Table of Contents Author Guidelines Submit a Manuscript
Mobile Information Systems
Volume 2015 (2015), Article ID 596204, 12 pages
http://dx.doi.org/10.1155/2015/596204
Research Article

SPRINT-SELF: Social-Based Routing and Selfish Node Detection in Opportunistic Networks

1Faculty of Automatic Control and Computers, University Politehnica of Bucharest, Romania
2Universitat Politecnica de Catalunya, Barcelona, Spain

Received 2 July 2013; Accepted 22 October 2013

Academic Editor: David Taniar

Copyright © 2015 Radu Ioan Ciobanu et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. R. I. Ciobanu, C. Dobre, and V. Cristea, “Reducing congestion for routing algorithms in opportunistic networks with socially-Aware node behavior prediction,” in Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications (AINA '13), pp. 554–561, March 2013. View at Publisher · View at Google Scholar · View at Scopus
  2. R.-I. Ciobanu, C. Dobre, M. Dascalu, S. Trausan-Matu, and V. Cristea, “Collaborative selfish node detection with an incentive mechanism for opportunistic networks,” in Proceedings of the IFIP/IEEE International Symposium on Integrated Network Management, pp. 1161–1166, May 2013. View at Scopus
  3. M. Conti, S. Giordano, M. May, and A. Passarella, “From opportunistic networks to opportunistic computing,” IEEE Communications Magazine, vol. 48, no. 9, pp. 126–139, 2010. View at Publisher · View at Google Scholar · View at Scopus
  4. P. Hui, J. Crowcroft, and E. Yoneki, “BUBBLE rap: social-based forwarding in delay tolerant networks,” in Proceedings of the 9th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '08), pp. 241–250, ACM, Hong Kong, May 2008. View at Publisher · View at Google Scholar · View at Scopus
  5. H. A. Nguyen, S. Giordano, and A. Puiatti, “Probabilistic routing protocol for intermittently connected mobile ad hoc network (PROPICMAN),” in Proceedings of the IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WOWMOM '07), pp. 1–6, IEEE, Espoo, Finland, June 2007. View at Publisher · View at Google Scholar · View at Scopus
  6. C. Boldrini, M. Conti, I. Iacopini, and A. Passarella, “HiBOp: a history based routing protocol for opportunistic networks,” in Proceedings of the IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WOWMOM '07), pp. 1–12, IEEE, Espoo, Finland, June 2007. View at Publisher · View at Google Scholar · View at Scopus
  7. R. Ciobanu and C. Dobre, “Data dissemination in opportunistic networks,” in Proceedings of the 18th International Conference on Control Systems and Computer Science (CSCS '11), pp. 529–536, 2011.
  8. A. Vahdat and D. Becker, Epidemic Routing for Partially Connected Ad Hoc Networks, 2000.
  9. E. Yoneki, P. Hui, S. Chan, and J. Crowcroft, “A Socio-Aware Overlay for publish/subscribe communication in delay tolerant networks,” in Proceedings of the 10th ACM Symposium on Modeling, Analysis, and Simulation of Wireless and Mobile Systems (MSWiM '07), pp. 225–234, ACM, New York, NY, USA, October 2007. View at Publisher · View at Google Scholar · View at Scopus
  10. V. Lenders, M. May, G. Karlsson, and C. Wacha, “Wireless ad hoc podcasting,” SIGMOBILE Mobile Computing and Communications Review, vol. 12, pp. 65–67, 2008. View at Google Scholar
  11. C. Boldrini, M. Conti, and A. Passarella, “Exploiting users' social relations to forward data in opportunistic networks: the HiBOp solution,” Pervasive and Mobile Computing, vol. 4, no. 5, pp. 633–657, 2008. View at Publisher · View at Google Scholar · View at Scopus
  12. G. Bigwood, D. Rehunathan, M. Bateman, T. Henderson, and S. Bhatti, “Exploiting self-reported social networks for routing in ubiquitous computing environments,” in Proceedings of the IEEE International Conference on Wireless & Mobile Computing, Networking & Communications (WIMOB '08), pp. 484–489, IEEE Computer Society, Washington, DC, USA, October 2008. View at Publisher · View at Google Scholar
