
 
03 agricultural information to the farmers in tamil nadu 2
03 agricultural information to the farmers in tamil nadu 203 agricultural information to the farmers in tamil nadu 2
03 agricultural information to the farmers in tamil nadu 2
 
Effect of controlled temperature (27°c 42°c)
Effect of controlled temperature (27°c  42°c)Effect of controlled temperature (27°c  42°c)
Effect of controlled temperature (27°c 42°c)
 
Preparation gade and idol model for preventing multiple spoofing attackers in...
Preparation gade and idol model for preventing multiple spoofing attackers in...Preparation gade and idol model for preventing multiple spoofing attackers in...
Preparation gade and idol model for preventing multiple spoofing attackers in...
 
Distribution of the number of times m m 2 n
Distribution of the number of times m m 2 nDistribution of the number of times m m 2 n
Distribution of the number of times m m 2 n
 
Aircraft
AircraftAircraft
Aircraft
 
Implementation and analysis of multiple criteria decision routing algorithm f...
Implementation and analysis of multiple criteria decision routing algorithm f...Implementation and analysis of multiple criteria decision routing algorithm f...
Implementation and analysis of multiple criteria decision routing algorithm f...
 
An empirical study on skewness of test scores of a management subject in an a...
An empirical study on skewness of test scores of a management subject in an a...An empirical study on skewness of test scores of a management subject in an a...
An empirical study on skewness of test scores of a management subject in an a...
 
Mems based optical sensor for salinity measurement
Mems based optical sensor for salinity measurementMems based optical sensor for salinity measurement
Mems based optical sensor for salinity measurement
 

Similar a A secure payment scheme in multihop wireless network by trusted node identification method

Report based payment scheme for multihop wireless networks
Report based payment scheme for multihop wireless networksReport based payment scheme for multihop wireless networks
Report based payment scheme for multihop wireless networkseSAT Journals
 
Eport based payment scheme for multihop wireless networks
Eport based payment scheme for multihop wireless networksEport based payment scheme for multihop wireless networks
Eport based payment scheme for multihop wireless networkseSAT Journals
 
A Survey on Credit Based Scheme for Multihop Wireless Network
A Survey on Credit Based Scheme for Multihop Wireless NetworkA Survey on Credit Based Scheme for Multihop Wireless Network
A Survey on Credit Based Scheme for Multihop Wireless Networkijsrd.com
 
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...IJNSA Journal
 
A NOVEL CHARGING AND ACCOUNTING SCHEME IN MOBILE AD-HOC NETWORKS
A NOVEL CHARGING AND ACCOUNTING SCHEME IN MOBILE AD-HOC NETWORKSA NOVEL CHARGING AND ACCOUNTING SCHEME IN MOBILE AD-HOC NETWORKS
A NOVEL CHARGING AND ACCOUNTING SCHEME IN MOBILE AD-HOC NETWORKSIJNSA Journal
 
A NOVEL CHARGING AND ACCOUNTING SCHEME IN MOBILE AD-HOC NETWORKS
A NOVEL CHARGING AND ACCOUNTING SCHEME IN MOBILE AD-HOC NETWORKSA NOVEL CHARGING AND ACCOUNTING SCHEME IN MOBILE AD-HOC NETWORKS
A NOVEL CHARGING AND ACCOUNTING SCHEME IN MOBILE AD-HOC NETWORKSIJNSA Journal
 
Irrational node detection in multihop cellular
Irrational node detection in multihop cellularIrrational node detection in multihop cellular
Irrational node detection in multihop cellulareSAT Publishing House
 
Irrational node detection in multihop cellular networks using accounting center
Irrational node detection in multihop cellular networks using accounting centerIrrational node detection in multihop cellular networks using accounting center
Irrational node detection in multihop cellular networks using accounting centereSAT Journals
 
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...IJNSA Journal
 
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...CSCJournals
 
IRJET- Trust Based Routing Protocol For Ad-Hoc And Sensor Networks
IRJET-  	  Trust Based Routing Protocol For Ad-Hoc And Sensor NetworksIRJET-  	  Trust Based Routing Protocol For Ad-Hoc And Sensor Networks
IRJET- Trust Based Routing Protocol For Ad-Hoc And Sensor NetworksIRJET Journal
 
