skip to main content
research-article

MobiCoop: An Incentive-Based Cooperation Solution for Mobile Applications

Authors Info & Claims
Published:24 August 2016Publication History
Skip Abstract Section

Abstract

Network architectures based on mobile devices and wireless communications present several constraints (e.g., processor, energy storage, bandwidth, etc.) that affect the overall network performance. Cooperation strategies have been considered as a solution to address these network limitations. In the presence of unstable network infrastructures, mobile nodes cooperate with each other, forwarding data and performing other specific network functionalities. This article proposes a generalized incentive-based cooperation solution for mobile services and applications called MobiCoop. This reputation-based scheme includes an application framework for mobile applications that uses a Web service to handle all the nodes reputation and network permissions. The main goal of MobiCoop is to provide Internet services to mobile devices without network connectivity through cooperation with neighbor devices. The article includes a performance evaluation study of MobiCoop considering both a real scenario (using a prototype) and a simulation-based study. Results show that the proposed approach provides network connectivity independency to users with mobile apps when Internet connectivity is unavailable. Then, it is concluded that MobiCoop improved significantly the overall system performance and the service provided for a given mobile application.

References

  1. M. Abdellatif, A. Mtibaa, K. A. Harras, and M. Youssef. 2013. GreenLoc: An energy efficient architecture for WiFi-based indoor localization on mobile phones. In 2013 IEEE International Conference on Communications (ICC). 4425--4430. DOI:http://dx.doi.org/10.1109/ICC.2013.6655263Google ScholarGoogle ScholarCross RefCross Ref
  2. L. Al-Kanj and Z. Dawy. 2010. Optimized energy efficient content distribution over wireless networks with mobile-to-mobile cooperation. In IEEE 17th International Conference on Telecommunications (ICT 2010). Doha, Qatar, 471--475. DOI:http://dx.doi.org/10.1109/ICTEL.2010.5478815Google ScholarGoogle ScholarCross RefCross Ref
  3. Alessandro Aldini and Alessandro Bogliolo. 2014. User-Centric Networking: Future Perspectives. Springer, Berlin. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. S. Althunibat, G. Kibalya, and F. Granelli. 2012. Energy-efficient network discovery mechanism by exploiting cooperation among terminals. In IEEE 19th Symposium on Communications and Vehicular Technology in the Benelux (SCVT 2012). Eindhoven, Netherlands, 1--5. DOI:http://dx.doi.org/10.1109/SCVT.2012.6399398Google ScholarGoogle ScholarCross RefCross Ref
  5. A. Antonopoulos and C. Verikoukis. 2012. N-player medium access game for wireless data dissemination. In IEEE Global Communications Conference (GLOBECOM 2012). California, USA, 3043--3048. DOI:http://dx.doi.org/10.1109/GLOCOM.2012.6503581Google ScholarGoogle ScholarCross RefCross Ref
  6. A. Antonopoulos and C. Verikoukis. 2014. Multi-player game theoretic MAC strategies for energy efficient data dissemination. IEEE Trans. Wireless Commun. 13, 2 (February 2014), 592--603. DOI:http://dx.doi.org/10.1109/TWC.2013.120713.120790Google ScholarGoogle ScholarCross RefCross Ref
  7. Sorav Bansal and Mary Baker. 2003. Observation-based Cooperation Enforcement in Ad hoc Networks. (2003).Google ScholarGoogle Scholar
  8. Christian Bettstetter. 2001. Mobility modeling in wireless networks: Categorization, smooth movement, and border effects. SIGMOBILE Mob. Comput. Commun. Rev. 5, 3 (July 2001), 55--66. DOI:http://dx.doi.org/10.1145/584051.584056 Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Sonja Buchegger and Jean-Yves Le Boudec. 2002. Performance analysis of the CONFIDANT protocol. In Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing (MobiHoc 2002). ACM, New York, NY, 226--236. DOI:http://dx.doi.org/10.1145/513800.513828 Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Levente Buttyán and Jean-Pierre Hubaux. 2001. Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks. Technical Report.Google ScholarGoogle Scholar
