{"title":"Uttering: social micro-blogging without the internet","authors":"S. M. Allen, Gualtiero Colombo, R. Whitaker","doi":"10.1145/1755743.1755754","DOIUrl":"https://doi.org/10.1145/1755743.1755754","url":null,"abstract":"This paper studies a new potential social communication phenomenon: social micro-blogging without the Internet. Social micro-blogs (called utterances) are assumed created on mobile devices and shared between peers using direct wireless transmission rather than using any network infrastructure. This combines two emerging issues: opportunistic networking architectures are making it possible to \"store, carry and forward\" such content while trends in social media and self expression such as micro-blogging have become increasingly popular.\u0000 We address the problem of obtaining content of personal interest through social micro-blogging without the Internet. This is a challenging problem because generally speaking, content cannot be pulled from its source on demand. Consequently intelligent techniques are needed that allow content to be pushed between groups of users. We introduce a community-based approach that allows content to be pushed to those who can derive utility from it. We explore the robustness and performance of this approach which builds social networks through which relevant content can be pushed using epidemic-inspired mechanisms.","PeriodicalId":198518,"journal":{"name":"International Workshop on Mobile Opportunistic Networks","volume":"5 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120998702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security issues in opportunistic networks","authors":"Abdullatif Shikfa","doi":"10.1145/1755743.1755795","DOIUrl":"https://doi.org/10.1145/1755743.1755795","url":null,"abstract":"In this extended abstract we present a work on security issues in opportunistic network that were studied in the framework of a PhD program. In particular we analyze the problems of cooperation enforcement and of secure context or content based routing and propose suitable solutions.","PeriodicalId":198518,"journal":{"name":"International Workshop on Mobile Opportunistic Networks","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126518520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy-enhanced opportunistic networks","authors":"Iain Parris","doi":"10.1145/1755743.1755794","DOIUrl":"https://doi.org/10.1145/1755743.1755794","url":null,"abstract":"Opportunistic networks have been the study of much research --- in particular on making end-to-end routing efficient. Social network information is often exploited in opportunistic network routing, but simple social network routing schemes broadcast social network information, which introduces privacy concerns. These inherent privacy issues have not been the subject of much research. Is it possible to add privacy features to opportunistic networks without degrading the user experience? What privacy concerns do users have? How might we build an opportunistic network that can mitigate users' concerns while efficiently delivering data?\u0000 Our early work suggests that it is possible to modify social network routing to add privacy-enhancing features. We are currently planning experiments to determine the privacy concerns of users in different contexts when using opportunistic networks. We will then use our understanding of these concerns to inform design of a privacy-aware social network routing protocol which dynamically adapts to users' privacy requirements in different contexts.","PeriodicalId":198518,"journal":{"name":"International Workshop on Mobile Opportunistic Networks","volume":"13 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134133192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Synthetic map-based mobility traces for the performance evaluation in opportunistic networks","authors":"N. Aschenbruck, Matthias Schwamborn","doi":"10.1145/1755743.1755769","DOIUrl":"https://doi.org/10.1145/1755743.1755769","url":null,"abstract":"Realistic, scenario-dependent mobility modeling is crucial for the reliable performance evaluation of wireless networks. For opportunistic networks several measured movement traces are available. However, for scalability and abstraction of the measured scenarios, synthetic mobility models are needed. In the last decade a significant number of synthetic mobility models have been proposed. However, many of these models lack realism. For example, they miss to consider geographic restrictions in a realistic way.\u0000 In contrast to this, realistic maps are publicly available. Thus, these maps can help integrating geographic restrictions into mobility models. A quite simple way is to integrate location-based services into a scenario modeling tool. In this paper we show such an integration and evaluate the performance of it, as well. The performance evaluation shows that the runtime for the scenario generation is pretty small, even though location-based services are used.","PeriodicalId":198518,"journal":{"name":"International Workshop on Mobile Opportunistic Networks","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123866881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Daniele Mansella, L. Galluccio, A. Leonardi, G. Morabito, A. Pantò, F. Scoto
{"title":"Ateneo On Fly: a system for supporting mobile sharing applications in campus scenarios","authors":"Daniele Mansella, L. Galluccio, A. Leonardi, G. Morabito, A. Pantò, F. Scoto","doi":"10.1145/1755743.1755782","DOIUrl":"https://doi.org/10.1145/1755743.1755782","url":null,"abstract":"In this demo proposal we present Ateneo On Fly (AOF) that has been developed within a project at University of Catania. AOF is a platform for mobile users services dedicated to university students. AOF exploits multiple interfaces that are currently available in the new high capability mobile devices like PDAs or new generation smart phones, and supports two kind of services. The first type consists of information about courses, exams and others uploaded by teachers and downloaded by students once they opportunistically are in contact with infostations. The second type of services are those supported by mobile users who can share, while moving, the data they have already downloaded with other mobile users.","PeriodicalId":198518,"journal":{"name":"International Workshop on Mobile Opportunistic