Coordinating User and Device Behavior in Wireless Grids

  • Lee W. McKnight
  • William Lehr
  • James Howison

The evolution of computing is characterized by decentralization and decreasing institutional control over resources. Wireless Grids, that is, fixed and mobile ad-hoc resource sharing networks, are challenging environments in which users strategic behaviors are crucial to system performance. We review the mechanisms employed to regulate strategic behavior online-technical, social, legal and economic-and discuss trends in their operation and application in distributed wireless grid computing.


Strategic Behavior Reputation System Edge Node Internet Engineer Task Force Trust Computing 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    K. Aberer and Z. Despotovic. Managing trust in a peer-2-peer information system. In the Tenth International Conference on Information and Knowledge Management, 2001.Google Scholar
  2. 2.
    R. Anderson. Trusted computing FAQ., 2003.
  3. 3.
    D. Anius. Enhancing innovation within a regional wireless grid. In The Inter-national Conference on Computer, Communication and Control Technologies, Orlando, Florida, 2003.Google Scholar
  4. 4.
    F. Baker, B. Foster, and C. Sharp. Cisco architecture for lawful intercept in IP networks, Internet Draft (Informational). Technical report, IETF, 2003.Google Scholar
  5. 5.
    P. A. Branch. Lawful interception of the internet. Technical report, Centre for Advanced Internet Architectures, 2003.Google Scholar
  6. 6.
    L. Buttyán and J. -P. Hubaux. Stimulating cooperation in self-organizing mobile ad hoc networks. Mobile Networks and Applications, 83(5):589-592, 2003.Google Scholar
  7. 7.
    R. Buyya, H. Stockinger, J. Giddy, and D. Abramson. Economic models for management of resources in peer-to-peer and grid computing. In the SPIE Inter-national Conference on Commercial Applications for High-Performance Com-puting, Denver, USA, 2001.Google Scholar
  8. 8.
    B. Chen and C. H. Chang. Mobility impact on energy conservation of ad hoc routing protocols. In International Conference on Advances in Infrastructure for Electronic Business, Education, Science, Medicine, and Mobile Technologies on the Internet, L’Aquila, Italy, 2003.Google Scholar
  9. 9.
    D. Clark. The design philosophy of the darpa internet protocols. In SIG-COMM ’88: Symposium proceedings on Communications architectures and pro-tocols, pages 106-114, New York, NY, USA, 1988. ACM Press.Google Scholar
  10. 10.
    B. Cohen. Incentives build robustness in bittorrent. In Workshop on Economics of Peer-to-Peer Systems, 2003.Google Scholar
  11. 11.
    R. Conte and C. Castelfranchi. Cognitive and Social Action. UCL Press, 1995.Google Scholar
  12. 12.
    J. Crowcroft, R. Gibbens, F. Kelly, and S. Ostring. Modelling incentives for collaboration in mobile ad hoc networks. In WiOpt ’03, 2003. Google Scholar
  13. 13.
    E. Drexler and M. Miller. Ecology of Computation, chapter Incentive engineering for computational resource management. Elsevier Science Publishers B. V., 1988.Google Scholar
  14. 14.
    Foster, C. Kesselman, J. Nick, and S. Tuecke. The physiology of the grid: An open grid services architecture for distributed systems integration. citeseer. nj. nec. com/foster02physiology. html, 2002.Google Scholar
  15. 15.
    Ian Foster, Carl Kesselman, and Steven Tuecke. The anatomy of the grid: Enabling scalable virtual organizations. Int. J. High Perform. Comput. Appl., 15(3):200-222, 2001.Google Scholar
  16. 16.
    E. Friedman and D. Parkes. Pricing wifi at starbucks -issues in online mechanism design. In Fourth ACM Conf. on Elec. Commerce, 2003.Google Scholar
  17. 17.
    M. Gaynor, S. L. Moulton, M. Welsh, E. LaCombe, A. Rowan, and J Wynne. Integrating wireless sensor networks with the grid. IEEE Internet Computing, 8(4):32-39, 2004.CrossRefGoogle Scholar
  18. 18.
    M. Gaynor, L. W. McKnight, J. Hwang, and J. Freedman. Wireless grid networks and virtual markets. In the International Conference on Computer, Communi-cation and Control Technologies, 2003.Google Scholar
