Filters








12,045 Hits in 6.1 sec

Ensuring Users Privacy and Mutual Authentication in Opportunistic Networks: A Survey

Cossi Blaise Avoussoukpo, Chunxiang Xu, Marius Tchenagnon
2020 International Journal of Network Security  
Second, it Points out the differences between Opp-Nets and some communications models that emerged from Mobile Ad hoc Networks research.  ...  Third, it succinctly reviews the main existing techniques proposed for users mutual authentication and privacy protection in OppNets, organising them in a taxonomy.  ...  The authors gratefully acknowledge the anonymous reviewers for their valuable comments.  ... 
dblp:journals/ijnsec/AvoussoukpoXT20 fatcat:hynqrjwutreehku6xz5kp7nkye

Trust Framework for Data Forwarding in Opportunistic Networks Using Mobile Traces

Poonguzharselvi B
2012 International Journal of Wireless & Mobile Networks  
This paper presents a trust framework for opportunistic network where the nodes in the network follow the trace based mobility model.  ...  Opportunistic networks are usually formed spontaneously by mobile devices equipped with short range wireless communication interfaces. The idea is that an end-to-end connection may never be present.  ...  This type of network is used for emergency applications. An opportunistic network (oppnet) is a network of mobile as well as fixed nodes. Opportunistic network are different from traditional network.  ... 
doi:10.5121/ijwmn.2012.4609 fatcat:d3v2yb4pxzf5lf7supxs36lnjq

From opportunistic networks to opportunistic computing

Marco Conti, Silvia Giordano, Martin May, Andrea Passarella
2010 IEEE Communications Magazine  
MobiClique builds (on top of a locally maintained social network structure) a framework for collaborative forwarding relying uniquely on opportunistic contacts.  ...  In opportunistic environments such applications may build dynamic social networks among users that share, possibly for some limited periods of time, a common interest or a goal, and provide social networking  ... 
doi:10.1109/mcom.2010.5560597 fatcat:svzmhzr27ffxnmh7pgjaojpu7y

Understanding Information Centric Layer of Adaptive Collaborative Caching Framework in Mobile Disconnection-Prone Networks

Vu San Ha Huynh, Milena Radenkovic, Robert John
2018 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC)  
We describe a reputationbased popularity weighting mechanism built in informationcentric layer of our adaptive collaborative caching framework CafRepCache which considers a realistic case where caching  ...  We extensively evaluate CafRepCache with competitive protocols across three heterogeneous real-world mobility, connectivity traces and use YouTube dataset for different workload and content popularity  ...  [4] proposed Café and CafeREP, a congestion-aware mobile social framework for data forwarding over heterogeneous opportunistic networks.  ... 
doi:10.1109/iwcmc.2018.8450321 dblp:conf/iwcmc/HuynhRJ18 fatcat:6vxevhzo4jcfxjygbsll4d4lbu

Trust-Based Opportunistic Network Offloaders for Smart Agriculture

Prince Sharma, Shailendra Shukla, Amol Vasudeva
2021 International Journal of Agricultural and Environmental Information Systems  
Although, few works contribute to the trust established, most of them are applicable only for static networks. This paper explores a trust-based solution for mobile data offloading.  ...  The proposed algorithm outperforms the hybrid trust-based mobility aware clustering algorithm for trust-based offloaders with up to 13% better offloading potential saving a minimum of 8 pJ energy per user  ...  The research includes the forecast for trust prediction among nodes for social networking based mobile network.  ... 
doi:10.4018/ijaeis.20210101.oa3 fatcat:qps4dekaavhqngkc3ns7omovqa

Pervasive Data Sharing As Enabler For Mobile Citizen Sensing Systems

Waldir Moreira, Paulo Mendes
2015 Zenodo  
Hence, this paper describes a set of paradigms that should be considered to allow pervasive data sharing for the support mobile citizen sensing systems.  ...  Today, users can use their personal devices for a wide range of applications and services, such as controlling other devices, monitoring human physiological signals, or accessing information while on the  ...  This paper reflects only the authors views and the Community is not liable for any use that may be made of the information contained therein.  ... 
doi:10.5281/zenodo.22201 fatcat:7kt5bhb46jelzlqw7nldxn2bei

An Introduction to Wireless Mobile Social Networking in Opportunistic Communication

Navdeep Kaur
2013 International Journal of Distributed and Parallel systems  
Users will be more and more mobile, protocols, etc. will increase and render the network more complex to manage.  ...  Opportunistic communication has emerged as a new communication paradigm to cope with these problems.  ...  Opportunistic mobile social networks are a novel communication paradigm that exploits opportunistic encounters between human carried devices and social networks for mobile social networking as opportunistic  ... 
doi:10.5121/ijdps.2013.4306 fatcat:loewqg3jejecvhk2qcy6rcs7oy

Opportunities in Opportunistic Computing

Marco Conti, Mohan Kumar
2010 Computer  
OPPORTUNITIES IN OPPORTUNISTIC COMPUTING Authorized licensed use limited to: University of Texas at Arlington. Downloaded on April 25,2010 at 02:59:53 UTC from IEEE Xplore. Restrictions apply.  ...  Trust, security, and privacy Establishing trust and security for an interaction between a priori unknown peers in an opportunistic network is challenging.  ...  While electronic social network relationships provide key information for designing opportunistic network protocols, the virtual social network provides a basis for the development of opportunistic computing  ... 
doi:10.1109/mc.2010.19 fatcat:6ykgb46wlbca5jtjlzbwcnjdfm

