Abstract
Opportunistic networks or OPNETs are challenged networks with sporadic communication opportunities and erratic link performance. OPNETs are simply considered complementary to traditional networks particularly at the time of disaster or at the locations without adequate network infrastructure. However, OPNETs are neither obsolete even after unprecedented infrastructural development in traditional networks nor ubiquitously deployed parallel to traditional networks. The need of the hour is to look at these networks with a newer vision considering current developed status of traditional networks. OPNETs can offer cellular network offloading, communication in challenged areas, proximity-based applications and censorship circumvention. This chapter will discuss the concept, protocol, architecture, cooperative framework, routing techniques, privacy issues and future directions of research in OPNETs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Denko, Mieso K., ed. Mobile Opportunistic Networks: Architectures, Protocols and Applications. CRC Press, 2016.
Loo, Jonathan, Jaime Lloret Mauri, and Jess Hamilton Ortiz, eds. Mobile ad hoc networks: current status and future trends. CRC Press, 2016.
Song, Libo, and David F. Kotz. “Routing in Mobile Opportunistic Networks.” Mobile Opportunistic Networks: Architectures, Protocols and Applications (2016): 1.
Xue, Jingfeng, et al. “Spray and wait routing based on average delivery probability in delay tolerant network.” Networks Security, Wireless Communications and Trusted Computing, 2009. NSWCTC’09. International Conference on. Vol. 2. IEEE, 2009.
Pelusi, Luciana, Andrea Passarella, and Marco Conti. “Opportunistic networking: data forwarding in disconnected mobile ad hoc networks.” IEEE communications Magazine 44, no. 11 (2006).
Zhao, Dong, et al. “COUPON: A cooperative framework for building sensing maps in mobile opportunistic networks.” IEEE transactions on parallel and distributed systems 26.2 (2015): 392–402.
Conti, Marco, Silvia Giordano, Martin May, and Andrea Passarella. “From opportunistic networks to opportunistic computing.” IEEE Communications Magazine 48, no. 9 (2010).
Biswas, Sanjit, and Robert Morris. “Opportunistic routing in multi-hop wireless networks.” ACM SIGCOMM Computer Communication Review 34.1 (2004): 69–74.
Mei, Haibo, Peng Jiang, and John Bigham. “Augment delay tolerant networking routing to extend wireless network coverage.” Wireless Communications and Signal Processing (WCSP), 2011 International Conference on. IEEE, 2011.
Zhang, Cheng, Qing-sheng Zhu, and Zi-yu Chen. “Game-based data-forward decision mechanism for opportunistic networks.” Journal of computers 5.2 (2010): 298–305.
Li, Li, Yang Qin, and Xiaoxiong Zhong. “A novel routing scheme for resource-constraint opportunistic networks: A cooperative multiplayer bargaining game approach.” IEEE Transactions on Vehicular Technology 65.8 (2016): 6547–6561.
Mtibaa, Abderrahmen, et al. “Peoplerank: Social opportunistic forwarding.” Infocom, 2010 Proceedings IEEE. IEEE, 2010.
Cetinkaya, Coskun, and Edward W. Knightly. “Opportunistic traffic scheduling over multiple network paths.” INFOCOM 2004. Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies. Vol. 3. IEEE, 2004.
Ganjali, Yashar, and Abtin Keshavarzian. “Load balancing in ad hoc networks: single-path routing vs. multi-path routing.” INFOCOM 2004. Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies. Vol. 2. IEEE, 2004.
Han, Bo, Pan Hui, VS Anil Kumar, Madhav V. Marathe, Jianhua Shao, and Aravind Srinivasan. “Mobile data offloading through opportunistic communications and social participation.” IEEE Transactions on Mobile Computing 11, no. 5 (2012): 821–834.
Wang, Shengling, Xia Wang, Xiuzhen Cheng, Jianhui Huang, Rongfang Bie, and Feng Zhao. “Fundamental Analysis on Data Dissemination in Mobile Opportunistic Networks With Lvy Mobility.” IEEE Transactions on Vehicular Technology 66, no. 5 (2017): 4173–4187.
Parris, Iain, and Tristan Henderson. “The impact of location privacy on opportunistic networks.” World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2011 IEEE International Symposium on a. IEEE, 2011.
Zakhary, Sameh, Milena Radenkovic, and Abderrahim Benslimane. “Efficient location privacy-aware forwarding in opportunistic mobile networks.” IEEE Transactions on Vehicular Technology 63, no. 2 (2014): 893–906.
Hui, Pan, et al. “Pocket switched networks and human mobility in conference environments.” Proceedings of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking. ACM, 2005.
Rao, K. Srihari, Mrs Lokeswari, and J. Srikanth. “Security in unstructured opportunistic networks: Vague communication and counter intelligence functionality.” Int. J. Comput. Sci. Telecommun 3.1 (2012): 54–61.
Leal, Bernardo, and Luigi Atzori. “Connecting Moving Smart objects to the internet: Potentialities and issues When Using Mobile Ad Hoc network technologies.” Mobile Ad Hoc Networks: Current Status and Future Trends (2016): 313.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Goswami, A., Gupta, R., Parashari, G.S. (2018). Infrastructure in Mobile Opportunistic Networks. In: Arya, K., Bhadoria, R., Chaudhari, N. (eds) Emerging Wireless Communication and Network Technologies. Springer, Singapore. https://doi.org/10.1007/978-981-13-0396-8_8
Download citation
DOI: https://doi.org/10.1007/978-981-13-0396-8_8
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-0395-1
Online ISBN: 978-981-13-0396-8
eBook Packages: Computer ScienceComputer Science (R0)