Trust Management for Secure Routing Forwarding Data Using Delay Tolerant Netw...
Trust Management for Secure Routing Forwarding Data Using Delay Tolerant Netw...Trust Management for Secure Routing Forwarding Data Using Delay Tolerant Netw...
Trust Management for Secure Routing Forwarding Data Using Delay Tolerant Netw...rahulmonikasharma
 
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...IRJET Journal
 
Dynamic Routing to Alleviate Congestion with Authentication for Mobile Wirele...
Dynamic Routing to Alleviate Congestion with Authentication for Mobile Wirele...Dynamic Routing to Alleviate Congestion with Authentication for Mobile Wirele...
Dynamic Routing to Alleviate Congestion with Authentication for Mobile Wirele...ijbuiiir1
 
Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...IRJET Journal
 
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...IRJET Journal
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsSurvey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsIRJET Journal
 

Similar a A secure payment scheme in multihop wireless network by trusted node identification method (20)

Report based payment scheme for multihop wireless networks
Report based payment scheme for multihop wireless networksReport based payment scheme for multihop wireless networks
Report based payment scheme for multihop wireless networks
 
Eport based payment scheme for multihop wireless networks
Eport based payment scheme for multihop wireless networksEport based payment scheme for multihop wireless networks
Eport based payment scheme for multihop wireless networks
 
A Survey on Credit Based Scheme for Multihop Wireless Network
A Survey on Credit Based Scheme for Multihop Wireless NetworkA Survey on Credit Based Scheme for Multihop Wireless Network
A Survey on Credit Based Scheme for Multihop Wireless Network
 
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...
 
A NOVEL CHARGING AND ACCOUNTING SCHEME IN MOBILE AD-HOC NETWORKS
A NOVEL CHARGING AND ACCOUNTING SCHEME IN MOBILE AD-HOC NETWORKSA NOVEL CHARGING AND ACCOUNTING SCHEME IN MOBILE AD-HOC NETWORKS
A NOVEL CHARGING AND ACCOUNTING SCHEME IN MOBILE AD-HOC NETWORKS
 
A NOVEL CHARGING AND ACCOUNTING SCHEME IN MOBILE AD-HOC NETWORKS
A NOVEL CHARGING AND ACCOUNTING SCHEME IN MOBILE AD-HOC NETWORKSA NOVEL CHARGING AND ACCOUNTING SCHEME IN MOBILE AD-HOC NETWORKS
A NOVEL CHARGING AND ACCOUNTING SCHEME IN MOBILE AD-HOC NETWORKS
 
Irrational node detection in multihop cellular
Irrational node detection in multihop cellularIrrational node detection in multihop cellular
Irrational node detection in multihop cellular
 
Irrational node detection in multihop cellular networks using accounting center
Irrational node detection in multihop cellular networks using accounting centerIrrational node detection in multihop cellular networks using accounting center
Irrational node detection in multihop cellular networks using accounting center
 
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...
A SECURE CLUSTER BASED COMMUNICATION IN WIRELESS NETWORK USING CRYPTOGRAPHIC ...
 
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
Cluster Based Misbehaviour Detection and Authentication Using Threshold Crypt...
 
IRJET- Trust Based Routing Protocol For Ad-Hoc And Sensor Networks
IRJET-  	  Trust Based Routing Protocol For Ad-Hoc And Sensor NetworksIRJET-  	  Trust Based Routing Protocol For Ad-Hoc And Sensor Networks
IRJET- Trust Based Routing Protocol For Ad-Hoc And Sensor Networks
 
Trust Management for Secure Routing Forwarding Data Using Delay Tolerant Netw...
Trust Management for Secure Routing Forwarding Data Using Delay Tolerant Netw...Trust Management for Secure Routing Forwarding Data Using Delay Tolerant Netw...
Trust Management for Secure Routing Forwarding Data Using Delay Tolerant Netw...
 
