Peer-to-peer wireless LAN consortia: economic modeling and architecture

We address the incentive issues that arise in a peer-to-peer WLAN consortium (P. Antoniadis et al., 2003). We explore the use of flexible rules on reciprocity to guide domain policies and develop a suitable economic model that demonstrates the basic characteristics of our system.

[1]  David Abramson,et al.  Economic models for resource management and scheduling in Grid computing , 2002, Concurr. Comput. Pract. Exp..

[2]  Vikram Srinivasan,et al.  Cooperation in wireless ad hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[3]  Stefan Saroiu,et al.  A Measurement Study of Peer-to-Peer File Sharing Systems , 2001 .

[4]  A. M. Abdullah,et al.  Wireless lan medium access control (mac) and physical layer (phy) specifications , 1997 .

[5]  Jon Crowcroft,et al.  Modelling incentives for collaboration in mobile ad hoc networks , 2004, Perform. Evaluation.

[6]  Adi Shamir,et al.  Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.

[7]  Sheng Zhong,et al.  Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[8]  Kevin Leyton-Brown,et al.  Incentives for sharing in peer-to-peer networks , 2001, EC '01.

[9]  Eytan Adar,et al.  Free Riding on Gnutella , 2000, First Monday.

[10]  Levente Buttyán,et al.  Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..

[11]  Pietro Michiardi,et al.  A game theoretical approach to evaluate cooperation enforcement mechanisms in mobile ad hoc networks , 2003 .

[12]  George C. Polyzos,et al.  The Case for Peer-to-Peer Wireless LAN Consortia , 2003 .

[13]  Narayan B. Mandayam,et al.  Pricing for enabling forwarding in self-configuring ad hoc networks , 2004, WCNC.

[14]  E. Friedman,et al.  The Social Cost of Cheap Pseudonyms , 2001 .

[15]  Paul Resnick,et al.  Reputation systems , 2000, CACM.

[16]  Jean-Yves Le Boudec,et al.  Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks , 2002, Proceedings 10th Euromicro Workshop on Parallel, Distributed and Network-based Processing.