Opportunistic Networks

Author(s):  
Radu Ioan Ciobanu ◽  
Ciprian Dobre

When mobile devices are unable to establish direct communication, or when communication should be offloaded to cope with large throughputs, mobile collaboration can be used to facilitate communication through opportunistic networks. These types of networks, formed when mobile devices communicate only using short-range transmission protocols, usually when users are close, can help applications still exchange data. Routes are built dynamically, since each mobile device is acting according to the store-carry-and-forward paradigm. Thus, contacts are seen as opportunities to move data towards the destination. In such networks data dissemination is usually based on a publish/subscribe model. Opportunistic data dissemination also raises questions concerning user privacy and incentives. In this the authors present a motivation of using opportunistic networks in various real life use cases, and then analyze existing relevant work in the area of data dissemination. The authors present the categories of a proposed taxonomy that captures the capabilities of data dissemination techniques used in opportunistic networks. Moreover, the authors survey relevant techniques and analyze them using the proposed taxonomy.

2014 ◽  
Vol 519-520 ◽  
pp. 241-244
Author(s):  
Li Liu

Mobile devices are popular used in peoples life. Generally, most of portable mobile devices are carried by people. Thus, the mobility of mobile devices is influenced heavily by peoples social relationship. Socially-aware Opportunistic Networks are used in intermittently connected networks by use of store-carry-and-forward fashion. It is mainly based on social relationship to design solutions for problem such as routing protocol or data dissemination. In this paper, we exploit social relationship about friendships information among people and use them to predict the contact opportunities. We present Friend-based Prediction routing protocol (FBP) and establish experiment based on ONE. The simulation results show that the efficiency of FBP outperforms Epidemic and PROPHET in higher delivery ratio, lower overhead and shorter average latency.


2021 ◽  
Vol 17 (2) ◽  
pp. 1-39
Author(s):  
Mai Ben Adar Bessos ◽  
Amir Herzberg

We investigate an understudied threat: networks of stealthy routers (S-Routers) , relaying messages to a hidden destination . The S-Routers relay communication along a path of multiple short-range, low-energy hops, to avoid remote localization by triangulation. Mobile devices called Interceptors can detect communication by an S-Router, but only when the Interceptor is next to the transmitting S-Router. We examine algorithms for a set of mobile Interceptors to find the destination of the communication relayed by the S-Routers. The algorithms are compared according to the number of communicating rounds before the destination is found, i.e., rounds in which data is transmitted from the source to the destination . We evaluate the algorithms analytically and using simulations, including against a parametric, optimized strategy for the S-Routers. Our main result is an Interceptors algorithm that bounds the expected number of communicating rounds by a term quasilinear in the number of S-Routers. For the case where S-Routers transmit at every round (“continuously”), we present an algorithm that improves this bound.


2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Jiawei Zhang ◽  
Ning Lu ◽  
Teng Li ◽  
Jianfeng Ma

Mobile cloud computing (MCC) is embracing rapid development these days and able to provide data outsourcing and sharing services for cloud users with pervasively smart mobile devices. Although these services bring various conveniences, many security concerns such as illegally access and user privacy leakage are inflicted. Aiming to protect the security of cloud data sharing against unauthorized accesses, many studies have been conducted for fine-grained access control using ciphertext-policy attribute-based encryption (CP-ABE). However, a practical and secure data sharing scheme that simultaneously supports fine-grained access control, large university, key escrow free, and privacy protection in MCC with expressive access policy, high efficiency, verifiability, and exculpability on resource-limited mobile devices has not been fully explored yet. Therefore, we investigate the challenge and propose an Efficient and Multiauthority Large Universe Policy-Hiding Data Sharing (EMA-LUPHDS) scheme. In this scheme, we employ fully hidden policy to preserve the user privacy in access policy. To adapt to large scale and distributed MCC environment, we optimize multiauthority CP-ABE to be compatible with large attribute universe. Meanwhile, for the efficiency purpose, online/offline and verifiable outsourced decryption techniques with exculpability are leveraged in our scheme. In the end, we demonstrate the flexibility and high efficiency of our proposal for data sharing in MCC by extensive performance evaluation.


In this research paper compare the protocol’s performance together with the experimental results of optimal routing using real-life scenarios of vehicles and pedestrians roaming in a city. In this research paper, conduct several simulation comparison experiments(in the NS2 Software) to show the impact of changing buffer capacity, packet lifetime, packet generation rate, and number of nodes on the performance metrics. This research paper is concluded by providing guidelines to develop an efficient DTN routing protocol. To the best of researcher(Parameswari et al.,) knowledge, this work is the first to provide a detailed performance comparison among the diverse collection of DTN routing protocols.