Opportunities in opportunistic computing

Marco Conti, Mohan Kumar
2009 Computer  
OPPORTUNITIES IN OPPORTUNISTIC COMPUTING Authorized licensed use limited to: University of Texas at Arlington. Downloaded on April 25,2010 at 02:59:53 UTC from IEEE Xplore. Restrictions apply.  ...  Trust, security, and privacy Establishing trust and security for an interaction between a priori unknown peers in an opportunistic network is challenging.  ...  While electronic social network relationships provide key information for designing opportunistic network protocols, the virtual social network provides a basis for the development of opportunistic computing  ... 
doi:10.1109/mc.2009.378 fatcat:mq3mdzqszvhzfcelxdpu7i7wjm

Trustworthy opportunistic sensing: A Social Computing Paradigm

Henric Johnson, Niklas Lavesson, Daniela Oliveira, S. Felix Wu
2011 2011 IEEE International Conference on Information Reuse & Integration  
Thus, it is possible to create largescale opportunistic networks by integrating sensors, applications and social networks and this development could also promote innovative collaborative cyber security  ...  In recent years, technological advances have lead to a society with communication platforms like iPhone and Kinect Xbox that are able to inject sensing presence into online social networks (OSNs).  ...  Figure 2 shows the different layers for the envisioned socially aware opportunistic sensing framework.  ... 
doi:10.1109/iri.2011.6009608 dblp:conf/iri/JohnsonLOW11 fatcat:6ltaztftobb7na272ucrttwu2y

Quantitative social relations based on trust routing algorithm in opportunistic social network

Genghua Yu, Zhi Gang Chen, Jia Wu, Jian Wu
2019 EURASIP Journal on Wireless Communications and Networking  
The trust model is widely used in the opportunistic social network to solve the problem of malicious nodes and information flooding.  ...  In real applications, this information does not have integrity and does not take into account the characteristics and dynamic adaptability of nodes, network structures, and the transitivity of social relationships  ...  A Social Relationship Opportunistic Routing Algorithm (SROR) [14] was proposed for mobile social networks.  ... 
doi:10.1186/s13638-019-1397-1 fatcat:trovgzinjrcnpn7kqyeqtzsxpm

Social Networking for Pervasive Adaptation

Stuart M. Allen, Marco Conti, Jon Crowcroft, Robin Dunbar, Pietro Lio', Jose Fernando Mendes, Refik Molva, Andrea Passarella, Ioannis Stavrakakis, Roger M. Whitaker
2008 2008 Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems Workshops  
Through developing the capacity for devices to socially network, we believe that there is significant potential to facilitate highly effective pervasive communication and content provision.  ...  The EU FET project Social Networking for Pervasive Adaptation (SOCIALNETS) seeks to overcome these challenges by understanding, modelling and exploiting the key characteristics that enable humans to adapt  ...  Acknowledgement: This work has been supported by the SOCIALNETS project, grant agreement number 217141, funded by the EC seventh framework programme theme FP7-ICT-2007-8.2 for Pervasive Adaptation.  ... 
doi:10.1109/sasow.2008.34 dblp:conf/saso/AllenCCDLMMPSW08 fatcat:dzvzmwa4pvastepx7ccm2xxvaq

Opportunistic IoT: Exploring the harmonious interaction between human and the internet of things

Bin Guo, Daqing Zhang, Zhu Wang, Zhiwen Yu, Xingshe Zhou
2013 Journal of Network and Computer Applications  
Some of our ongoing practices, including opportunistic mobile social networking, opportunistic marketing, and community service provision are further presented to demonstrate the potential application  ...  We characterize the bi-directional effects between human and opportunistic IoT, discuss the technical challenges faced by this new research field, and propose a reference architecture for developing opportunistic  ...  The framework should provide a set of mechanisms for dynamic network management, human behavior analysis, and information sharing among mobile nodes.  ... 
doi:10.1016/j.jnca.2012.12.028 fatcat:ru2n64yzujeqtcdrmijmrz2bxe

Understanding Complementary Multi-layer Collaborative Heuristics for Adaptive Caching in Heterogeneous Mobile Opportunistic Networks

Vu San Ha Huynh, Milena Radenkovic
2018 2018 14th International Wireless Communications & Mobile Computing Conference (IWCMC)  
heterogeneous mobile opportunistic environments.  ...  Keywords-Opportunistic mobile networks, content discovery and retrieval, content caching, multi-layer heuristics and utilities.  ...  [2] proposed Cafe and CafRep, a congestionaware mobile social framework for data forwarding and replication over heterogeneous opportunistic networks.  ... 
doi:10.1109/iwcmc.2018.8450536 dblp:conf/iwcmc/HuynhR18 fatcat:fpnmi3mqizeuheapy3jute7tty

Adaptive user anonymity for mobile opportunistic networks

Milena Radenkovic, Ivan Vaghi
2012 Proceedings of the seventh ACM international workshop on Challenged networks - CHANTS '12  
This paper describes a novel flexible and adaptive approach, AdaptAnon that is suitable for dynamic and heterogeneous mobile opportunistic networks.  ...  Current mobile opportunistic networks often use social routing protocols to transfer messages among users and to the services.  ...  RELATED WORK This section gives a brief overview of anonymity approaches in social and mobile opportunistic networks. [2] consider social network routing that is based on disseminating information about  ... 
doi:10.1145/2348616.2348635 dblp:conf/mobicom/RadenkovicV12 fatcat:ryj5ibis7zfgbjtxwpq7lhpzca
« Previous Showing results 1 — 15 out of 12,045 results