Data Modeling for Socially Based Routing in Opportunistic Networks

  • Radu-Ioan CiobanuEmail author
  • Ciprian Dobre
  • Fatos Xhafa
Part of the Modeling and Optimization in Science and Technologies book series (MOST, volume 4)


Opportunistic networks are the next step in the evolution of mobile networks, especially, since the number of human-carried mobile devices such as smartphones and tablets has greatly increased in the past few years. They assume unselfish communication between devices based on a store-carry-and-forward paradigm, where mobile nodes carry each other’s data through the network, which is exchanged opportunistically. In this chapter, we present opportunistic networks in detail and show various real-life scenarios where such networks have been successfully deployed or are about to be, such as disaster management, smart cities, wildlife tracking, context-aware platforms, etc. We highlight the challenges in designing successful data routing and dissemination algorithms for opportunistic networks, and present some of the most important techniques and algorithms that have been proposed in the past few years. We show the most important issues for each of them, and attempt to propose solutions for improving opportunistic routing and dissemination. Finally, we present what the future trends in this area of research might be, from information-centric networks to the Internet of Things.


Mobile Device Mobile Node Community Detection Smart City Delay Tolerant Network 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Akyildiz, I.F., Akan, Ö.B., Chen, C., Fang, J., Su, W.: InterPlaNetary Internet: state-of-the-art and research challenges. Computer Networks Journal 43(2), 75–112 (2003)CrossRefzbMATHGoogle Scholar
  2. 2.
    Arnaboldi, V., Conti, M., Delmastro, F., Minutiello, G., Ricci, L.: DroidOppPathFinder: A context and social-aware path recommender system based on opportunistic sensing. In: Proceedings of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2012 (2012)Google Scholar
  3. 3.
    Athanasopoulos, D., Zarras, A.V., Issarny, V., Pitoura, E., Vassiliadis, P.: CoWSAMI: Interface-aware context gathering in ambient intelligence environments. Pervasive and Mobile Computing Journal 4(3), 360–389 (2008)CrossRefGoogle Scholar
  4. 4.
    Bharathidasan, A., An, V., Ponduru, S.: Sensor networks: An overview. Technical report, Department of Computer Science, University of California, Davis (2002)Google Scholar
  5. 5.
    Bigwood, G., Henderson, T.: In: Proceedings of IEEE Third International Conference on Privacy, Security, Risk and Trust, PASSAT 2011 (2011)Google Scholar
  6. 6.
    Bigwood, G., Rehunathan, D., Bateman, M., Henderson, T., Bhatti, S.: Exploiting self-reported social networks for routing in ubiquitous computing environments. In: Proceedings of the 2008 IEEE International Conference on Wireless & Mobile Computing, Networking & Communication, WIMOB 2008, pp. 484–489. IEEE Computer Society, Washington, DC (2008)CrossRefGoogle Scholar
  7. 7.
    Boldrini, C., Conti, M., Passarella, A.: Exploiting users’ social relations to forward data in opportunistic networks: The HiBOp solution. Pervasive and Mobile Computing Journal 4, 633–657 (2008)CrossRefGoogle Scholar
  8. 8.
    Bruno, R., Conti, M., Passarella, A.: Opportunistic networking overlays for ICT services in crisis management. In: Proceedings of the International Conference on Information Systems for Crisis Response and Management, ISCRAM 2008 (2008)Google Scholar
  9. 9.
    Chaintreau, A., Hui, P., Crowcroft, J., Diot, C., Gass, R., Scott, J.: Pocket switched networks: Real-world mobility and its consequences for opportunistic forwarding. Technical report, University of Cambridge Computer Lab (2005)Google Scholar
  10. 10.
    Chourabi, H., Nam, T., Walker, S., Gil-Garcia, J.R., Mellouli, S., Nahon, K., Pardo, T.A., Scholl, H.J.: Understanding smart cities: An integrative framework. In: Proceedings of the 45th Hawaii International Conference on System Science, HICSS 2012, pp. 2289–2297 (2012)Google Scholar
  11. 11.
    Ciobanu, R., Dobre, C.: Data dissemination in opportunistic networks. In: Proceedings of 18th International Conference on Control Systems and Computer Science, CSCS-18, pp. 529–536. Politehnica Press (2012)Google Scholar
  12. 12.
    Ciobanu, R.I., Dobre, C.: Predicting encounters in opportunistic networks. In: Proceedings of the 1st ACM Workshop on High Performance Mobile Opportunistic Systems, HP-MOSys 2012, pp. 9–14. ACM, New York (2012)Google Scholar
  13. 13.
