SlideShare a Scribd company logo
1 of 7
A Secure Payment Scheme with Low Communication and
Processing Overhead for Multihop Wireless Networks
ABSTRACT:
We propose RACE, a report-based payment scheme for multihop wireless
networks to stimulate node cooperation, regulate packet transmission, and enforce
fairness. The nodes submit lightweight payment reports (instead of receipts) to the
accounting center (AC) and temporarily store undeniable security tokens called
Evidences. The reports contain the alleged charges and rewards without security
proofs, e.g., signatures. The AC can verify the payment by investigating the
consistency of the reports, and clear the payment of the fair reports with almost no
processing overhead or cryptographic operations. For cheating reports, the
Evidences are requested to identify and evict the cheating nodes that submit
incorrect reports. Instead of requesting the Evidences from all the nodes
participating in the cheating reports, RACE can identify the cheating nodes with
requesting few Evidences. Moreover, Evidence aggregation technique is used to
reduce the Evidences’ storage area. Our analytical and simulation results
demonstrate that RACE requires much less communication and processing
overhead than the existing receipt-based schemes with acceptable payment
clearance delay and storage area. This is essential for the effective implementation
of a payment scheme because it uses micropayment and the overhead cost should
be much less than the payment value. Moreover, RACE can secure the payment
and precisely identify the cheating nodes without false accusations.
EXISTING SYSTEM:
The existing payment schemes can be classified into tamper-proof-device (TPD)-
based and receipt-based schemes. In TPD-based payment schemes, a TPD is
installed in each node to store and manage its credit account and secure its
operation. For receipt-based payment schemes, an offline central unit called the
accounting center stores and manages the nodes’ credit accounts. The nodes
usually submit undeniable proofs for relaying packets, called receipts, to the AC to
update their credit accounts.
DISADVANTAGES OF EXISTING SYSTEM:
False accusations and missed detections
Vulnerable to Collusion attacks
Long time to identify cheaters
PROPOSED SYSTEM:
In this paper, we propose RACE, a Report-based pAyment sChemE for MWNs.
The nodes submit lightweight payment reports (instead of receipts) to the AC to
update their credit accounts, and temporarily store undeniable security tokens
called Evidences. The reports contain the alleged charges and rewards of different
sessions without security proofs, e.g., signatures. The AC verifies the payment by
investigating the consistency of the reports, and clears the payment of the fair
reports with almost no cryptographic operations or computational overhead. For
cheating reports, the Evidences are requested to identify and evict the cheating
nodes that submit incorrect reports, e.g., to steal credits or pay less. In other words,
the Evidences are used to resolve disputes when the nodes disagree about the
payment. Instead of requesting the Evidences from all the nodes participating in
the cheating reports, RACE can identify the cheating nodes with submitting and
processing few Evidences. Moreover, Evidence aggregation technique is used to
reduce the storage area of the Evidences.
In RACE, Evidences are submitted and the AC applies cryptographic operations to
verify them only in case of cheating, but the nodes always submit security tokens,
e.g., signatures, and the AC always applies cryptographic operations to verify the
payment in the existing receipt based schemes. RACE can clear the payment nearly
without applying cryptographic operations and with submitting lightweight reports
when Evidences are not frequently requested.
ADVANTAGES OF PROPOSED SYSTEM:
Widespread cheating actions are not expected in civilian applications because the
common users do not have the technical knowledge to tamper with their devices.
Moreover, cheating nodes are evicted once they commit one cheating action and it
is neither easy nor cheap to change identities. Our analytical and simulation results
demonstrate that RACE requires much less communication and processing
overhead than the existing receipt-based schemes with acceptable payment
clearance delay and Evidences’ storage area, which is necessary to make the
practical implementation of the payment scheme effective. Moreover, RACE can
secure the payment and precisely identify the cheating nodes without false
accusations or stealing credits. To the best of our knowledge, RACE is the first
payment scheme that can verify the payment by investigating the consistency of
the nodes’ reports without systematically submitting and processing security
tokens and without false accusations. RACE is also the first scheme that uses the
concept of Evidence to secure the payment and requires applying cryptographic
operations in clearing the payment only in case of cheating.
In overall we summarize:
 Lightweight payment reports (charges and rewards) without security proof
 Almost no cryptographic operations in clearing payments of fair reports
 Uses Evidences to solve disputes
 Reduce storage via Evidence aggregation technique
SYSTEM ARCHITECTURE:
MODULES:
1) Route establishment
2) Data transmission
3) Evidence composition
4) Payment report composition/submission
SYSTEM CONFIGURATION:-
HARDWARE REQUIREMENTS:-
 Processor - Pentium –IV
 Speed - 1.1 Ghz
 RAM - 256 MB
 Hard Disk - 20 GB
 Key Board - Standard Windows Keyboard
 Mouse - Two or Three Button Mouse
 Monitor - SVGA
SOFTWARE REQUIREMENTS:
• Operating system : - Windows XP.
• Coding Language : C#.Net.
REFERENCE:
Mohamed M.E.A. Mahmoud and Xuemin (Sherman) Shen, “A Secure Payment
Scheme with Low Communication and Processing Overhead for Multihop
Wireless Networks”, IEEE TRANSACTIONS ON PARALLEL AND
DISTRIBUTED SYSTEMS, VOL. 24, NO. 2, FEBRUARY 2013

