107
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

Opportunistic forwarding for user-provided networks

, &
Pages 717-741 | Received 14 Jan 2017, Accepted 29 Aug 2017, Published online: 21 Sep 2017

References

  • Patel M , Naughton B , Chan C , et al . Mobile-edge computing introductory technical white paper. Mobile-edge Computing (MEC) industry initiative, European Telecommunications Standards Institute (ETSI); Sept 2014.
  • Open fog consortium . 2017 [cited 2017 May 26]. Available from: http://www.openfogconsortium.org
  • Liang X , Zhang K , Shen X , et al . Security and privacy in mobile social networks: challenges and solutions. IEEE Wirel Commun. Feb 2014;21(1):33–41.
  • Motani M , Srinivasan V , Nuggehalli P . Peoplenet: engineering a wireless virtual social network. In: Proceedings of the MobiCom. Cologne, Germany; 2005. p. 243–257.
  • Sofia R , Mendes P . User-provided networks: consumer as provider. IEEE Commun Mag. 2008;46:86–91.
  • FON Community . 2017 [cited 2017 May 26]. Available from: http://www.fon.com
  • Karma Mobility Inc, Karma Inititiative . 2017 [cited 2017 May 26]. Available from: http://www.yourkarma.com
  • Open Garden, Open Garden Initiative . San Francisco, USA; 2017 [cited 2017 May 26]. Available from: http://www.opengarden.com
  • OpenSpark Community . 2017 [cited 2017 May 26]. Available from: https://open.sparknet.fi
  • WiFi.com . 2017 [cited 2017 May 26]. Available from: http://www.wifi.com
  • Manshaei MH , Freudiger J , Felegyhazi M , et al . On wireless social community networks. INFOCOM. 2008.
  • Ishmael J , Bury S , Pezaros D , et al. Deploying rural community wireless mesh networks. IEEE Internet Comput. Jul 2008;12(4):22–29.
  • Ntareme H , Domancich S . Security and performance aspects of bytewalla: a delay tolerant network on smartphones. In: Proceedings of the 2011 IEEE 7th International Conference on Wireless and Mobile Computing, Networking and Communications, series WIMOB. Shanghai, China; 2011.
  • Rolla VG , Curado M . Enabling wireless cooperation in user provided networks. In: IFIP/IEEE International Symposium on Integrated Network Management (IM). Ottawa, ON; 2015. p. 1114–1121.
  • Psaras I , Mamatas L . On demand connectivity sharing: queuing management and load balancing for user-provided networks. Comput Netw (COMNET). Feb 2011;55(2):399–414, Elsevier Science, Special Issue on Wireless for the Future Internet.
  • Mamatas L , Psaras I , Pavlou G . Incentives and algorithms for broadband access sharing, 1st ACM sigcomm workshop on home networks (HomeNets), New Delhi, India; Aug 2010.
  • Lenas SA , Tsaoussidis V . Enabling free internet access at the edges of broadband connections: a hybrid packet scheduling approach. SIGMOBILE Mobile Comput Commun Rev (MC2R). Feb 2014;18(1):55–63.
  • Fall K . A delay-tolerant network architecture for challenged internets. SIGCOMM’03. New York (NY): ACM; p. 27–34
  • Spyropoulos T , Psounis K , Raghavendra CS . Spray and focus: efficient mobility-assisted routing for heterogeneous and correlated mobility. In: Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom), White Plains (NY), 19–23 Mar 2007; 2007. p. 79–85.
  • Small T , Haas ZJ . The shared wireless infostation model: a new ad hoc networking paradigm (or where there is a whale, there is a way). Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing (MobiHoc ’03). New York (NY): ACM; 2003. p. 233–244
  • Athens wireless metropolitan network (AWMN) . 2017 [cited 2017 May 26]. Available from: http://www.awmn.net
  • Koutsogiannis E , Mamatas L , Psaras I . Storage-enabled access point for improved mobile performance: an evaluation study. 9th International Conference on Wired/Wireless Internet Communications (WWIC); 2011 Jun 15--17; Barcelona, Spain.
  • Xin A , Srinivasan V , Tham CK . Wi-Sh: a simple, robust credit based wi-fi community network. In: INFOCOM. Rio de Janeiro, Brazil; 2009.
  • Vahdat A , Becker D . Epidemic routing for partially connected ad hoc networks. Technical Report CS-200006, Duke University. 2000.
  • Burgess J , Gallagher B , Jensen D , et al. MaxProp: routing for vehicle-based disruption-tolerant networks. In: Proceedings of the IEEE INFOCOM. Barcelona, Spain; Apr 2006.
  • Spyropoulos T , Psounis K , Raghavendra CS . Spray and wait: an efficient routing scheme for intermittently connected mobile networks. Proceedings of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking, Philadelphia (PA), 26 Aug 2005. 2005. p. 252–259.
  • Lindgren A , Doria A , Schelen O . Probabilistic routing in intermittently connected networks. SIGMOBILE Mobile Comput Commun Rev. Jul 2003;7(3).
  • Xu Y , Mahendran YV , Radhakrishnan S . Internet of hybrid opportunistic things: a novel framework for interconnecting IoTs and DTNs. In: IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), San Francisco; 2016.
  • Gao L , Luan TH , Yu S , et al . FogRoute: DTN-based data dissemination model in fog computing. IEEE Internet Things J. 2017;4(1):225–235.
