Sciweavers

FC
2005
Springer

Fraud Within Asymmetric Multi-hop Cellular Networks

14 years 5 months ago
Fraud Within Asymmetric Multi-hop Cellular Networks
At Financial Cryptography 2003, Jakobsson, Hubaux, and Butty´an suggested a lightweight micro-payment scheme aimed at encouraging routing collaboration in asymmetric multi-hop cellular networks. We will show in this paper that this scheme suffers from some weaknesses. Firstly, we will describe an attack which enables two adversaries in the same cell to communicate freely without being challenged by the operator center. We will put forward a solution to fix this protocol. Then we will describe another method that allows an attacker to determine the secret keys of the other users. This attack thwarts the micro-payment scheme’s purpose because an attacker can thus communicate without being charged. Finally we will suggest some solutions to counteract this attack. Key words: micro-payment, multi-hop cellular networks, cryptanalysis.
Gildas Avoine
Added 27 Jun 2010
Updated 27 Jun 2010
Type Conference
Year 2005
Where FC
Authors Gildas Avoine
Comments (0)