Skip to content

Research at St Andrews

Bootstrapping opportunistic networks using social roles

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Author(s)

Greg Bigwood, Tristan Henderson

School/Research organisations

Abstract

Opportunistic routing protocols can enable message delivery in disconnected networks of mobile devices. To conserve energy in mobile environments, such routing protocols must minimise unnecessary message-forwarding.
This paper presents an opportunistic routing protocol that leverages social role information. We compute node roles from a social network graph to identify nodes with similar contact relationships, and use these roles to determine routing decisions. By using pre-existing social network information, such as online social network friends, to determine roles, we show that our protocol can bootstrap a new opportunistic network without the delay incurred by encounter-history-based routing protocols such as SimbetTS. Simulations with four real-world datasets show improved performance over SimbetTS, with performance approaching Epidemic routing in some scenarios.
Close

Details

Original languageEnglish
Title of host publication2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)
PublisherIEEE
Number of pages6
ISBN (Electronic)978-1-4577-0350-8
ISBN (Print)978-1-4577-0352-2
DOIs
Publication statusPublished - 23 Jun 2011
EventThe Fifth IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications (AOC) - Lucca, Italy
Duration: 20 Jun 201124 Jun 2011

Conference

ConferenceThe Fifth IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications (AOC)
Country/TerritoryItaly
CityLucca
Period20/06/1124/06/11

    Research areas

  • Mobile computing, Social networking, Routing protocols

Discover related content
Find related publications, people, projects and more using interactive charts.

View graph of relations

Related by author

  1. Data portability as a tool for audit

    Zwiebelmann, Z. & Henderson, T., 21 Sep 2021, UbiComp '21: Adjunct Proceedings of the 2021 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2021 ACM International Symposium on Wearable Computers. ACM, p. 276–280 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. Data protection for the common good: developing a framework for a data protection-focused data commons

    Wong, J., Henderson, T. & Ball, K., 15 Sep 2020, Data for Policy Conference 2020. Data for Policy, 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Automating dynamic consent decisions for the processing of social media data in health research

    Norval, C. & Henderson, T., Jul 2020, In: Journal of Empirical Research on Human Research Ethics. 15, 3, p. 187-201

    Research output: Contribution to journalArticlepeer-review

  4. Short paper: Integrating the data protection impact assessment into the software development lifecycle

    Irvine, C., Balasubramaniam, D. & Henderson, T., 2020, Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS 2020 International Workshops, DPM 2020 and CBT 2020, Guildford, UK, September 17–18, 2020, Revised Selected Papers. Garcia-Alfaro, J., Navarro-Arribas, G. & Herrera-Joancomarti, J. (eds.). Cham: Springer, p. 219-228 (Lecture Notes in Computer Science (including subseries Security and Cryptology); vol. 12484 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

ID: 14642469

Top