Abstract
At Financial Cryptography 2003, Jakobsson, Hubaux, and Buttyán suggested a lightweight micro-payment scheme aimed at encouraging routing collaboration in asymmetric multi-hop cellular networks. We will show in this paper that this scheme suffers from some weaknesses. Firstly, we will describe an attack which enables two adversaries in the same cell to communicate freely without being challenged by the operator center. We will put forward a solution to fix this protocol. Then we will describe another method that allows an attacker to determine the secret keys of the other users. This attack thwarts the micro-payment scheme’s purpose because an attacker can thus communicate without being charged. Finally we will suggest some solutions to counteract this attack.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Haug, T.: Overview of GSM: philosophy and results. International Journal of Wireless Information Networks 1(1), 7–16 (1994)
Jakobsson, M., Hubaux, J.-P., Buttyán, L.: A micro-payment scheme encouraging collaboration in multi-hop cellular networks. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 15–33. Springer, Heidelberg (2003)
Lin, Y.-D., Hsu, Y.-C.: Multihop cellular: A new architecture for wireless communications. In: Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies – INFOCOM 2000, Tel-Aviv, Israel, March 2000, vol. 3, pp. 1273–1282. IEEE, Los Alamitos (2000)
Rivest, R.: Electronic lottery tickets as micropayments. In: Luby, M., Rolim, J.D.P., Serna, M. (eds.) FC 1997. LNCS, vol. 1318, pp. 307–314. Springer, Heidelberg (1997)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Avoine, G. (2005). Fraud Within Asymmetric Multi-hop Cellular Networks. In: Patrick, A.S., Yung, M. (eds) Financial Cryptography and Data Security. FC 2005. Lecture Notes in Computer Science, vol 3570. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11507840_1
Download citation
DOI: https://doi.org/10.1007/11507840_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-26656-3
Online ISBN: 978-3-540-31680-0
eBook Packages: Computer ScienceComputer Science (R0)