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
IRJET-Secured Approach for Authentication of Messages in Wireless Sensor Netw...
 
I1086066
I1086066I1086066
I1086066
 
Dynamic Routing to Alleviate Congestion with Authentication for Mobile Wirele...
Dynamic Routing to Alleviate Congestion with Authentication for Mobile Wirele...Dynamic Routing to Alleviate Congestion with Authentication for Mobile Wirele...
Dynamic Routing to Alleviate Congestion with Authentication for Mobile Wirele...
 
Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...
 
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
An Identification and Detection of Fraudulence in Credit Card Fraud Transacti...
 
I1086066
I1086066I1086066
I1086066
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-PaymentsSurvey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
Survey Paper on Frodo: Fraud Resilient Device for Off-Line Micro-Payments
 

Más de prjpublications

An approach to design a rectangular microstrip patch antenna in s band by tlm...
An approach to design a rectangular microstrip patch antenna in s band by tlm...An approach to design a rectangular microstrip patch antenna in s band by tlm...
An approach to design a rectangular microstrip patch antenna in s band by tlm...prjpublications
 
A design and simulation of optical pressure sensor based on photonic crystal ...
A design and simulation of optical pressure sensor based on photonic crystal ...A design and simulation of optical pressure sensor based on photonic crystal ...
A design and simulation of optical pressure sensor based on photonic crystal ...prjpublications
 
Pattern recognition using video surveillance for wildlife applications
Pattern recognition using video surveillance for wildlife applicationsPattern recognition using video surveillance for wildlife applications
Pattern recognition using video surveillance for wildlife applicationsprjpublications
 
Precision face image retrieval by extracting the face features and comparing ...
Precision face image retrieval by extracting the face features and comparing ...Precision face image retrieval by extracting the face features and comparing ...
Precision face image retrieval by extracting the face features and comparing ...prjpublications
 
Keyless approach of separable hiding data into encrypted image
Keyless approach of separable hiding data into encrypted imageKeyless approach of separable hiding data into encrypted image
Keyless approach of separable hiding data into encrypted imageprjpublications
 
Encryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudEncryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudprjpublications
 
Study on gis simulated water quality model
Study on gis simulated water quality modelStudy on gis simulated water quality model
Study on gis simulated water quality modelprjpublications
 
Smes role in reduction of the unemployment problem in the area located in sa...
Smes  role in reduction of the unemployment problem in the area located in sa...Smes  role in reduction of the unemployment problem in the area located in sa...
Smes role in reduction of the unemployment problem in the area located in sa...prjpublications
 
Reduction of executive stress by development of emotional intelligence a stu...
Reduction of executive stress by development of emotional intelligence  a stu...Reduction of executive stress by development of emotional intelligence  a stu...
Reduction of executive stress by development of emotional intelligence a stu...prjpublications
 
Mathematical modeling approach for flood management
Mathematical modeling approach for flood managementMathematical modeling approach for flood management
Mathematical modeling approach for flood managementprjpublications
 
Influences of child endorsers on the consumers
Influences of child endorsers on the consumersInfluences of child endorsers on the consumers
Influences of child endorsers on the consumersprjpublications
 
Impact of stress management by development of emotional intelligence in cmts,...
Impact of stress management by development of emotional intelligence in cmts,...Impact of stress management by development of emotional intelligence in cmts,...
Impact of stress management by development of emotional intelligence in cmts,...prjpublications
 
Faulty node recovery and replacement algorithm for wireless sensor network
Faulty node recovery and replacement algorithm for wireless sensor networkFaulty node recovery and replacement algorithm for wireless sensor network
Faulty node recovery and replacement algorithm for wireless sensor networkprjpublications
 
Extended information technology enabled service quality model for life insura...
Extended information technology enabled service quality model for life insura...Extended information technology enabled service quality model for life insura...
Extended information technology enabled service quality model for life insura...prjpublications
 
Employee spirituality and job engagement a correlational study across organi...
Employee spirituality and job engagement  a correlational study across organi...Employee spirituality and job engagement  a correlational study across organi...
Employee spirituality and job engagement a correlational study across organi...prjpublications
 
