Stimulating Participation in Wireless Community Networks

Wireless Community Networks (WCNs) are wide-area wireless networks whose nodes are owned and managed by volunteers. We focus on the provision of Internet access to mobile users through WCN-controlled wireless LAN access points (APs). We rely on reciprocity: a person participates in the WCN and provides ‘free’ Internet access to mobile users in order to enjoy the same benefit when mobile. Our reciprocity scheme is compatible with the distinctive structure of WCNs: it does not require registration with authorities, relying only on uncertified free identities (public-private key pairs). Users sign digital receipts when they consume service. The receipts form a receipt graph, which is used as input to a reciprocity algorithm that identifies contributing users using network flow techniques. Simulations show that this algorithm can sustain reciprocal cooperation. We have implemented our algorithm to run on common APs.

[1]  Leonidas J. Guibas,et al.  A dichromatic framework for balanced trees , 1978, 19th Annual Symposium on Foundations of Computer Science (sfcs 1978).

[2]  A. Goldberg,et al.  A new approach to the maximum-flow problem , 1988, JACM.

[3]  Andrew V. Goldberg,et al.  On Implementing the Push—Relabel Method for the Maximum Flow Problem , 1997, Algorithmica.

[4]  Alexander Aiken,et al.  Attack-Resistant Trust Metrics for Public Key Certification , 1998, USENIX Security Symposium.

[5]  Éva Tardos,et al.  Simple Generalized Maximum Flow Algorithms , 1998, IPCO.

[6]  M. Nowak,et al.  Evolution of indirect reciprocity by image scoring , 1998, Nature.

[7]  Michael K. Reiter,et al.  Authentication metric analysis and design , 1999, TSEC.

[8]  E. Friedman,et al.  The Social Cost of Cheap Pseudonyms , 2001 .

[9]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[10]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[11]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[12]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[13]  B. Greiner,et al.  Indirect Reciprocity in Cyclical Networks - An Experimental Study - , 2005 .

[14]  Hector Garcia-Molina,et al.  PPay: micropayments for peer-to-peer systems , 2003, CCS '03.

[15]  Srdjan Capkun,et al.  Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..

[16]  Levente Buttyán,et al.  Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..

[17]  Brian D. Noble,et al.  Samsara: honor among thieves in peer-to-peer storage , 2003, SOSP '03.

[18]  Sheng Zhong,et al.  Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[19]  R. Boyd,et al.  Indirect reciprocity can stabilize cooperation without the second-order free rider problem , 2004, Nature.

[20]  Ion Stoica,et al.  Robust incentive techniques for peer-to-peer networks , 2004, EC '04.

[21]  Jon Crowcroft,et al.  Rethinking incentives for mobile ad hoc networks , 2004, PINS '04.

[22]  Ratul Mahajan,et al.  Experiences applying game theory to system design , 2004, PINS '04.

[23]  Kostas G. Anagnostakis,et al.  Exchange-based incentive mechanisms for peer-to-peer file sharing , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..

[24]  George C. Polyzos,et al.  A self-managed scheme for free citywide Wi-Fi , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.

[25]  Markus Jakobsson,et al.  Reputation-based Wi-Fi deployment , 2005, MOCO.

[26]  Michal Feldman,et al.  The evolution of cooperation under cheap pseudonyms , 2005, Seventh IEEE International Conference on E-Commerce Technology (CEC'05).

[27]  George C. Polyzos,et al.  Self-organised peering of wireless LAN hotspots , 2005, Eur. Trans. Telecommun..

[28]  Ratul Mahajan,et al.  Sustaining cooperation in multi-hop wireless networks , 2005, NSDI.

[29]  Seungjoon Lee,et al.  Cooperative peer groups in NICE , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[30]  Levente Buttyán,et al.  Nash equilibria of packet forwarding strategies in wireless ad hoc networks , 2006, IEEE Transactions on Mobile Computing.

[31]  Sheng Zhong,et al.  On designing incentive-compatible routing and forwarding protocols in wireless ad-hoc networks , 2006, Wirel. Networks.

[32]  Kazumaro Aoki,et al.  SEC X.2: Recommended Elliptic Curve Domain Parameters , 2008 .