More Related Content

Viewers also liked

Context driven, prescription-based personal activity classification methodolo...
Context driven, prescription-based personal activity classification methodolo...Context driven, prescription-based personal activity classification methodolo...
Context driven, prescription-based personal activity classification methodolo...JPINFOTECH JAYAPRAKASH
 
Spatial query integrity with voronoi neighbors
Spatial query integrity with voronoi neighborsSpatial query integrity with voronoi neighbors
Spatial query integrity with voronoi neighborsJPINFOTECH JAYAPRAKASH
 
Mobile relay configuration in data intensive wireless sensor networks
Mobile relay configuration in data intensive wireless sensor networksMobile relay configuration in data intensive wireless sensor networks
Mobile relay configuration in data intensive wireless sensor networksJPINFOTECH JAYAPRAKASH
 
Green droid automated diagnosis of energy inefficiency for smartphone applica...
Green droid automated diagnosis of energy inefficiency for smartphone applica...Green droid automated diagnosis of energy inefficiency for smartphone applica...
Green droid automated diagnosis of energy inefficiency for smartphone applica...JPINFOTECH JAYAPRAKASH
 
A new algorithm for inferring user search goals with feedback sessions
A new algorithm for inferring user search goals with feedback sessionsA new algorithm for inferring user search goals with feedback sessions
A new algorithm for inferring user search goals with feedback sessionsJPINFOTECH JAYAPRAKASH
 
Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...JPINFOTECH JAYAPRAKASH
 
Pack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction systemPack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction systemJPINFOTECH JAYAPRAKASH
 
A stochastic model to investigate data center performance and qo s in iaas cl...
A stochastic model to investigate data center performance and qo s in iaas cl...A stochastic model to investigate data center performance and qo s in iaas cl...
A stochastic model to investigate data center performance and qo s in iaas cl...JPINFOTECH JAYAPRAKASH
 
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based EncryptionSecuring Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based EncryptionJPINFOTECH JAYAPRAKASH
 
Crowdsourcing predictors of behavioral outcomes
Crowdsourcing predictors of behavioral outcomesCrowdsourcing predictors of behavioral outcomes
Crowdsourcing predictors of behavioral outcomesJPINFOTECH JAYAPRAKASH
 
Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...JPINFOTECH JAYAPRAKASH
 
A framework for mining signatures from event sequences and its applications i...
A framework for mining signatures from event sequences and its applications i...A framework for mining signatures from event sequences and its applications i...
A framework for mining signatures from event sequences and its applications i...JPINFOTECH JAYAPRAKASH
 
Privacy enhanced web service composition
Privacy enhanced web service compositionPrivacy enhanced web service composition
Privacy enhanced web service compositionJPINFOTECH JAYAPRAKASH
 

Viewers also liked (15)

Context driven, prescription-based personal activity classification methodolo...
Context driven, prescription-based personal activity classification methodolo...Context driven, prescription-based personal activity classification methodolo...
Context driven, prescription-based personal activity classification methodolo...
 
