A survey of social-aware routing protocols in delay tolerant networks: Applications, taxonomy and design-related issues

K Wei, X Liang, K Xu - IEEE Communications Surveys & …, 2013 - ieeexplore.ieee.org
In the past few years, more and more researchers have paid close attention to the emerging
field of delay tolerant networks (DTNs), in which network often partitions and end-to-end …

Keep your friends close: Incorporating trust into social network-based sybil defenses

A Mohaisen, N Hopper, Y Kim - 2011 Proceedings IEEE …, 2011 - ieeexplore.ieee.org
Social network-based Sybil defenses exploit the algorithmic properties of social graphs to
infer the extent to which an arbitrary node in such a graph should be trusted. However, these …

Secure encounter-based mobile social networks: Requirements, designs, and tradeoffs

A Mohaien, DF Kune, EY Vasserman… - IEEE Transactions on …, 2013 - ieeexplore.ieee.org
Encounter-based social networks and encounter-based systems link users who share a
location at the same time, as opposed to the traditional social network paradigm of linking …

Collaboration in social network-based information dissemination

A Mohaisen, T AbuHmed, T Zhu… - 2012 IEEE International …, 2012 - ieeexplore.ieee.org
Connectivity and trust within social networks have been exploited to build applications on
top of these networks, including information dissemination, Sybil defenses, and anonymous …

Analyzing the impact of selfishness on probabilistic routing algorithms in Delay Tolerant Networks

CC Sobin - 2015 International Conference on Computing and …, 2015 - ieeexplore.ieee.org
Delay Tolerant Networks (DTNs) are sparse networks, in which communication is possible
without end-to-end connectivity. A node in DTN is considered as selfish when that node is …

[PDF][PDF] Implementation of a disaster mode to maintain twitter communications in times of network outages

P Carta - 2011 - pub.tik.ee.ethz.ch
Online social networks like Twitter and Facebook have become critical infrastructure for
communicating and spreading news, especially in times of natural disasters or political …

Secure and usable services in opportunistic networks

M Nagy - 2019 - aaltodoc.aalto.fi
The last 10 years of Internet development have been dominated by the growing popularity of
cloud computing and online social networks. These enable the building of new services …

Opportunistic Emergency Scenarios: An Opportunistic Distributed Computing Approach

CB Iglesias - Opportunistic Networks, 2021 - taylorfrancis.com
In this chapter, I present an application of a general purpose, multi-application mobile node
sensor network based on mobile code applied to emergency scenarios. Mobile nodes host …

Mobile-Code-Based Opportunistic Networking

CB Iglesias - Opportunistic Networks, 2021 - taylorfrancis.com
In this chapter we explain how to include mobile code in opportunistic networking (OppNet)
messages to improve its performance. Store-carry-and-forward OppNet protocols offer new …

[PDF][PDF] Characterizing collaboration in social network-enabled routing

M Mohaisen, A Mohaisen - KSII Transactions on Internet and …, 2016 - koreascience.kr
Connectivity and trust in social networks have been exploited to propose applications on top
of these networks, including routing, Sybil defenses, and anonymous communication …