Browse > Article
http://dx.doi.org/10.14400/JDC.2019.17.1.195

WiCoin : Wireless LAN Sharing Using Block Chain Technology  

Kim, Woo-Seong (Dept. of Computer engineering, Gachon University)
Ryu, Kyoung-Ho (Dept. of Computer engineering, Gachon University)
Park, Yang-Jae (Dept. of Computer engineering, Gachon University)
Publication Information
Journal of Digital Convergence / v.17, no.1, 2019 , pp. 195-201 More about this Journal
Abstract
This paper proposes a blockchain system to share Wireless Local Area Network (WLAN) that recently suffers from mutual interference among increasing devices using unlicensed bands. Blockchain technology can induce cooperation from users by incentivizing them with cryptocurrency like shown in Bitcoin example. In this paper, we describe Blockchain based access mechanism in WLAN instead of conventional authentication based access. Here, users can access any WLAN access point by paying through smart contract while they also receive payment from others. In order to support real-time transaction, we apply proof-of-authority that is realized by Byzantine fault tolerant protocol instead of well-known proof-of-work that requires huge computing power and delay.
Keywords
Blockchain; WLAN; Cryptocurrency; Smart contract; Proof-of-Authority;
Citations & Related Records
연도 인용수 순위
  • Reference
1 K. Ritzberger. (2002). Foundations of non-cooperative game theory. OUP Catalogue.
2 M. Vukolic. (2015, October). The quest for scalable blockchain fabric: Proof-of-work vs. BFT replication. In International Workshop on Open Problems in Network Security (pp. 112-125). Springer, Cham.
3 N. McKeown. (2009). Software-defined networking. INFOCOM keynote talk , 17(2), 30-32.
4 S. Kieran. (2018). Vitalik - Ethereum en route to a million transactions per second. (Online). https://bravenewcoin.com/insights/vitalik-ethereum-en-route-to-a-million-transactions-per-second
5 I. C. Lin & T. C. Liao. (2017). A Survey of Blockchain Security Issues and Challenges. IJ Network Security, 19(5), 653-659.
6 P. Jayachandran. (2017). The difference between public and private blockchain. (Online). https://www.ibm.com/blogs/blockchain/2017/05/the-difference-between-public-and-private-blockchain
7 S. De Angelis, L. Aniello, R. Baldoni, F. Lombardi, A. Margheri & V. Sassone. (2018). PBFT vs proof-of-authority: applying the CAP theorem to permissioned blockchain.
8 A. Raniwala & T. C. Chiueh. (2005, March). Architecture and algorithms for an IEEE 802.11-based multi-channel wireless mesh network. In INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE (Vol. 3, pp. 2223-2234). IEEE.
9 B. Aboba, L. Blunk, J. Vollbrecht, J. Carlson & H. Levkowetz. (2004). Extensible authentication protocol (EAP) (No. RFC 3748).
10 S. Nakamoto. (2008). Bitcoin: A peer-to-peer electronic cash system.
11 M. Swan. (2015). Blockchain: Blueprint for a new economy. O'Reilly Media, Inc.
12 J. Hill. (2001). An analysis of the RADIUS authentication protocol. InfoGard Laboratories.
13 G. N. Purdy. (2004). Linux iptables Pocket Reference: Firewalls, NAT &Accounting . " O'Reilly Media, Inc.".
14 V. Buterin. (2014). A next-generation smart contract and decentralized application platform. white paper.
15 C. Collin. (2016). Using puppeth To Manually Create An Ethereum Proof Of Authority (Clique) Network On AWS. (Online). https://medium.com/@collin.cusce/using-puppeth-to-manually-create-an-ethereum-proof-of-authority-clique-network-on-aws-ae0d7c906cce