2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2011
DOI: 10.1109/wowmom.2011.5986139
|View full text |Cite
|
Sign up to set email alerts
|

Bootstrapping opportunistic networks using social roles

Abstract: Opportunistic routing protocols can enable message delivery in disconnected networks of mobile devices. To conserve energy in mobile environments, such routing protocols must minimise unnecessary message-forwarding.This paper presents an opportunistic routing protocol that leverages social role information. We compute node roles from a social network graph to identify nodes with similar contact relationships, and use these roles to determine routing decisions. By using pre-existing social network information, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(8 citation statements)
references
References 22 publications
0
8
0
Order By: Relevance
“…There is a range of source obfuscation protocols that have been proposed for opportunistic networks with no infrastructure [6], [18], [21], [31]. They differ in how they determine optimal obfuscator by relying on a range of heuristics based on interest or connectivity similarities.…”
Section: Threat Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…There is a range of source obfuscation protocols that have been proposed for opportunistic networks with no infrastructure [6], [18], [21], [31]. They differ in how they determine optimal obfuscator by relying on a range of heuristics based on interest or connectivity similarities.…”
Section: Threat Modelmentioning
confidence: 99%
“…It waits for the tested node to perform the anonymisation and for the "friend"/"trusted" node to forward the result of the obfuscation back to it (line 16). After it receives the response it generates a value for the Reputation status of the tested node based on its opinion of the tested node performance, signs it digitally and stores the updated Reputation value onto the tested node (lines [17][18][19][20].…”
Section: Pseudo Code Of Ocot and Mathematical Notationmentioning
confidence: 99%
See 1 more Smart Citation
“…During an opportunistic encounter, if the two user profiles are friends or share some interests, the users are alerted and can choose to exchange messages. In [2], an opportunistic routing protocol, called Social Role Routing (SRR), that uses OSN information to bootstrap the opportunistic network is presented. SRR categorizes nodes into roles by applying the social network analysis technique of regular equivalence that partitions nodes into classes, where all nodes in a class are connected to the same classes of nodes.…”
Section: Opportunistic Forwarding Using Both Dsn and Osnmentioning
confidence: 99%
“…Although some forwarding schemes [15,19,16,2,7,4,20] using both online social network and detected social network information have been proposed to increase the delivery speed and the likelihood of a message to reach its destination, our approach to exploit more than two social network layers has not been addressed before. We propose a Multi-Layer Social network based Opportunistic Routing (ML-SOR) protocol, in which a node forwards packets using a routing metric that combines three measures: node centrality, tie strength and a tie predictor.…”
Section: Introductionmentioning
confidence: 99%