  • Shah SFA , Zafar MH , Andonovic I , et al. Hybrid routing scheme for vehicular delay tolerant networks. In: 8th Computer Science and Electronic Engineering (CEEC), Colchester; 2016. p. 158–163.
  • Xie Y , Bao J , Song Z , et al. A hybrid opportunistic routing scheme based on nodes grouping strategy for VANETs in urban scenarios. In: 25th Wireless and Optical Communication Conference (WOCC), Chengdu; 2016. p. 1–5.
  • Gupta AK , Bhattacharya I , Banerjee PS , et al . DirMove: direction of movement based routing in DTN architecture for post-disaster scenario. Wirel Netw. 2016;22(3):723–740.
  • Whitbeck J , Conan V . HYMAD: hybrid DTN-MANET routing for dense and highly dynamic wireless networks. Comput Commun. 2010;33(13):1483–1492.
  • Azzuhri SR , Ahmad H , Portmann M , et al . An efficient hybrid MANET-DTN routing scheme for OLSR. Wirel Pers Commun. 2016;89(4):1335–1354.
  • Clausen T , Jacquet P , Adjih C , et al . Optimized link state routing protocol (OLSR). RFC. 2003;54(2).
  • Wan P , Chen S , Yu T , et al. A hybrid multiple copy routing algorithm in space delay-tolerant networks. Sci China Inform Sci. 2017;60(4):1–11.
  • Kaur H , Kaur H . An enhanced spray-copy-wait DTN routing using optimized delivery predictability. Computer communication, networking and internet security. Singapore: Springer; 2017. p. 603–610
  • Aung CY , Ho IW , Chong PH . Store-carry-cooperative forward routing with information epidemics control for data delivery in opportunistic networks. IEEE Access. 2017;5:6608–6625.
  • Muhammad A , Simon R . A simulation study of common mobility models for opportunistic networks. In: 41st Annual Simulation Symposium ANSS (Apr 2008). 2008. p. 43–50.
  • Passarella A , Conti M . Characterising aggregate inter-contact times in heterogeneous opportunistic networks. Networking. 2011;2011:301–313.
  • Chaintreau A , Hui P , Crowcroft J , et al . Impact of human mobility on opportunistic forwarding algorithms. IEEE Trans Mobile Comput. 2007;606–620.
  • Cai H , Eun DY . Toward stochastic anatomy of inter-meeting time distribution under general mobility models. In: MobiHoc ’08: Proceedings of the 9th ACM International Symposium on Mobile Ad Hoc Networking and Computing. Hong Kong, China; 2008. p. 273–282.
  • Abdulla M , Simon R . The impact of intercontact time within opportunistic networks: protocol implications and mobility models. Department of Computer Science, George Mason University, Fairfax, VA.
  • Bettstetter C , Resta G , Santi P . The node distribution of the random waypoint mobility model for wireless Ad Hoc networks. IEEE Trans Mobile Comput. Jan-Mar 2003;2(1):25–39.
  • Kwiatkowska M , Norman G , Parker D . PRISM: probabilistic symbolic model checker. In: Field T , Harrison P , Bradley J ,et al . editors. Proc. TOOLS 2002. Vol. 2324, Lecture notes in computer science. London: Springer; Apr 2006. p. 200–204.
  • Keränen A , Ott J , Kärkkäinen T . The ONE simulator for DTN protocol evaluation. SIMUTools ’09, Rome, Italy; 2009.
  • Leroy D , Detal G , Cathalo J , et al . SWISH: secure WiFi sharing. Comput Netw. 2011;55(7):1614–1630.
  • Sastry N , Sollins K , Crowcroft J . Architecting citywide ubiquitous Wi-Fi access. In: Proceedings of the HotNets-VI. Atlanta, GA; 2007.
  • Ferm J . Security analysis of WLAN roaming solutions [master thesis]. Lunds Tekniska Hgskola; 2013 Aug 19.
  • Parris I . Practical privacy and security for opportunistic networks [PhD thesis]. University of St Andrews; 2014.
  • Shikfa A , Onen M , Molva R . Privacy and confidentiality in context-based and epidemic forwarding. Comput Commun. Apr 2010;33(13):1493–1504.
  • Le Z , Vakde G , Wright M . PEON: privacy-enhanced opportunistic networks with applications in assistive environments. In: PETRA 09: Proceedings of the 2nd International Conference on PErvsive Technologies Related to Assistive Environments. Corfu, Greece; Jun 2009.
  • Korolova A , Motwani R , Nabar SU , et al. Link privacy in social networks. In: IEEE 24th International Conference on Data Engineering (ICDE 2008). Cancun, Mexico; Apr 2008.
  • Choo FC , Chan MC , Chang EC . Robustness of DTN against routing attacks. In: Second International Conference on Communication Systems and Networks (COMSNETS 2010). Bangalore, India; Jan 2010.
  • Symington S , Farrell S , Weiss H , et al. RFC 6257. Available from: http://www.rfc-editor.org/rfc/rfc6257.txt.
  • Farrell S , Cahill V . Delay- and disruption-tolerant networking. Boston: Artech house; 2006.
  • Hongyi H . OpenWiFi: a consumer WiFi sharing system [PhD thesis]. Massachusetts Institute of Technology; 2007.
  • Zhu H , Lin X , Lu R , et al . SMART: a secure multilayer credit-based incentive scheme for delay-tolerant networks. IEEE Trans Veh Technol. Oct 2009;58(8):4628–4639.
  • Lu R , Lin X , Zhu H , et al . Pi: A practical incentive protocol for delay tolerant networks. IEEE Trans Wirel Commun. Apr 2010;9(4):1483–1493.
  • Iosifidis G , Gao L , Huang J , et al . Incentive mechanisms for user-provided networks. IEEE Commun Mag. Sept 2014;52(9):20–27.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.