Anempirical study on the performance of self financing engineering colleges (...
Anempirical study on the performance of self financing engineering colleges (...Anempirical study on the performance of self financing engineering colleges (...
Anempirical study on the performance of self financing engineering colleges (...prjpublications
 
Studies on removal of acid orange 7 by advanced oxidation process using uv an...
Studies on removal of acid orange 7 by advanced oxidation process using uv an...Studies on removal of acid orange 7 by advanced oxidation process using uv an...
Studies on removal of acid orange 7 by advanced oxidation process using uv an...prjpublications
 
Is the higher quality financial reporting improves csr investment efficiency ...
Is the higher quality financial reporting improves csr investment efficiency ...Is the higher quality financial reporting improves csr investment efficiency ...
Is the higher quality financial reporting improves csr investment efficiency ...prjpublications
 
Impact of mergers and acquisitions
Impact of mergers and acquisitionsImpact of mergers and acquisitions
Impact of mergers and acquisitionsprjpublications
 
Role of fdi in india an emerging option for sustainable economic growth
Role of fdi in india an emerging option for sustainable economic growthRole of fdi in india an emerging option for sustainable economic growth
Role of fdi in india an emerging option for sustainable economic growthprjpublications
 

Más de prjpublications (20)

An approach to design a rectangular microstrip patch antenna in s band by tlm...
An approach to design a rectangular microstrip patch antenna in s band by tlm...An approach to design a rectangular microstrip patch antenna in s band by tlm...
An approach to design a rectangular microstrip patch antenna in s band by tlm...
 
A design and simulation of optical pressure sensor based on photonic crystal ...
A design and simulation of optical pressure sensor based on photonic crystal ...A design and simulation of optical pressure sensor based on photonic crystal ...
A design and simulation of optical pressure sensor based on photonic crystal ...
 
Pattern recognition using video surveillance for wildlife applications
Pattern recognition using video surveillance for wildlife applicationsPattern recognition using video surveillance for wildlife applications
Pattern recognition using video surveillance for wildlife applications
 
Precision face image retrieval by extracting the face features and comparing ...
Precision face image retrieval by extracting the face features and comparing ...Precision face image retrieval by extracting the face features and comparing ...
Precision face image retrieval by extracting the face features and comparing ...
 
Keyless approach of separable hiding data into encrypted image
Keyless approach of separable hiding data into encrypted imageKeyless approach of separable hiding data into encrypted image
Keyless approach of separable hiding data into encrypted image
 
Encryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloudEncryption based multi user manner secured data sharing and storing in cloud
Encryption based multi user manner secured data sharing and storing in cloud
 
Study on gis simulated water quality model
Study on gis simulated water quality modelStudy on gis simulated water quality model
Study on gis simulated water quality model
 
Smes role in reduction of the unemployment problem in the area located in sa...
Smes  role in reduction of the unemployment problem in the area located in sa...Smes  role in reduction of the unemployment problem in the area located in sa...
Smes role in reduction of the unemployment problem in the area located in sa...
 
Reduction of executive stress by development of emotional intelligence a stu...
Reduction of executive stress by development of emotional intelligence  a stu...Reduction of executive stress by development of emotional intelligence  a stu...
Reduction of executive stress by development of emotional intelligence a stu...
 
Mathematical modeling approach for flood management
Mathematical modeling approach for flood managementMathematical modeling approach for flood management
Mathematical modeling approach for flood management
 
Influences of child endorsers on the consumers
Influences of child endorsers on the consumersInfluences of child endorsers on the consumers
Influences of child endorsers on the consumers
 
Impact of stress management by development of emotional intelligence in cmts,...
Impact of stress management by development of emotional intelligence in cmts,...Impact of stress management by development of emotional intelligence in cmts,...
Impact of stress management by development of emotional intelligence in cmts,...
 
Faulty node recovery and replacement algorithm for wireless sensor network
Faulty node recovery and replacement algorithm for wireless sensor networkFaulty node recovery and replacement algorithm for wireless sensor network
Faulty node recovery and replacement algorithm for wireless sensor network
 
Extended information technology enabled service quality model for life insura...
Extended information technology enabled service quality model for life insura...Extended information technology enabled service quality model for life insura...
Extended information technology enabled service quality model for life insura...
 
Employee spirituality and job engagement a correlational study across organi...
Employee spirituality and job engagement  a correlational study across organi...Employee spirituality and job engagement  a correlational study across organi...
Employee spirituality and job engagement a correlational study across organi...
 
Anempirical study on the performance of self financing engineering colleges (...
Anempirical study on the performance of self financing engineering colleges (...Anempirical study on the performance of self financing engineering colleges (...
Anempirical study on the performance of self financing engineering colleges (...
 
Studies on removal of acid orange 7 by advanced oxidation process using uv an...
Studies on removal of acid orange 7 by advanced oxidation process using uv an...Studies on removal of acid orange 7 by advanced oxidation process using uv an...
Studies on removal of acid orange 7 by advanced oxidation process using uv an...
 
Is the higher quality financial reporting improves csr investment efficiency ...
Is the higher quality financial reporting improves csr investment efficiency ...Is the higher quality financial reporting improves csr investment efficiency ...
Is the higher quality financial reporting improves csr investment efficiency ...
 
Impact of mergers and acquisitions
Impact of mergers and acquisitionsImpact of mergers and acquisitions
Impact of mergers and acquisitions
 
Role of fdi in india an emerging option for sustainable economic growth
Role of fdi in india an emerging option for sustainable economic growthRole of fdi in india an emerging option for sustainable economic growth
Role of fdi in india an emerging option for sustainable economic growth
 

Último

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 

A secure payment scheme in multihop wireless network by trusted node identification method

