A feasibility study of watchdogs on opportunistic mobile networks

D Soares, B Matthaus, ES Mota… - 2018 IEEE Symposium …, 2018 - ieeexplore.ieee.org
Detection of selfish behavior is crucial to the proper functioning of opportunistic mobile
networks operations. Previous works focused on developing reputation systems or trust …

A social-based watchdog system to detect selfish nodes in opportunistic mobile networks

B Jedari, F Xia, H Chen, SK Das, A Tolba… - Future Generation …, 2019 - Elsevier
Detecting selfish nodes in opportunistic mobile networks can reduce the loss of network
resources, thus improve the data delivery performance. Most of existing detection schemes …

On exploiting temporal periodicity for message delivery in mobile opportunistic networks

YF Hsu, CL Hu, HJ Hsiao - 2018 IEEE 42nd Annual Computer …, 2018 - ieeexplore.ieee.org
The mobile opportunistic network is an emerging thread of mobile and wireless networks,
which distributes messages when nodes move and encounter with others over infrastructure …

Cluster-based Replication: A forwarding strategy for mobile opportunistic networks

E Papapetrou, A Likas - … International Symposium on" A World of …, 2018 - ieeexplore.ieee.org
Mutli-copy routing is an efficient and wide-spread approach for coping with the intermittent
connectivity of mobile opportunistic networks. One popular multi-copy approach is known as …

Evaluating the Effect of Variable Buffer Size and Message Lifetimes in A Disconnected Mobile Opportunistic Network Environment

P Bagane, A Shrivastava, SB Ojha, S Gupta… - … Conference on Recent …, 2023 - Springer
The importance of using a mobile opportunistic network is that it allows users to
communicate and exchange packets with one another from anywhere and at any time …

Beyond contact predictions in mobile opportunistic networks

A Tatar, T Phe-Neau, MD de Amorim… - 2014 11th Annual …, 2014 - ieeexplore.ieee.org
When studying and designing protocols for mobile opportunistic networks, most works
consider only direct contact patterns between mobile nodes. Tracking these contacts is …

Improving message delivery performance in opportunistic networks using a forced-stop diffusion scheme

J Herrera-Tapia, E Hernández-Orallo, A Tomas… - Ad-hoc, Mobile, and …, 2016 - Springer
The performance of mobile opportunistic networks strongly depends on contact duration. If
the contact lasts less than the required transmission times, some messages will not get …

Friend or flood? Social prevention of flooding attacks in mobile opportunistic networks

I Parris, T Henderson - 2014 IEEE 34th international conference …, 2014 - ieeexplore.ieee.org
Opportunistic networks enable decentralised and infrastructure-less social networking
applications, through the cooperation of peer mobile devices to forward messages on one …

A dynamic data routing solution for opportunistic networks

RI Ciobanu, C Dobre, DG Reina… - 2017 14th International …, 2017 - ieeexplore.ieee.org
When two nodes in an opportunistic network meet, a utility function is generally employed to
select the data that have to be exchanged between them, in order to maximize the chance of …

Forwarding redundancy in opportunistic mobile networks: Investigation, elimination and exploitation

W Gao, Q Li, G Cao - IEEE Transactions on Mobile Computing, 2014 - ieeexplore.ieee.org
Opportunistic mobile networks consist of mobile devices which are intermittently connected
via short-range radios. Forwarding in such networks relies on selecting relays to carry and …