  11. L. Buttyán and J.-P. Hubaux. 2003. Stimulating cooperation in self-organizing mobile ad hoc networks. Mobile Netw. Appl. 8, 2 (2003), 579--592. DOI:http://dx.doi.org/10.1023/A:1025146013151 Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. V. Cerf, S. Burleigh, A. Hooke, L. Torgerson, R. Durst, K. Scott, K. Fall, and H. Weiss. 2007. Delay-Tolerant Networking Architecture. RFC 4838 (Informational). (April 2007). http://www.ietf.org/rfc/rfc4838.txt.Google ScholarGoogle Scholar
  13. Dimitris E. Charilas and Athanasios D. Panagopoulos. 2010. A survey on game theory applications in wireless networks. Comput. Netw. 54, 18 (Dec. 2010), 3421--3430. DOI:http://dx.doi.org/10.1016/j.comnet.2010.06.020 Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Kang Chen and Haiying Shen. 2013. Multicent: A multifunctional incentive scheme adaptive to diverse performance objectives for DTN routing. In 10th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON 2013). New Orleans, USA, 532--540. DOI:http://dx.doi.org/10.1109/SAHCN.2013.6645025Google ScholarGoogle ScholarCross RefCross Ref
  15. S. Corson and J. Macker. 1999. Mobile Ad Hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations. (1999). http://www.ietf.org/rfc/rfc4838.txt.Google ScholarGoogle Scholar
  16. J. A. F. F. Dias, J. J. P. C. Rodrigues, N. Kumar, and K. Saleem. 2015a. Cooperation strategies for vehicular delay-tolerant networks. IEEE Commun. Mag. 53, 12 (Dec 2015), 88--94. DOI:http://dx.doi.org/10.1109/MCOM.2015.7355571Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. J. A. F. F. Dias, J. J. P. C. Rodrigues, Feng Xia, and C. X. Mavromoustakis. 2015b. A cooperative watchdog system to detect misbehavior nodes in vehicular delay-tolerant networks. IEEE Trans. Indust. Electron. 62, 12 (Dec 2015), 7929--7937. DOI:http://dx.doi.org/10.1109/TIE.2015.2425357Google ScholarGoogle ScholarCross RefCross Ref
  18. M. Felegyhazi and J.-P. Hubaux. 2007. Game Theory in Wiress Networks: A Tutorial. Technical Report. EPFL.Google ScholarGoogle Scholar
  19. M. H. Lofti Froushani, B. H. Khalaj, and S. Vakilinia. 2011. A novel approach to incentive-based cooperation in wireless ad hoc networks. In 18th International Conference on Telecommunications (ICT 2011). Ayia Napa, Cyprus, 78--83.Google ScholarGoogle Scholar
  20. László Gyarmati and Tuan Anh Trinh. 2011. Cooperative strategies of wireless access technologies: A game-theoretic analysis. Pervas. Mobile Comput. 7, 5 (2011), 545--568.Google ScholarGoogle ScholarCross RefCross Ref
  21. Karim Habak, Khaled A. Harras, and Moustafa Youssef. 2013. Bandwidth aggregation techniques in heterogeneous multi-homed devices: A survey. CoRR abs/1309.0542 (2013). http://dblp.uni-trier.de/db/journals/corr/corr1309.html#HabakHY13. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Karim Habak, Khaled A. Harras, and Moustafa Youssef. 2015. What goes around comes around: Mobile bandwidth sharing and aggregation. In IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems (MASS), 2015. 37--45. DOI:http://dx.doi.org/10.1109/MASS.2015.42 Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Karim Habak, Moustafa Youssef, and Khaled A. Harras. 2013. An optimal deployable bandwidth aggregation system. Comput. Netw. 57, 15 (2013), 3067--3080. DOI:http://dx.doi.org/10.1016/j.comnet.2013.07.012 Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Qi He, Dapeng Wu, and Pradeep Khosla. 2004. SORI: A secure and objective reputation-based incentive scheme for ad-hoc networks. In IEEE Wireless Communications and Networking Conference (WCNC 2004), Vol. 2. Atlanta, Georgia, USA, 825--830 Vol.2. DOI:http://dx.doi.org/10.1109/WCNC.2004.1311293Google ScholarGoogle Scholar
  25. O. R. Helgason, F. Legendre, V. Lenders, M. May, and G. Karlsson. 2010. Performance of opportunistic content distribution under different levels of cooperation. In IEEE European Wireless Conference (EW 2010). Lucca, Italy, 903--910. DOI:http://dx.doi.org/10.1109/EW.2010.5483523Google ScholarGoogle ScholarCross RefCross Ref
  26. Mohammad Asharful Hoque, Matti Siekkinen, Jukka K. Nurminen, Sasu Tarkoma, and Mika Aalto. 2014. Saving energy in mobile devices for on-demand multimedia streaming -- A cross-layer approach. ACM Tran. Multimed. Comput. Commun. Appl. 10, 3, Article 25 (April 2014), 23 pages. DOI:http://dx.doi.org/10.1145/2556942 Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Jiangyi Hu and Mike Burmester. 2006. LARS: A locally aware reputation system for mobile ad hoc networks. In Proceedings of the 44th Annual Southeast Regional Conference. New York, NY, USA, 119--123. DOI:http://dx.doi.org/10.1145/1185448.1185475 Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Jiangyi Hu and Mike Burmester. 2009. Cooperation in mobile ad hoc networks. In Guide to Wireless Ad Hoc Networks. Springer, London, 43--57. DOI:http://dx.doi.org/10.1007/978-1-84800-328-6_3Google ScholarGoogle Scholar
  29. Juan José Jaramillo and R. Srikant. 2007. DARWIN: Distributed and adaptive reputation mechanism for wireless ad-hoc networks. In Proceedings of the 13th Annual ACM International Conference on Mobile Computing and Networking (MobiCom 2007). ACM, New York, NY, 87--98. DOI:http://dx.doi.org/10.1145/1287853.1287865 Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Wu Jianping, Li Hewu, Sun Wenqi, Wu Qian, Jiang Zhuo, and Zhao Wei. 2013. Technology trends and architecture research for future mobile internet. IEEE China Commun. 10, 6 (June 2013), 14--27. DOI:http://dx.doi.org/10.1109/CC.2013.6549255Google ScholarGoogle Scholar
  31. J. Jonsson and B. Kaliski. 2003. Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1. (2003).Google ScholarGoogle Scholar
  32. Ma Kai, Guan Xinping, and Zhao Bin. 2010. Symmetrical cooperative strategies in wireless networks: A cooperative game approach. In 29th IEEE Chinese Control Conference (CCC 2010). Beijing, China, 4175--4179.Google ScholarGoogle Scholar
  33. Ari Keränen, Teemu Kärkkäinen, Mikko Pitkänen, Frans Ekman, Jouni Karvo, and Jörg Ott. 2016. The ONE: The Opportunistic Network Environment simulator. (April 2016). https://akeranen.github.io/the-one/.Google ScholarGoogle Scholar
  34. U. A. Khan, S. Kar, and J. M. F. Moura. 2009. Distributed sensor localization in random environments using minimal number of anchor nodes. IEEE Trans. Sign. Process. 57, 5 (May 2009), 2000--2016. DOI:http://dx.doi.org/10.1109/TSP.2009.2014812 Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Thanasis Korakis, Zhifeng Tao, Shashi Raj Singh, Pei Liu, and Shivendra S. Panwar. 2009. Implementation of a cooperative MAC protocol: Performance and challenges in a real environment. EURASIP J. Wireless Commun. Netw. 2009 (2009). DOI:http://dx.doi.org/10.1155/2009/598140 Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Gerhard Kramer, Ivana Maric, and Roy D. Yates. 2006. Cooperative communications. Found. Trends Netw. 1, 3--4 (2006), 271--425. DOI:http://dx.doi.org/10.1561/1300000004 Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Lifeng Lai, Ke Liu, and H. El-Gamal. 2006. The three-node wireless network: Achievable rates and cooperation strategies. IEEE Trans. Inform. Theor. 52, 3 (March 2006), 805--828. DOI:http://dx.doi.org/10.1109/TIT.2005.864421 Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Lei Lei, Zhangdui Zhong, Kan Zheng, Jiadi Chen, and Hanlin Meng. 2013. Challenges on wireless heterogeneous networks for mobile cloud computing. IEEE Wireless Commun. 20, 3 (June 2013), 34--44. DOI:http://dx.doi.org/10.1109/MWC.2013.6549281Google ScholarGoogle Scholar