  19. 19.
    J. Gomoluch and M. Schroeder. Market-based resource allocation for grid com-puting: A model and simulation. In 1st International Workshop on Middleware for Grid Computing, Rio de Janeiro, Brazil, 2003.Google Scholar
  20. 20.
    J. Hwang and P. Aravamudham. Proxy-based middleware services for peer-to-peer computing in virtually clustered wireless grid networks. In the International Conference on Computer, Communication and Control Technologies, Orlando, Florida, 2003.Google Scholar
  21. 21.
    Junseok Hwang and P. Aravamudham. Middleware services for P2P computing in wireless grid networks. IEEE Internet Computing, 8(4):40-46, 2004.CrossRefGoogle Scholar
  22. 22.
    IESG IAB. IETF policy on wiretapping. Technical Report RFC 2804, IETF, 2000.Google Scholar
  23. 23.
    R. Jurca and B. Faltings. An incentive compatible reputation mechanism. In the IEEE Conference on E-Commerce, Newport Beach, CA, USA, 2003.Google Scholar
  24. 24.
    S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina. The eigentrust algorithm for reputation management in p2p networks. In the Twelfth International World Wide Web Conference, 2003.Google Scholar
  25. 25.
    T. F. Kompas. Traditional notions of equilibrium reconsidered. Equilibrium, 11:484-495, 2000.Google Scholar
  26. 26.
    W. Lehr. Standardization: Understanding the process. Journal of the American Society for Information Science, 43(8):550-555, 1992.CrossRefGoogle Scholar
  27. 27.
    L. Lessig. Code and Other Laws of Cyberspace. Basic Books, 1999.Google Scholar
  28. 28.
    J. MacKie-Mason, S. Shenker, and H. Varian. Network architecture and content provision: An economic analysis. Telecommunications Policy, 20(3):203-217, 1996.CrossRefGoogle Scholar
  29. 29.
    T. W. Malone, J. Yates, and R. I. Benjamin. Electronic markets and electronic hierarchies. Communications of the ACM, 30(6):484-497, 1987.CrossRefGoogle Scholar
  30. 30.
    D. McCullagh. Inside Cisco’s eavesdropping apparatus. http://news. com. com/ 2010-1071-997528. html, 2003.
  31. 31.
    L. W. McKnight, D. Anius, and O. Uzuner. Virtual markets in wireless grids: Peering policy obstacles. In Proceedings of the International Conference on Computer, Communication and Control Technologies, 2003. Google Scholar
  32. 32.
    L. W. McKnight and J. Howison. Towards a sharing protocol for wireless grids. In Proceedings of the International Conference on Computer, Communication and Control Technologies, 2003.Google Scholar
  33. 33.
    L. W. McKnight and W. Lehr. Show me the money: Agents and contracts in service level agreement markets. INFO, 40(2):24-36, 2002.Google Scholar
  34. 34.
    L. W. McKnight, P. M. Vaaler, and R. L. Katz. Creative destruction: business survival strategies in the global Internet economy. MIT Press, 2001.Google Scholar
  35. 35.
    Lee McKnight. Wireless Grids-Distributed Resource Sharing by Mobile, Nomadic, and Fixed Devices. IEEE Internet Computing, 8(4):2-10, 2004.CrossRefGoogle Scholar
  36. 36.
    L. W. McKnight, R. Sharif, and L. van de Wijngaert. Wireless Grids:Assessing a New Technology from a User Perspective, pages 169-182. Springer, 2005.Google Scholar
  37. 37.
    W. McKnight, D. Anius, and O. Uzuner. Internet Services. Quality of Service in Grids, Networks and Markets. In press.Google Scholar
  38. 38.
    N. Miller, P. Resnick, and R. Zeckhauser. Eliciting honest feedback in electronic markets. In Working Paper for the SITE02 workshop, 2003.Google Scholar
  39. 39.
    T. Moreton and A. Twigg. Trading in trust, tokens and stamps. In 1st Workshop on the Economics of P2P systems, Cambridge University, 2003.Google Scholar
  40. 40.
    L. Mui, M. Mohtashemi, and A. Halberstadt. Notions of reputation in multi-agents systems: a review. In the first international joint conference on Au-tonomous agents and multiagent systems, 2002.Google Scholar
  41. 41.
