[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1755743.1755773acmconferencesArticle/Chapter ViewAbstractPublication PagesmobisysConference Proceedingsconference-collections
poster

Social-Greedy: a socially-based greedy routing algorithm for delay tolerant networks

Published: 22 February 2010 Publication History

Abstract

Efficient routing in mobile opportunistic networks and Delay Tolerant Networks (DTNs) in particular, is a challenging task because human mobility patterns are hard to predict. Several recent work have shown the importance of communities in efficient routing of messages in DTNs. However, real time community detection in DTNs is a complex and time consuming process. In this paper, we propose a simple and cost effective method for bootstrapping wireless devices by employing available social profiles. Moreover, we propose a simple greedy routing algorithm called Social-Greedy which uses a social distance derived from people's social profiles to route messages in DTNs.

References

[1]
C. Boldrini, M. Conti, and A. Passarella. Exploiting users social relations to forward data in opportunistic networks: the hibop solution. Pervasive and Mobile Computing (PMC), 2008.
[2]
X. Cheng, C. Dale, and J. Liu. Statistics and social network of youtube videos. In Quality of Service, 2008. IWQoS 2008. 16th International Workshop on, pages 229--238, 2008.
[3]
P. Hui and J. Crowcroft. How small labels create big improvements. In PERCOMW '07: Proceedings of the Fifth IEEE International Conference on Pervasive Computing and Communications Workshops, pages 65--70, Washington, DC, USA, 2007. IEEE Computer Society.
[4]
P. Hui and J. Crowcroft. Human mobility models and opportunistic communication system design. Royal Society Philosophical Transactions, 366(1872), June 2008.
[5]
P. Hui, J. Crowcroft, and E. Yoneki. Bubble rap: social-based forwarding in delay tolerant networks. In MobiHoc '08: Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing, pages 241--250, New York, NY, USA, 2008. ACM.
[6]
P. Hui, E. Yoneki, S. Y. Chan, and J. Crowcroft. Distributed community detection in delay tolerant networks. In MobiArch '07: Proceedings of first ACM/IEEE international workshop on Mobility in the evolving internet architecture, pages 1--8, New York, NY, USA, 2007. ACM.
[7]
P. Jaccard. Étude comparative de la distribution florale dans une portion des alpes et des jura. Bulletin del la Société Vaudoise des Sciences Naturelles, 37:547--579, 1901.
[8]
J. Kleinberg. The small-world phenomenon: an algorithm perspective. In STOC '00: Proceedings of the thirty-second annual ACM symposium on Theory of computing, pages 163--170, New York, NY, USA, 2000. ACM.
[9]
S. Milgram. The small world problem. Psychology Today, 1:60--67, 1967.
[10]
A. Mtibaa, A. Chaintreau, J. LeBrun, E. Oliver, A. K. Pietilainen, and C. Diot. Are you moved by your social network application? pages 67--72. ACM, 2008.
[11]
A. S. P. Nathan Eaglea and D. Lazer. Inferring friendship network structure by using mobile phone data. Proceedings of the National Academy of Sciences, 106(36):15274--15278, September 2009.
[12]
J. Scott, R. Gass, J. Crowcroft, P. Hui, C. Diot, and A. Chaintreau. CRAWDAD trace for infocom2006. http://crawdad.cs.dartmouth.edu, May 2009.
[13]
A. Vahdat and D. Becker. Epidemic routing for partially-connected ad hoc networks. Technical report, Duke University, April 2000.

Cited By

View all
  • (2023)Community trend message locking routing protocol for delay tolerant networkPeer-to-Peer Networking and Applications10.1007/s12083-023-01470-416:2(1155-1173)Online publication date: 10-Mar-2023
  • (2020)Multiattribute‐based routing for lifetime maximization in opportunistic mobile social networksInternational Journal of Communication Systems10.1002/dac.431233:10Online publication date: 13-Jan-2020
  • (2016)An efficient authentication framework over heterogeneous vehicular networks2016 IEEE International Conference on Communication Systems (ICCS)10.1109/ICCS.2016.7833603(1-6)Online publication date: Dec-2016
  • Show More Cited By

Index Terms

  1. Social-Greedy: a socially-based greedy routing algorithm for delay tolerant networks

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    MobiOpp '10: Proceedings of the Second International Workshop on Mobile Opportunistic Networking
    February 2010
    229 pages
    ISBN:9781605589251
    DOI:10.1145/1755743
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 22 February 2010

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. delay tolerant networks
    2. mobile opportunistic networks
    3. routing algorithms
    4. social distance
    5. social profile

    Qualifiers

    • Poster

    Conference

    MobiOpp' 10
    Sponsor:

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 22 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Community trend message locking routing protocol for delay tolerant networkPeer-to-Peer Networking and Applications10.1007/s12083-023-01470-416:2(1155-1173)Online publication date: 10-Mar-2023
    • (2020)Multiattribute‐based routing for lifetime maximization in opportunistic mobile social networksInternational Journal of Communication Systems10.1002/dac.431233:10Online publication date: 13-Jan-2020
    • (2016)An efficient authentication framework over heterogeneous vehicular networks2016 IEEE International Conference on Communication Systems (ICCS)10.1109/ICCS.2016.7833603(1-6)Online publication date: Dec-2016
    • (2016)A secure routing based on social trust in opportunistic networks2016 IEEE International Conference on Communication Systems (ICCS)10.1109/ICCS.2016.7833575(1-6)Online publication date: Dec-2016
    • (2016)A survey of routing and data dissemination in Delay Tolerant NetworksJournal of Network and Computer Applications10.1016/j.jnca.2016.01.00267:C(128-146)Online publication date: 1-May-2016
    • (2015)TR-SDTNInternational Journal of Distributed Sensor Networks10.1155/2015/6904822015(9-9)Online publication date: 1-Jan-2015
    • (2015)Social-Similarity-Aware TCP With Collision Avoidance in Ad Hoc Social NetworksIEEE Systems Journal10.1109/JSYST.2014.23051919:4(1273-1284)Online publication date: Dec-2015
    • (2015)TR-SDTN: Trust based efficient routing in hostile social DTNs2015 IEEE International Conference on Communication Workshop (ICCW)10.1109/ICCW.2015.7247406(1587-1592)Online publication date: Jun-2015
    • (2015)Role playing mobility model for mobile social networks2015 IEEE/CIC International Conference on Communications in China (ICCC)10.1109/ICCChina.2015.7448733(1-6)Online publication date: Nov-2015
    • (2015)Routing protocols for mobile social networks achieving trade-off among energy consumption, delivery ratio and delay2015 IEEE/CIC International Conference on Communications in China (ICCC)10.1109/ICCChina.2015.7448731(1-6)Online publication date: Nov-2015
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media