skip to main content
research-article

MobiCoop: An Incentive-Based Cooperation Solution for Mobile Applications

Published: 24 August 2016 Publication History

Abstract

Network architectures based on mobile devices and wireless communications present several constraints (e.g., processor, energy storage, bandwidth, etc.) that affect the overall network performance. Cooperation strategies have been considered as a solution to address these network limitations. In the presence of unstable network infrastructures, mobile nodes cooperate with each other, forwarding data and performing other specific network functionalities. This article proposes a generalized incentive-based cooperation solution for mobile services and applications called MobiCoop. This reputation-based scheme includes an application framework for mobile applications that uses a Web service to handle all the nodes reputation and network permissions. The main goal of MobiCoop is to provide Internet services to mobile devices without network connectivity through cooperation with neighbor devices. The article includes a performance evaluation study of MobiCoop considering both a real scenario (using a prototype) and a simulation-based study. Results show that the proposed approach provides network connectivity independency to users with mobile apps when Internet connectivity is unavailable. Then, it is concluded that MobiCoop improved significantly the overall system performance and the service provided for a given mobile application.

References

[1]
M. Abdellatif, A. Mtibaa, K. A. Harras, and M. Youssef. 2013. GreenLoc: An energy efficient architecture for WiFi-based indoor localization on mobile phones. In 2013 IEEE International Conference on Communications (ICC). 4425--4430.
[2]
L. Al-Kanj and Z. Dawy. 2010. Optimized energy efficient content distribution over wireless networks with mobile-to-mobile cooperation. In IEEE 17th International Conference on Telecommunications (ICT 2010). Doha, Qatar, 471--475.
[3]
Alessandro Aldini and Alessandro Bogliolo. 2014. User-Centric Networking: Future Perspectives. Springer, Berlin.
[4]
S. Althunibat, G. Kibalya, and F. Granelli. 2012. Energy-efficient network discovery mechanism by exploiting cooperation among terminals. In IEEE 19th Symposium on Communications and Vehicular Technology in the Benelux (SCVT 2012). Eindhoven, Netherlands, 1--5.
[5]
A. Antonopoulos and C. Verikoukis. 2012. N-player medium access game for wireless data dissemination. In IEEE Global Communications Conference (GLOBECOM 2012). California, USA, 3043--3048.
[6]
A. Antonopoulos and C. Verikoukis. 2014. Multi-player game theoretic MAC strategies for energy efficient data dissemination. IEEE Trans. Wireless Commun. 13, 2 (February 2014), 592--603.
[7]
Sorav Bansal and Mary Baker. 2003. Observation-based Cooperation Enforcement in Ad hoc Networks. (2003).
[8]
Christian Bettstetter. 2001. Mobility modeling in wireless networks: Categorization, smooth movement, and border effects. SIGMOBILE Mob. Comput. Commun. Rev. 5, 3 (July 2001), 55--66.
[9]
Sonja Buchegger and Jean-Yves Le Boudec. 2002. Performance analysis of the CONFIDANT protocol. In Proceedings of the 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing (MobiHoc 2002). ACM, New York, NY, 226--236.
[10]
Levente Buttyán and Jean-Pierre Hubaux. 2001. Nuglets: a Virtual Currency to Stimulate Cooperation in Self-Organized Mobile Ad Hoc Networks. Technical Report.
[11]
L. Buttyán and J.-P. Hubaux. 2003. Stimulating cooperation in self-organizing mobile ad hoc networks. Mobile Netw. Appl. 8, 2 (2003), 579--592.
[12]
V. Cerf, S. Burleigh, A. Hooke, L. Torgerson, R. Durst, K. Scott, K. Fall, and H. Weiss. 2007. Delay-Tolerant Networking Architecture. RFC 4838 (Informational). (April 2007). http://www.ietf.org/rfc/rfc4838.txt.
[13]
Dimitris E. Charilas and Athanasios D. Panagopoulos. 2010. A survey on game theory applications in wireless networks. Comput. Netw. 54, 18 (Dec. 2010), 3421--3430.
[14]
Kang Chen and Haiying Shen. 2013. Multicent: A multifunctional incentive scheme adaptive to diverse performance objectives for DTN routing. In 10th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON 2013). New Orleans, USA, 532--540.
[15]
S. Corson and J. Macker. 1999. Mobile Ad Hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations. (1999). http://www.ietf.org/rfc/rfc4838.txt.
[16]
J. A. F. F. Dias, J. J. P. C. Rodrigues, N. Kumar, and K. Saleem. 2015a. Cooperation strategies for vehicular delay-tolerant networks. IEEE Commun. Mag. 53, 12 (Dec 2015), 88--94.
[17]
J. A. F. F. Dias, J. J. P. C. Rodrigues, Feng Xia, and C. X. Mavromoustakis. 2015b. A cooperative watchdog system to detect misbehavior nodes in vehicular delay-tolerant networks. IEEE Trans. Indust. Electron. 62, 12 (Dec 2015), 7929--7937.
[18]
M. Felegyhazi and J.-P. Hubaux. 2007. Game Theory in Wiress Networks: A Tutorial. Technical Report. EPFL.
[19]
M. H. Lofti Froushani, B. H. Khalaj, and S. Vakilinia. 2011. A novel approach to incentive-based cooperation in wireless ad hoc networks. In 18th International Conference on Telecommunications (ICT 2011). Ayia Napa, Cyprus, 78--83.
[20]
László Gyarmati and Tuan Anh Trinh. 2011. Cooperative strategies of wireless access technologies: A game-theoretic analysis. Pervas. Mobile Comput. 7, 5 (2011), 545--568.
[21]
Karim Habak, Khaled A. Harras, and Moustafa Youssef. 2013. Bandwidth aggregation techniques in heterogeneous multi-homed devices: A survey. CoRR abs/1309.0542 (2013). http://dblp.uni-trier.de/db/journals/corr/corr1309.html#HabakHY13.
[22]
Karim Habak, Khaled A. Harras, and Moustafa Youssef. 2015. What goes around comes around: Mobile bandwidth sharing and aggregation. In IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems (MASS), 2015. 37--45.
[23]
Karim Habak, Moustafa Youssef, and Khaled A. Harras. 2013. An optimal deployable bandwidth aggregation system. Comput. Netw. 57, 15 (2013), 3067--3080.
[24]
Qi He, Dapeng Wu, and Pradeep Khosla. 2004. SORI: A secure and objective reputation-based incentive scheme for ad-hoc networks. In IEEE Wireless Communications and Networking Conference (WCNC 2004), Vol. 2. Atlanta, Georgia, USA, 825--830 Vol.2.
[25]
O. R. Helgason, F. Legendre, V. Lenders, M. May, and G. Karlsson. 2010. Performance of opportunistic content distribution under different levels of cooperation. In IEEE European Wireless Conference (EW 2010). Lucca, Italy, 903--910.
[26]
Mohammad Asharful Hoque, Matti Siekkinen, Jukka K. Nurminen, Sasu Tarkoma, and Mika Aalto. 2014. Saving energy in mobile devices for on-demand multimedia streaming -- A cross-layer approach. ACM Tran. Multimed. Comput. Commun. Appl. 10, 3, Article 25 (April 2014), 23 pages.
[27]
Jiangyi Hu and Mike Burmester. 2006. LARS: A locally aware reputation system for mobile ad hoc networks. In Proceedings of the 44th Annual Southeast Regional Conference. New York, NY, USA, 119--123.
[28]
Jiangyi Hu and Mike Burmester. 2009. Cooperation in mobile ad hoc networks. In Guide to Wireless Ad Hoc Networks. Springer, London, 43--57.
[29]
Juan José Jaramillo and R. Srikant. 2007. DARWIN: Distributed and adaptive reputation mechanism for wireless ad-hoc networks. In Proceedings of the 13th Annual ACM International Conference on Mobile Computing and Networking (MobiCom 2007). ACM, New York, NY, 87--98.
