Abstract
Network architectures based on mobile devices and wireless communications present several constraints (e.g., processor, energy storage, bandwidth, etc.) that affect the overall network performance. Cooperation strategies have been considered as a solution to address these network limitations. In the presence of unstable network infrastructures, mobile nodes cooperate with each other, forwarding data and performing other specific network functionalities. This article proposes a generalized incentive-based cooperation solution for mobile services and applications called MobiCoop. This reputation-based scheme includes an application framework for mobile applications that uses a Web service to handle all the nodes reputation and network permissions. The main goal of MobiCoop is to provide Internet services to mobile devices without network connectivity through cooperation with neighbor devices. The article includes a performance evaluation study of MobiCoop considering both a real scenario (using a prototype) and a simulation-based study. Results show that the proposed approach provides network connectivity independency to users with mobile apps when Internet connectivity is unavailable. Then, it is concluded that MobiCoop improved significantly the overall system performance and the service provided for a given mobile application.
- M. Abdellatif, A. Mtibaa, K. A. Harras, and M. Youssef. 2013. GreenLoc: An energy efficient architecture for WiFi-based indoor localization on mobile phones. In 2013 IEEE International Conference on Communications (ICC). 4425--4430. DOI:http://dx.doi.org/10.1109/ICC.2013.6655263Google Scholar
Cross Ref
- L. Al-Kanj and Z. Dawy. 2010. Optimized energy efficient content distribution over wireless networks with mobile-to-mobile cooperation. In IEEE 17th International Conference on Telecommunications (ICT 2010). Doha, Qatar, 471--475. DOI:http://dx.doi.org/10.1109/ICTEL.2010.5478815Google Scholar
Cross Ref
- Alessandro Aldini and Alessandro Bogliolo. 2014. User-Centric Networking: Future Perspectives. Springer, Berlin. Google Scholar
Digital Library
- S. Althunibat, G. Kibalya, and F. Granelli. 2012. Energy-efficient network discovery mechanism by exploiting cooperation among terminals. In IEEE 19th Symposium on Communications and Vehicular Technology in the Benelux (SCVT 2012). Eindhoven, Netherlands, 1--5. DOI:http://dx.doi.org/10.1109/SCVT.2012.6399398Google Scholar
Cross Ref
- A. Antonopoulos and C. Verikoukis. 2012. N-player medium access game for wireless data dissemination. In IEEE Global Communications Conference (GLOBECOM 2012). California, USA, 3043--3048. DOI:http://dx.doi.org/10.1109/GLOCOM.2012.6503581Google Scholar
Cross Ref
- A. Antonopoulos and C. Verikoukis. 2014. Multi-player game theoretic MAC strategies for energy efficient data dissemination. IEEE Trans. Wireless Commun. 13, 2 (February 2014), 592--603. DOI:http://dx.doi.org/10.1109/TWC.2013.120713.120790Google Scholar
Cross Ref
- Sorav Bansal and Mary Baker. 2003. Observation-based Cooperation Enforcement in Ad hoc Networks. (2003).Google Scholar
- Christian Bettstetter. 2001. Mobility modeling in wireless networks: Categorization, smooth movement, and border effects. SIGMOBILE Mob. Comput. Commun. Rev. 5, 3 (July 2001), 55--66. DOI:http://dx.doi.org/10.1145/584051.584056 Google Scholar
Digital Library
- Sonja Buchegger and Jean-Yves Le Boudec. 2002. Performance analysis of the CONFIDANT protocol. In Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing (MobiHoc 2002). ACM, New York, NY, 226--236. DOI:http://dx.doi.org/10.1145/513800.513828 Google Scholar
Digital Library
- Levente Buttyán and Jean-Pierre Hubaux. 2001. Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks. Technical Report.Google Scholar
