Files in this item
Bootstrapping opportunistic networks using social roles
Item metadata
dc.contributor.author | Bigwood, Greg | |
dc.contributor.author | Henderson, Tristan | |
dc.date.accessioned | 2011-10-05T13:56:08Z | |
dc.date.available | 2011-10-05T13:56:08Z | |
dc.date.issued | 2011-06-23 | |
dc.identifier.citation | Bigwood , G & Henderson , T 2011 , Bootstrapping opportunistic networks using social roles . in 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM) . IEEE , The Fifth IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications (AOC) , Lucca , Italy , 20/06/11 . https://doi.org/10.1109/WoWMoM.2011.5986139 | en |
dc.identifier.citation | conference | en |
dc.identifier.isbn | 978-1-4577-0352-2 | |
dc.identifier.isbn | 978-1-4577-0350-8 | |
dc.identifier.other | PURE: 14642469 | |
dc.identifier.other | PURE UUID: b302becf-0ad8-472c-bdf4-fae1ac95556c | |
dc.identifier.other | Bibtex: urn:d8f37cf1120886b83fab248d6a2862ab | |
dc.identifier.other | Scopus: 80052778449 | |
dc.identifier.uri | https://hdl.handle.net/10023/2010 | |
dc.description.abstract | Opportunistic routing protocols can enable message delivery in disconnected networks of mobile devices. To conserve energy in mobile environments, such routing protocols must minimise unnecessary message-forwarding. This paper presents an opportunistic routing protocol that leverages social role information. We compute node roles from a social network graph to identify nodes with similar contact relationships, and use these roles to determine routing decisions. By using pre-existing social network information, such as online social network friends, to determine roles, we show that our protocol can bootstrap a new opportunistic network without the delay incurred by encounter-history-based routing protocols such as SimbetTS. Simulations with four real-world datasets show improved performance over SimbetTS, with performance approaching Epidemic routing in some scenarios. | |
dc.format.extent | 6 | |
dc.language.iso | eng | |
dc.publisher | IEEE | |
dc.relation.ispartof | 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM) | en |
dc.rights | © 2011 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. | en |
dc.subject | Mobile computing | en |
dc.subject | Social networking | en |
dc.subject | Routing protocols | en |
dc.subject | QA75 Electronic computers. Computer science | en |
dc.subject.lcc | QA75 | en |
dc.title | Bootstrapping opportunistic networks using social roles | en |
dc.type | Conference item | en |
dc.description.version | Postprint | en |
dc.contributor.institution | University of St Andrews. School of Computer Science | en |
dc.identifier.doi | https://doi.org/10.1109/WoWMoM.2011.5986139 |
This item appears in the following Collection(s)
Items in the St Andrews Research Repository are protected by copyright, with all rights reserved, unless otherwise indicated.