[HTML][HTML] Evaluating forwarding protocols in opportunistic networks: trends, advances, challenges and best practices

V Kuppusamy, UM Thanthrige, A Udugama, A Förster - Future Internet, 2019 - mdpi.com
A variety of applications and forwarding protocols have been proposed for opportunistic
networks (OppNets) in the literature. However, the methodology of evaluation, testing and …

Mobilityfirst: A mobility-centric and trustworthy internet architecture

A Venkataramani, JF Kurose, D Raychaudhuri… - ACM SIGCOMM …, 2014 - dl.acm.org
MobilityFirst is a future Internet architecture with mobility and trustworthiness as central
design goals. Mobility means that all endpoints--devices, services, content, and networks …

Homing spread: Community home-based multi-copy routing in mobile social networks

J Wu, M **ao, L Huang - 2013 Proceedings IEEE INFOCOM, 2013 - ieeexplore.ieee.org
A mobile social network (MSN) is a special delay tolerant network (DTN) composed of
mobile nodes with social characteristics. Mobile nodes in MSNs generally visit community …

Route or carry: Motion-driven packet forwarding in micro aerial vehicle networks

M Asadpour, KA Hummel, D Giustiniano… - IEEE Transactions …, 2016 - ieeexplore.ieee.org
Micro aerial vehicles (MAVs) provide data such as images and videos from an aerial
perspective, with data typically transferred to the ground. To establish connectivity in larger …

Crf: Coexistent routing and flooding using wifi packets in heterogeneous iot networks

W Wang, X Liu, Y Yao, Y Pan, Z Chi… - IEEE INFOCOM 2019 …, 2019 - ieeexplore.ieee.org
Routing and flooding are important functions in wireless networks. However, until now
routing and flooding protocols are investigated separately within the same network (ie, a …

JamholeHunter: On detecting new wormhole attack in opportunistic mobile networks

A Altaweel, S Aslam, I Kamel - Journal of Network and Computer …, 2024 - Elsevier
This paper first shows that Prophet, Spray and Wait, Epidemic, and First Contact routing
protocols in Opportunistic Mobile Networks (OMNs) are vulnerable to the Jamhole attack. In …

A hybrid MANET-DTN routing scheme for emergency response scenarios

C Raffelsberger, H Hellwagner - 2013 IEEE international …, 2013 - ieeexplore.ieee.org
Emergency response operations are a promising application area for mobile ad-hoc
networks (MANETs). Most existing MANET routing protocols assume that an end-to-end path …

Tour: time-sensitive opportunistic utility-based routing in delay tolerant networks

M **ao, J Wu, C Liu, L Huang - 2013 Proceedings IEEE …, 2013 - ieeexplore.ieee.org
In this paper, we propose a time-sensitive utility model for delay tolerant networks (DTNs), in
which each message has an attached time-sensitive benefit that decays over time. The utility …

Contact expectation based routing for delay tolerant networks

H Chen, W Lou - Ad Hoc Networks, 2016 - Elsevier
In conventional networks, routing problem can be modeled as the design of an efficient
source-to-destination route based on persistent end-to-end paths. However, in a delay …

On detecting route hijacking attack in opportunistic mobile networks

A Altaweel, R Stoleru, G Gu, AK Maity… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
In this paper, we show that Hybrid Routing and Prophet protocols in Opportunistic Mobile
Networks (OMNs) are vulnerable to the CollusiveHijack attack, in which a malicious attacker …