Networks","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130528565","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Spectral efficiency of mobility-assisted podcasting in cellular networks","authors":"V. Vukadinovic, G. Karlsson","doi":"10.1145/1755743.1755753","DOIUrl":"https://doi.org/10.1145/1755743.1755753","url":null,"abstract":"We consider a wireless podcasting service for mobile users. That can be provided by mobile operators in their coverage areas. Our focus is on dense urban environments. The latency and throughput requirements of the podcasting service are flexible and, therefore, podcast contents do not need to be delivered to all users via the operator's network: they can be relayed from one user to another in a store-carry-and-forward fashion. Hence, mobility of users can be used as a supplementary transport mechanism to off-load the operator's network and relieve strain on scarce spectrum resources. In this paper, we evaluate the achievable throughputs and spectrum savings of the mobility-assisted wireless podcasting for various mobility patterns and user densities in an area.","PeriodicalId":198518,"journal":{"name":"International Workshop on Mobile Opportunistic Networks","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130915632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent autonomous handover in iMANETs","authors":"B. McCarthy, Panagiotis Georgopoulos, C. Edwards","doi":"10.1145/1755743.1755759","DOIUrl":"https://doi.org/10.1145/1755743.1755759","url":null,"abstract":"Autonomously making good network handover decisions is a complicated process that is fundamentally important in many complex mobile scenarios. In many mobile scenarios it is often infeasible to assume that an end user can be required to intervene and manually perform or verify a network handover decision. For this reason, utilities are required that can specifically manage the network connectivity of mobile nodes, monitoring their constantly changing state and the changing environment around them in order to ensure that the most appropriate connection is utilised at any given time. In this paper we present our Handover Manager that we have developed specifically for use in rescue system mobile networking solutions, such as mountain and coastal rescue, based on our experiences from real use case deployments. In particular we describe the way our solution autonomously manages connections to multiple heterogeneous access network technologies, we provide results from a testbed based analysis we performed and finally we draw upon our experiences to highlight important areas for future consideration that are applicable to our Handover Manager approach and to the wider MANET community in general.","PeriodicalId":198518,"journal":{"name":"International Workshop on Mobile Opportunistic Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130227661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An opportunistic platform for Android-based mobile devices","authors":"P. Meroni, E. Pagani, G. P. Rossi, L. Valerio","doi":"10.1145/1755743.1755783","DOIUrl":"https://doi.org/10.1145/1755743.1755783","url":null,"abstract":"This paper describes a novel Android-based opportunistic platform for mobile computing applications. It has the aim to incentive the growth of practical experiences that should give an answer to the following question: can Opportunistic Networks actually compete with cellular networks to support urban-wide mobile computing applications?","PeriodicalId":198518,"journal":{"name":"International Workshop on Mobile Opportunistic Networks","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122372923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bernhard Distl, Gergely Csúcs, Sacha Trifunovic, F. Legendre, Carlos Anastasiades
{"title":"Extending the reach of online social networks to opportunistic networks with PodNet","authors":"Bernhard Distl, Gergely Csúcs, Sacha Trifunovic, F. Legendre, Carlos Anastasiades","doi":"10.1145/1755743.1755779","DOIUrl":"https://doi.org/10.1145/1755743.1755779","url":null,"abstract":"PodNet is an opportunistic architecture allowing to exchange multimedia content, or podcasts, from mobiles to mobiles in an opportunistic fashion using Wifi. Content can originate from the Internet (e.g., YouTube, BBC) but it can also be user generated content (e.g., pictures or video/voice recordings). We have enhanced the PodNet architecture to extend the reach of online social networking applications (e.g., Facebook, Twitter) to opportunistic networks. We'll demonstrate how Facebook feeds (public or private) are distributed opportunistically among the demo devices that are carried by participants. Using additional PodNet gateway components, content generated in the opportunistic domain can be sent to the Internet (e.g. updates on the Facebook page). Eventually, we will demonstrate an Infoscreen (embedded with a PodNet gateway), which displays useful high-level information (campus life, tram schedules) users can subscribe to, to fetch richer content provided through PodNet.","PeriodicalId":198518,"journal":{"name":"International Workshop on Mobile Opportunistic Networks","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127089027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An evaluation of the resource discovery process in IEEE 802.11 networks","authors":"G. Castignani, A. Arcia-Moret, N. Montavont","doi":"10.1145/1755743.1755770","DOIUrl":"https://doi.org/10.1145/1755743.1755770","url":null,"abstract":"Today wireless communications are synonym of mobility and resource sharing. These characteristics, proper of spontaneous and ad-hoc networks relies heavily on a general resource discovery process. The discovery process, being an unavoidable procedure, has to be fast and reliable to mitigate the effect of network disruptions. In this article, by means of simulations and a real testbed, our contribution is twofold. First we assess the discovery process focusing on the adaptation of 802.11 timers: MinChannelTime and MaxChannelTime. Then, varying these timers, we propose and evaluate an adaptive discovery strategy from which we obtain notable improvements over a fixed timers strategy.","PeriodicalId":198518,"journal":{"name":"International Workshop on Mobile Opportunistic Networks","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122023518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}