  39. Yun Li, Xiaofen Zhu, and Weiliang Zhao. 2011. Cooperation mode selection for maximizing throughput in wireless networks. In 8th IEEE International Conference on Wireless and Optical Communications Networks (WOCN 2011). 1--5. DOI:http://dx.doi.org/10.1109/WOCN.2011.5872935Google ScholarGoogle ScholarCross RefCross Ref
  40. Cong Liu, Jie Wu, Xin Guan, and Li Chen. 2011. Cooperative file sharing in hybrid delay tolerant networks. In Proceedings of the 2011 31st International Conference on Distributed Computing Systems Workshops (ICDCSW 2011). Washington, DC, USA, 339--344. DOI:http://dx.doi.org/10.1109/ICDCSW.2011.68 Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Pei Liu, Zhifeng Tao, Sathya Narayanan, Thanasis Korakis, and Shivendra S. Panwar. 2007. CoopMAC: A cooperative MAC for wireless LANs. IEEE J. Select. Areas. Commun. 25, 2 (2007), 340--354. http://dblp.uni-trier.de/db/journals/jsac/jsac25.html#LiuTNKP07. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Yuting Luo and R. Deters. 2009. Using cooperation to improve the experience of mobile web services consumers. In IEEE Asia-Pacific Services Computing Conference (APSCC 2009). 213--218. DOI:http://dx.doi.org/10.1109/APSCC.2009.5394122Google ScholarGoogle ScholarCross RefCross Ref
  43. N. Magaia, P. Rogerio Pereira, and M. P. Correia. 2013. Selfish and malicious behavior in delay-tolerant networks. In Future Network and Mobile Summit (FutureNetworkSummit), 2013. 1--10.Google ScholarGoogle Scholar
  44. Pietro Michiardi and Refik Molva. 2002. Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security. Kluwer, B.V., 107--121. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. T. Mshvidobadze. 2012. Evolution mobile wireless communication and LTE networks. In 6th International Conference on Application of Information and Communication Technologies (AICT 2012). 1--7.Google ScholarGoogle ScholarCross RefCross Ref
  46. Patrick Murphy, Ashutosh Sabharwal, and Behnaam Aazhang. 2009. On building a cooperative communication system: Testbed implementation and first results. EURASIP J. Wireless Commun. Netw. 2009, Article 7 (2009), 9 pages. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. N. Patwari, J. N. Ash, S. Kyperountas, A. O. Hero, R. L. Moses, and N. S. Correal. 2005. Locating the nodes: Cooperative localization in wireless sensor networks. IEEE Sign. Process. Mag. 22, 4 (July 2005), 54--69. DOI:http://dx.doi.org/10.1109/MSP.2005.1458287Google ScholarGoogle ScholarCross RefCross Ref
  48. J. M. Pozo, O. Trullols, J. M. Barcelo, and J. G. Vidal. 2008. A cooperative ARQ for delay-tolerant vehicular networks. In 28th International Conference on Distributed Computing Systems Workshops (ICDCS 2008). 192--197. DOI:http://dx.doi.org/10.1109/ICDCS.Workshops.2008.58 Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. K. Raeburn. 2005. Advanced Encryption Standard (AES) Encryption for Kerberos 5. RFC 3962 (Proposed Standard). (February 2005). http://www.ietf.org/rfc/rfc3962.txt.Google ScholarGoogle Scholar
  50. D. Raychaudhuri and Narayan B. Mandayam. 2012. Frontiers of wireless and mobile communications. Proc. IEEE 100, 4 (April 2012), 824--840. DOI:http://dx.doi.org/10.1109/JPROC.2011.2182095Google ScholarGoogle ScholarCross RefCross Ref
  51. R. Rivest. 1992. The MD5 Message-Digest Algorithm. (1992).Google ScholarGoogle Scholar
  52. Lawrence A. Rowe. 2013. Looking forward 10 years to multimedia successes. ACM Trans. Multimed. Comput. Commun. Appl. 9, 1, Article 37 (Oct. 2013), 7 pages. DOI:http://dx.doi.org/10.1145/2490825 Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. C. Sammarco, F. H. P. Fitzek, G. P. Perrucci, A. Iera, and A. Molinaro. 2008. Localization information retrieval exploiting cooperation among mobile devices. In IEEE International Conference on Communications Workshops (ICC Workshops 2008). 149--153. DOI:http://dx.doi.org/10.1109/ICCW.2008.33Google ScholarGoogle ScholarCross RefCross Ref