[30]
Wu Jianping, Li Hewu, Sun Wenqi, Wu Qian, Jiang Zhuo, and Zhao Wei. 2013. Technology trends and architecture research for future mobile internet. IEEE China Commun. 10, 6 (June 2013), 14--27.
[31]
J. Jonsson and B. Kaliski. 2003. Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1. (2003).
[32]
Ma Kai, Guan Xinping, and Zhao Bin. 2010. Symmetrical cooperative strategies in wireless networks: A cooperative game approach. In 29th IEEE Chinese Control Conference (CCC 2010). Beijing, China, 4175--4179.
[33]
Ari Keränen, Teemu Kärkkäinen, Mikko Pitkänen, Frans Ekman, Jouni Karvo, and Jörg Ott. 2016. The ONE: The Opportunistic Network Environment simulator. (April 2016). https://akeranen.github.io/the-one/.
[34]
U. A. Khan, S. Kar, and J. M. F. Moura. 2009. Distributed sensor localization in random environments using minimal number of anchor nodes. IEEE Trans. Sign. Process. 57, 5 (May 2009), 2000--2016.
[35]
Thanasis Korakis, Zhifeng Tao, Shashi Raj Singh, Pei Liu, and Shivendra S. Panwar. 2009. Implementation of a cooperative MAC protocol: Performance and challenges in a real environment. EURASIP J. Wireless Commun. Netw. 2009 (2009).
[36]
Gerhard Kramer, Ivana Maric, and Roy D. Yates. 2006. Cooperative communications. Found. Trends Netw. 1, 3--4 (2006), 271--425.
[37]
Lifeng Lai, Ke Liu, and H. El-Gamal. 2006. The three-node wireless network: Achievable rates and cooperation strategies. IEEE Trans. Inform. Theor. 52, 3 (March 2006), 805--828.
[38]
Lei Lei, Zhangdui Zhong, Kan Zheng, Jiadi Chen, and Hanlin Meng. 2013. Challenges on wireless heterogeneous networks for mobile cloud computing. IEEE Wireless Commun. 20, 3 (June 2013), 34--44.
[39]
Yun Li, Xiaofen Zhu, and Weiliang Zhao. 2011. Cooperation mode selection for maximizing throughput in wireless networks. In 8th IEEE International Conference on Wireless and Optical Communications Networks (WOCN 2011). 1--5.
[40]
Cong Liu, Jie Wu, Xin Guan, and Li Chen. 2011. Cooperative file sharing in hybrid delay tolerant networks. In Proceedings of the 2011 31st International Conference on Distributed Computing Systems Workshops (ICDCSW 2011). Washington, DC, USA, 339--344.
[41]
Pei Liu, Zhifeng Tao, Sathya Narayanan, Thanasis Korakis, and Shivendra S. Panwar. 2007. CoopMAC: A cooperative MAC for wireless LANs. IEEE J. Select. Areas. Commun. 25, 2 (2007), 340--354. http://dblp.uni-trier.de/db/journals/jsac/jsac25.html#LiuTNKP07.
[42]
Yuting Luo and R. Deters. 2009. Using cooperation to improve the experience of mobile web services consumers. In IEEE Asia-Pacific Services Computing Conference (APSCC 2009). 213--218.
[43]
N. Magaia, P. Rogerio Pereira, and M. P. Correia. 2013. Selfish and malicious behavior in delay-tolerant networks. In Future Network and Mobile Summit (FutureNetworkSummit), 2013. 1--10.
[44]
Pietro Michiardi and Refik Molva. 2002. Core: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Proceedings of the IFIP TC6/TC11 Sixth Joint Working Conference on Communications and Multimedia Security: Advanced Communications and Multimedia Security. Kluwer, B.V., 107--121.
[45]
T. Mshvidobadze. 2012. Evolution mobile wireless communication and LTE networks. In 6th International Conference on Application of Information and Communication Technologies (AICT 2012). 1--7.
[46]
Patrick Murphy, Ashutosh Sabharwal, and Behnaam Aazhang. 2009. On building a cooperative communication system: Testbed implementation and first results. EURASIP J. Wireless Commun. Netw. 2009, Article 7 (2009), 9 pages.
[47]
N. Patwari, J. N. Ash, S. Kyperountas, A. O. Hero, R. L. Moses, and N. S. Correal. 2005. Locating the nodes: Cooperative localization in wireless sensor networks. IEEE Sign. Process. Mag. 22, 4 (July 2005), 54--69.