    Ciobanu, R.I., Dobre, C., Cristea, V.: Social aspects to support opportunistic networks in an academic environment. In: Li, X.-Y., Papavassiliou, S., Ruehrup, S. (eds.) ADHOC-NOW 2012. LNCS, vol. 7363, pp. 69–82. Springer, Heidelberg (2012)CrossRefGoogle Scholar
  14. 14.
    Ciobanu, R.I., Dobre, C., Cristea, V.: SPRINT: Social prediction-based opportunistic routing. In: Proceedings of IEEE 14th International Symposium and Workshops on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2013, pp. 1–7 (2013)Google Scholar
  15. 15.
    Ciobanu, R.-I., Dobre, C., Cristea, V., Al-Jumeily, D.: Social aspects for opportunistic communication. In: Proceedings of the 11th International Symposium on Parallel and Distributed Computing, ISPDC 2012, pp. 251–258 (2012)Google Scholar
  16. 16.
    Ciobanu, R.-I., Dobre, C., Dascălu, M., Trăusan-Matu, S., Cristea, V.: Collaborative selfish node detection with an incentive mechanism for opportunistic networks. In: Proceedings of IFIP/IEEE International Symposium on Integrated Network Management, IM 2013, pp. 1161–1166 (2013)Google Scholar
  17. 17.
    Conti, M., Giordano, S., May, M., Passarella, A.: From opportunistic networks to opportunistic computing. Communications Magazine 48(9), 126–139 (2010)CrossRefGoogle Scholar
  18. 18.
    Desta, M.S., Hyytiä, E., Ott, J., Kangasharju, J.: Characterizing content sharing properties for mobile users in open city squares. In: Proceedings of the 10th Annual Conference on Wireless on-demand Network Systems and Services, WONS 2013, pp. 147–154 (2013)Google Scholar
  19. 19.
    Dobre, C., Manea, F., Cristea, V.: CAPIM: A context-aware platform using integrated mobile services. In: Proceedings of IEEE International Conference on Intelligent Computer Communication and Processing, ICCP 2011, pp. 533–540 (2011)Google Scholar
  20. 20.
    Doria, A., Uden, M., Pandey, D.P.: Providing connectivity to the Saami nomadic community. In: Proceedings of the 2nd International Conference on Open Collaborative Design for Sustainable Innovation, DYD 2002, Bangalore, India (December 2002)Google Scholar
  21. 21.
    Ghodsi, A., Shenker, S., Koponen, T., Singla, A., Raghavan, B., Wilcox, J.: Information-centric networking: seeing the forest for the trees. In: Proceedings of the 10th ACM Workshop on Hot Topics in Networks, HotNets-X, pp. 1:1–1:6. ACM, New York (2011)Google Scholar
  22. 22.
    Gu, T., Pung, H.K., Zhang, D.Q.: A service-oriented middleware for building context-aware services. Journal of Network and Computer Applications 28(1), 1–18 (2005)CrossRefGoogle Scholar
  23. 23.
    Guo, B., Yu, Z., Zhou, X., Zhang, D.: Opportunistic IoT: Exploring the social side of the Internet of Things. In: Proceedings of IEEE 16th International Conference on Computer Supported Cooperative Work in Design, CSCWD 2012, pp. 925–929 (2012)Google Scholar
  24. 24.
    Guo, S., Derakhshani, M., Falaki, M.H., Ismail, U., Luk, R., Oliver, E.A., Ur Rahman, S., Seth, A., Zaharia, M.A., Keshav, S.: Design and implementation of the KioskNet system. Computer Networks Journal 55(1), 264–281 (2011)CrossRefGoogle Scholar
  25. 25.
    Haddadi, H., Hui, P., Henderson, T., Brown, I.: Targeted advertising on the handset: privacy and security challenges. Human-Computer Interaction Series. Springer (July 2011)Google Scholar
  26. 26.
    Heinemann, A., Straub, T.: Opportunistic networks as an enabling technology for mobile word-of-mouth advertising. In: Pousttchi, K., Wiedmann, D.G. (eds.) Handbook of Research on Mobile Marketing Management, pp. 236–254. Business Scrience Reference, PA (2010)Google Scholar
  27. 27.
    Henricksen, K., Robinson, R.: A survey of middleware for sensor networks: state-of-the-art and future directions. In: Proceedings of the International Workshop on Middleware for Sensor Networks, MidSens 2006, pp. 60–65. ACM, New York (2006)CrossRefGoogle Scholar
  28. 28.
    Hui, P., Chaintreau, A., Scott, J., Gass, R., Crowcroft, J., Diot, C.: Pocket switched networks and human mobility in conference environments. In: Proceedings of the ACM SIGCOMM Workshop on Delay-Tolerant Networking, WDTN 2005, pp. 244–251. ACM, New York (2005)CrossRefGoogle Scholar
  29. 29.