- L. Buttyán and J.-P. Hubaux. 2003. Stimulating cooperation in self-organizing mobile ad hoc networks. Mobile Netw. Appl. 8, 2 (2003), 579--592. DOI:http://dx.doi.org/10.1023/A:1025146013151 Google Scholar
Digital Library
- V. Cerf, S. Burleigh, A. Hooke, L. Torgerson, R. Durst, K. Scott, K. Fall, and H. Weiss. 2007. Delay-Tolerant Networking Architecture. RFC 4838 (Informational). (April 2007). http://www.ietf.org/rfc/rfc4838.txt.Google Scholar
- Dimitris E. Charilas and Athanasios D. Panagopoulos. 2010. A survey on game theory applications in wireless networks. Comput. Netw. 54, 18 (Dec. 2010), 3421--3430. DOI:http://dx.doi.org/10.1016/j.comnet.2010.06.020 Google Scholar
Digital Library
- Kang Chen and Haiying Shen. 2013. Multicent: A multifunctional incentive scheme adaptive to diverse performance objectives for DTN routing. In 10th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON 2013). New Orleans, USA, 532--540. DOI:http://dx.doi.org/10.1109/SAHCN.2013.6645025Google Scholar
Cross Ref
- S. Corson and J. Macker. 1999. Mobile Ad Hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations. (1999). http://www.ietf.org/rfc/rfc4838.txt.Google Scholar
- J. A. F. F. Dias, J. J. P. C. Rodrigues, N. Kumar, and K. Saleem. 2015a. Cooperation strategies for vehicular delay-tolerant networks. IEEE Commun. Mag. 53, 12 (Dec 2015), 88--94. DOI:http://dx.doi.org/10.1109/MCOM.2015.7355571Google Scholar
Digital Library
- J. A. F. F. Dias, J. J. P. C. Rodrigues, Feng Xia, and C. X. Mavromoustakis. 2015b. A cooperative watchdog system to detect misbehavior nodes in vehicular delay-tolerant networks. IEEE Trans. Indust. Electron. 62, 12 (Dec 2015), 7929--7937. DOI:http://dx.doi.org/10.1109/TIE.2015.2425357Google Scholar
Cross Ref
- M. Felegyhazi and J.-P. Hubaux. 2007. Game Theory in Wiress Networks: A Tutorial. Technical Report. EPFL.Google Scholar
- M. H. Lofti Froushani, B. H. Khalaj, and S. Vakilinia. 2011. A novel approach to incentive-based cooperation in wireless ad hoc networks. In 18th International Conference on Telecommunications (ICT 2011). Ayia Napa, Cyprus, 78--83.Google Scholar
- László Gyarmati and Tuan Anh Trinh. 2011. Cooperative strategies of wireless access technologies: A game-theoretic analysis. Pervas. Mobile Comput. 7, 5 (2011), 545--568.Google Scholar
Cross Ref
- Karim Habak, Khaled A. Harras, and Moustafa Youssef. 2013. Bandwidth aggregation techniques in heterogeneous multi-homed devices: A survey. CoRR abs/1309.0542 (2013). http://dblp.uni-trier.de/db/journals/corr/corr1309.html#HabakHY13. Google Scholar
Digital Library
- Karim Habak, Khaled A. Harras, and Moustafa Youssef. 2015. What goes around comes around: Mobile bandwidth sharing and aggregation. In IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems (MASS), 2015. 37--45. DOI:http://dx.doi.org/10.1109/MASS.2015.42 Google Scholar
Digital Library
- Karim Habak, Moustafa Youssef, and Khaled A. Harras. 2013. An optimal deployable bandwidth aggregation system. Comput. Netw. 57, 15 (2013), 3067--3080. DOI:http://dx.doi.org/10.1016/j.comnet.2013.07.012 Google Scholar
Digital Library
- Qi He, Dapeng Wu, and Pradeep Khosla. 2004. SORI: A secure and objective reputation-based incentive scheme for ad-hoc networks. In IEEE Wireless Communications and Networking Conference (WCNC 2004), Vol. 2. Atlanta, Georgia, USA, 825--830 Vol.2. DOI:http://dx.doi.org/10.1109/WCNC.2004.1311293Google Scholar
- O. R. Helgason, F. Legendre, V. Lenders, M. May, and G. Karlsson. 2010. Performance of opportunistic content distribution under different levels of cooperation. In IEEE European Wireless Conference (EW 2010). Lucca, Italy, 903--910. DOI:http://dx.doi.org/10.1109/EW.2010.5483523Google Scholar
Cross Ref