  • 1. International Journal of Computer science and Engineering Research and Development (IJCSERD), ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 4, Number 2, April-June (2014) 34 A SECURE PAYMENT SCHEME IN MULTIHOP WIRELESS NETWORK BY TRUSTED NODE IDENTIFICATION METHOD [1] Soumya A V, [2] Mrs.Prajna M R [1] Dept of CS&E VTU, Belgaum KVGCE, SULLIA, DK-574327 [2] Assoc.prof, Dept of CSE VTU, Belgaum KVGCE, SULLIA, DK-574327 ABSTRACT The papers propose an improvised version of the report based payment scheme by adopting a trust system which will assign trust value for each and every node in the network. In report based payment scheme the nodes submit light weight payment report to the Trusted Third party .By checking the consistency of the report the third party classify the reports to fair report and cheating report. If it is a fair report means there is an immediate payment clearance. Otherwise trusted party will ask evidence from all the nodes and cheater nodes are evicted. To increase the performance the proposed system will assign trust value for all the nodes in the network. The nodes have high trust value if they relay more messages successfully in the past. So that packet transmission will be through highly trusted nodes which will reduce probability of dropping messages. Thus increase packet delivery ratio and through put and hence network performance. Index Terms: Payment schemes; Trust value; Trust centre; cheater node. I. INTRODUCTION In Multihop wireless Network the packets from a node is usually transmitted through the intermediate node to reach to the destination [1]. There will be some selfish nodes that will not relay others packets but they make use of others to relay their messages which will give a negative effect hence, there is performance degradation [2]. Payment scheme will give credit to all the nodes participated in the packet transmission which motivate the nodes [3]. This scheme treats the packet forwarding task as a service which can be charged and valuated. This scheme enforces fairness, node cooperation, regulate packet transmission. IJCSERD © PRJ PUBLICATION INTERNATIONAL JOURNAL OF COMPUTER SCIENCE ENGINEERING RESEARCH AND DEVELOPMENT (IJCSERD) ISSN 2248 – 9363(Print) ISSN 2248 – 9371(Online), Volume 4, Number 2, April- June (2014), pp: 34-40 © PRJ Publication, http://www.prjpublication.com/IJCSERD.asp
  • 2. International Journal of Computer science and Engineering Research and Development (IJCSERD), ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 4, Number 2, April-June (2014) 35 A high-quality payment scheme should be secure and need less communication and processing overhead. MWNs can’t be implemented without a secured payment scheme because the nodes are autonomous and aim to maximize their welfare. Since a trusted party may not be involved in communication session, the nodes create proofs of other’s packets of the transmitting called receipts, and for getting the payment they will submit receipts to the Accounting Centre (AC).Here the receipt carries security proof so they are large in size. The AC must carry out large number of cryptographic operations to certify the receipts which leads to communication and processing overhead. In report based schemes the nodes submit light payment reports to the trusted third party to update the credits. The reports contain the alleged charges and the rewards of different sessions without security proofs. The trusted third party verifies the consistency of the report and categorizes them into fair or cheating report. Without any cryptographic operations trusted party will clear the payment for fair report. If it is a cheating report then evidences is requested to discover and evict the cheater node. To increase the performance of report based payment scheme the trust centre will give a trust value for the nodes in the network. Trust values are assigned based on the past performance of the nodes. Thus communication is always routed through the nodes with higher trust values which will reduce the probability of message failure and enhance the delivery ratio and throughput. The rest of the paper is structured as follows. Section 2 describes related works of this area .Section 3 presents the proposed system. Section 4 discusses the experimental work .Then description of the performance discussion in section 5 and conclusion in section 6. II. RELATED WORKS In these days several researches have come up with several payment schemes including tamper-proof-device (TPD)-based [4] and receipt-based schemes. In TPD-based payment schemes, a TPD is installed in each node to store and manage its credit account and secure its operation. In tamper proof-device (TPD) is any payment-based approach require some kind of tamper proofness essential for guaranteeing the security process of the payment. In Nuglets [4], the forwarded packets by a node are passed to the TPD to decrease and increase the node’s credit account. In SIP [5] after getting data packets, the destination node sends a RECEIPT packet to the source to issue a REWARD packet to increment credit count of intermediate node. In CASHnet [6], the credit account of the source node is charged and a signature is attached to each packet. When the packet is received, the credit account of the destination node is charged, and a digitally signed acknowledgement (ACK) packet is send back to the source.TPD based schemes have lot of limitations. First the assumption that TPD can’t be tampered with. But if the attacker can compromise with the TPD then he can communicate with the TPD in an unnoticeable way. To eliminate the use of TPDs, an offline central bank called the Accounting Center is used to store and administer the nodes credit accounts. Different receipt based schemes [12] are SPRITE, PIS, CDS, FESCIM, ESIP.