    Hui, P., Crowcroft, J.: Predictability of human mobility and its impact on forwarding. In: Proceedings of the Third International Conference on Communications and Networking in China, ChinaCom 2008, pp. 543–547 (2008)Google Scholar
  30. 30.
    Hui, P., Crowcroft, J., Yoneki, E.: BUBBLE Rap: social-based forwarding in delay tolerant networks. In: Proceedings of the 9th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2008, pp. 241–250. ACM, New York (2008)Google Scholar
  31. 31.
    Hui, P., Yoneki, E., Chan, S.Y., Crowcroft, J.: Distributed community detection in delay tolerant networks. In: Proceedings of 2nd ACM/IEEE International Workshop on Mobility in the Evolving Internet Architecture, MobiArch 2007, pp. 7:1–7:8. ACM, New York (2007)Google Scholar
  32. 32.
    Juang, P., Oki, H., Wang, Y., Martonosi, M., Peh, L.S., Rubenstein, D.: Energy-efficient computing for wildlife tracking: design tradeoffs and early experiences with ZebraNet. SIGOPS Operating Systems Review 36(5), 96–107 (2002)CrossRefGoogle Scholar
  33. 33.
    Le, V.-D., Scholten, H., Havinga, P.: Unified routing for data dissemination in smart city networks. In: Proceedings of the 3rd International Conference on the Internet of Things, IOT 2012, pp. 175–182. IEEE Press, USA (2012)Google Scholar
  34. 34.
    Lilien, L., Gupta, A., Yang, Z.: Opportunistic networks for emergency applications and their standard implementation framework. In: Proceedings of IEEE International Performance, Computing, and Communications Conference, IPCCC 2007, pp. 588–593 (2007)Google Scholar
  35. 35.
    Lindgren, A., Doria, A., Schelén, O.: Probabilistic routing in intermittently connected networks. SIGMOBILE Mobile Computing and Communications Review 7(3), 19–20 (2003)CrossRefGoogle Scholar
  36. 36.
    Martín-Campillo, A., Martí, R., Yoneki, E., Crowcroft, J.: Electronic triage tag and opportunistic networks in disasters. In: Proceedings of the Special Workshop on Internet and Disasters, SWID 2011, pp. 6:1–6:10. ACM, New York (2011)Google Scholar
  37. 37.
    Moreira, W., Mendes, P., Sargento, S.: Opportunistic routing based on daily routines. In: IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM 2012, pp. 1–6 (2012)Google Scholar
  38. 38.
    Pelusi, L., Passarella, A., Conti, M.: Opportunistic networking: data forwarding in disconnected mobile ad hoc networks. Communications Magazine 44(11), 134–141 (2006)CrossRefGoogle Scholar
  39. 39.
    Pentland, A., Fletcher, R., Hasson, A.: DakNet: Rethinking connectivity in developing nations. Computer Journal 37(1), 78–83 (2004)CrossRefGoogle Scholar
  40. 40.
    INFSO D.4 Networked Enterprise & RFID, INFSO G.2 Micro & Nanosystems, and Working Group RFID of the ETP EPoSS. Internet of Things in 2020. Roadmap for the future (2009), (accessed December 20, 2013)
  41. 41.
    Small, T., Haas, Z.J.: The shared wireless infostation model: a new ad hoc networking paradigm (or where there is a whale, there is a way). In: Proceedings of the 4th ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc 2003, pp. 233–244. ACM, New York (2003)Google Scholar
  42. 42.
    Spyropoulos, T., Psounis, K., Raghavendra, C.S.: Spray and wait: an efficient routing scheme for intermittently connected mobile networks. In: Proceedings of the ACM SIGCOMM Workshop on Delay-Tolerant Networking, WDTN 2005, pp. 252–259. ACM, New York (2005)CrossRefGoogle Scholar
  43. 43.
    Thilakarathna, K., Viana, A.C., Seneviratne, A., Petander, H.: The power of hood friendship for opportunistic content dissemination in mobile social networks. Technical report, INRIA, Saclay, France (2012)Google Scholar
  44. 44.
    Vahdat, A., Becker, D.: Epidemic Routing for Partially-Connected Ad Hoc Networks. Technical report, Duke University (April 2000)Google Scholar
  45. 45.
    Yoneki, E., Hui, P., Chan, S., Crowcroft, J.: A socio-aware overlay for publish/subscribe communication in delay tolerant networks. In: Proceedings of the 10th ACM Symposium on Modeling, Analysis, and Simulation of Wireless and Mobile Systems, MSWiM 2007, pp. 225–234. ACM, New York (2007)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.University Politehnica of BucharestBucharestRomania
  2. 2.Universitat Politècnica de CatalunyaBarcelonaSpain

Personalised recommendations