{"title":"将网状网络扩展到机会资源共享","authors":"J. Hansen","doi":"10.1109/IMIS.2012.100","DOIUrl":null,"url":null,"abstract":"We propose a high-level framework that extends the notion of opportunistic mesh networking to include opportunistic access to and sharing of other device resources such as nonvolatile data storage and computation. While work has been done on providing opportunistic access to each of these resources (network access, data storage, and computation, that is) individually, this paper is an attempt to bring all three resource-sharing applications under the same umbrella. This framework uses an existing \"web of trust\" protocol that does not require a full public-key infrastructure (PKI) and adds reputation mechanisms to handle interactions between both explicitly-trusted and untrusted peers. Once devices have initiated a connection, they mutually authenticate one another and negotiate the terms of a resource-sharing agreement overran encrypted tunnel. This agreement may involve a payment of electronic currency or a request for credit in exchange for a particular resource, or the resource may be provided at no cost. Each device's local policy dictates how interactions with others should proceed.","PeriodicalId":290976,"journal":{"name":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","volume":"53 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Extending Mesh Networks to Opportunistic Resource Sharing\",\"authors\":\"J. Hansen\",\"doi\":\"10.1109/IMIS.2012.100\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We propose a high-level framework that extends the notion of opportunistic mesh networking to include opportunistic access to and sharing of other device resources such as nonvolatile data storage and computation. While work has been done on providing opportunistic access to each of these resources (network access, data storage, and computation, that is) individually, this paper is an attempt to bring all three resource-sharing applications under the same umbrella. This framework uses an existing \\\"web of trust\\\" protocol that does not require a full public-key infrastructure (PKI) and adds reputation mechanisms to handle interactions between both explicitly-trusted and untrusted peers. Once devices have initiated a connection, they mutually authenticate one another and negotiate the terms of a resource-sharing agreement overran encrypted tunnel. This agreement may involve a payment of electronic currency or a request for credit in exchange for a particular resource, or the resource may be provided at no cost. Each device's local policy dictates how interactions with others should proceed.\",\"PeriodicalId\":290976,\"journal\":{\"name\":\"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing\",\"volume\":\"53 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-07-04\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IMIS.2012.100\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IMIS.2012.100","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Extending Mesh Networks to Opportunistic Resource Sharing
We propose a high-level framework that extends the notion of opportunistic mesh networking to include opportunistic access to and sharing of other device resources such as nonvolatile data storage and computation. While work has been done on providing opportunistic access to each of these resources (network access, data storage, and computation, that is) individually, this paper is an attempt to bring all three resource-sharing applications under the same umbrella. This framework uses an existing "web of trust" protocol that does not require a full public-key infrastructure (PKI) and adds reputation mechanisms to handle interactions between both explicitly-trusted and untrusted peers. Once devices have initiated a connection, they mutually authenticate one another and negotiate the terms of a resource-sharing agreement overran encrypted tunnel. This agreement may involve a payment of electronic currency or a request for credit in exchange for a particular resource, or the resource may be provided at no cost. Each device's local policy dictates how interactions with others should proceed.