  13. D. Karamshuk, C. Boldrini, M. Conti, and A. Passarella, “Human mobility models for opportunistic networks,” IEEE Communications Magazine, vol. 49, no. 12, pp. 157–165, 2011. View at Publisher · View at Google Scholar · View at Scopus
  14. C. Boldrini, M. Conti, F. Delmastro, and A. Passarella, “Context- and social-aware middleware for opportunistic networks,” Journal of Network and Computer Applications, vol. 33, no. 5, pp. 525–541, 2010. View at Publisher · View at Google Scholar · View at Scopus
  15. S. Jain, K. Fall, and R. Patra, “Routing in a delay tolerant network,” ACM SIGCOMM Computer Communication Review, vol. 34, no. 4, pp. 145–158, 2004. View at Google Scholar
  16. C. Song, Z. Qu, N. Blumm, and A.-L. Barab{\'a}si, “Limits of predictability in human mobility,” Science, vol. 327, no. 5968, pp. 1018–1021, 2010. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  17. A. Ihler, J. Hutchins, and P. Smyth, “Learning to detect events with Markov-modulated poisson processes,” ACM Transactions on Knowledge Discovery from Data, vol. 1, no. 3, article 13, 2007. View at Publisher · View at Google Scholar · View at Scopus
  18. R. I. Ciobanu and C. Dobre, “Predicting encounters in opportunistic networks,” in Proceedings of the 1st ACM Workshop on High Performance Mobile Opportunistic Systems (HP-MOSys '12), pp. 9–14, ACM, Paphos, Cyprus, October 2012. View at Publisher · View at Google Scholar · View at Scopus
  19. P. Hui, K. Xu, V. O. K. Li, J. Crowcroft, V. Latora, and P. Lio, “Selfishness, altruism and message spreading in mobile social networks,” in Proceedings of the IEEE INFOCOM Workshops, pp. 1–6, IEEE, April 2009. View at Publisher · View at Google Scholar · View at Scopus
  20. E. Hernández-Orallo, M. D. S. Olmos, J.-C. Cano, C. T. Calafate, and P. Manzoni, “Evaluation of collaborative selfish node detection in MANETs and DTNs,” in Proceedings of the 15th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM '12), pp. 159–166, ACM, October 2012. View at Publisher · View at Google Scholar · View at Scopus
  21. A. Lavinia, C. Dobre, F. Pop, and V. Cristea, “A failure detection system for large scale distributed systems,” in Proceedings of the 4th International Conference on Complex, Intelligent and Software Intensive Systems (CISIS '10), pp. 482–489, February 2010. View at Publisher · View at Google Scholar · View at Scopus
  22. Q. Zhou, J. Ying, and M. Wu, “A detection method for uncooperative nodes in opportunistic networks,” in Proceedings of the 2nd IEEE International Conference on Network Infrastructure and Digital Content (IC-NIDC '10), pp. 835–838, September 2010. View at Publisher · View at Google Scholar · View at Scopus
  23. G. Bigwood and T. Henderson, “IRONMAN: using social networks to add incentives and reputation to opportunistic networks,” in Proceedings of the IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT '11) and IEEE International Conference on Social Computing (SocialCom '11), pp. 65–72, October 2011. View at Publisher · View at Google Scholar · View at Scopus
  24. R. I. Ciobanu, C. Dobre, V. Cristea, and D. Al-Jumeily, “Social aspects for opportunistic communication,” in Proceedings of the 11th International Symposium on Parallel and Distributed Computing (ISPDC '12), pp. 251–258, June 2012. View at Publisher · View at Google Scholar · View at Scopus
  25. P. Hui, E. Yoneki, S. Y. Chan, and J. Crowcroft, “Distributed community detection in delay tolerant networks,” in Proceedings of the 2nd ACM/IEEE International Workshop on Mobility in the Evolving Internet Architecture (MobiArch '07), pp. 7:1–7:8, ACM, New York, NY, USA, August 2007. View at Publisher · View at Google Scholar · View at Scopus
  26. J. Scott, R. Gass, J. Crowcroft, P. Hui, C. Diot, and A. Chaintreau, “CRAWDAD data set Cambridge/Haggle (v. 2009-05-29),” May 2009, http://crawdad.cs.dartmouth.edu/cambridge/haggle.
  27. L. A. Adamic, B. A. Huberman, A.-L. Barabási, R. Albert, H. Jeong, and G. Bianconi, “Power-law distribution of the world wide web,” Science, vol. 287, no. 5461, p. 2115, 2000. View at Publisher · View at Google Scholar