Spatial query integrity with voronoi neighbors
Spatial query integrity with voronoi neighborsSpatial query integrity with voronoi neighbors
Spatial query integrity with voronoi neighbors
 
Mobile relay configuration in data intensive wireless sensor networks
Mobile relay configuration in data intensive wireless sensor networksMobile relay configuration in data intensive wireless sensor networks
Mobile relay configuration in data intensive wireless sensor networks
 
Green droid automated diagnosis of energy inefficiency for smartphone applica...
Green droid automated diagnosis of energy inefficiency for smartphone applica...Green droid automated diagnosis of energy inefficiency for smartphone applica...
Green droid automated diagnosis of energy inefficiency for smartphone applica...
 
A new algorithm for inferring user search goals with feedback sessions
A new algorithm for inferring user search goals with feedback sessionsA new algorithm for inferring user search goals with feedback sessions
A new algorithm for inferring user search goals with feedback sessions
 
Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...
 
Pack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction systemPack prediction based cloud bandwidth and cost reduction system
Pack prediction based cloud bandwidth and cost reduction system
 
A stochastic model to investigate data center performance and qo s in iaas cl...
A stochastic model to investigate data center performance and qo s in iaas cl...A stochastic model to investigate data center performance and qo s in iaas cl...
A stochastic model to investigate data center performance and qo s in iaas cl...
 
ieee projects for cse 2013
ieee projects for cse 2013ieee projects for cse 2013
ieee projects for cse 2013
 
Bulk ieee projects
Bulk ieee projectsBulk ieee projects
Bulk ieee projects
 
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based EncryptionSecuring Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
 
Crowdsourcing predictors of behavioral outcomes
Crowdsourcing predictors of behavioral outcomesCrowdsourcing predictors of behavioral outcomes
Crowdsourcing predictors of behavioral outcomes
 
Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...Toward privacy preserving and collusion resistance in a location proof updati...
Toward privacy preserving and collusion resistance in a location proof updati...
 
A framework for mining signatures from event sequences and its applications i...
A framework for mining signatures from event sequences and its applications i...A framework for mining signatures from event sequences and its applications i...
A framework for mining signatures from event sequences and its applications i...
 
Privacy enhanced web service composition
Privacy enhanced web service compositionPrivacy enhanced web service composition
Privacy enhanced web service composition
 

Similar to A secure payment scheme with low communication and processing overhead for multihop wireless networks

Java a secure payment scheme with low communication and processing overhead ...
Java  a secure payment scheme with low communication and processing overhead ...Java  a secure payment scheme with low communication and processing overhead ...
Java a secure payment scheme with low communication and processing overhead ...ecwayerode
 
A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...ecway
 
A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...Ecwaytech
 
A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...ecwayprojects
 
Dotnet a secure payment scheme with low communication and processing overhea...
Dotnet  a secure payment scheme with low communication and processing overhea...Dotnet  a secure payment scheme with low communication and processing overhea...
Dotnet a secure payment scheme with low communication and processing overhea...Ecwaytech
 
A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...Ecwayt
 
Dotnet a secure payment scheme with low communication and processing overhea...
Dotnet  a secure payment scheme with low communication and processing overhea...Dotnet  a secure payment scheme with low communication and processing overhea...
Dotnet a secure payment scheme with low communication and processing overhea...Ecwayt
 
A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...Ecway2004
 
A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...Ecway2004
 
A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...Ecwaytechnoz
 
A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...Ecwayt
 
A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...Ecwaytechnoz
 
A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...Ecwaytechnoz
 
Report based payment scheme for multihop wireless networks
Report based payment scheme for multihop wireless networksReport based payment scheme for multihop wireless networks
Report based payment scheme for multihop wireless networkseSAT Publishing House
 
Report based payment scheme for multihop wireless networks
Report based payment scheme for multihop wireless networksReport based payment scheme for multihop wireless networks
Report based payment scheme for multihop wireless networkseSAT Journals
 
Eport based payment scheme for multihop wireless networks
Eport based payment scheme for multihop wireless networksEport based payment scheme for multihop wireless networks
Eport based payment scheme for multihop wireless networkseSAT Journals
 
A secure payment scheme in multihop wireless network by trusted node identifi...
A secure payment scheme in multihop wireless network by trusted node identifi...A secure payment scheme in multihop wireless network by trusted node identifi...
A secure payment scheme in multihop wireless network by trusted node identifi...prjpublications
 
A secure payment scheme in multihop
A secure payment scheme in multihopA secure payment scheme in multihop
A secure payment scheme in multihopprj_publication
 
Dynamic audit services for outsourced storages in clouds
Dynamic audit services for outsourced storages in cloudsDynamic audit services for outsourced storages in clouds
Dynamic audit services for outsourced storages in cloudsJPINFOTECH JAYAPRAKASH
 

Similar to A secure payment scheme with low communication and processing overhead for multihop wireless networks (20)

Java a secure payment scheme with low communication and processing overhead ...
Java  a secure payment scheme with low communication and processing overhead ...Java  a secure payment scheme with low communication and processing overhead ...
Java a secure payment scheme with low communication and processing overhead ...
 
A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...
 
F0352033038
F0352033038F0352033038
F0352033038
 
A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...
 
A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...
 
Dotnet a secure payment scheme with low communication and processing overhea...
Dotnet  a secure payment scheme with low communication and processing overhea...Dotnet  a secure payment scheme with low communication and processing overhea...
Dotnet a secure payment scheme with low communication and processing overhea...
 
A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...
 
Dotnet a secure payment scheme with low communication and processing overhea...
Dotnet  a secure payment scheme with low communication and processing overhea...Dotnet  a secure payment scheme with low communication and processing overhea...
Dotnet a secure payment scheme with low communication and processing overhea...
 
A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...
 
A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...
 
A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...
 
A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...
 
A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...
 
A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...A secure payment scheme with low communication and processing overhead for mu...
A secure payment scheme with low communication and processing overhead for mu...
 
Report based payment scheme for multihop wireless networks
Report based payment scheme for multihop wireless networksReport based payment scheme for multihop wireless networks
Report based payment scheme for multihop wireless networks
 
Report based payment scheme for multihop wireless networks
Report based payment scheme for multihop wireless networksReport based payment scheme for multihop wireless networks
Report based payment scheme for multihop wireless networks
 
Eport based payment scheme for multihop wireless networks
Eport based payment scheme for multihop wireless networksEport based payment scheme for multihop wireless networks
Eport based payment scheme for multihop wireless networks
 
A secure payment scheme in multihop wireless network by trusted node identifi...
A secure payment scheme in multihop wireless network by trusted node identifi...A secure payment scheme in multihop wireless network by trusted node identifi...
A secure payment scheme in multihop wireless network by trusted node identifi...
 
A secure payment scheme in multihop
A secure payment scheme in multihopA secure payment scheme in multihop
A secure payment scheme in multihop
 
Dynamic audit services for outsourced storages in clouds
Dynamic audit services for outsourced storages in cloudsDynamic audit services for outsourced storages in clouds
Dynamic audit services for outsourced storages in clouds
 

Recently uploaded

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 

Recently uploaded (20)

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 

A secure payment scheme with low communication and processing overhead for multihop wireless networks