  • 3. International Journal of Computer science and Engineering Research and Development (IJCSERD), ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 4, Number 2, April-June (2014) 36 In sprite [7] the source node signs the identities of the nodes in the route and the message, and sends the signature as a proof for sending a message. The intermediate nodes verify the signature, create receipts which contain the identities of the nodes in the path and the source’s signature, and submit the receipts to the AC to get the payment. After verification AC give the payments. The problem is the communication overhead In FESCIM [8] the source and destination is charged, if they are interested in communication. In PIS [9], the source adds a signature to each message and the destination node acknowledges with a signed packet. CDS [10] uses statistical methods to find the cheater nodes. Due to the nature of statistical method some sincere node may incorrectly accused as cheater. Some cheaters may not be recognized. ESIP [11] suggests communication protocol that can be used for a payment scheme. ESIP transmits messages from the source to destination node with limited number of public key cryptography operation by integrating public key cryptography, identity based cryptography and hash function. Comparing to PIS, ESIP needs less public key cryptography operations but larger receipt size. In proposed paper to avoid the communication and processing overhead of the existing schemes introducing report based payment scheme and using a trust system to improve the performance. III. PROPOSED SYSTEM In the proposed system the considered Multihop Wireless Network has an offline Trusted party(TP), responsible for maintaining the nodes credit account.TP is also responsible for cancel and update the certificate for nodes.ie, TP has Accounting Centre, Certificate Authority and Trust centre. Trust centre is responsible for maintaining the trust value of the node according to the no of relayed and dropped messages. Each node has to register with TP to get symmetric key, public key/private key and certificate. Only registered nodes can communicate each other. After the communication session the TP will verify the payment report submitted by the nodes and clear the payments if the report is consistent. This scheme can be used with any dynamic source routing protocol which set up end to end route before sending the data. As shown in fig.1 the payment scheme has 5 main phases. The first phase is communication phase. In this Route is established through highly trusted nodes and data is transmitted. Second is classifier which classifies the report into fair or cheating. From the cheating report the trusted party will discover the cheaters by asking evidences from the suspicious nodes. .This is fourth phase called Identifying cheaters. Then the trusted party evicts the cheaters from the network. The next is credit account update .In this phase the correct credit is assigned to all the nodes by trusted party. After the packet transmission the trust centre assigns the trust value for the nodes, participated in the packet transmission.
  • 4. International Journal of Computer science and Engineering Research and Development (IJCSERD), ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 4, Number 2, April-June (2014) 37 Fig.1 Architecture of proposed scheme A. Communication The communication phase includes 4 processes: Route establishment, Data transmission, Evidence composition, payment composition/submission. The source node broadcasts the route request which contains the source identity, Destination identity, Time stamp and Time To live. Time To live means maximum number of intermediate nodes. The route is established by considering the nodes that have high trust values. The node that relay more messages in the past have high trust values. So during route establishment instead of considering shortest path they will consider the route with nodes having high trust values as in figure.2. So that chance of message dropping is less. The nodes that relay more messages have high trust value. After route establishment data is transmitted and destination node replies with acknowledgement. Then the intermediate node composes the evidences for data transmission. All the nodes participated in data transmission compose payment report and submitted to the trusted party. Figure 2. Data transmission through high trusted nodes
  • 5. International Journal of Computer science and Engineering Research and Development (IJCSERD), ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 4, Number 2, April-June (2014) 38 B. Classifier When Accounting Centre obtains the session’s payment report it verifies them by checking the consistency of the report and categorize them into fair or cheating. In the case of fair report all the nodes will be submitting the correct payment report so all will be asking for equal credits but for cheating report at least one node will submit incorrect payment report. Fair report can be for complete and broken sessions. For fair report the trusted party will do payment clearance immediately. The evidence is legal if the calculated proof is similar to the evidences. C. Identifying Cheaters The Trusted party processes the cheating report to identify the cheaters. The objective is to avoid the attackers from stealing credits. The Trusted party asks evidence from the node which requests more payment. In this way, the AC can precisely identify the cheating nodes with requesting few Evidences .To verify the evidences the Trusted party creates the proof by generating the nodes signature and hashing them. After identifying the cheaters the cheater node is evicted from the network. D. Credit Account Update The Credit-Account Update phase obtains fair and corrected payment