    W. R. Neuman, L. W. McKnight, and R. J. Solomon. The Gordian Knot: Political Gridlock on the Information Highway. MIT Press, 1997.Google Scholar
  42. 42.
    C. Ng, D. Parkes, and M. Seltzer. Strategyproof computing: Systems infrastruc-tures for self-interested parties. In 1st Workshop on the Economics of P2P systems, 2003.Google Scholar
  43. 43.
    Odlyzko. Internet pricing and the history of communications. Computer Networks, 36(5-6):493-517, 2001.Google Scholar
  44. 44.
    J. S. Park, A. Nanda, and J. Howison. Security challenges and countermeasures in wlans. In the International Conference on Computer, Communication and Control Technologies, Orlando, Florida, 2003.Google Scholar
  45. 45.
    D. C. Parkes. Iterative combinatorial auctions: Achieving economic and com-putational efficiency. Technical report, University of Pennsylvania, 2001.Google Scholar
  46. 46.
    D. Reed, J. Saltzer, and D. Clark. Active networking and end-to-end arguments. IEEE Network, 12(3):67-71, 1998.Google Scholar
  47. 47.
    P. Resnick and C. Dellarocas. Online Reputation Mechanisms: A Roadmap for Future Research. Technical report, First Interdisciplinary Symposium on Online Reputation Mechanisms, 2006.Google Scholar
  48. 48.
    P. Resnick and R. Zeckhauser. Trust among strangers in internet transactions: Empirical analysis of ebay’s reputation system. Advances in Applied Microeco-nomics, Elsevier Science, 11, 2003.Google Scholar
  49. 49.
    P. Resnick, R. Zeckhauser, E. Friedman, and K. Kuwabara. Reputation systems: Facilitating trust in internet interactions. Communications of the ACM, 43(12):45-48, 2000.CrossRefGoogle Scholar
  50. 50.
    P. Resnick, R. Zeckhauser, J. Swanson, and K. Lockwood. The value of reputa-tion on ebay: A controlled experiment. Technical report, School of Information, University of Michigan, 2002.Google Scholar
  51. 51.
    J. H. Saltzer, D. P. Reed, and D. D. Clark. End-to-end arguments in system design. ACM Transactions on Computer Systems, 2(4):277-288, 1984. CrossRefGoogle Scholar
  52. 52.
    S. E. Schecter, R. A. Greenstadt, and M. D. Smith. Trusted computing, peer-to-peer distribution, and the economics of pirated entertainment. In The Second Workshop on Economics and Information Security, 2003.Google Scholar
  53. 53.
    S. Shenker, D. Clark, D. Estrin, and S. Herzog. Pricing in computer networks: Reshaping the research agenda. ACM Computer Communication Review, 26(6):19-43, 1996.CrossRefGoogle Scholar
  54. 54.
    J. Shneidman and D. Parkes. Rationality and self-interest in peer to peer net-works. In Proceedings of the 2nd International Workshop on Peer-to-Peer Sys-tems, 2003.Google Scholar
  55. 55.
    B. Strulo, J. Farr, and A. Smith. Securing mobile ad hoc networks -a motiva-tional approach. BT Technology Journal, 21(3):81-89, 2003.CrossRefGoogle Scholar
  56. 56.
    Sutherland. A futures market in computer time. Communications of the ACM, 11(6):449-451, 1968.Google Scholar
  57. 57.
    O. Uzuner and R. Davis. Digital fingerprinting for distribution volume track-ing:intellectual property protection in wireless grids. In the International Conference on Computer, Communication and Control Technologies, Orlando, Florida, 2003.Google Scholar
  58. 58.
    H. R. Varian. Economic mechanism design for computerized agents. In Workshop on Electronic Commerce, 2000.Google Scholar
  59. 59.
    C. A. Waldspurger, T. Hogg, B. A. Huberman, J. O. Kephart, and W. S. Stornetta. Spawn: A distributed computational economy. Software Engineering, 18(2):103-117, 1992.CrossRefGoogle Scholar
  60. 60.
    C. J. Woodard and D. C. Parkes. Strategyproof mechanisms for ad hoc network formation. In 1st Workshop on the Economics of P2P systems, 2003.Google Scholar

Copyright information

© Springer 2007

Authors and Affiliations

  • Lee W. McKnight
    • 1
  • William Lehr
    • 2
  • James Howison
    • 1
  1. 1.School of Information StudiesSyracuse University
  2. 2.Massachusetts Institute of Technology

Personalised recommendations