Skip to content

Research at St Andrews

Bootstrapping opportunistic networks using social roles

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Author(s)

Greg Bigwood, Tristan Henderson

School/Research organisations

Abstract

Opportunistic routing protocols can enable message delivery in disconnected networks of mobile devices. To conserve energy in mobile environments, such routing protocols must minimise unnecessary message-forwarding.
This paper presents an opportunistic routing protocol that leverages social role information. We compute node roles from a social network graph to identify nodes with similar contact relationships, and use these roles to determine routing decisions. By using pre-existing social network information, such as online social network friends, to determine roles, we show that our protocol can bootstrap a new opportunistic network without the delay incurred by encounter-history-based routing protocols such as SimbetTS. Simulations with four real-world datasets show improved performance over SimbetTS, with performance approaching Epidemic routing in some scenarios.
Close

Details

Original languageEnglish
Title of host publication2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)
PublisherIEEE
Number of pages6
ISBN (Electronic)978-1-4577-0350-8
ISBN (Print)978-1-4577-0352-2
DOIs
Publication statusPublished - 23 Jun 2011
EventThe Fifth IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications (AOC) - Lucca, Italy
Duration: 20 Jun 201124 Jun 2011

Conference

ConferenceThe Fifth IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications (AOC)
CountryItaly
CityLucca
Period20/06/1124/06/11

    Research areas

  • Mobile computing, Social networking, Routing protocols

Discover related content
Find related publications, people, projects and more using interactive charts.

View graph of relations

Related by author

  1. Co-Creating Autonomy: Group data protection and individual self-determination within a data commons

    Wong, J. & Henderson, T., 2 Feb 2020, (Accepted/In press) Proceedings of the 15th International Digital Curation Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. Data Protection, certification and the fourth industrial revolution

    Henderson, T. & Schafer, B., Sep 2019, Regulating Industrial Internet through IPR, Data Protection and Competition Law. Ballardini, R. M., Pitkänen, O. & Kuommamäki, P. (eds.). Alphen aan den Rijn, The Netherlands: Kluwer Law International

    Research output: Chapter in Book/Report/Conference proceedingChapter

  3. Teaching data ethics: "We're going to ethics the heck out of this"

    Henderson, T., 9 Jan 2019, Proceedings of the 3rd Conference on Computing Education Practice (CEP'19). New York: ACM, 4 p. 4

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

ID: 14642469

Top