Skip to main content

Infrastructure in Mobile Opportunistic Networks

  • Chapter
  • First Online:
Emerging Wireless Communication and Network Technologies

Abstract

Opportunistic networks or OPNETs are challenged networks with sporadic communication opportunities and erratic link performance. OPNETs are simply considered complementary to traditional networks particularly at the time of disaster or at the locations without adequate network infrastructure. However, OPNETs are neither obsolete even after unprecedented infrastructural development in traditional networks nor ubiquitously deployed parallel to traditional networks. The need of the hour is to look at these networks with a newer vision considering current developed status of traditional networks. OPNETs can offer cellular network offloading, communication in challenged areas, proximity-based applications and censorship circumvention. This chapter will discuss the concept, protocol, architecture, cooperative framework, routing techniques, privacy issues and future directions of research in OPNETs.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 179.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Denko, Mieso K., ed. Mobile Opportunistic Networks: Architectures, Protocols and Applications. CRC Press, 2016.

    Google Scholar 

  2. Loo, Jonathan, Jaime Lloret Mauri, and Jess Hamilton Ortiz, eds. Mobile ad hoc networks: current status and future trends. CRC Press, 2016.

    Google Scholar 

  3. Song, Libo, and David F. Kotz. “Routing in Mobile Opportunistic Networks.” Mobile Opportunistic Networks: Architectures, Protocols and Applications (2016): 1.

    Google Scholar 

  4. Xue, Jingfeng, et al. “Spray and wait routing based on average delivery probability in delay tolerant network.” Networks Security, Wireless Communications and Trusted Computing, 2009. NSWCTC’09. International Conference on. Vol. 2. IEEE, 2009.

    Google Scholar 

  5. Pelusi, Luciana, Andrea Passarella, and Marco Conti. “Opportunistic networking: data forwarding in disconnected mobile ad hoc networks.” IEEE communications Magazine 44, no. 11 (2006).

    Google Scholar 

  6. Zhao, Dong, et al. “COUPON: A cooperative framework for building sensing maps in mobile opportunistic networks.” IEEE transactions on parallel and distributed systems 26.2 (2015): 392–402.

    Google Scholar 

  7. Conti, Marco, Silvia Giordano, Martin May, and Andrea Passarella. “From opportunistic networks to opportunistic computing.” IEEE Communications Magazine 48, no. 9 (2010).

    Google Scholar 

  8. Biswas, Sanjit, and Robert Morris. “Opportunistic routing in multi-hop wireless networks.” ACM SIGCOMM Computer Communication Review 34.1 (2004): 69–74.

    Google Scholar 

  9. Mei, Haibo, Peng Jiang, and John Bigham. “Augment delay tolerant networking routing to extend wireless network coverage.” Wireless Communications and Signal Processing (WCSP), 2011 International Conference on. IEEE, 2011.

    Google Scholar 

  10. Zhang, Cheng, Qing-sheng Zhu, and Zi-yu Chen. “Game-based data-forward decision mechanism for opportunistic networks.” Journal of computers 5.2 (2010): 298–305.

    Google Scholar 

  11. Li, Li, Yang Qin, and Xiaoxiong Zhong. “A novel routing scheme for resource-constraint opportunistic networks: A cooperative multiplayer bargaining game approach.” IEEE Transactions on Vehicular Technology 65.8 (2016): 6547–6561.

    Google Scholar 

  12. Mtibaa, Abderrahmen, et al. “Peoplerank: Social opportunistic forwarding.” Infocom, 2010 Proceedings IEEE. IEEE, 2010.

    Google Scholar 

  13. Cetinkaya, Coskun, and Edward W. Knightly. “Opportunistic traffic scheduling over multiple network paths.” INFOCOM 2004. Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies. Vol. 3. IEEE, 2004.

    Google Scholar 

  14. Ganjali, Yashar, and Abtin Keshavarzian. “Load balancing in ad hoc networks: single-path routing vs. multi-path routing.” INFOCOM 2004. Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies. Vol. 2. IEEE, 2004.

    Google Scholar 

  15. Han, Bo, Pan Hui, VS Anil Kumar, Madhav V. Marathe, Jianhua Shao, and Aravind Srinivasan. “Mobile data offloading through opportunistic communications and social participation.” IEEE Transactions on Mobile Computing 11, no. 5 (2012): 821–834.

    Google Scholar 

  16. Wang, Shengling, Xia Wang, Xiuzhen Cheng, Jianhui Huang, Rongfang Bie, and Feng Zhao. “Fundamental Analysis on Data Dissemination in Mobile Opportunistic Networks With Lvy Mobility.” IEEE Transactions on Vehicular Technology 66, no. 5 (2017): 4173–4187.

    Google Scholar 

  17. Parris, Iain, and Tristan Henderson. “The impact of location privacy on opportunistic networks.” World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2011 IEEE International Symposium on a. IEEE, 2011.

    Google Scholar 

  18. Zakhary, Sameh, Milena Radenkovic, and Abderrahim Benslimane. “Efficient location privacy-aware forwarding in opportunistic mobile networks.” IEEE Transactions on Vehicular Technology 63, no. 2 (2014): 893–906.

    Google Scholar 

  19. Hui, Pan, et al. “Pocket switched networks and human mobility in conference environments.” Proceedings of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking. ACM, 2005.

    Google Scholar 

  20. Rao, K. Srihari, Mrs Lokeswari, and J. Srikanth. “Security in unstructured opportunistic networks: Vague communication and counter intelligence functionality.” Int. J. Comput. Sci. Telecommun 3.1 (2012): 54–61.

    Google Scholar 

  21. Leal, Bernardo, and Luigi Atzori. “Connecting Moving Smart objects to the internet: Potentialities and issues When Using Mobile Ad Hoc network technologies.” Mobile Ad Hoc Networks: Current Status and Future Trends (2016): 313.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Antriksh Goswami .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Goswami, A., Gupta, R., Parashari, G.S. (2018). Infrastructure in Mobile Opportunistic Networks. In: Arya, K., Bhadoria, R., Chaudhari, N. (eds) Emerging Wireless Communication and Network Technologies. Springer, Singapore. https://doi.org/10.1007/978-981-13-0396-8_8

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-0396-8_8

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-0395-1

  • Online ISBN: 978-981-13-0396-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics