Secure unified cellular ad hoc network routing

Jason J. Haas, Yih-Chun Hu

Research output: Chapter in Book/Report/Conference proceedingConference contribution


Previous simulations have shown substantial performance gains can be achieved by using hybrid cellular and wireless LAN (WLAN) approaches [1]. In a hybrid system, a proxy in an area of strong connectivity (and therefore higher bandwidth) forwards traffic on behalf of a client in an area of weaker connectivity (and therefore lower bandwidth). The proxy routes traffic between the base station (over a cellular link) and the client (over a WLAN). Such approaches have had limited practical applicability due to substantial security risks, including eavesdropping, intentional performance degradation and cheating the incentive schemes. The Secure Unified Cellular Ad Hoc Network (SUCAN) protocol is designed to address these risks, allowing the deployment of hybrid networks. SUCAN uses incentives and cryptographic techniques to eliminate cheating by self-interested hosts, while limiting the damage caused by malicious hosts. We implemented SUCAN on Verizon's Broadband Access network. To our knowledge, this is the first real-world implementation of a hybrid cellular network protocol. Our implementation results show that the SUCAN system can provide substantial performance increases and protects against performance degradation even in the presence of malicious behavior.

Original languageEnglish (US)
Title of host publicationGLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference
StatePublished - Dec 1 2009
Event2009 IEEE Global Telecommunications Conference, GLOBECOM 2009 - Honolulu, HI, United States
Duration: Nov 30 2009Dec 4 2009

Publication series

NameGLOBECOM - IEEE Global Telecommunications Conference


Other2009 IEEE Global Telecommunications Conference, GLOBECOM 2009
CountryUnited States
CityHonolulu, HI

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'Secure unified cellular ad hoc network routing'. Together they form a unique fingerprint.

  • Cite this

    Haas, J. J., & Hu, Y-C. (2009). Secure unified cellular ad hoc network routing. In GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference [5425789] (GLOBECOM - IEEE Global Telecommunications Conference).