  54. Haiying Shen and Ze Li. 2012. Game-theoretic analysis of cooperation incentive strategies in mobile ad hoc networks. IEEE Trans. Mobile Comput. 11, 8 (2012), 1287--1303. DOI:http://dx.doi.org/10.1109/TMC.2011.151 Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Yuan Shen, Henk Wymeersch, and Moe Z. Win. 2010. Fundamental limits of wideband localization - Part II: Cooperative networks. Computing Research Repository abs/1006.0890 (2010). Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. U. Shevade, Han Hee Song, Lili Qiu, and Yin Zhang. 2008. Incentive-aware routing in DTNs. In IEEE International Conference on Network Protocols (ICNP 2008). 238--247. DOI:http://dx.doi.org/10.1109/ICNP.2008.4697042 Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. Bruno M. C. Silva, Joel J. P. C. Rodrigues, Ivo M. C. Lopes, Tiago M.F. Machado, and Liang Zhou. 2013b. A novel cooperation strategy for mobile health applications. IEEE J. Select. Areas Commun. 31, 9 (September 2013), 28--36. DOI:http://dx.doi.org/10.1109/JSAC.2013.SUP.0513003Google ScholarGoogle ScholarCross RefCross Ref
  58. M. Bruno Silva, JPC Joel Rodrigues, Fábio Canelo, C. Ivo Lopes, and Liang Zhou. 2013a. A data encryption solution for mobile health apps in cooperation environments. J. Med. Internet Res. 15, 4 (25 Apr 2013), e66.Google ScholarGoogle ScholarCross RefCross Ref
  59. Vasco N. G. J. Soares and Joel J. P. C. Rodrigues. 2011. Cooperative Networking. Wiley, Chapter Cooperation in DTN-Based Network Architectures, 101--115.Google ScholarGoogle Scholar
  60. Shuhuan Wen, Baozhu Hu, Ahmad B. Rad, Xinbin Li, Huibin Lu, and Jianhua Zhang. 2012. Robust nash dynamic game strategy for user cooperation energy efficiency in wireless cellular networks. Math. Probl. Eng. 2012 (2012).Google ScholarGoogle Scholar
  61. M. Z. Win, A. Conti, S. Mazuelas, Yuan Shen, W. M. Gifford, D. Dardari, and M. Chiani. 2011. Network localization and navigation via cooperation. IEEE Commun. Mag. 49, 5 (May 2011), 56--62. DOI:http://dx.doi.org/10.1109/MCOM.2011.5762798Google ScholarGoogle ScholarCross RefCross Ref
  62. H. Wymeersch, J. Lien, and M. Z. Win. 2009. Cooperative localization in wireless networks. Proc. IEEE 97, 2 (Feb 2009), 427--450. DOI:http://dx.doi.org/10.1109/JPROC.2008.2008853Google ScholarGoogle ScholarCross RefCross Ref
  63. Lei Yin, Hui mei Lu, Yuan-Da Cao, and Jian min Gao. 2010. Cooperation in delay tolerant networks. In 2nd International Conference on Signal Processing Systems (ICSPS 2010), Vol. 1. V1--202--V1--205. DOI:http://dx.doi.org/10.1109/ICSPS.2010.5555572Google ScholarGoogle ScholarCross RefCross Ref
  64. Jong-Woon Yoo and Kyu Ho Park. 2011. A cooperative clustering protocol for energy saving of mobile devices with WLAN and bluetooth interfaces. IEEE Trans. Mobile Comput. 10, 4 (April 2011), 491--504. DOI:http://dx.doi.org/10.1109/TMC.2010.161 Google ScholarGoogle ScholarDigital LibraryDigital Library
  65. Per Zetterberg, Christos Mavrokefalidis, Aris S. Lalos, and Emmanouil Matigakis. 2009. Experimental investigation of cooperative schemes on a real-time DSP-based testbed. EURASIP J. Wireless Commun. Netw. 2009 (2009). Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. S. Zhong, J. Chen, and Y. R. Yang. 2003. Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks. In IEEE Societies 22nd Annual Joint Conference of the IEEE Computer and Communications (INFOCOM 2003), Vol. 3. 1987--1997 vol.3. DOI:http://dx.doi.org/10.1109/INFCOM.2003.1209220Google ScholarGoogle Scholar

Index Terms

  1. MobiCoop: An Incentive-Based Cooperation Solution for Mobile Applications

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader
          About Cookies On This Site

          We use cookies to ensure that we give you the best experience on our website.

          Learn more

          Got it!