Skip to content

Research at St Andrews

Bootstrapping opportunistic networks using social roles

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Standard

Bootstrapping opportunistic networks using social roles. / Bigwood, Greg; Henderson, Tristan.

2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM). IEEE, 2011.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Harvard

Bigwood, G & Henderson, T 2011, Bootstrapping opportunistic networks using social roles. in 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM). IEEE, The Fifth IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications (AOC), Lucca, Italy, 20/06/11. https://doi.org/10.1109/WoWMoM.2011.5986139

APA

Bigwood, G., & Henderson, T. (2011). Bootstrapping opportunistic networks using social roles. In 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM) IEEE. https://doi.org/10.1109/WoWMoM.2011.5986139

Vancouver

Bigwood G, Henderson T. Bootstrapping opportunistic networks using social roles. In 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM). IEEE. 2011 https://doi.org/10.1109/WoWMoM.2011.5986139

Author

Bigwood, Greg ; Henderson, Tristan. / Bootstrapping opportunistic networks using social roles. 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM). IEEE, 2011.

Bibtex - Download

@inproceedings{b302becf0ad8472cbdf4fae1ac95556c,
title = "Bootstrapping opportunistic networks using social roles",
abstract = "Opportunistic routing protocols can enable message delivery in disconnected networks of mobile devices. To conserve energy in mobile environments, such routing protocols must minimise unnecessary message-forwarding.This paper presents an opportunistic routing protocol that leverages social role information. We compute node roles from a social network graph to identify nodes with similar contact relationships, and use these roles to determine routing decisions. By using pre-existing social network information, such as online social network friends, to determine roles, we show that our protocol can bootstrap a new opportunistic network without the delay incurred by encounter-history-based routing protocols such as SimbetTS. Simulations with four real-world datasets show improved performance over SimbetTS, with performance approaching Epidemic routing in some scenarios.",
keywords = "Mobile computing, Social networking, Routing protocols",
author = "Greg Bigwood and Tristan Henderson",
year = "2011",
month = jun,
day = "23",
doi = "10.1109/WoWMoM.2011.5986139",
language = "English",
isbn = "978-1-4577-0352-2 ",
booktitle = "2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)",
publisher = "IEEE",
note = "The Fifth IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications (AOC) ; Conference date: 20-06-2011 Through 24-06-2011",

}

RIS (suitable for import to EndNote) - Download

TY - GEN

T1 - Bootstrapping opportunistic networks using social roles

AU - Bigwood, Greg

AU - Henderson, Tristan

PY - 2011/6/23

Y1 - 2011/6/23

N2 - Opportunistic routing protocols can enable message delivery in disconnected networks of mobile devices. To conserve energy in mobile environments, such routing protocols must minimise unnecessary message-forwarding.This paper presents an opportunistic routing protocol that leverages social role information. We compute node roles from a social network graph to identify nodes with similar contact relationships, and use these roles to determine routing decisions. By using pre-existing social network information, such as online social network friends, to determine roles, we show that our protocol can bootstrap a new opportunistic network without the delay incurred by encounter-history-based routing protocols such as SimbetTS. Simulations with four real-world datasets show improved performance over SimbetTS, with performance approaching Epidemic routing in some scenarios.

AB - Opportunistic routing protocols can enable message delivery in disconnected networks of mobile devices. To conserve energy in mobile environments, such routing protocols must minimise unnecessary message-forwarding.This paper presents an opportunistic routing protocol that leverages social role information. We compute node roles from a social network graph to identify nodes with similar contact relationships, and use these roles to determine routing decisions. By using pre-existing social network information, such as online social network friends, to determine roles, we show that our protocol can bootstrap a new opportunistic network without the delay incurred by encounter-history-based routing protocols such as SimbetTS. Simulations with four real-world datasets show improved performance over SimbetTS, with performance approaching Epidemic routing in some scenarios.

KW - Mobile computing

KW - Social networking

KW - Routing protocols

U2 - 10.1109/WoWMoM.2011.5986139

DO - 10.1109/WoWMoM.2011.5986139

M3 - Conference contribution

SN - 978-1-4577-0352-2

BT - 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM)

PB - IEEE

T2 - The Fifth IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications (AOC)

Y2 - 20 June 2011 through 24 June 2011

ER -

Related by author

  1. Integrating the Data Protection Impact Assessment into the Software Development Lifecycle

    Irvine, C., Balasubramaniam, D. & Henderson, T., 17 Sep 2020, Proceedings of the 15th DPM International Workshop on Data Privacy Management.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. Data Protection for the Common Good: Developing a framework for a data protection-focused data commons

    Wong, J., Henderson, T. & Ball, K., 15 Sep 2020, Data for Policy Conference 2020.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Automating dynamic consent decisions for the processing of social media data in health research

    Norval, C. & Henderson, T., Jul 2020, In: Journal of Empirical Research on Human Research Ethics. 15, 3, p. 187-201

    Research output: Contribution to journalArticlepeer-review

  4. Data Protection, certification and the fourth industrial revolution

    Henderson, T. & Schafer, B., Sep 2019, Regulating Industrial Internet through IPR, Data Protection and Competition Law. Ballardini, R. M., Pitkänen, O. & Kuommamäki, P. (eds.). Alphen aan den Rijn, The Netherlands: Kluwer Law International

    Research output: Chapter in Book/Report/Conference proceedingChapter

ID: 14642469

Top