Crossing the Chasm with Ad hoc Networks - The Provider-mediated Communication Paradigm
Key: KWH+06-1
Author: Tronje Krop, Jörg Widmer, Matthias Hollick, Christian Prehofer, Ralf Steinmetz
Date: May 2006
Kind: @misc
Book title: Seventh ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc 2006)
Abstract: Ad hoc networks have attracted remarkable attention in the research community in recent years. Fashioned from whatever devices are immediately available, the self-organizing nature of ad hoc networks promises spontaneous communication in absence of infrastructure. Ad hoc networks have yet to deliver the high dependability, e.g., trustworthiness and predictability, of traditional (mobile) communication networks. We propose the provider-mediated communication paradigm to address these challenges. The mediation is achieved by means of an overlay network, which is established between nodes subscribed to a service provider, so-called provider nodes. Since such nodes are under control of the service provider, the overlay can be regarded as trustworthy. The implications reach far beyond augmenting cellular networks by multihop capabilities. Many hard problems for ad hoc networks can be significantly simplified if a set of trusted nodes is known in advance. This applies in particular to network monitoring, trust management, network security, and robustness in the presence of faulty or malicious nodes. In this poster we give an overview of the proposed over-lay architecture and provide initial results how it can be used to improve routing performance.

The documents distributed by this server have been provided by the contributing authors as a means to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, not withstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder.