2nd International IEEE/Create-Net Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities

Research Article

The peer-to-peer wireless network confederation scheme protocol, algorithms, and services

  • @INPROCEEDINGS{10.1109/TRIDNT.2006.1649174,
        author={Elias C.  Efstathiou and Fotis  Elianos and Pantelis A.  Frangoudis and Vasileios P.  Kemerlis and Dimitrios  Paraskevaidis and George C.  Polyzos and Eleftherios C.  Stefanis },
        title={The peer-to-peer wireless network confederation scheme protocol, algorithms, and services},
        proceedings={2nd International IEEE/Create-Net Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities},
        publisher={IEEE},
        proceedings_a={TRIDENTCOM},
        year={2006},
        month={7},
        keywords={},
        doi={10.1109/TRIDNT.2006.1649174}
    }
    
  • Elias C. Efstathiou
    Fotis Elianos
    Pantelis A. Frangoudis
    Vasileios P. Kemerlis
    Dimitrios Paraskevaidis
    George C. Polyzos
    Eleftherios C. Stefanis
    Year: 2006
    The peer-to-peer wireless network confederation scheme protocol, algorithms, and services
    TRIDENTCOM
    IEEE
    DOI: 10.1109/TRIDNT.2006.1649174
Elias C. Efstathiou1,*, Fotis Elianos1,*, Pantelis A. Frangoudis1,*, Vasileios P. Kemerlis1,*, Dimitrios Paraskevaidis1,*, George C. Polyzos1,*, Eleftherios C. Stefanis 1,*
  • 1: Mobile Multimedia Laboratory, Department of Computer Science, Athens University of Economics and Business, Athens 104 34, Greece
*Contact email: efstath@aueb.gr, p3020008@dias.aueb.gr, pfrag@aueb.gr, vpk@cs.aueb.gr, dcp@aueb.gr, polyzos@aueb.gr, leste@aueb.gr

Abstract

In metropolitan areas, public infrastructures for high-speed wireless networking can be built through the private contributions of individual "microproviders" who use their Internet-connected wireless LANs (WLANs) to forward foreign traffic from/to nearby low-mobility clients. We have designed a practical WLAN aggregation scheme that: (1) Assumes that microproviders are selfish and do not trust each other and uses a secure incentive technique to encourage their contribution. (2) Assumes that clients and microproviders do not trust each other and protects their real-world identities by relying only on disposable opaque identifiers. (3) Is fully distributed and does not rely on any authority to resolve disputes or to control membership. (4) Uses standard hardware (PCs, WLAN access points, PDAs) and software we have developed for the main available platforms (Linux, Windows)