[48]
J. M. Pozo, O. Trullols, J. M. Barcelo, and J. G. Vidal. 2008. A cooperative ARQ for delay-tolerant vehicular networks. In 28th International Conference on Distributed Computing Systems Workshops (ICDCS 2008). 192--197.
[49]
K. Raeburn. 2005. Advanced Encryption Standard (AES) Encryption for Kerberos 5. RFC 3962 (Proposed Standard). (February 2005). http://www.ietf.org/rfc/rfc3962.txt.
[50]
D. Raychaudhuri and Narayan B. Mandayam. 2012. Frontiers of wireless and mobile communications. Proc. IEEE 100, 4 (April 2012), 824--840.
[51]
R. Rivest. 1992. The MD5 Message-Digest Algorithm. (1992).
[52]
Lawrence A. Rowe. 2013. Looking forward 10 years to multimedia successes. ACM Trans. Multimed. Comput. Commun. Appl. 9, 1, Article 37 (Oct. 2013), 7 pages.
[53]
C. Sammarco, F. H. P. Fitzek, G. P. Perrucci, A. Iera, and A. Molinaro. 2008. Localization information retrieval exploiting cooperation among mobile devices. In IEEE International Conference on Communications Workshops (ICC Workshops 2008). 149--153.
[54]
Haiying Shen and Ze Li. 2012. Game-theoretic analysis of cooperation incentive strategies in mobile ad hoc networks. IEEE Trans. Mobile Comput. 11, 8 (2012), 1287--1303.
[55]
Yuan Shen, Henk Wymeersch, and Moe Z. Win. 2010. Fundamental limits of wideband localization - Part II: Cooperative networks. Computing Research Repository abs/1006.0890 (2010).
[56]
U. Shevade, Han Hee Song, Lili Qiu, and Yin Zhang. 2008. Incentive-aware routing in DTNs. In IEEE International Conference on Network Protocols (ICNP 2008). 238--247.
[57]
Bruno M. C. Silva, Joel J. P. C. Rodrigues, Ivo M. C. Lopes, Tiago M.F. Machado, and Liang Zhou. 2013b. A novel cooperation strategy for mobile health applications. IEEE J. Select. Areas Commun. 31, 9 (September 2013), 28--36.
[58]
M. Bruno Silva, JPC Joel Rodrigues, Fábio Canelo, C. Ivo Lopes, and Liang Zhou. 2013a. A data encryption solution for mobile health apps in cooperation environments. J. Med. Internet Res. 15, 4 (25 Apr 2013), e66.
[59]
Vasco N. G. J. Soares and Joel J. P. C. Rodrigues. 2011. Cooperative Networking. Wiley, Chapter Cooperation in DTN-Based Network Architectures, 101--115.
[60]
Shuhuan Wen, Baozhu Hu, Ahmad B. Rad, Xinbin Li, Huibin Lu, and Jianhua Zhang. 2012. Robust nash dynamic game strategy for user cooperation energy efficiency in wireless cellular networks. Math. Probl. Eng. 2012 (2012).
[61]
M. Z. Win, A. Conti, S. Mazuelas, Yuan Shen, W. M. Gifford, D. Dardari, and M. Chiani. 2011. Network localization and navigation via cooperation. IEEE Commun. Mag. 49, 5 (May 2011), 56--62.
[62]
H. Wymeersch, J. Lien, and M. Z. Win. 2009. Cooperative localization in wireless networks. Proc. IEEE 97, 2 (Feb 2009), 427--450.
[63]
Lei Yin, Hui mei Lu, Yuan-Da Cao, and Jian min Gao. 2010. Cooperation in delay tolerant networks. In 2nd International Conference on Signal Processing Systems (ICSPS 2010), Vol. 1. V1--202--V1--205.
[64]
Jong-Woon Yoo and Kyu Ho Park. 2011. A cooperative clustering protocol for energy saving of mobile devices with WLAN and bluetooth interfaces. IEEE Trans. Mobile Comput. 10, 4 (April 2011), 491--504.
[65]
Per Zetterberg, Christos Mavrokefalidis, Aris S. Lalos, and Emmanouil Matigakis. 2009. Experimental investigation of cooperative schemes on a real-time DSP-based testbed. EURASIP J. Wireless Commun. Netw. 2009 (2009).
[66]
S. Zhong, J. Chen, and Y. R. Yang. 2003. Sprite: A simple, cheat-proof, credit-based system for mobile ad-hoc networks. In IEEE Societies 22nd Annual Joint Conference of the IEEE Computer and Communications (INFOCOM 2003), Vol. 3. 1987--1997 vol.3.

Cited By

View all
  • (2023)Green Requirement Engineering: Towards Sustainable Mobile Application Development and Internet of ThingsSustainability10.3390/su1509756915:9(7569)Online publication date: 5-May-2023
  • (2022)LA Novel Proposal of Cooperation and Reputation Mechanisms for IoT-based Tourism Solutions2022 IEEE 2nd IoT Vertical and Topical Summit for Tourism (IoTT)10.1109/IoTT56174.2022.9925903(1-6)Online publication date: 20-Sep-2022
  • (2021)EigenCloud: A Cooperation and Trust-Aware Dependable Cloud File-Sharing NetworkIEEE Transactions on Computational Social Systems10.1109/TCSS.2020.30473808:2(522-536)Online publication date: Apr-2021
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Multimedia Computing, Communications, and Applications
ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 12, Issue 4
August 2016
219 pages
ISSN:1551-6857
EISSN:1551-6865
DOI:10.1145/2983297
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 24 August 2016
Accepted: 01 April 2016
Revised: 01 April 2016
Received: 01 June 2015
Published in TOMM Volume 12, Issue 4

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Mobile computing
  2. cooperation
  3. incentive-based cooperation
  4. mobile applications
  5. reputation-based cooperation

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)15
  • Downloads (Last 6 weeks)3
Reflects downloads up to 13 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Green Requirement Engineering: Towards Sustainable Mobile Application Development and Internet of ThingsSustainability10.3390/su1509756915:9(7569)Online publication date: 5-May-2023
  • (2022)LA Novel Proposal of Cooperation and Reputation Mechanisms for IoT-based Tourism Solutions2022 IEEE 2nd IoT Vertical and Topical Summit for Tourism (IoTT)10.1109/IoTT56174.2022.9925903(1-6)Online publication date: 20-Sep-2022
  • (2021)EigenCloud: A Cooperation and Trust-Aware Dependable Cloud File-Sharing NetworkIEEE Transactions on Computational Social Systems10.1109/TCSS.2020.30473808:2(522-536)Online publication date: Apr-2021
  • (2021)Weighted Distance Hyperbolic Prediction-Based Detection Scheme for Non Line Of Sight nodes in VANETsJournal of King Saud University - Computer and Information Sciences10.1016/j.jksuci.2018.04.00133:4(489-496)Online publication date: May-2021
  • (2018)A Cooperative Quality-Aware Service Access System for Social Internet of VehiclesIEEE Internet of Things Journal10.1109/JIOT.2017.27642595:4(2506-2517)Online publication date: Aug-2018
  • (2018)A Survey on Human-Centric Communications in Non-Cooperative Wireless Relay NetworksIEEE Communications Surveys & Tutorials10.1109/COMST.2018.279142820:2(914-944)Online publication date: Oct-2019
  • (2018)Addressing space‐constraint driven selfishness in smart opportunistic environmentInternational Journal of Communication Systems10.1002/dac.376231:14Online publication date: 16-Jul-2018
  • (2017)Efficient wireless mobile networks communications applied to e-health2017 IEEE International Conference on Communications (ICC)10.1109/ICC.2017.7996894(1-6)Online publication date: May-2017
  • (2017)Incentive mechanism for computation offloading using edge computingComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2017.03.015129:P2(399-409)Online publication date: 24-Dec-2017

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media