Skip to main content

Fraud Within Asymmetric Multi-hop Cellular Networks

  • Conference paper
Financial Cryptography and Data Security (FC 2005)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3570))

Included in the following conference series:

Abstract

At Financial Cryptography 2003, Jakobsson, Hubaux, and Buttyán suggested a lightweight micro-payment scheme aimed at encouraging routing collaboration in asymmetric multi-hop cellular networks. We will show in this paper that this scheme suffers from some weaknesses. Firstly, we will describe an attack which enables two adversaries in the same cell to communicate freely without being challenged by the operator center. We will put forward a solution to fix this protocol. Then we will describe another method that allows an attacker to determine the secret keys of the other users. This attack thwarts the micro-payment scheme’s purpose because an attacker can thus communicate without being charged. Finally we will suggest some solutions to counteract this attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Haug, T.: Overview of GSM: philosophy and results. International Journal of Wireless Information Networks 1(1), 7–16 (1994)

    Article  Google Scholar 

  2. Jakobsson, M., Hubaux, J.-P., Buttyán, L.: A micro-payment scheme encouraging collaboration in multi-hop cellular networks. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 15–33. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  3. Lin, Y.-D., Hsu, Y.-C.: Multihop cellular: A new architecture for wireless communications. In: Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies – INFOCOM 2000, Tel-Aviv, Israel, March 2000, vol. 3, pp. 1273–1282. IEEE, Los Alamitos (2000)

    Chapter  Google Scholar 

  4. Rivest, R.: Electronic lottery tickets as micropayments. In: Luby, M., Rolim, J.D.P., Serna, M. (eds.) FC 1997. LNCS, vol. 1318, pp. 307–314. Springer, Heidelberg (1997)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Avoine, G. (2005). Fraud Within Asymmetric Multi-hop Cellular Networks. In: Patrick, A.S., Yung, M. (eds) Financial Cryptography and Data Security. FC 2005. Lecture Notes in Computer Science, vol 3570. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11507840_1

Download citation

  • DOI: https://doi.org/10.1007/11507840_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-26656-3

  • Online ISBN: 978-3-540-31680-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics