BarterRoam: A Novel Mobile and Wireless Roaming Settlement Model

نویسندگان

  • Eng Keong Lua
  • Alex Lin
  • Jon Crowcroft
  • Valerie Tan
چکیده

This paper describes BarterRoam: a new novel mobile and wireless roaming settlement model and clearance methodology, based on the concept of sharing and bartering excess capacities for usage in Visiting Wireless Internet Service Provider (WISP) coverage areas with Home WISP. The methodology is not limited to WISPs; it is applicable to virtual WISPs and any Value-Added Services in the mobile and wireless access environments. In the Broadband Public Wireless Local Area Network (PWLAN) environments, every WISP provides its own coverage at various locations or Hotspots. The most desirable option to help WISPs to reduce cost in providing wider coverage area is for the Home and Visiting WISPs to collaborate for customer seamless access via bilateral or multilateral agreement and proxy RADIUS authentication [1]. This is termed a roaming agreement. Due to the large number of WISPs desiring to enter the market, the bilateral or multilateral roaming agreements become complex and unmanageable. The traditional settlement model is usually based on customer’s usage plus margin. In the broadband PWLAN environment, most WISPs and customers prefer flat-rated services so that they can budget expenses accordingly. The current settlement model will not be able to handle the preferred flat-rated settlement. Hence, a novel flat-rated settlement model and clearance methodology for wireless network environments is proposed to enable multiple service providers to trade their excess capacities and to minimize cash outflow among the service providers via barter trade mode. We are unaware of other comparative work in this area.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

One-Pass Key Establishment Protocol for Wireless Roaming with User Anonymity

Key Establishment for Wireless Roaming (KE-WR) is expected to ensure a mobile user to establish a fresh session key with a foreign WSP and also roam from one foreign network domain to another while enjoying the roaming services. However, so far there is no ID-based KE-WR protocol proposed in the literatures with a formal security proof in an appropriate model. The main work of this article addr...

متن کامل

A Secure Mutual Authentication Protocol for Roaming in Wireless Mesh Networks

Roaming in wireless mesh networks (WMNs) requires that mobile nodes complete access authentication fast while protecting the identities of mobile nodes. In this paper, after analyzing some current authentication protocols for roaming in wireless mesh networks, we propose a new protocol based on multi-signature and three-party key agreement with a zone-based hierarchical network topology and pro...

متن کامل

Representing a Model for Improving Connectivity and Power Dissipation in Wireless Networks Using Mobile Sensors

Wireless sensor networks are often located in areas where access to them is difficult or dangerous. Today, in wireless sensor networks, cluster-based routing protocols by dividing sensor nodes into distinct clusters and selecting local head-clusters to combine and send information of each cluster to the base station and balanced energy consumption by network nodes, get the best performance ...

متن کامل

A novel localised authentication scheme in IEEE 802.11 based Wireless Mesh Networks

In the paper, we propose an efficient two-factor localised authentication scheme for inter-domain handover and roaming in IEEE 802.11 based service-oriented wireless mesh networks (WMNs). Some important aspects, such as resource-constraint Mobile Stations (MSs) and the ping-pong movement phenomenon when handover roaming across different hotspots occurs, are considered. An analytic model is deve...

متن کامل

A Novel Mobile Communications Authentication Scheme with Roaming Service and User Anonymity

Many novel, effective, and efficient applications and networking services are being developed for the Social Internet of Things. Recently, Li proposed a more secure and efficient authentication scheme with roaming service and user anonymity for mobile communications. The security analysis and discussion of the agreement phase is sufficiently safe; however, an attacker can intercept the identity...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004