  • 1. A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks ABSTRACT: We propose RACE, a report-based payment scheme for multihop wireless networks to stimulate node cooperation, regulate packet transmission, and enforce fairness. The nodes submit lightweight payment reports (instead of receipts) to the accounting center (AC) and temporarily store undeniable security tokens called Evidences. The reports contain the alleged charges and rewards without security proofs, e.g., signatures. The AC can verify the payment by investigating the consistency of the reports, and clear the payment of the fair reports with almost no processing overhead or cryptographic operations. For cheating reports, the Evidences are requested to identify and evict the cheating nodes that submit incorrect reports. Instead of requesting the Evidences from all the nodes participating in the cheating reports, RACE can identify the cheating nodes with requesting few Evidences. Moreover, Evidence aggregation technique is used to reduce the Evidences’ storage area. Our analytical and simulation results demonstrate that RACE requires much less communication and processing overhead than the existing receipt-based schemes with acceptable payment clearance delay and storage area. This is essential for the effective implementation
  • 2. of a payment scheme because it uses micropayment and the overhead cost should be much less than the payment value. Moreover, RACE can secure the payment and precisely identify the cheating nodes without false accusations. EXISTING SYSTEM: The existing payment schemes can be classified into tamper-proof-device (TPD)- based and receipt-based schemes. In TPD-based payment schemes, a TPD is installed in each node to store and manage its credit account and secure its operation. For receipt-based payment schemes, an offline central unit called the accounting center stores and manages the nodes’ credit accounts. The nodes usually submit undeniable proofs for relaying packets, called receipts, to the AC to update their credit accounts. DISADVANTAGES OF EXISTING SYSTEM: False accusations and missed detections Vulnerable to Collusion attacks Long time to identify cheaters
  • 3. PROPOSED SYSTEM: In this paper, we propose RACE, a Report-based pAyment sChemE for MWNs. The nodes submit lightweight payment reports (instead of receipts) to the AC to update their credit accounts, and temporarily store undeniable security tokens called Evidences. The reports contain the alleged charges and rewards of different sessions without security proofs, e.g., signatures. The AC verifies the payment by investigating the consistency of the reports, and clears the payment of the fair reports with almost no cryptographic operations or computational overhead. For cheating reports, the Evidences are requested to identify and evict the cheating nodes that submit incorrect reports, e.g., to steal credits or pay less. In other words, the Evidences are used to resolve disputes when the nodes disagree about the payment. Instead of requesting the Evidences from all the nodes participating in the cheating reports, RACE can identify the cheating nodes with submitting and processing few Evidences. Moreover, Evidence aggregation technique is used to reduce the storage area of the Evidences. In RACE, Evidences are submitted and the AC applies cryptographic operations to verify them only in case of cheating, but the nodes always submit security tokens, e.g., signatures, and the AC always applies cryptographic operations to verify the payment in the existing receipt based schemes. RACE can clear the payment nearly without applying cryptographic operations and with submitting lightweight reports when Evidences are not frequently requested.
  • 4. ADVANTAGES OF PROPOSED SYSTEM: Widespread cheating actions are not expected in civilian applications because the common users do not have the technical knowledge to tamper with their devices. Moreover, cheating nodes are evicted once they commit one cheating action and it is neither easy nor cheap to change identities. Our analytical and simulation results demonstrate that RACE requires much less communication and processing overhead than the existing receipt-based schemes with acceptable payment clearance delay and Evidences’ storage area, which is necessary to make the practical implementation of the payment scheme effective. Moreover, RACE can secure the payment and precisely identify the cheating nodes without false accusations or stealing credits. To the best of our knowledge, RACE is the first payment scheme that can verify the payment by investigating the consistency of the nodes’ reports without systematically submitting and processing security tokens and without false accusations. RACE is also the first scheme that uses the concept of Evidence to secure the payment and requires applying cryptographic operations in clearing the payment only in case of cheating. In overall we summarize:  Lightweight payment reports (charges and rewards) without security proof  Almost no cryptographic operations in clearing payments of fair reports
  • 5.  Uses Evidences to solve disputes  Reduce storage via Evidence aggregation technique SYSTEM ARCHITECTURE:
  • 6. MODULES: 1) Route establishment 2) Data transmission 3) Evidence composition 4) Payment report composition/submission SYSTEM CONFIGURATION:- HARDWARE REQUIREMENTS:-  Processor - Pentium –IV  Speed - 1.1 Ghz  RAM - 256 MB  Hard Disk - 20 GB  Key Board - Standard Windows Keyboard  Mouse - Two or Three Button Mouse  Monitor - SVGA
  • 7. SOFTWARE REQUIREMENTS: • Operating system : - Windows XP. • Coding Language : C#.Net. REFERENCE: Mohamed M.E.A. Mahmoud and Xuemin (Sherman) Shen, “A Secure Payment Scheme with Low Communication and Processing Overhead for Multihop Wireless Networks”, IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO. 2, FEBRUARY 2013