Skip to main content

An Incentive-Based System for Information Providers over Peer-to-Peer Mobile Ad-Hoc Networks

  • Conference paper
Modeling Decisions for Artificial Intelligence (MDAI 2007)

Abstract

An architecture for a peer-to-peer mobile ad-hoc network offering distributed information provision is presented. Any user can volunteer to become an information server (a server-user). Volunteering implies devoting some of the user’s computational resources (storage, bandwidth, processing power) to serving information. An incentive scheme is proposed to encourage end-users to become server-users. The latter are rewarded proportionally to the number of end-user queries served. The proposed architecture is specified as a protocol suite taking security and privacy aspects into account. Details are given on an implementation completed on a WiFi ad-hoc network for the specific case of a distributed tourist information service.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Blundo, C., Cimato, S., De Bonis, A.: Secure E-Coupons. Electronic Commerce Research Journal 5(1), 117–139 (2005)

    Article  Google Scholar 

  2. Chaum, D., Den Boer, B., Van Heyst, E., Mjolsnes, S., Steenbeek, A.: Efficient offline electronic checks (extended abstract). In: Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques on Advances in Cryptology, November 1990, Springer, New York (1990)

    Google Scholar 

  3. Ding, G., Bhargava, B.: Peer-to-peer file-sharing over mobile ad hoc networks. In: First International Workshop on Mobile Peer-to-Peer Computing, p. 1000 (2004)

    Google Scholar 

  4. Greer, J., McCalla, G., Vassileva, J., Deters, R., Bull, S., Kettel, L.: Lessons learned in deploying a multi-agent learning support system: the I-help experience. In: AIED 2001. Proceedings of AI in Education, pp. 410–421 (2001)

    Google Scholar 

  5. Heinemann, A., Kangasharju, J., Lyardet, F., Mühlhäuser, M.: iClouds - Peer-to-peer information sharing in mobile environments. In: Kosch, H., Böszörményi, L., Hellwagner, H. (eds.) Euro-Par 2003. LNCS, vol. 2790, pp. 1038–1045. Springer, Heidelberg (2003)

    Google Scholar 

  6. Heinemann, A., Mühlhäuser, M.: Spontaneous collaboration in mobile peer-to-peer networks. In: Steinmetz, R., Wehrle, K. (eds.) Peer-to-Peer Systems and Applications. LNCS, vol. 3485, pp. 419–433. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  7. Sun Microsystems, JAVA Programming language: http://java.sun.com

  8. Sun Microsystems, Project JXTA: http://www.jxta.org/

  9. IBM, WebSphere Everyplace Micro Environment: http://www-128.ibm.com/

  10. Li, J., Kang, X.: Proof of Service in a Hybrid P2P Environment. In: Chen, G., Pan, Y., Guo, M., Lu, J. (eds.) Parallel and Distributed Processing and Applications - ISPA 2005 Workshops. LNCS, vol. 3759, pp. 64–73. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  11. Pan, J., Cai, L., Shen, X., Mark, J.W.: Identity-based secure collaboration in wireless ad hoc networks. Computer Networks 51(3), 853–865

    Google Scholar 

  12. Public-Key Cryptography Standards (PKCS): http://www.rsasecurity.com/rsalabs/node.asp?id=2124

  13. Rajasekaran, H.: An incentive based distribution system for DRM protected content using peer-to-peer networks. In: 1st International Conference on Automated Production of Cross Media Content for Multi-channel Distribution, pp. 150–156 (2005)

    Google Scholar 

  14. Rivest, R.L., Shamir, A., Adleman, L.M.: A method of Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM 21(2), 120–126 (1978)

    Article  MATH  MathSciNet  Google Scholar 

  15. Rivest, R.L., Shamir, A.: PayWord and MicroMint: two simple micropayment schemes. In: Lomas, M. (ed.) Security Protocols. LNCS, vol. 1189, pp. 69–87. Springer, Heidelberg (1997)

    Google Scholar 

  16. Vassileva, J.: Motivating Participation in Peer to Peer Communities. In: Petta, P., Tolksdorf, R., Zambonelli, F. (eds.) ESAW 2002. LNCS (LNAI), vol. 2577, pp. 141–155. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  17. Vishnumurthy, V., Chandrakumar, S., Sirer, E.: Karma: A secure economic framework for p2p resource sharing. In: Workshop on Economics of Peer-to-Peer Systems (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Vicenç Torra Yasuo Narukawa Yuji Yoshida

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Castellà-Roca, J., Daza, V., Domingo-Ferrer, J., Manjón, J.A., Sebé, F., Viejo, A. (2007). An Incentive-Based System for Information Providers over Peer-to-Peer Mobile Ad-Hoc Networks. In: Torra, V., Narukawa, Y., Yoshida, Y. (eds) Modeling Decisions for Artificial Intelligence. MDAI 2007. Lecture Notes in Computer Science(), vol 4617. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73729-2_36

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-73729-2_36

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-73728-5

  • Online ISBN: 978-3-540-73729-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics