A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Ensuring Users Privacy and Mutual Authentication in Opportunistic Networks: A Survey
2020
International Journal of Network Security
Second, it Points out the differences between Opp-Nets and some communications models that emerged from Mobile Ad hoc Networks research. ...
Third, it succinctly reviews the main existing techniques proposed for users mutual authentication and privacy protection in OppNets, organising them in a taxonomy. ...
The authors gratefully acknowledge the anonymous reviewers for their valuable comments. ...
dblp:journals/ijnsec/AvoussoukpoXT20
fatcat:hynqrjwutreehku6xz5kp7nkye
Trust Framework for Data Forwarding in Opportunistic Networks Using Mobile Traces
2012
International Journal of Wireless & Mobile Networks
This paper presents a trust framework for opportunistic network where the nodes in the network follow the trace based mobility model. ...
Opportunistic networks are usually formed spontaneously by mobile devices equipped with short range wireless communication interfaces. The idea is that an end-to-end connection may never be present. ...
This type of network is used for emergency applications. An opportunistic network (oppnet) is a network of mobile as well as fixed nodes. Opportunistic network are different from traditional network. ...
doi:10.5121/ijwmn.2012.4609
fatcat:d3v2yb4pxzf5lf7supxs36lnjq
From opportunistic networks to opportunistic computing
2010
IEEE Communications Magazine
MobiClique builds (on top of a locally maintained social network structure) a framework for collaborative forwarding relying uniquely on opportunistic contacts. ...
In opportunistic environments such applications may build dynamic social networks among users that share, possibly for some limited periods of time, a common interest or a goal, and provide social networking ...
doi:10.1109/mcom.2010.5560597
fatcat:svzmhzr27ffxnmh7pgjaojpu7y
Understanding Information Centric Layer of Adaptive Collaborative Caching Framework in Mobile Disconnection-Prone Networks
2018
2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC)
We describe a reputationbased popularity weighting mechanism built in informationcentric layer of our adaptive collaborative caching framework CafRepCache which considers a realistic case where caching ...
We extensively evaluate CafRepCache with competitive protocols across three heterogeneous real-world mobility, connectivity traces and use YouTube dataset for different workload and content popularity ...
[4] proposed Café and CafeREP, a congestion-aware mobile social framework for data forwarding over heterogeneous opportunistic networks. ...
doi:10.1109/iwcmc.2018.8450321
dblp:conf/iwcmc/HuynhRJ18
fatcat:6vxevhzo4jcfxjygbsll4d4lbu
Trust-Based Opportunistic Network Offloaders for Smart Agriculture
2021
International Journal of Agricultural and Environmental Information Systems
Although, few works contribute to the trust established, most of them are applicable only for static networks. This paper explores a trust-based solution for mobile data offloading. ...
The proposed algorithm outperforms the hybrid trust-based mobility aware clustering algorithm for trust-based offloaders with up to 13% better offloading potential saving a minimum of 8 pJ energy per user ...
The research includes the forecast for trust prediction among nodes for social networking based mobile network. ...
doi:10.4018/ijaeis.20210101.oa3
fatcat:qps4dekaavhqngkc3ns7omovqa
Pervasive Data Sharing As Enabler For Mobile Citizen Sensing Systems
2015
Zenodo
Hence, this paper describes a set of paradigms that should be considered to allow pervasive data sharing for the support mobile citizen sensing systems. ...
Today, users can use their personal devices for a wide range of applications and services, such as controlling other devices, monitoring human physiological signals, or accessing information while on the ...
This paper reflects only the authors views and the Community is not liable for any use that may be made of the information contained therein. ...
doi:10.5281/zenodo.22201
fatcat:7kt5bhb46jelzlqw7nldxn2bei
An Introduction to Wireless Mobile Social Networking in Opportunistic Communication
2013
International Journal of Distributed and Parallel systems
Users will be more and more mobile, protocols, etc. will increase and render the network more complex to manage. ...
Opportunistic communication has emerged as a new communication paradigm to cope with these problems. ...
Opportunistic mobile social networks are a novel communication paradigm that exploits opportunistic encounters between human carried devices and social networks for mobile social networking as opportunistic ...
doi:10.5121/ijdps.2013.4306
fatcat:loewqg3jejecvhk2qcy6rcs7oy
Opportunities in Opportunistic Computing
2010
Computer
OPPORTUNITIES IN OPPORTUNISTIC COMPUTING Authorized licensed use limited to: University of Texas at Arlington. Downloaded on April 25,2010 at 02:59:53 UTC from IEEE Xplore. Restrictions apply. ...
Trust, security, and privacy Establishing trust and security for an interaction between a priori unknown peers in an opportunistic network is challenging. ...
While electronic social network relationships provide key information for designing opportunistic network protocols, the virtual social network provides a basis for the development of opportunistic computing ...
doi:10.1109/mc.2010.19
fatcat:6ykgb46wlbca5jtjlzbwcnjdfm
Opportunities in opportunistic computing
2009
Computer
OPPORTUNITIES IN OPPORTUNISTIC COMPUTING Authorized licensed use limited to: University of Texas at Arlington. Downloaded on April 25,2010 at 02:59:53 UTC from IEEE Xplore. Restrictions apply. ...
Trust, security, and privacy Establishing trust and security for an interaction between a priori unknown peers in an opportunistic network is challenging. ...
While electronic social network relationships provide key information for designing opportunistic network protocols, the virtual social network provides a basis for the development of opportunistic computing ...
doi:10.1109/mc.2009.378
fatcat:mq3mdzqszvhzfcelxdpu7i7wjm
Trustworthy opportunistic sensing: A Social Computing Paradigm
2011
2011 IEEE International Conference on Information Reuse & Integration
Thus, it is possible to create largescale opportunistic networks by integrating sensors, applications and social networks and this development could also promote innovative collaborative cyber security ...
In recent years, technological advances have lead to a society with communication platforms like iPhone and Kinect Xbox that are able to inject sensing presence into online social networks (OSNs). ...
Figure 2 shows the different layers for the envisioned socially aware opportunistic sensing framework. ...
doi:10.1109/iri.2011.6009608
dblp:conf/iri/JohnsonLOW11
fatcat:6ltaztftobb7na272ucrttwu2y
Quantitative social relations based on trust routing algorithm in opportunistic social network
2019
EURASIP Journal on Wireless Communications and Networking
The trust model is widely used in the opportunistic social network to solve the problem of malicious nodes and information flooding. ...
In real applications, this information does not have integrity and does not take into account the characteristics and dynamic adaptability of nodes, network structures, and the transitivity of social relationships ...
A Social Relationship Opportunistic Routing Algorithm (SROR) [14] was proposed for mobile social networks. ...
doi:10.1186/s13638-019-1397-1
fatcat:trovgzinjrcnpn7kqyeqtzsxpm
Social Networking for Pervasive Adaptation
2008
2008 Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops
Through developing the capacity for devices to socially network, we believe that there is significant potential to facilitate highly effective pervasive communication and content provision. ...
The EU FET project Social Networking for Pervasive Adaptation (SOCIALNETS) seeks to overcome these challenges by understanding, modelling and exploiting the key characteristics that enable humans to adapt ...
Acknowledgement: This work has been supported by the SOCIALNETS project, grant agreement number 217141, funded by the EC seventh framework programme theme FP7-ICT-2007-8.2 for Pervasive Adaptation. ...
doi:10.1109/sasow.2008.34
dblp:conf/saso/AllenCCDLMMPSW08
fatcat:dzvzmwa4pvastepx7ccm2xxvaq
Opportunistic IoT: Exploring the harmonious interaction between human and the internet of things
2013
Journal of Network and Computer Applications
Some of our ongoing practices, including opportunistic mobile social networking, opportunistic marketing, and community service provision are further presented to demonstrate the potential application ...
We characterize the bi-directional effects between human and opportunistic IoT, discuss the technical challenges faced by this new research field, and propose a reference architecture for developing opportunistic ...
The framework should provide a set of mechanisms for dynamic network management, human behavior analysis, and information sharing among mobile nodes. ...
doi:10.1016/j.jnca.2012.12.028
fatcat:ru2n64yzujeqtcdrmijmrz2bxe
Understanding Complementary Multi-layer Collaborative Heuristics for Adaptive Caching in Heterogeneous Mobile Opportunistic Networks
2018
2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC)
heterogeneous mobile opportunistic environments. ...
Keywords-Opportunistic mobile networks, content discovery and retrieval, content caching, multi-layer heuristics and utilities. ...
[2] proposed Cafe and CafRep, a congestionaware mobile social framework for data forwarding and replication over heterogeneous opportunistic networks. ...
doi:10.1109/iwcmc.2018.8450536
dblp:conf/iwcmc/HuynhR18
fatcat:fpnmi3mqizeuheapy3jute7tty
Adaptive user anonymity for mobile opportunistic networks
2012
Proceedings of the seventh ACM international workshop on Challenged networks - CHANTS '12
This paper describes a novel flexible and adaptive approach, AdaptAnon that is suitable for dynamic and heterogeneous mobile opportunistic networks. ...
Current mobile opportunistic networks often use social routing protocols to transfer messages among users and to the services. ...
RELATED WORK This section gives a brief overview of anonymity approaches in social and mobile opportunistic networks. [2] consider social network routing that is based on disseminating information about ...
doi:10.1145/2348616.2348635
dblp:conf/mobicom/RadenkovicV12
fatcat:ryj5ibis7zfgbjtxwpq7lhpzca
« Previous
Showing results 1 — 15 out of 12,045 results