- Mohammad Asharful Hoque, Matti Siekkinen, Jukka K. Nurminen, Sasu Tarkoma, and Mika Aalto. 2014. Saving energy in mobile devices for on-demand multimedia streaming -- A cross-layer approach. ACM Tran. Multimed. Comput. Commun. Appl. 10, 3, Article 25 (April 2014), 23 pages. DOI:http://dx.doi.org/10.1145/2556942 Google Scholar
Digital Library
- Jiangyi Hu and Mike Burmester. 2006. LARS: A locally aware reputation system for mobile ad hoc networks. In Proceedings of the 44th Annual Southeast Regional Conference. New York, NY, USA, 119--123. DOI:http://dx.doi.org/10.1145/1185448.1185475 Google Scholar
Digital Library
- Jiangyi Hu and Mike Burmester. 2009. Cooperation in mobile ad hoc networks. In Guide to Wireless Ad Hoc Networks. Springer, London, 43--57. DOI:http://dx.doi.org/10.1007/978-1-84800-328-6_3Google Scholar
- Juan José Jaramillo and R. Srikant. 2007. DARWIN: Distributed and adaptive reputation mechanism for wireless ad-hoc networks. In Proceedings of the 13th Annual ACM International Conference on Mobile Computing and Networking (MobiCom 2007). ACM, New York, NY, 87--98. DOI:http://dx.doi.org/10.1145/1287853.1287865 Google Scholar
Digital Library
- Wu Jianping, Li Hewu, Sun Wenqi, Wu Qian, Jiang Zhuo, and Zhao Wei. 2013. Technology trends and architecture research for future mobile internet. IEEE China Commun. 10, 6 (June 2013), 14--27. DOI:http://dx.doi.org/10.1109/CC.2013.6549255Google Scholar
- J. Jonsson and B. Kaliski. 2003. Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1. (2003).Google Scholar
- Ma Kai, Guan Xinping, and Zhao Bin. 2010. Symmetrical cooperative strategies in wireless networks: A cooperative game approach. In 29th IEEE Chinese Control Conference (CCC 2010). Beijing, China, 4175--4179.Google Scholar
- Ari Keränen, Teemu Kärkkäinen, Mikko Pitkänen, Frans Ekman, Jouni Karvo, and Jörg Ott. 2016. The ONE: The Opportunistic Network Environment simulator. (April 2016). https://akeranen.github.io/the-one/.Google Scholar
- U. A. Khan, S. Kar, and J. M. F. Moura. 2009. Distributed sensor localization in random environments using minimal number of anchor nodes. IEEE Trans. Sign. Process. 57, 5 (May 2009), 2000--2016. DOI:http://dx.doi.org/10.1109/TSP.2009.2014812 Google Scholar
Digital Library
- Thanasis Korakis, Zhifeng Tao, Shashi Raj Singh, Pei Liu, and Shivendra S. Panwar. 2009. Implementation of a cooperative MAC protocol: Performance and challenges in a real environment. EURASIP J. Wireless Commun. Netw. 2009 (2009). DOI:http://dx.doi.org/10.1155/2009/598140 Google Scholar
Digital Library
- Gerhard Kramer, Ivana Maric, and Roy D. Yates. 2006. Cooperative communications. Found. Trends Netw. 1, 3--4 (2006), 271--425. DOI:http://dx.doi.org/10.1561/1300000004 Google Scholar
Digital Library
- Lifeng Lai, Ke Liu, and H. El-Gamal. 2006. The three-node wireless network: Achievable rates and cooperation strategies. IEEE Trans. Inform. Theor. 52, 3 (March 2006), 805--828. DOI:http://dx.doi.org/10.1109/TIT.2005.864421 Google Scholar
Digital Library
- Lei Lei, Zhangdui Zhong, Kan Zheng, Jiadi Chen, and Hanlin Meng. 2013. Challenges on wireless heterogeneous networks for mobile cloud computing. IEEE Wireless Commun. 20, 3 (June 2013), 34--44. DOI:http://dx.doi.org/10.1109/MWC.2013.6549281Google Scholar
- Yun Li, Xiaofen Zhu, and Weiliang Zhao. 2011. Cooperation mode selection for maximizing throughput in wireless networks. In 8th IEEE International Conference on Wireless and Optical Communications Networks (WOCN 2011). 1--5. DOI:http://dx.doi.org/10.1109/WOCN.2011.5872935Google Scholar
Cross Ref
- Cong Liu, Jie Wu, Xin Guan, and Li Chen. 2011. Cooperative file sharing in hybrid delay tolerant networks. In Proceedings of the 2011 31st International Conference on Distributed Computing Systems Workshops (ICDCSW 2011). Washington, DC, USA, 339--344. DOI:http://dx.doi.org/10.1109/ICDCSW.2011.68 Google Scholar
