Enabling crowd-sourced mobile Internet access
Ημερομηνία
2014Λέξη-κλειδί
Επιτομή
Crowd-sourced mobile Internet access services enable mobile users to connect with each other and share their Internet connections. This is a promising solution for addressing users' increasing needs for ubiquitous connectivity and alleviating network congestion. The success of such services heavily depends on users' willingness to contribute their resources. In this paper, we consider a general model for such services, and design a distributed incentive mechanism for encouraging users' participation. This bargaining based scheme ensures that the contribution of user resources, in terms of Internet access bandwidths and battery energy, and the allocation of service capacity, measured in the delivered mobile data, are Pareto efficient and proportionally fair. The numerical results verify that the service always improves users' performance and that these benefits depend on the diversity of the users' resources. © 2014 IEEE.
Collections
Related items
Showing items related by title, author, creator and subject.
-
A federated machine learning protocol for fog networks
Foukalas F., Tziouvaras A. (2021)In this paper, we present a federated learning (FL) protocol for fog networking applications. The fog networking architecture is compatible with the Internet of Things (IoT) edge computing concept of the Internet Engineering ... -
Reputation-based internet sharing in wireless neighborhood community networks
Satsiou, A.; Tassiulas, L. (2010)This paper proposes easily applicable distributed reputation-based policies to motivate users of a wireless community to share their Internet connection in a p2p fashion. The goal is the provision of free and good quality ... -
Voice interactive personalized security protocol: Definition and security analysis
Zisiadis, D.; Kopsidas, S.; Tassiulas, L. (2007)Security is a major issue in VoIP communications over the Internet, especially in mobile environments. Voice Interactive Personalized Security (VIPSec) constitutes a method for leveraging the security for Internet ...