Context-adaptive forwarding in mobile opportunistic networks

被引:3
作者
Ciobanu, Radu-Ioan [1 ]
Gutierrez Reina, Daniel [2 ]
Dobre, Ciprian [3 ]
Toral, Sergio L. [4 ]
机构
[1] Univ Politehn Bucuresti, Fac Automat Control & Comp, Bucharest, Romania
[2] Loyola Andalucia Univ, Energia Solar Edificio E, Seville 41014, Spain
[3] Natl Inst Res & Dev Informat, Bucharest, Romania
[4] Univ Seville, Ave Camino Descubrimientos, Seville 41092, Spain
关键词
Opportunistic; Networking; Dynamic; Mobile; Social; TOLERANT; DESIGN;
D O I
10.1007/s12243-018-0654-3
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
When two opportunistic network peers encounter, utility functions are generally employed to select the messages that have to be exchanged, with the purpose of maximizing message delivery probability and reduce congestion. These functions compute weighted sums of various parameters, like centrality, similarity, and trust. Most of the existing solutions statically compute the weights based on offline observations and apply the same values regardless of a node's context. However, mobile networks are not necessarily constant in terms of behavior and characteristics, so the classic approach might not be suitable. The network might be split into sub-networks, which behave differently from each other. Thus, in this paper, we show that, by dynamically adjusting the behavior of a node based on its context, through the adjustment of the utility function on the fly, the opportunistic forwarding process can be improved. We show that nodes behave differently from each other and have different views of the network. Through real-life trace-based simulations, we prove that our solution is feasible and is able to improve an opportunistic network's performance from the standpoint of hit rate, latency, and delivery cost.
引用
收藏
页码:559 / 575
页数:17
相关论文
共 17 条
[1]  
[Anonymous], 2000, TECHNICAL REPORT
[2]   HCMM: Modelling spatial and temporal properties of human mobility driven by users' social relationships [J].
Boldrini, Chiara ;
Passarella, Andrea .
COMPUTER COMMUNICATIONS, 2010, 33 (09) :1056-1074
[3]   JDER: A history-based forwarding scheme for delay tolerant networks using Jaccard distance and encountered ration [J].
Ciobanu, R. I. ;
Reina, D. G. ;
Dobre, C. ;
Toral, S. L. ;
Johnson, P. .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2014, 40 :279-291
[4]  
Ciobanu RL, 2017, PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS CONTEL 2017, P83, DOI 10.23919/ConTEL.2017.8000043
[5]  
Daly E, 2007, MOBIHOC'07: PROCEEDINGS OF THE EIGHTH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING, P32
[6]   Energy-Efficient Contact Detection Model in Mobile Opportunistic Networks [J].
Dou, Yueyue ;
Zeng, Feng ;
Li, Wenjia .
WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2017, 2017, 10251 :60-70
[7]   Design and implementation of the KioskNet system [J].
Guo, S. ;
Derakhshani, M. ;
Falaki, M. H. ;
Ismail, U. ;
Luk, R. ;
Oliver, E. A. ;
Rahman, S. Ur ;
Seth, A. ;
Zaharia, M. A. ;
Keshav, S. .
COMPUTER NETWORKS, 2011, 55 (01) :264-281
[8]   BUBBLE Rap: Social-based Forwarding in Delay Tolerant Networks [J].
Hui, Pan ;
Crowcroft, Jon ;
Yoneki, Eiko .
MOBIHOC'08: PROCEEDINGS OF THE NINTH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING, 2008, :241-250
[9]   Energy-efficient computing for wildlife tracking: Design tradeoffs and early experiences with ZebraNet [J].
Juang, P ;
Oki, H ;
Wang, Y ;
Martonosi, M ;
Peh, LS ;
Rubenstein, D .
ACM SIGPLAN NOTICES, 2002, 37 (10) :96-107
[10]   Disruption-Tolerant Networking: A Comprehensive Survey on Recent Developments and Persisting Challenges [J].
Khabbaz, Maurice J. ;
Assi, Chadi M. ;
Fawaz, Wissam F. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2012, 14 (02) :607-640