reports to update the credit of the nodes.The payment clearance is done by charging and rewarding policy. For the payment clearance the trusted party needs reports from all the nodes in the communication session. When registration the trusted party will give a Public and Private Key pair, a symmetric key and a certificate. The public and private key pair is used in communication are required to act as source or destination node. The symmetric key is used to submit the payment reports. E. Trust Value Update The Trust centre assigns the trust value to the nodes that relayed the packets success fully in the communication session. This trust value of the node is considered during the next route establishment phase. Stationary nodes and nodes with large resources to spare will have higher trust value .Nodes at the boundary are more likely to have lower trust value. IV. EXPERIMENTAL WORK All the nodes must be registered with the trusted third party, in order to issue certificate for the nodes. In order to transmit the packets from source to destination the source node produces route request which contains source node identity, destination identity, Time stamp and TTL. Then the source node broadcast the request to all the intermediate nodes. The intermediate node forwards this route request to the next intermediate node until it reaches the destination. The destination node send route selection request to the trusted party to get a path which has a high trust value. Once the path is established by the destination node the source node transmit the packets to the destination node through the established route. After transmitting the packets the nodes can request for the payment .So all the nodes submit the payment report together to the trusted third party. The trusted third party verifies it. If it is consistent means the report will be fair. But the attacker or cheater they will always request for more payment without relaying the packet .So the trusted party can easily find out the cheater by checking the consistency. The trusted party can ask for the evidence and if it is
  • 6. International Journal of Computer science and Engineering Research and Development (IJCSERD), ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 4, Number 2, April-June (2014) 39 not valid then trusted party can assign a cheating count to the node. So during the next route establishment the nodes having high cheating count is rarely considered. V. PERFORMANCE DISCUSSION The performance of proposed scheme is more in terms of throughput and packet delivery ratio. Since this method assigns a trust value for the nodes according to the number of messages relayed in the past and the packet transmission is through the high trust valued nodes, the probability of dropping of messages will reduce. Since the payment clearance in report based scheme is with almost no cryptographic operations, the processing overhead is less and less payment delay is less. Since all the nodes submit the report together the report based payment scheme reduces the communication overhead. VI. CONCLUSION The proposed system improves the performance of the network and provides a secure payment scheme. In this there is a trust system which will assign trust value to each node that relayed the packets more successfully in the past. The report based payment scheme eliminates the communication and processing overhead of other payment schemes and the inclusion of trust centre significantly improves the performance of the network since the data transmission is routed through highly trusted nodes whenever possible. REFERENCES [1] G. Shen, J. Liu, D. Wang, J. Wang, and S. Jin, “Multi-Hop Relay for Next-Generation Wireless Access Networks,” Bell Labs Technical J.,vol. 13, no. 4, pp. 175-193, 2009 [2] S. Marti, T. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” Proc. MobiCom ’00, pp. 255-265, Aug. 2000. [3] G. Marias, P. Georgiadis, D. Flitzanis, and K. Mandalas,“Cooperation Enforcement Schemes for MANETs: A Survey,” Wiley’s J. Wireless Comm. and Mobile Computing, vol. 6, no. 3,pp. 319-332, 2006. [4] L. Buttyan and J. Hubaux, “Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks,” Mobile Networks and Applications, vol. 8, no. 5, pp. 579-592, Oct. 2004. [5] Y. Zhang, W. Lou, and Y. Fang, “A Secure Incentive Protocol for Mobile Ad Hoc Networks,” ACM Wireless Networks, vol. 13, no. 5,pp. 569-582, Oct. 2007. [6] A. Weyland, “Cooperation and Accounting in Multi-Hop Cellular etworks,” PhD thesis, Univ. of Bern, Nov. 2005. [7] S. Zhong, J. Chen, and R. Yang, “Sprite: A Simple, Cheat-Proof, Credit based System for Mobile Ad-Hoc Networks,” Proc. IEEE INFOCOM ’03, vol. 3, pp. 1987-1997, Mar./Apr. 2003. [8] M. Mahmoud and X. Shen, “FESCIM: Fair, Efficient, and Secure ooperation Incentive Mechanism for Hybrid Ad Hoc Networks,”IEEE Trans. Mobile Computing, vol. 11, no. 5, pp. 753-766, May 2012.
  • 7. International Journal of Computer science and Engineering Research and Development (IJCSERD), ISSN 2248- 9363 (Print), ISSN- 2248-9371 (Online) Volume 4, Number 2, April-June (2014) 40 [9] M. Mahmoud and X. Shen, “PIS: A Practical Incentive System for Multi-Hop Wireless Networks,” IEEE Trans. Vehicular Technology,vol. 59, no. 8, pp. 4012-4025, Oct. 2010. [10] M. Mahmoud and X. Shen, “Stimulating Cooperation in Multihop Wireless Networks Using Cheating Detection System,” Proc.IEEE INFOCOM ’10, Mar. 2010. [11] Networks,” IEEE Trans. Mobile Computing, vol. 10, no. 7, pp. 997-1010, July 2011 [12] N. Salem, L. Buttyan, J. Hubaux, and M. Jakobsson, “Node Cooperation in Hybrid Ad Hoc Networks,” IEEE Trans. Mobile Computing, vol. 5, no. 4, pp. 365-376, Apr. 2006. [13] J. Pan, L. Cai, X. Shen, and J. Mark, “Identity-Based Secure Collaboration in Wireless Ad Hoc Networks,” Computer Networks, vol. 51, no. 3, pp. 853-865, 2007