Digital Library
- Pei Liu, Zhifeng Tao, Sathya Narayanan, Thanasis Korakis, and Shivendra S. Panwar. 2007. CoopMAC: A cooperative MAC for wireless LANs. IEEE J. Select. Areas. Commun. 25, 2 (2007), 340--354. http://dblp.uni-trier.de/db/journals/jsac/jsac25.html#LiuTNKP07. Google Scholar
Digital Library
- Yuting Luo and R. Deters. 2009. Using cooperation to improve the experience of mobile web services consumers. In IEEE Asia-Pacific Services Computing Conference (APSCC 2009). 213--218. DOI:http://dx.doi.org/10.1109/APSCC.2009.5394122Google Scholar
Cross Ref
- N. Magaia, P. Rogerio Pereira, and M. P. Correia. 2013. Selfish and malicious behavior in delay-tolerant networks. In Future Network and Mobile Summit (FutureNetworkSummit), 2013. 1--10.Google Scholar
- Pietro Michiardi and Refik Molva. 2002. Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security. Kluwer, B.V., 107--121. Google Scholar
Digital Library
- T. Mshvidobadze. 2012. Evolution mobile wireless communication and LTE networks. In 6th International Conference on Application of Information and Communication Technologies (AICT 2012). 1--7.Google Scholar
Cross Ref
- Patrick Murphy, Ashutosh Sabharwal, and Behnaam Aazhang. 2009. On building a cooperative communication system: Testbed implementation and first results. EURASIP J. Wireless Commun. Netw. 2009, Article 7 (2009), 9 pages. Google Scholar
Digital Library
- N. Patwari, J. N. Ash, S. Kyperountas, A. O. Hero, R. L. Moses, and N. S. Correal. 2005. Locating the nodes: Cooperative localization in wireless sensor networks. IEEE Sign. Process. Mag. 22, 4 (July 2005), 54--69. DOI:http://dx.doi.org/10.1109/MSP.2005.1458287Google Scholar
Cross Ref
- J. M. Pozo, O. Trullols, J. M. Barcelo, and J. G. Vidal. 2008. A cooperative ARQ for delay-tolerant vehicular networks. In 28th International Conference on Distributed Computing Systems Workshops (ICDCS 2008). 192--197. DOI:http://dx.doi.org/10.1109/ICDCS.Workshops.2008.58 Google Scholar
Digital Library
- K. Raeburn. 2005. Advanced Encryption Standard (AES) Encryption for Kerberos 5. RFC 3962 (Proposed Standard). (February 2005). http://www.ietf.org/rfc/rfc3962.txt.Google Scholar
- D. Raychaudhuri and Narayan B. Mandayam. 2012. Frontiers of wireless and mobile communications. Proc. IEEE 100, 4 (April 2012), 824--840. DOI:http://dx.doi.org/10.1109/JPROC.2011.2182095Google Scholar
Cross Ref
- R. Rivest. 1992. The MD5 Message-Digest Algorithm. (1992).Google Scholar
- Lawrence A. Rowe. 2013. Looking forward 10 years to multimedia successes. ACM Trans. Multimed. Comput. Commun. Appl. 9, 1, Article 37 (Oct. 2013), 7 pages. DOI:http://dx.doi.org/10.1145/2490825 Google Scholar
Digital Library
- C. Sammarco, F. H. P. Fitzek, G. P. Perrucci, A. Iera, and A. Molinaro. 2008. Localization information retrieval exploiting cooperation among mobile devices. In IEEE International Conference on Communications Workshops (ICC Workshops 2008). 149--153. DOI:http://dx.doi.org/10.1109/ICCW.2008.33Google Scholar
Cross Ref
- Haiying Shen and Ze Li. 2012. Game-theoretic analysis of cooperation incentive strategies in mobile ad hoc networks. IEEE Trans. Mobile Comput. 11, 8 (2012), 1287--1303. DOI:http://dx.doi.org/10.1109/TMC.2011.151 Google Scholar
Digital Library
- Yuan Shen, Henk Wymeersch, and Moe Z. Win. 2010. Fundamental limits of wideband localization - Part II: Cooperative networks. Computing Research Repository abs/1006.0890 (2010). Google Scholar
Digital Library
- U. Shevade, Han Hee Song, Lili Qiu, and Yin Zhang. 2008. Incentive-aware routing in DTNs. In IEEE International Conference on Network Protocols (ICNP 2008). 238--247. DOI:http://dx.doi.org/10.1109/ICNP.2008.4697042 Google Scholar
