Show simple item record

Files in this item

Thumbnail

Item metadata

dc.contributor.authorBigwood, Greg
dc.contributor.authorHenderson, Tristan
dc.date.accessioned2011-10-05T13:56:08Z
dc.date.available2011-10-05T13:56:08Z
dc.date.issued2011-06-23
dc.identifier.citationBigwood , G & Henderson , T 2011 , Bootstrapping opportunistic networks using social roles . in 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM) . IEEE , The Fifth IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications (AOC) , Lucca , Italy , 20/06/11 . https://doi.org/10.1109/WoWMoM.2011.5986139en
dc.identifier.citationconferenceen
dc.identifier.isbn978-1-4577-0352-2
dc.identifier.isbn978-1-4577-0350-8
dc.identifier.otherPURE: 14642469
dc.identifier.otherPURE UUID: b302becf-0ad8-472c-bdf4-fae1ac95556c
dc.identifier.otherBibtex: urn:d8f37cf1120886b83fab248d6a2862ab
dc.identifier.otherScopus: 80052778449
dc.identifier.urihttp://hdl.handle.net/10023/2010
dc.description.abstractOpportunistic routing protocols can enable message delivery in disconnected networks of mobile devices. To conserve energy in mobile environments, such routing protocols must minimise unnecessary message-forwarding. This paper presents an opportunistic routing protocol that leverages social role information. We compute node roles from a social network graph to identify nodes with similar contact relationships, and use these roles to determine routing decisions. By using pre-existing social network information, such as online social network friends, to determine roles, we show that our protocol can bootstrap a new opportunistic network without the delay incurred by encounter-history-based routing protocols such as SimbetTS. Simulations with four real-world datasets show improved performance over SimbetTS, with performance approaching Epidemic routing in some scenarios.
dc.format.extent6
dc.language.isoeng
dc.publisherIEEE
dc.relation.ispartof2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)en
dc.rights© 2011 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.en
dc.subjectMobile computingen
dc.subjectSocial networkingen
dc.subjectRouting protocolsen
dc.subjectQA75 Electronic computers. Computer scienceen
dc.subject.lccQA75en
dc.titleBootstrapping opportunistic networks using social rolesen
dc.typeConference itemen
dc.description.versionPostprinten
dc.contributor.institutionUniversity of St Andrews.School of Computer Scienceen
dc.identifier.doihttps://doi.org/10.1109/WoWMoM.2011.5986139


This item appears in the following Collection(s)

Show simple item record