Extending Mesh Networks to Opportunistic Resource Sharing

We propose a high-level framework that extends the notion of opportunistic mesh networking to include opportunistic access to and sharing of other device resources such as nonvolatile data storage and computation. While work has been done on providing opportunistic access to each of these resources (network access, data storage, and computation, that is) individually, this paper is an attempt to bring all three resource-sharing applications under the same umbrella. This framework uses an existing "web of trust" protocol that does not require a full public-key infrastructure (PKI) and adds reputation mechanisms to handle interactions between both explicitly-trusted and untrusted peers. Once devices have initiated a connection, they mutually authenticate one another and negotiate the terms of a resource-sharing agreement overran encrypted tunnel. This agreement may involve a payment of electronic currency or a request for credit in exchange for a particular resource, or the resource may be provided at no cost. Each device's local policy dictates how interactions with others should proceed.

[1]  M. Gerla,et al.  GloMoSim: a library for parallel simulation of large-scale wireless networks , 1998, Proceedings. Twelfth Workshop on Parallel and Distributed Simulation PADS '98 (Cat. No.98TB100233).

[2]  Félix Gómez Mármol,et al.  Security threats scenarios in trust and reputation models for distributed systems , 2009, Comput. Secur..

[3]  Chi-Sheng Shih,et al.  An Online Migration Environment for Executing Mobile Applications on the Cloud , 2011, 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[4]  Miron Livny,et al.  Condor-a hunter of idle workstations , 1988, [1988] Proceedings. The 8th International Conference on Distributed.

[5]  Marco Conti,et al.  Mesh networks: commodity multihop ad hoc networks , 2005, IEEE Communications Magazine.

[6]  Eyal de Lara,et al.  Haggle: Seamless Networking for Mobile Applications , 2007, UbiComp.

[7]  Yacine Challal,et al.  Reliable and fully distributed trust model for mobile ad hoc networks , 2009, Comput. Secur..

[8]  Jeremy A. Hansen Adding privacy and currency to social networking , 2010, 2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).

[9]  Yang Li,et al.  Deep shot: a framework for migrating tasks across devices using mobile phone cameras , 2011, CHI.

[10]  Michael A. Rappa,et al.  The utility business model and the future of computing services , 2004, IBM Syst. J..

[11]  Christopher Allen,et al.  The TLS Protocol Version 1.0 , 1999, RFC.

[12]  Marco Conti,et al.  From opportunistic networks to opportunistic computing , 2010, IEEE Communications Magazine.

[13]  Bennet S. Yee,et al.  Native Client: A Sandbox for Portable, Untrusted x86 Native Code , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[14]  David P. Anderson,et al.  BOINC: a system for public-resource computing and storage , 2004, Fifth IEEE/ACM International Workshop on Grid Computing.

[15]  Edward W. Knightly,et al.  End-to-end performance and fairness in multihop wireless backhaul networks , 2004, MobiCom '04.