Home

About

Advanced Search

Browse by Discipline

Scientific Societies

E-print Alerts

Add E-prints

E-print Network
FAQHELPSITE MAPCONTACT US


  Advanced Search  

 
Proceedings of the 2007 IEEE Workshop on Information Assurance
 

Summary: Proceedings of the 2007 IEEE
Workshop on Information Assurance
United States Military Academy, West Point, NY, 20-22 June 2007
SWAP: Shared Wireless Access Protocol (using Reciprocity)
Matthew W. Dunlop, Ginger Perng, David G. Andersen
Abstract-- Wireless access points are becoming more and more promi-
nent in the home, yet there is no incentive to encourage access point owners
to share their service. We introduce SWAP, a lightweight protocol that uses
reciprocity to motivate users to share service. Each node participating in
SWAP stores perishable receipts that are used to calculate a user's rating
(how much the user shares his or her access point). SWAP does not use a
centralized authority to store or validate receipts nor does it place an exces-
sive burden on peers. SWAP is also robust against collusion, which we show
through analysis and implementation. As demonstrated by an implementa-
tion of the most computationally expensive portions of the protocol, SWAP
imposes little overhead even on mobile devices.
Keywords--Community Wireless, Reciprocity, Wireless Security
I. INTRODUCTION
Recent years have seen an explosion in the use of wireless
networking technology. Unfortunately, while city-wide wire-

  

Source: Andersen, Dave - School of Computer Science, Carnegie Mellon University

 

Collections: Computer Technologies and Information Sciences