The Community for Technology Leaders
RSS Icon
Issue No.03 - March (2009 vol.20)
pp: 289-302
Hwangnam Kim , Korea University, Seoul
E-yong Kim , Samsung Electronics, Korea
Many protocol particulars developed for the wireless mesh networks, such as multi-path routing, channel assignment, topology control, assume that a network-wide collaboration is available to establish connections to the network outside. However, the collaboration can be easily discouraged in the presence of selfish behaviors, referred to as free-riding. In this paper, we propose a framework, PReSENt, to promote and make more secure the practices of collaboration among nodes by securing a compensation to the collaboration. When the PReSENt is enabled in wireless mesh networks, a node accumulates credits, an amount quantifying its resource provision when it provides its resource for other nodes. The nodes consuming the resource publish rewards, an amount quantifying their resource usage. The credits are used to guarantee the resource sharing for the provider from the customers in the future, whose amount is proportional to its relative contribution to the network-wide collaboration. The rewards are used to validate their corresponding credits in order to prevent false accumulations of the credits in selfish nodes. We formally define the underlying security model of the PReSENt and prove that the PReSENt is secure in the random oracle model. We then implement the PReSENt in J-Sim to illustrate its operational behaviors with respect to correct and secure resource sharing.
Network architecture and design, wireless mesh networks, wireless communication
Hwangnam Kim, E-yong Kim, "PReSENt: A Collaboration Framework for Resource Sharing in Wireless Mesh Networks", IEEE Transactions on Parallel & Distributed Systems, vol.20, no. 3, pp. 289-302, March 2009, doi:10.1109/TPDS.2008.81
[1] G. Bianchi, “Performance Analysis of the IEEE 802.11 Distributed Coordination Function,” IEEE J. Selected Areas in Comm., vol. 18, no. 3, pp. 535-547, Mar. 2000.
[2] F. Calì, M. Conti, and E. Gregori, “Dynamic Tuning of the IEEE 802.11 Protocol to Achieve a Theoretical Throughput Limit,” IEEE/ACM Trans. Networking, vol. 8, no. 6, pp. 785-799, Dec. 2000.
[3] Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, ANSI/IEEE Std. 802.11, 1999.
[4] A. Veres, A.T. Campbell, M. Barry, and L.-H. Sun, “Supporting Service Differentiation in Wireless Packet Networks Using Distributed Control,” IEEE J. Selected Areas in Comm., vol. 19, no. 10, pp. 2081-2093, Oct. 2001.
[5] Microsoft Research Mesh Networking, commesh/, 2008.
[6] CUWiN (The Champaign-Urbana Community Wireless Network), http:/, 2008.
[7] MIT Roofnet,, 2008.
[8] Nortel Networks, The Business Case for Wireless Mesh Networks, wmn_eseminar/collateralwmn_eseminar.pdf , Dec. 2003.
[9] E. Adar and B.A. Huberman, “Free Riding on Gnutella,” First Monday, vol. 5, no. 10, Oct. 2000.
[10] B.-G. Chun, R. Fonseca, I. Stoica, and J. Kubiatowicz, “Characterizing Selfishly Constructed Overlay Routing Networks,” Proc. IEEE INFOCOM '04, vol. 2, pp. 1329-1339, Mar. 2004.
[11] N. Spring, R. Mahajan, and T. Anderson, “Quantifying the Causes of Path Inflation,” Proc. ACM SIGCOMM '03, pp. 113-124, Aug. 2003.
[12] A. Akella, S. Seshan, R. Karp, S. Shenker, and C. Papadimitriou, “Selfish Behavior and Stability of the Internet: A Game-Theoretic Analysis of TCP,” Proc. ACM SIGCOMM '02, pp.117-130, Aug. 2002.
[13] S. Floyd and K. Fall, “Promoting the Use of End-to-End Congestion Control in the Internet,” IEEE/ACM Trans. Networking, vol. 7, no. 4, pp. 458-472, Aug. 1999.
[14] F.P. Kelly, A.K. Maulloo, and D.K.H. Tan, “Rate Control for Communication Networks: Shadow Prices, Proportional Fairness and Stability,” J. Operational Research Soc., vol. 49, no. 3, pp. 237-252, Mar. 1998.
[15] S.H. Low, F. Paganini, and J.C. Doyle, “Internet Congestion Control,” IEEE Control Systems Magazine, pp. 28-43, Feb. 2002.
[16] S. Shenker, “Making Greed Work in Networks: A Game-Theoretic Analysis of Switch Service Disciplines,” IEEE/ACM Trans. Networking, vol. 3, no. 6, pp. 819-831, Dec. 1995.
[17] L. Buttyán and J.-P. Hubaux, “Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks,” Mobile Networks and Applications, vol. 8, no. 5, pp. 579-592, Oct. 2003.
[18] S. Zhong, J. Chen, and Y.R. Yang, “Sprite: A Simple, Cheat-Proof, Credit-Based System for Mobile Ad-Hoc Networks,” Proc. IEEE INFOCOM '03, vol. 3, pp. 1987-1997, Mar. 2003.
[19] V. Srinivasan, P. Nuggehalli, C.F. Chiasserini, and R.R. Rao, “Cooperation in Wireless Ad Hoc Networks,” Proc. IEEE INFOCOM '03, vol. 2, pp. 808-817, Mar. 2003.
[20] Z. Fang and B. Bensaou, “Fair Bandwidth Sharing Algorithms Based on Game Theory Frameworks for Wireless Ad-Hoc Networks,” Proc. IEEE INFOCOM '04, vol. 2, pp. 1284-1295, Mar. 2004.
[21] M. Bellare and P. Rogaway, “Random Oracles Are Practical: A Paradigm for Designing Efficient Protocols,” Proc. ACM Conf. Computer and Comm. Security (CCS '93), pp. 62-73, Nov. 1993.
[22] J-Sim, http:/, 2008.
[23] D. Boneh and M. Franklin, “Identity-Based Encryption from the Weil Pairing,” SIAM J. Computing, vol. 32, no. 3, pp. 586-615, Mar. 2003.
[24] J.C. Cha and J.H. Cheon, “An Identity-Based Signature from Gap Diffie-Hellman Groups,” Proc. Int'l Workshop Practice and Theory in Public Key Cryptography (PKC '03), pp. 18-30, 2003.
[25] D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, “Public-Key Encryption with Keyword Search,” Proc. Ann. Int'l Conf. Theory and Applications of Cryptographic Techniques (EUROCRYPT '04), Advances in Cryptology, pp. 506-522, 2004.
[26] B. Libert and J.-J. Quisquater, The Exact Security of An Identity Based Signature and Its Applications, Report 2004/102, Cryptology ePrint Archive,, 2004.
[27] R.T.B. Ma, S.C.M. Lee, J.C.S. Lui, and D.K.Y. Yau, “Incentive and Service Differentiation in P2P Networks: A Game Theoretic Approach,” IEEE/ACM Trans. Networking, vol. 14, no. 5, pp. 978-991, Oct. 2006.
[28] S. Marti, T.J. Giuli, K. Lai, and M. Baker, “Mitigating Routing Misbehavior in Mobile Ad Hoc Networks,” Proc. MobiCom '00, pp.255-265, Aug. 2000.
[29] S. Buchegger and J.-Y. Le Boudec, “Performance Analysis of the CONFIDANT Protocol (Cooperation of Nodes: Fairness in Dynamic Ad-Hoc NeTworks),” Proc. MobiHoc '02, pp. 226-236, June 2002.
[30] R. Mahajan, M. Rodrig, D. Wetherall, and J. Zahorjan, “Sustaining Cooperation in Multi-Hop Wireless Networks,” Proc. Usenix Symp. Networked Systems Design and Implementation (NSDI '05), pp. 231-244, May 2005.
[31] K. Lai, M. Feldman, I. Stoica, and J. Chuang, “Incentives for Cooperation in Peer-to-Peer Networks,” Proc. Workshop Economics of Peer-to-Peer Systems, June 2003.
[32] S. Jun and M. Ahamad, “Incentives in BitTorrent Induce Free Riding,” Proc. ACM SIGCOMM Workshop Economics of Peer-to-Peer Systems (P2PECON '05), pp. 116-121, Aug. 2005.
[33] M. Feldman, K. Lai, I. Stoica, and J. Chuang, “Robust Incentive Techniques for Peer-to-Peer Networks,” Proc. ACM Conf. Electronic Commerce (EC '04), pp. 102-111, May 2004.
[34] K.G. Anagnostakis and M.B. Greenwald, “Exchange-Based Incentive Mechanisms for Peer-to-Peer File Sharing,” Proc. Int'l Conf. Distributed Computing Systems (ICDCS '04), pp. 524-533, Mar. 2004.
[35] N. Ntarmos and P. Triantafillou, “SeAl: Managing Accesses and Data in Peer-to-Peer Sharing Networks,” Proc. Int'l Conf. Peer-to-Peer Computing (P2P '04), pp. 116-123, Aug. 2004.
[36] E. Anceaume, M. Gradinariu, and A. Ravoaja, “Incentives for P2P Fair Resource Sharing,” Proc. IEEE Int'l Conf. Peer-to-Peer Computing (P2P '05), pp. 253-260, Aug. 2005.
57 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool