Fraud within asymmetric multi-hop cellular networks

1Citations
Citations of this article
22Readers
Mendeley users who have this article in their library.
Get full text

Abstract

At Financial Cryptography 2003, Jakobsson, Hubaux, and Buttyán suggested a lightweight micro-payment scheme aimed at encouraging routing collaboration in asymmetric multi-hop cellular networks. We will show in this paper that this scheme suffers from some weaknesses. Firstly, we will describe an attack which enables two adversaries in the same cell to communicate freely without being challenged by the operator center. We will put forward a solution to fix this protocol. Then we will describe another method that allows an attacker to determine the secret keys of the other users. This attack thwarts the micro-payment scheme's purpose because an attacker can thus communicate without being charged. Finally we will suggest some solutions to counteract this attack. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Avoine, G. (2005). Fraud within asymmetric multi-hop cellular networks. In Lecture Notes in Computer Science (Vol. 3570, pp. 1–15). Springer Verlag. https://doi.org/10.1007/11507840_1

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free