An Incentive-Based System for Information Providers over Peer-to-Peer Mobile Ad-Hoc Networks

  • Jordi Castellà-Roca
  • Vanesa Daza
  • Josep Domingo-Ferrer
  • Jesús A. Manjón
  • Francesc Sebé
  • Alexandre Viejo
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4617)

Abstract

An architecture for a peer-to-peer mobile ad-hoc network offering distributed information provision is presented. Any user can volunteer to become an information server (a server-user). Volunteering implies devoting some of the user’s computational resources (storage, bandwidth, processing power) to serving information. An incentive scheme is proposed to encourage end-users to become server-users. The latter are rewarded proportionally to the number of end-user queries served. The proposed architecture is specified as a protocol suite taking security and privacy aspects into account. Details are given on an implementation completed on a WiFi ad-hoc network for the specific case of a distributed tourist information service.

Keywords

Peer-to-peer networks Mobile ad-hoc networks Distributed information servers Security and privacy 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Blundo, C., Cimato, S., De Bonis, A.: Secure E-Coupons. Electronic Commerce Research Journal 5(1), 117–139 (2005)CrossRefGoogle Scholar
  2. 2.
    Chaum, D., Den Boer, B., Van Heyst, E., Mjolsnes, S., Steenbeek, A.: Efficient offline electronic checks (extended abstract). In: Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology, November 1990, Springer, New York (1990)Google Scholar
  3. 3.
    Ding, G., Bhargava, B.: Peer-to-peer file-sharing over mobile ad hoc networks. In: First International Workshop on Mobile Peer-to-Peer Computing, p. 1000 (2004)Google Scholar
  4. 4.
    Greer, J., McCalla, G., Vassileva, J., Deters, R., Bull, S., Kettel, L.: Lessons learned in deploying a multi-agent learning support system: the I-help experience. In: AIED 2001. Proceedings of AI in Education, pp. 410–421 (2001)Google Scholar
  5. 5.
    Heinemann, A., Kangasharju, J., Lyardet, F., Mühlhäuser, M.: iClouds - Peer-to-peer information sharing in mobile environments. In: Kosch, H., Böszörményi, L., Hellwagner, H. (eds.) Euro-Par 2003. LNCS, vol. 2790, pp. 1038–1045. Springer, Heidelberg (2003)Google Scholar
  6. 6.
    Heinemann, A., Mühlhäuser, M.: Spontaneous collaboration in mobile peer-to-peer networks. In: Steinmetz, R., Wehrle, K. (eds.) Peer-to-Peer Systems and Applications. LNCS, vol. 3485, pp. 419–433. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  7. 7.
    Sun Microsystems, JAVA Programming language: http://java.sun.com
  8. 8.
    Sun Microsystems, Project JXTA: http://www.jxta.org/
  9. 9.
    IBM, WebSphere Everyplace Micro Environment: http://www-128.ibm.com/
  10. 10.
    Li, J., Kang, X.: Proof of Service in a Hybrid P2P Environment. In: Chen, G., Pan, Y., Guo, M., Lu, J. (eds.) Parallel and Distributed Processing and Applications - ISPA 2005 Workshops. LNCS, vol. 3759, pp. 64–73. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  11. 11.
    Pan, J., Cai, L., Shen, X., Mark, J.W.: Identity-based secure collaboration in wireless ad hoc networks. Computer Networks 51(3), 853–865Google Scholar
  12. 12.
    Public-Key Cryptography Standards (PKCS): http://www.rsasecurity.com/rsalabs/node.asp?id=2124
  13. 13.
    Rajasekaran, H.: An incentive based distribution system for DRM protected content using peer-to-peer networks. In: 1st International Conference on Automated Production of Cross Media Content for Multi-channel Distribution, pp. 150–156 (2005)Google Scholar
  14. 14.
    Rivest, R.L., Shamir, A., Adleman, L.M.: A method of Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21(2), 120–126 (1978)MATHCrossRefMathSciNetGoogle Scholar
  15. 15.
    Rivest, R.L., Shamir, A.: PayWord and MicroMint: two simple micropayment schemes. In: Lomas, M. (ed.) Security Protocols. LNCS, vol. 1189, pp. 69–87. Springer, Heidelberg (1997)Google Scholar
  16. 16.
    Vassileva, J.: Motivating Participation in Peer to Peer Communities. In: Petta, P., Tolksdorf, R., Zambonelli, F. (eds.) ESAW 2002. LNCS (LNAI), vol. 2577, pp. 141–155. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  17. 17.
    Vishnumurthy, V., Chandrakumar, S., Sirer, E.: Karma: A secure economic framework for p2p resource sharing. In: Workshop on Economics of Peer-to-Peer Systems (2003)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Jordi Castellà-Roca
    • 1
  • Vanesa Daza
    • 1
  • Josep Domingo-Ferrer
    • 1
  • Jesús A. Manjón
    • 1
  • Francesc Sebé
    • 1
  • Alexandre Viejo
    • 1
  1. 1.Rovira i Virgili University, UNESCO Chair in Data Privacy, Department of Computer Engineering and Mathematics, Av. Països Catalans, 26, E-43007 Tarragona, Catalonia 

Personalised recommendations