2012
DOI: 10.1109/mcom.2012.6231292
|View full text |Cite
|
Sign up to set email alerts
|

Beyond traditional DTN routing: social networks for opportunistic communication

Abstract: Abstract-This article examines the evolution of routing protocols for intermittently connected ad hoc networks and discusses the trend toward social-based routing protocols. A survey of current routing solutions is presented, where routing protocols for opportunistic networks are classified based on the network graph employed. The need to capture performance tradeoffs from a multi-objective perspective is highlighted.

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
38
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 81 publications
(41 citation statements)
references
References 17 publications
1
38
0
Order By: Relevance
“…Integration of some level of randomness may benefit performance. This is relatively a new area and more work needs to be done before it can be appropriately exploited [64]. Some applications of UAV networks, e.g., providing communication over a disaster prone area or communication over an oil drilling platform, may provide an environment where this type of routing can be applied.…”
Section: ) Social Network Based Routingmentioning
confidence: 99%
“…Integration of some level of randomness may benefit performance. This is relatively a new area and more work needs to be done before it can be appropriately exploited [64]. Some applications of UAV networks, e.g., providing communication over a disaster prone area or communication over an oil drilling platform, may provide an environment where this type of routing can be applied.…”
Section: ) Social Network Based Routingmentioning
confidence: 99%
“…[14] Thus, they can be considered as a generalization of DTNs. [5] Device discovery is essentially the first step of opportunistic communication.For example, as shown in Figure 1, the user at the desktop opportunistically exchanges information, via a WiFi ad hoc link or through Bluetooth, a message for a friend to a user passing nearby, "hoping" that this user will carry the information closer to the destination. This user passes close to a train station, using Dynamic Source Routing(DSR) and forwards the message to a traveler going to the same city where the destination user works.…”
Section: Opportunistic Conceptmentioning
confidence: 99%
“…These challenges stem from high delay, such as inter-planetary networks, harsh propagation environments, node mobility, lack of infrastructure, such as rural and remote areas, and military battlefields, limited power, such as mobile sensor networks, etc. DTNs, opportunistic networks or wireless sensor networks constitute typical challenged network examples [1].…”
Section: Introductionmentioning
confidence: 99%