703 research outputs found

    In Vivo Evaluation of the Secure Opportunistic Schemes Middleware using a Delay Tolerant Social Network

    Full text link
    Over the past decade, online social networks (OSNs) such as Twitter and Facebook have thrived and experienced rapid growth to over 1 billion users. A major evolution would be to leverage the characteristics of OSNs to evaluate the effectiveness of the many routing schemes developed by the research community in real-world scenarios. In this paper, we showcase the Secure Opportunistic Schemes (SOS) middleware which allows different routing schemes to be easily implemented relieving the burden of security and connection establishment. The feasibility of creating a delay tolerant social network is demonstrated by using SOS to power AlleyOop Social, a secure delay tolerant networking research platform that serves as a real-life mobile social networking application for iOS devices. SOS and AlleyOop Social allow users to interact, publish messages, and discover others that share common interests in an intermittent network using Bluetooth, peer-to-peer WiFi, and infrastructure WiFi.Comment: 6 pages, 4 figures, accepted in ICDCS 2017. arXiv admin note: text overlap with arXiv:1702.0565

    Socially aware integrated centralized infrastructure and opportunistic networking: a powerful content dissemination catalyst

    No full text
    The classic centralized infrastructure (CI) exhibits low efficiency in disseminating the content of common interest across its requesters. In order to overcome the limitations of CI-based content dissemination, smart mobile devices are capable of activating direct opportunistic communications among mobile users, which returns in integrated cellular and opportunistic networks. During the content dissemination process, the social characteristics of multiple users, including their common interest in the content, their mobility patterns, their social ties, and their altruistic forwarding behaviors, should be carefully considered in order to design an efficient content dissemination scheme. We demonstrate that the integrated network-based content dissemination scheme outperforms its CI-based counterpart in terms of both content delivery ratio and its various energy and delay metrics. Furthermore, the opportunistic network is capable of offloading a large fraction of tele-traffic from the overloaded CI-based network

    Delay Tolerant Networking over the Metropolitan Public Transportation

    Get PDF
    We discuss MDTN: a delay tolerant application platform built on top of the Public Transportation System (PTS) and able to provide service access while exploiting opportunistic connectivity. Our solution adopts a carrier-based approach where buses act as data collectors for user requests requiring Internet access. Simulations based on real maps and PTS routes with state-of-the-art routing protocols demonstrate that MDTN represents a viable solution for elastic nonreal-time service delivery. Nevertheless, performance indexes of the considered routing policies show that there is no golden rule for optimal performance and a tailored routing strategy is required for each specific case

    Efficient content delivery through fountain coding in opportunistic information-centric networks

    Get PDF
    Opportunistic networks can increase network capacity, support collaborative downloading of content and offload traffic from a cellular to a cellular-assisted, device-to-device network. They can also support communication and content exchange when the cellular infrastructure is under severe stress and when the network is down or inaccessible. Fountain coding has been considered as espe- cially suitable for lossy networks, providing reliable multicast transport without requiring feedback from receivers. It is also ideal for multi-path and multi- source communication that fits exceptionally well with opportunistic networks. In this paper, we propose a content-centric approach for disseminating con- tent in opportunistic networks efficiently and reliably. Our approach is based on Information-Centric Networking (ICN) and employs fountain coding. When tied together, ICN and fountain coding provide a comprehensive solution that overcomes significant limitations of existing approaches. Extensive network simulations indicate that our approach is viable. Cache hit ratio can be increased by up to five times, while the overall network traffic load is reduced by up to four times compared to content dissemination on top of the standard Named Data Networking architecture

    From MANET to people-centric networking: Milestones and open research challenges

    Get PDF
    In this paper, we discuss the state of the art of (mobile) multi-hop ad hoc networking with the aim to present the current status of the research activities and identify the consolidated research areas, with limited research opportunities, and the hot and emerging research areas for which further research is required. We start by briefly discussing the MANET paradigm, and why the research on MANET protocols is now a cold research topic. Then we analyze the active research areas. Specifically, after discussing the wireless-network technologies, we analyze four successful ad hoc networking paradigms, mesh networks, opportunistic networks, vehicular networks, and sensor networks that emerged from the MANET world. We also present an emerging research direction in the multi-hop ad hoc networking field: people centric networking, triggered by the increasing penetration of the smartphones in everyday life, which is generating a people-centric revolution in computing and communications
    • …
    corecore