{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:45:03Z","timestamp":1767339903266,"version":"3.41.0"},"reference-count":55,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2023,1,16]],"date-time":"2023-01-16T00:00:00Z","timestamp":1673827200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"German ministry of education and research"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Manage. Inf. Syst."],"published-print":{"date-parts":[[2023,3,31]]},"abstract":"<jats:p>Enabling Internet access while taking load of mobile networks, the concept of Wi-Fi sharing holds much potential. While trust-based concepts require a trusted intermediary and cannot prevent malicious behavior, for example, conducted through fake profiles, security-based approaches lack adequate accounting mechanisms and coverage. Against this backdrop, we develop a Wi-Fi sharing architecture based on blockchain technology and payment channel networks. Our contribution is twofold: First, we present a comprehensive collection of design principles for workable Wi-Fi sharing networks. Second, we propose and evaluate a reference architecture that augments current approaches with adequate accounting mechanisms and facilitates performance, scalability, security, and participant satisfaction.<\/jats:p>","DOI":"10.1145\/3529097","type":"journal-article","created":{"date-parts":[[2022,4,19]],"date-time":"2022-04-19T12:37:25Z","timestamp":1650371845000},"page":"1-24","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["An Architecture Using Payment Channel Networks for Blockchain-based Wi-Fi Sharing"],"prefix":"10.1145","volume":"14","author":[{"given":"Christian","family":"Janiesch","sequence":"first","affiliation":[{"name":"TU Dortmund University, Dortmund, Germany"}]},{"given":"Marcus","family":"Fischer","sequence":"additional","affiliation":[{"name":"InnoBrain GmbH, W\u00fcrzburg, Germany"}]},{"given":"Florian","family":"Imgrund","sequence":"additional","affiliation":[{"name":"InnoBrain GmbH, W\u00fcrzburg, Germany"}]},{"given":"Adrian","family":"Hofmann","sequence":"additional","affiliation":[{"name":"University of W\u00fcrzburg, W\u00fcrzburg, Germany"}]},{"given":"Axel","family":"Winkelmann","sequence":"additional","affiliation":[{"name":"University of W\u00fcrzburg, W\u00fcrzburg, Germany"}]}],"member":"320","published-online":{"date-parts":[[2023,1,16]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"crossref","unstructured":"G. Camponovo and D. Cerutti. 2005. WLAN communities and internet access sharing: A regulatory overview. In International Conference on Mobile Business (ICMB) . 281\u2013287.","DOI":"10.1109\/ICMB.2005.118"},{"key":"e_1_3_1_3_2","doi-asserted-by":"crossref","unstructured":"P. A. Frangoudis G. C. Polyzos and V. P. Kemerlis. 2011. Wireless community networks: An alternative approach for nomadic broadband network access. IEEE Communications Magazine 49 5 (2011) 206\u2013213.","DOI":"10.1109\/MCOM.2011.5762819"},{"key":"e_1_3_1_4_2","doi-asserted-by":"crossref","unstructured":"Z. Cao J. Fitschen and P. Papadimitriou. 2015. Social Wi-Fi: Hotspot sharing with online friends. In 2015 IEEE 26th Annual International Symposium on Personal Indoor and Mobile Radio Communications (PIMRC) . Hong Kong China 2132\u20132137.","DOI":"10.1109\/PIMRC.2015.7343650"},{"key":"e_1_3_1_5_2","doi-asserted-by":"crossref","unstructured":"S. Dimatteo P. Hui B. Han and V. O. K. Li. 2011. Cellular traffic offloading through WiFi networks. In Eighth International Conference on Mobile Ad-Hoc and Sensor Systems . Valencia Spain 192\u2013201.","DOI":"10.1109\/MASS.2011.26"},{"key":"e_1_3_1_6_2","doi-asserted-by":"crossref","unstructured":"D. Leroy G. Detal J. Cathalo M. Manulis F. Koeune and O. Bonaventure. 2011. SWISH: Secure WiFi sharing. Computer Networks 55 7 (2011) 1614\u20131630.","DOI":"10.1016\/j.comnet.2011.01.012"},{"key":"e_1_3_1_7_2","doi-asserted-by":"crossref","unstructured":"F. Shi Z. Qin and J. A. McCann. 2017. OPPay: Design and implementation of a payment system for opportunistic data services. In 37th International Conference on Distributed Computing Systems (ICDCS) . Atlanta GA USA 1618\u20131628.","DOI":"10.1109\/ICDCS.2017.21"},{"key":"e_1_3_1_8_2","doi-asserted-by":"crossref","unstructured":"L. Mamatas I. Psaras and G. Pavlou. 2010. Incentives and algorithms for broadband access sharing. ACM SIGCOMM Workshop on Home Networks . New Delhi India. ACM 19\u201324.","DOI":"10.1145\/1851307.1851312"},{"key":"e_1_3_1_9_2","unstructured":"R. Beck J. S. Czepluch N. Lollike and S. Malone. 2016. Blockchain: The gateway to trust-free cryptographic transactions. In 30th European Conference on Information Systems . Istanbul Turkey 1\u201314."},{"key":"e_1_3_1_10_2","unstructured":"S. Nakamoto. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System 2008. https:\/\/bitcoin.org\/bitcoin.pdf."},{"key":"e_1_3_1_11_2","doi-asserted-by":"crossref","unstructured":"R. Alt. 2018. Electronic markets and current general research. Electronic Markets 28 2 (2018) 123\u2013128.","DOI":"10.1007\/s12525-018-0299-0"},{"key":"e_1_3_1_12_2","unstructured":"B. Gipp N. Meuschke and A. Gernandt. 2015. Trusted timestamping using the crypto currency Bitcoin. In iConference . Newport Beach CA USA 1\u20136."},{"key":"e_1_3_1_13_2","doi-asserted-by":"crossref","unstructured":"F. Tschorsch and B. Scheuermann. 2016. Bitcoin and beyond: A technical survey on decentralized digital currencies. IEEE Communications Surveys & Tutorials 18 3 (2016) 2084\u20132123.","DOI":"10.1109\/COMST.2016.2535718"},{"key":"e_1_3_1_14_2","doi-asserted-by":"crossref","unstructured":"K. Fanning and D. P. Centers. 2016. Blockchain and its coming impact on financial services. Journal of Corporate Accounting & Finance 27 5 (2016) 53\u201357.","DOI":"10.1002\/jcaf.22179"},{"key":"e_1_3_1_15_2","doi-asserted-by":"crossref","unstructured":"J. J. Sikorski J. Haughton and M. Kraft. 2017. Blockchain technology in the chemical industry: Machine-to-machine electricity market. Applied Energy 195 (2017) 234\u2013246.","DOI":"10.1016\/j.apenergy.2017.03.039"},{"key":"e_1_3_1_16_2","doi-asserted-by":"crossref","unstructured":"P. Rogaway and T. Shrimpton. 2004. Cryptographic hash-function basics: Definitions implications and separations for preimage resistance second-preimage resistance and collision resistance. International Workshop on Fast Software Encryption . Delhi India 371\u2013388.","DOI":"10.1007\/978-3-540-25937-4_24"},{"key":"e_1_3_1_17_2","doi-asserted-by":"crossref","unstructured":"M. Risius and K. Spohrer. 2017. A blockchain research framework. Business & Information Systems Engineering 59 6 (2017) 385\u2013409.","DOI":"10.1007\/s12599-017-0506-0"},{"key":"e_1_3_1_18_2","doi-asserted-by":"crossref","unstructured":"R. Beck and C. M\u00fcller-Bloch. 2017. Blockchain as radical innovation: A framework for engaging with distributed ledgers as incumbent organization. 50th Hawaii International Conference on System Sciences . Hawaii HI USA.","DOI":"10.24251\/HICSS.2017.653"},{"key":"e_1_3_1_19_2","doi-asserted-by":"crossref","unstructured":"J. Yli-Huumo D. Ko S. Choi S. Park and K. Smolander. 2016. Where is current research on blockchain technology?\u2014A systematic review. PLOS ONE 11 10 (2016) 1\u201327.","DOI":"10.1371\/journal.pone.0163477"},{"key":"e_1_3_1_20_2","unstructured":"M. Swan. 2015. Blockchain: Blueprint for a New Economy . O'Reilly Media Inc. Beijing China."},{"key":"e_1_3_1_21_2","doi-asserted-by":"crossref","unstructured":"J. Derks J. Gordijn and A. Siegmann. 2016. From chaining blocks to breaking even: A study on the profitability of Bitcoin mining from 2012 to 2016. Electronic Markets 28 3 (2018) 321\u2013338.","DOI":"10.1007\/s12525-018-0308-3"},{"key":"e_1_3_1_22_2","doi-asserted-by":"crossref","unstructured":"A. Beikverdi and J. Song. 2015. Trend of centralization in Bitcoin's distributed network. In 16th International Conference on Software Engineering Artificial Intelligence Networking and Parallel\/Distributed Computing (SNPD) . Takamatsu Japan 1\u20136.","DOI":"10.1109\/SNPD.2015.7176229"},{"key":"e_1_3_1_23_2","doi-asserted-by":"crossref","unstructured":"C.-T. Li C.-Y. Weng C.-C. Lee and C.-C. Wang. 2015. A hash based remote user authentication and authenticated key agreement scheme for the integrated EPR information system. Journal of Medical Systems 39 11 (2015) 144.","DOI":"10.1007\/s10916-015-0322-3"},{"key":"e_1_3_1_24_2","doi-asserted-by":"crossref","unstructured":"M. Bellare C. Namprempre and G. Neven. 2009. Security proofs for identity-based identification and signature schemes. Journal of Cryptology 22 1 (2009) 1\u201361.","DOI":"10.1007\/s00145-008-9028-8"},{"key":"e_1_3_1_25_2","doi-asserted-by":"crossref","unstructured":"S. Ahangama and D. C. C. Poo. 2016. Credibility of algorithm based decentralized computer networks governing personal finances: The case of cryptocurrency. In International Conference on HCI in Business Government and Organizations . Springer Cham 165\u2013176.","DOI":"10.1007\/978-3-319-39396-4_15"},{"key":"e_1_3_1_26_2","unstructured":"M. Avital R. Beck J. King M. Rossi and R. Teigland. 2016. Jumping on the Blockchain bandwagon: Lessons of the past and outlook to the future. International Conference on Information Systems . Dublin Ireland 1\u20136."},{"key":"e_1_3_1_27_2","doi-asserted-by":"crossref","unstructured":"G. Malavolta P. Moreno-Sanchez A. Kate M. Maffei and S. Ravi. 2017. Concurrency and privacy with payment-channel networks. ACM SIGSAC Conference on Computer and Communications Security . Dallas TX USA ACM 455\u2013471.","DOI":"10.1145\/3133956.3134096"},{"key":"e_1_3_1_28_2","doi-asserted-by":"crossref","unstructured":"E. Rohrer J.-F. La\u00df and F. Tschorsch. 2017. Towards a concurrent and distributed route selection for payment channel networks. In European Symposium on Research in Computer Security . Springer Cham 411\u2013419.","DOI":"10.1007\/978-3-319-67816-0_23"},{"key":"e_1_3_1_29_2","doi-asserted-by":"crossref","unstructured":"C. Decker and R. Wattenhofer. 2015. A fast and scalable payment network with Bitcoin duplex micropayment channels. In Symposium on Self-Stabilizing Systems . Springer International Publishing Cham 3\u201318.","DOI":"10.1007\/978-3-319-21741-3_1"},{"key":"e_1_3_1_30_2","unstructured":"J. Poon and T. Dryja. 2016. The Bitcoin Lightning Network: Scalable Off-chain Instant Payments. Draft Version 0.592 . 2016. https:\/\/lightning.network\/lightning-network-paper.pdf."},{"key":"e_1_3_1_31_2","doi-asserted-by":"crossref","unstructured":"P. McCorry M. M\u00f6ser S. F. Shahandasti and F. Hao. 2016. Towards Bitcoin payment networks. In Australasian Conference on Information Security and Privacy . Springer Bisbane Australia 57\u201376.","DOI":"10.1007\/978-3-319-40253-6_4"},{"key":"e_1_3_1_32_2","doi-asserted-by":"crossref","unstructured":"K. Peffers T. Tuunanen M. A. Rothenberger and S. Chatterjee. 2007. A design science research methodology for information systems research. Journal of Management Information Systems 24 3 (2007) 45\u201377.","DOI":"10.2753\/MIS0742-1222240302"},{"key":"e_1_3_1_33_2","doi-asserted-by":"crossref","unstructured":"A. R. Hevner S. T. March J. Park and S. Ram. 2004. Design science in information systems research. MIS Quarterly 28 1 (2004) 75\u2013105.","DOI":"10.2307\/25148625"},{"key":"e_1_3_1_34_2","doi-asserted-by":"crossref","unstructured":"J. Venable J. Pries-Heje and R. Baskerville. 2012. A comprehensive framework for evaluation in design science research. In International Conference on Design Science Research in Information Systems . Springer Berlin Germany 423\u2013438.","DOI":"10.1007\/978-3-642-29863-9_31"},{"key":"e_1_3_1_35_2","doi-asserted-by":"crossref","unstructured":"J. Venable J. Pries-Heje and R. Baskerville. 2016. FEDS: A framework for evaluation in design science research. European Journal of Information Systems 25 1 (2016) 77\u201389.","DOI":"10.1057\/ejis.2014.36"},{"key":"e_1_3_1_36_2","doi-asserted-by":"crossref","unstructured":"L. Chandra S. Seidel and S. Gregor. 2015. Prescriptive knowledge in IS research: Conceptualizing design principles in terms of materiality action and boundary conditions. In 48th Hawaii International Conference on System Sciences . Kauai HI USA 4039\u20134048.","DOI":"10.1109\/HICSS.2015.485"},{"key":"e_1_3_1_37_2","doi-asserted-by":"crossref","unstructured":"R. N. Clarke. 2014. Expanding mobile wireless capacity: The challenges presented by technology and economics. Telecommunications Policy 38 8 (2014) 693\u2013708.","DOI":"10.1016\/j.telpol.2013.11.006"},{"key":"e_1_3_1_38_2","unstructured":"Cisco. 2017. Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update 2016\u20132021 White Paper . 2017. https:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/service-provider\/visual-networking-index-vni\/mobile-white-paper-c11-520862.pdf."},{"key":"e_1_3_1_39_2","doi-asserted-by":"crossref","unstructured":"A. Khan W. Kellerer K. Kozu and M. Yabusaki. 2011. Network sharing in the next mobile network: TCO reduction management flexibility and operational independence. IEEE Communications Magazine 49 10 (2011) 134\u2013142.","DOI":"10.1109\/MCOM.2011.6035827"},{"key":"e_1_3_1_40_2","doi-asserted-by":"crossref","unstructured":"M. Seufert V. Burger and T. Ho\u00dffeld. 2013. HORST - Home router sharing based on trust. In 9th International Conference on Network and Service Management (CNSM'13) . Zurich Switzerland 402\u2013405.","DOI":"10.1109\/CNSM.2013.6727865"},{"key":"e_1_3_1_41_2","unstructured":"N. Sastry J. Crowcroft and K. R. Sollins. 2007. Architecting citywide ubiquitous Wi-Fi access. In ACM Workshops on HotNets-VI . 1\u20137."},{"key":"e_1_3_1_42_2","doi-asserted-by":"crossref","unstructured":"C. B. Lafuente X. Titi and J. M. Seigneur. 2011. Flexible communication: A secure and trust-based free Wi-Fi password sharing service. In 10th International Conference on Trust Security and Privacy in Computing and Communications . Changsha China 706\u2013713.","DOI":"10.1109\/TrustCom.2011.91"},{"key":"e_1_3_1_43_2","doi-asserted-by":"crossref","unstructured":"P. Vidales A. Manecke and M. Solarski. 2009. Metropolitan public WiFi access based on broadband sharing. In Mexican International Conference on Computer Science . IEEE Mexico City Mexico 146\u2013151.","DOI":"10.1109\/ENC.2009.22"},{"key":"e_1_3_1_44_2","doi-asserted-by":"crossref","unstructured":"E. Y. Daraghmi and S.-M. Yuan. 2014. We are so close less than 4 degrees separating you and me! Computers in Human Behavior 30 (2014) 273\u2013285.","DOI":"10.1016\/j.chb.2013.09.014"},{"key":"e_1_3_1_45_2","doi-asserted-by":"crossref","unstructured":"D. Tr\u010dek. 2018. Computational trust and reputation management. Trust and Reputation Management Systems: An e-Business Perspective . Springer Cham 21\u201354.","DOI":"10.1007\/978-3-319-62374-0_3"},{"key":"e_1_3_1_46_2","doi-asserted-by":"crossref","unstructured":"K. Lakshminarayanan and V. N. Padmanabhan. 2003. Some findings on the network performance of broadband hosts. 3rd ACM SIGCOMM Conference on Internet Measurement . Miami Beach FL USA ACM 45\u201350.","DOI":"10.1145\/948205.948212"},{"key":"e_1_3_1_47_2","unstructured":"B. Notheisen F. Hawlitschek and C. Weinhardt. 2017. Breaking down the Blockchain hype: Towards a Blockchain market engineering approach. 25th European Conference on Information Systems . Guimar\u00e3es Portugal 1062\u20131080."},{"key":"e_1_3_1_48_2","doi-asserted-by":"crossref","unstructured":"A. Hofmann. 2020. Building scalable Blockchain applications: A decision process. In 15th International Conference on Design Science Research in Information Systems and Technology. Lecture Notes in Computer Science Vol. 12388. Kristiansand Norway Springer 309\u2013320.","DOI":"10.1007\/978-3-030-64823-7_28"},{"key":"e_1_3_1_49_2","doi-asserted-by":"crossref","unstructured":"S. Mercan E. Erdin and K. Akkaya. 2021. Improving transaction success rate in cryptocurrency payment channel networks. Computer Communications 166 (2021) 196\u2013207.","DOI":"10.1016\/j.comcom.2020.12.009"},{"key":"e_1_3_1_50_2","doi-asserted-by":"crossref","unstructured":"E. Erdin S. Mercan and K. Akkaya. 2021. An evaluation of cryptocurrency payment channel networks and their privacy implications. ITU Journal on Future and Evolving Technologies 2 1 (2021) 1\u201310.","DOI":"10.52953\/CLBL7402"},{"key":"e_1_3_1_51_2","doi-asserted-by":"crossref","unstructured":"U. Gretzel M. Sigala Z. Xiang and C. Koo. 2015. Smart tourism: Foundations and developments. Electronic Markets 25 3 (2015) 179\u2013188.","DOI":"10.1007\/s12525-015-0196-8"},{"key":"e_1_3_1_52_2","doi-asserted-by":"crossref","unstructured":"N. Singhal M. K. Sharma S. S. Samant P. Goswami and Y. A. Reddy. 2020. Smart KYC using Blockchain and IPFS. V. K. Gunjan S. Senatore A. Kumar X.-Z. Gao and S. Merugu (Eds.) Advances in Cybernetics Cognition and Machine Learning for Communication Technologies. Lecture Notes in Electrical Engineering Vol. 643. Springer Berlin Germany 77\u201384.","DOI":"10.1007\/978-981-15-3125-5_9"},{"key":"e_1_3_1_53_2","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2006.30"},{"key":"e_1_3_1_54_2","doi-asserted-by":"crossref","unstructured":"C. Janiesch C. Rosenkranz and U. Scholten. 2020. An information systems design theory for service network effects. Journal of the Association for Information Systems 21 6 (2020) 1402\u20131460.","DOI":"10.17705\/1jais.00642"},{"key":"e_1_3_1_55_2","doi-asserted-by":"crossref","unstructured":"J. Recker M. Rosemann P. Green and M. Indulska. 2011. Do ontological deficiencies in modeling grammars matter? MIS Quarterly 35 1 (2011) 57\u201379.","DOI":"10.2307\/23043489"},{"key":"e_1_3_1_56_2","first-page":"777","volume-title":"17th USENIX Symposium on Networked Systems Design and Implementation (NSDI)","author":"Sivaraman V.","year":"2020","unstructured":"V. Sivaraman, S. B. Venkatakrishnan, K. Ruan, P. Negi, L. Yang, R. Mittal, G. Fanti, and M. Alizadeh. 2020. High throughput cryptocurrency routing in payment channel networks. 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI). Santa Clara, CA, USA, 777\u2013796."}],"container-title":["ACM Transactions on Management Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3529097","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3529097","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:25Z","timestamp":1750182685000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3529097"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,16]]},"references-count":55,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,3,31]]}},"alternative-id":["10.1145\/3529097"],"URL":"https:\/\/doi.org\/10.1145\/3529097","relation":{},"ISSN":["2158-656X","2158-6578"],"issn-type":[{"type":"print","value":"2158-656X"},{"type":"electronic","value":"2158-6578"}],"subject":[],"published":{"date-parts":[[2023,1,16]]},"assertion":[{"value":"2020-04-08","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-03-24","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-01-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}