DocumentCode :
3273934
Title :
Extending Mesh Networks to Opportunistic Resource Sharing
Author :
Hansen, Jeremy A.
Author_Institution :
Dept. of Comput. Sci., Norwich Univ. Northfield, Northfield, VT, USA
fYear :
2012
fDate :
4-6 July 2012
Firstpage :
224
Lastpage :
230
Abstract :
We propose a high-level framework that extends the notion of opportunistic mesh networking to include opportunistic access to and sharing of other device resources such as nonvolatile data storage and computation. While work has been done on providing opportunistic access to each of these resources (network access, data storage, and computation, that is) individually, this paper is an attempt to bring all three resource-sharing applications under the same umbrella. This framework uses an existing "web of trust" protocol that does not require a full public-key infrastructure (PKI) and adds reputation mechanisms to handle interactions between both explicitly-trusted and untrusted peers. Once devices have initiated a connection, they mutually authenticate one another and negotiate the terms of a resource-sharing agreement overran encrypted tunnel. This agreement may involve a payment of electronic currency or a request for credit in exchange for a particular resource, or the resource may be provided at no cost. Each device\´s local policy dictates how interactions with others should proceed.
Keywords :
cryptographic protocols; peer-to-peer computing; public key cryptography; random-access storage; resource allocation; wireless mesh networks; PKI; device resources; electronic currency; explicitly-trusted peers; high-level framework; mesh networks; network access; nonvolatile data computation; nonvolatile data storage; opportunistic access; opportunistic mesh networking; opportunistic resource sharing; public-key infrastructure; reputation mechanisms; resource-sharing agreement overran encrypted tunnel; resource-sharing applications; untrusted peers; web of trust protocol; Authentication; Internet; Memory; Resource management; Servers; Wireless application protocol; commodification; distributed; grid; mesh; opportunistic; peer-to-peer; reputation; sharing; trust;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2012 Sixth International Conference on
Conference_Location :
Palermo
Print_ISBN :
978-1-4673-1328-5
Type :
conf
DOI :
10.1109/IMIS.2012.100
Filename :
6296858
Link To Document :
بازگشت