Exploiting users' social relations to forward data in opportunistic networks: The HiBOp solution

被引:101
作者
Boldrini, Chiara [1 ]
Conti, Marco [1 ]
Passarella, Andrea [1 ]
机构
[1] IIT CNR, Pisa, Italy
关键词
Opportunistic networks; Social networking; Routing; Pervasive networks;
D O I
10.1016/j.pmcj.2008.04.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Opportunistic networks, in which nodes opportunistically exploit any pair-wise contact to identify next hops towards the destination, are one of the most interesting technologies to support the pervasive networking vision. Opportunistic networks allow content sharing between mobile users without requiring any pre-existing Internet infrastructure, and tolerate partitions, long disconnections, and topology instability in general. In this paper we propose a context-aware framework for routing and forwarding in opportunistic networks. The framework is general, and able to host various flavors of context-aware routing. In this work we also present a particular protocol, HiBOp, which, by exploiting the framework, learns and represents through context information, the users' behavior and their social relations, and uses this knowledge to drive the forwarding process. The comparison of HiBOp with reference to alternative solutions shows that a context-aware approach based on users' social relations turns out to be a very efficient solution for forwarding in opportunistic networks. We show performance improvements over the reference solutions both in terms of resource utilization and in terms of user perceived QoS. (C) 2008 Elsevier B.V. All rights reserved.
引用
收藏
页码:633 / 657
页数:25
相关论文
共 36 条
[1]  
[Anonymous], 2006, P 25 IEEE INT C COMP
[2]  
[Anonymous], 2005, P 2005 ACM SIGCOMM W
[3]  
[Anonymous], 2000, P 32 ANN ACM S THEOR, DOI DOI 10.1145/335305.335325
[4]  
[Anonymous], 2003, ACM MOB COMPUT COMMU, DOI DOI 10.1145/961268.961272
[5]  
[Anonymous], 2006, P IFIP WONS
[6]  
Asokan N., 2007, P 1 ACM SIGMOBILE WO
[7]  
Boldrini C, 2007, P IEEE WOWMOM INT W
[8]  
Boldrini C, 2007, I S WORLD WIREL MOBI, P78
[9]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[10]  
Burgess J, 2007, MOBIHOC'07: PROCEEDINGS OF THE EIGHTH ACM INTERNATIONAL SYMPOSIUM ON MOBILE AD HOC NETWORKING AND COMPUTING, P61