Author(s):  
Bo Han ◽  
Bolang Li

Data tables have been widely used for storage of a collection of related records in a structured format in many mobile applications. The lossless compression of data tables not only brings benefits for storage, but also reduces network transmission latencies and energy costs in batteries. In this paper, we propose a novel lossless compression approach by combining co-clustering and information coding theory. It reorders table columns and rows simultaneously for shaping homogeneous blocks and further optimizes alignment within a block to expose redundancy, such that standard lossless encoders can significantly improve compression ratios. We tested the approach on a synthetic dataset and ten UCI real-life datasets by using a standard compressor 7Z. The extensive experimental results suggest that compared with the direct table compression without co-clustering and within-block alignment, our approach can boost compression rates at least 21% and up to 68%. The results also show that the compression time cost of the co-clustering approach is linearly proportional to a data table size. In addition, since the inverse transform of co-clustering is just exchange of rows and columns according to recorded indexes, the decompression procedure runs very fast and the decompression time cost is similar to the counterpart without using co-clustering. Thereby, our approach is suitable for lossless compression of data tables in mobile devices with constrained resources.


2014 ◽  
Vol 31 (5) ◽  
pp. 14-16 ◽  
Author(s):  
Dheeraj Singh Negi

Purpose – The purpose of this paper is to describe the use of mobile technologies to develop new ways of Libraries and Information Centre. Mobile devices help to connect with patrons. Creating a library application (“app”) or mobile Web site that allows patrons to access library hours, view their library account or even search databases is easier than most people think. The resources below should help libraries begin to plan and implement their own unique mobile presence: analyzing the present usage of mobile devices; providing an overview of devices, providers and features; describing the various activities these devices support for well library use; focusing how libraries and our librarians are responding with services tailored for these devices; and what can be done by libraries in future in this respect”. Design/methodology/approach – Information and Communications Technology continues to expand the boundaries of higher education into the “anytime/anywhere” experiences. Mobile communication is transforming how people search, receive and interact with information on a daily basis. In just a few short years, smart phone ownership has skyrocketed, and popular use of e-readers has been steadily on the rise. These advanced mobile tools provide portable access to the world of information, across boundaries of subject, discipline and industry. Findings – Mobile technology holds great promise for enabling libraries to provide enhanced services in a form users increasingly are demanding. If this promise is to be fully realized, however, libraries will need to conduct analyses and make smart decisions to address the issues outlined above, support staff education and explore partnerships and new funding models, and be prepared to compromise with respect to their traditional information delivery models. Originality/value – The explosion of advanced mobile technology and robust digital information collection capabilities should prompt libraries to examine carefully the ramifications for user privacy. Libraries can maintain their commitment to user privacy without overcompensating by imposing burdensome security measures or annoying interruptions. For example, libraries do not have to show users a privacy statement or security warning every time they want to access information on a mobile device. A single log-in and acceptance of terms of use, similar to the procedures for other mobile applications and services, should suffice. At the same time, libraries can take the opportunity to educate users in best practices with respect to privacy issues associated with the use of mobile devices.


Author(s):  
Shawn McCann

Action learning teams create opportunities to learn from work on real-life challenges. Use of mobile learning can promote higher-order learning while bringing teams together around new ideas where their thinking may be challenged. In this way, action learning teams use mobile devices as tools of convenience to facilitate their learning. Mobile learning for action learning teams extends beyond simple content delivery and provides a platform that can introduce flow states and make space for critical reflection. The integration of mobile learning into action learning teams allows for the cultivation of individual creativity and maximization of group, virtual or face-to-face meetings.. This chapter will discuss the integration of mobile devices and detail multiple mobile learning exercises that action learning teams may use to promote creativity and critical reflection.


Author(s):  
Saonee Sarker ◽  
Damon E. Campbell ◽  
Jan Ondrus ◽  
Joseph S. Valacich

With the growing popularity of mobile technologies and the increasing use of groups within organizations, it is important to understand the collaboration contexts where mobile collaboration technologies (MCTs) are essential. This is especially critical given the high cost associated with the acquisition and implementation of MCTs and the need to make an informed decision regarding the appropriateness of MCTs. In this paper, the authors address this issue by first drawing on real life-based collaboration scenarios and examining the technology requirements of groups; second, comparing the features offered by MCTs with those of FTF and two types of CMCTs; third, proposing a collaboration environment-technology fit perspective in realizing optimal usage of a collaboration technology; and fourth, creating the Group Collaboration Technology Repertoire Grid, which maps the “ideal” collaboration technology(s) repertoire for each type of collaboration environment. The grid highlights the collaboration environments that would need MCTs and provides managers or organizational group leaders the ability to map their collaboration environments into a specific category and thus more easily decide on the particular collaboration technology repertoire that would be most beneficial.


Sign in / Sign up

Export Citation Format

Share Document