Digital Library
- Bruno M. C. Silva, Joel J. P. C. Rodrigues, Ivo M. C. Lopes, Tiago M.F. Machado, and Liang Zhou. 2013b. A novel cooperation strategy for mobile health applications. IEEE J. Select. Areas Commun. 31, 9 (September 2013), 28--36. DOI:http://dx.doi.org/10.1109/JSAC.2013.SUP.0513003Google Scholar
Cross Ref
- M. Bruno Silva, JPC Joel Rodrigues, Fábio Canelo, C. Ivo Lopes, and Liang Zhou. 2013a. A data encryption solution for mobile health apps in cooperation environments. J. Med. Internet Res. 15, 4 (25 Apr 2013), e66.Google Scholar
Cross Ref
- Vasco N. G. J. Soares and Joel J. P. C. Rodrigues. 2011. Cooperative Networking. Wiley, Chapter Cooperation in DTN-Based Network Architectures, 101--115.Google Scholar
- Shuhuan Wen, Baozhu Hu, Ahmad B. Rad, Xinbin Li, Huibin Lu, and Jianhua Zhang. 2012. Robust nash dynamic game strategy for user cooperation energy efficiency in wireless cellular networks. Math. Probl. Eng. 2012 (2012).Google Scholar
- M. Z. Win, A. Conti, S. Mazuelas, Yuan Shen, W. M. Gifford, D. Dardari, and M. Chiani. 2011. Network localization and navigation via cooperation. IEEE Commun. Mag. 49, 5 (May 2011), 56--62. DOI:http://dx.doi.org/10.1109/MCOM.2011.5762798Google Scholar
Cross Ref
- H. Wymeersch, J. Lien, and M. Z. Win. 2009. Cooperative localization in wireless networks. Proc. IEEE 97, 2 (Feb 2009), 427--450. DOI:http://dx.doi.org/10.1109/JPROC.2008.2008853Google Scholar
Cross Ref
- Lei Yin, Hui mei Lu, Yuan-Da Cao, and Jian min Gao. 2010. Cooperation in delay tolerant networks. In 2nd International Conference on Signal Processing Systems (ICSPS 2010), Vol. 1. V1--202--V1--205. DOI:http://dx.doi.org/10.1109/ICSPS.2010.5555572Google Scholar
Cross Ref
- Jong-Woon Yoo and Kyu Ho Park. 2011. A cooperative clustering protocol for energy saving of mobile devices with WLAN and bluetooth interfaces. IEEE Trans. Mobile Comput. 10, 4 (April 2011), 491--504. DOI:http://dx.doi.org/10.1109/TMC.2010.161 Google Scholar
Digital Library
- Per Zetterberg, Christos Mavrokefalidis, Aris S. Lalos, and Emmanouil Matigakis. 2009. Experimental investigation of cooperative schemes on a real-time DSP-based testbed. EURASIP J. Wireless Commun. Netw. 2009 (2009). Google Scholar
Digital Library
- S. Zhong, J. Chen, and Y. R. Yang. 2003. Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks. In IEEE Societies 22nd Annual Joint Conference of the IEEE Computer and Communications (INFOCOM 2003), Vol. 3. 1987--1997 vol.3. DOI:http://dx.doi.org/10.1109/INFCOM.2003.1209220Google Scholar
Index Terms
MobiCoop: An Incentive-Based Cooperation Solution for Mobile Applications
Recommendations
Executing resource intensive applications on mobile devices
ACM SE '10: Proceedings of the 48th Annual Southeast Regional ConferenceWith the prevalence of mobile computing devices such as smart phones we are interested in expanding their usage to resource intensive software. The challenges we face include lack of software libraries to run various applications limited battery life ...
Contemporary Issues in Handheld Computing Research
Mobile phones have become ubiquitous in today's society. However, mobile users are no longer satisfied with simple phones but instead expect ever more powerful functions to be available from their mobile devices. Advanced phones known as smartphones ...
Energy‐efficient replica detection for resource‐limited mobile devices in the internet of things
The forthcoming Internet of Things – an intelligent collaboration of resource‐limited static/mobile devices that are embedded in the daily lives of users – poses new challenges to security and end‐user privacy. One of the most challenging problems is how ...






Comments