• Article
  • | |
  • Metrics
  • |
  • Reference [67]
  • |
  • Related [20]
  • |
  • Cited by [49]
  • | |
  • Comments
    Abstract:

    The appearance of plenty of intelligent devices equipped for short-range wireless communications boosts the fast rise of wireless ad hoc networks application. However, in many realistic application environments, nodes form a disconnected network for most of the time due to nodal mobility, low density, lossy link, etc. Conventional communication model of mobile ad hoc network (MANET) requires at least one path existing from source to destination nodes, which results in communication failure in these scenarios. Opportunistic networks utilize the communication opportunities arising from node movement to forward messages in a hop-by-hop way, and implement communications between nodes based on the "store-carry-forward" routing pattern. This networking approach, totally different from the traditional communication model, captures great interests from researchers. This paper first introduces the conceptions and theories of opportunistic networks and some current typical applications. Then it elaborates the popular research problems including opportunistic forwarding mechanism, mobility model and opportunistic data dissemination and retrieval. Some other interesting research points such as communication middleware, cooperation and security problem and new applications are stated briefly. Finally, the paper concludes and looks forward to the possible research focuses for opportunistic networks in the future.

    Reference
    [1] Hull B, Bychkovsky V, Zhang Y, Chen K, Goraczko M, Miu A, Shih E, Balakrishnan H, Madden S. CarTel: A distributed mobile sensor computing system. In: Proc. of the 4th Int'l Conf. on Embedded Networked Sensor Systems. Boulder: ACM, 2006. 125-138.
    [2] Pan H, Chaintreau A, Scott J, Gass R, Crowcroft J, Diot C. Pocket switched networks and human mobility in conference environments. In: Proc. of the 2005 ACM SIGCOMM Workshop on Delay-Tolerant Networking. Philadelphia: ACM. 2005. 244-251.
    [3] Juang P, Oki H, Wang Y, Martonosi M, Peh LS, Rubenstein D. Energy-Efficient computing for wildlife tracking: Design tradeoffs and early experiences with ZebraNet. In: Proc. of the 10th Int'l Conf. on Architectural Support for Programming Languages and Operating Systems. New York: ACM, 2002. 96-107. DOI=http://doi.acm.org/10.1145/605397.605408
    [4] Pelusi L, Passarella A, Conti M. Opportunistic networking: data forwarding in disconnected mobile ad hoc networks. Communications Magazine, 2006,44(11):134-141.
    [5] Conti M, Giordano S. Multihop ad hoc networking: The reality. Communications Magazine, 2007,45(4):88-95.
    [6] Fall K. A delay-tolerant network architecture for challenged Internets. In: Proc. of the 2003 Conf. on Applications, Technologies, Architectures, and Protocols for Computer Communications. Karlsruhe: ACM, 2003. 27-34.
    [7] Akyildiz IF, Akan B, Chen C, Fang J, Su W. InterPlaNetary Internet: State-of-the-Art and research challenges. Computer Networks, 2003,43(2):75-112.
    [8] Gupta P, Kumar P. The capacity of wireless networks. IEEE Trans. on Information Theory, 2000,46(2):388-404.
    [9] Grossglauser M, Tse DNC. Mobility increases the capacity of ad hoc wireless networks. IEEE/ACM Trans. on Networking, 2002, 10(4):477-486.
    [10] Small T, Haas ZJ. The shared wireless infostation model: A new ad hoc networking paradigm (or where there is a whale, there is a way). In: Proc. of the 4th ACM Int'l Symp. on Mobile Ad Hoc Networking. Annapolis: ACM, 2003. 233-244.
    [11] Pentland A, Fletcher R, Hasson A. DakNet: Rethinking connectivity in developing nations. Computer, 2004,37(1):78-83.
    [12] Avri D, Maria U, and Durga PP. Providing connectivity to the Saami nomadic community. In: Proc. of the 2nd Int'l Conf. on Open Collaborative Design for Sustainable Innovation (dyd 02). Bangalore, 2002.
    [13] Brewer E, et al. Tier project. 2006. http://tier.cs.berkeley.edu/wiki/Home
    [14] Spyropoulos T, Psounis K, Raghavendra CS. Spray and wait: An efficient routing scheme for intermittently connected mobile networks. In: Proc. of the 2005 ACM SIGCOMM Workshop on Delay-Tolerant Networking. Philadelphia: ACM, 2005. 252-259.
    [15] Becker VD. Epidemic routing for partially connected ad hoc networks. Technique Report, CS-2000-06, Department of Computer Science, Duke University, Durham, NC, 2000.
    [16] Wang Y, Jain S, Martonosi M, Fall K. Erasure-Coding based routing for opportunistic networks. In: Proc. of the 2005 ACM SIGCOMM Workshop on Delay-Tolerant Networking. Philadelphia: ACM, 2005. 229-236.
    [17] Mitzenmacher M. Digital fountains: A survey and look forward. In: Information Theory Workshop. 2004. 271-276.
    [18] Chen L, Yu C, Sun T, Chen YC, Chu HH. A hybrid routing approach for opportunistic networks. In: Proc. of the 2006 SIGCOMM Workshop on Challenged Networks. Pisa: ACM, 2006. 213-220.
    [19] Widmer J, Boudec JL. Network coding for efficient communication in extreme networks. In: Proc. of the 2005 ACM SIGCOMM Workshop on Delay-Tolerant Networking. Philadelphia: ACM, 2005. 284-291.
    [20] Spyropoulos T, Psounis K, Raghavendra C. Single-Copy routing in intermittently connected mobile networks. In: Proc. of the 2004 1st Annual IEEE Communications Society Conf. on Sensor and Ad Hoc Communications and Networks. 2004. 235-244.
    [21] LeBrun J, Chuah CN, Ghosal D, Zhang M. Knowledge-Based opportunistic forwarding in vehicular wireless ad hoc networks. In: Vehicular Technology Conf., the VTC 2005-Spring, Vol.4. 2005. 2289-2293.
    [22] Leguay J, Friedman T, Conan V. DTN routing in a mobility pattern space. In: Proc. of the 2005 ACM SIGCOMM Workshop on Delay-Tolerant Networking. Philadelphia: ACM, 2005. 276-283.
    [23] Tan K, Zhang Q, Zhu W. Shortest path routing in partially connected ad hoc networks. In: Global Telecommunications Conf., the GLOBECOM 2003, Vol.2. 2003. 1038-1042.
    [24] Ramanathan R, Hansen R, Basu P, Rosales-Hain R, Krishnan R. Prioritized epidemic routing for opportunistic networks. In: Proc. of the 1st Int'l MobiSys Workshop on Mobile Opportunistic Networking. San Juan: ACM, 2007. 62-66.
    [25] Jones EPC, Li L, Ward PAS. Practical routing in delay-tolerant networks. In: Proc. of the 2005 ACM SIGCOMM Workshop on Delay-Tolerant Networking. Philadelphia: ACM, 2005. 237-243.
    [26] Chen C, Chen Z. Evaluating contacts for routing in highly partitioned mobile networks. In: Proc. of the 1st Int'l MobiSys Workshop on Mobile Opportunistic Networking. San Juan: ACM, 2007. 17-24.
    [27] Musolesi M, Hailes S, Mascolo C. Adaptive routing for intermittently connected mobile ad hoc networks. In: Proc. of the 6th IEEE Int'l Symp on World of Wireless Mobile and Multimedia Networks, WoWMoM 2005. 2005. 183-189.
    [28] Jacquet P, Mans B. Routing in intermittently connected networks: Age rumors in connected components. In: Proc. of the 5th Annual IEEE Int'l Conf. on Pervasive Computing and Communications Workshops, PerCom Workshops 2007. 2007. 53-58.
    [29] Lindgren A, Doria A, Schelén O. Probabilistic routing in intermittently connected networks. ACM SIGMOBILE Mobile Computing and Communications Review, 2003,7(3):19-20.
    [30] Spyropoulos T, Psounis K, Raghavendra CS. Spray and focus: Efficient mobility-assisted routing for heterogeneous and correlated mobility. In: Proc. of the IEEE PerCom Workshop on Intermittently Connected Mobile Ad Hoc Networks. 2007.
    [31] Mascolo C, Musolesi M, Pásztor B. Opportunistic mobile sensor data collection with SCAR. In: Proc. of the 4th Int'l Conf. on Embedded Networked Sensor Systems. Boulder: ACM, 2006. 343-344.
    [32] Wang Y, Wu H. DFT-MSN: The Delay/Fault-Tolerant mobile sensor network for pervasive information gathering. In: Proc. of the 25th IEEE Int'l Conf. on Computer Communications. 2006. 1-12.
    [33] Wang Y, Wu H. Replication-Based efficient data delivery scheme (red) for delay/fault-tolerant mobile sensor network (DFT-MSN). In: Proc. of the 4th Annual IEEE Int'l Conf. on Pervasive Computing and Communications Workshops, the PerCom Workshops 2006. 2006. 5.
    [34] Liao Y, Tan K, Zhang Z, Gao L. Estimation based erasure-coding routing in delay tolerant networks. In: Proc. of the 2006 Int'l Conf. on Wireless Communications and Mobile Computing. Vancouver: ACM, 2006. 557-562.
    [35] Shah R, Roy S, Jain S, Brunette W. Data MULEs: Modeling a three-tier architecture for sparse sensor networks. In: Proc. of the 1st IEEE, 2003 IEEE Int'l Workshop on Sensor Network Protocols and Applications. 2003. 30-41.
    [36] Zhao W, Ammar M, Zegura E. A message ferrying approach for data delivery in sparse mobile ad hoc networks. In: Proc. of the 5th ACM Int'l Symp. on Mobile Ad Hoc Networking and Computing. Roppongi Hills: ACM, 2004. 187-198.
    [37] Zhao W, Ammar M, Zegura E. Controlling the mobility of multiple data transport ferries in a delay-tolerant network. In: Proc. of the IEEE INFOCOM 2005. Miami, 2005.
    [38] Broch J, Maltz DA, Johnson DB, Hu Y, Jetcheva J. A performance comparison of multi-hop wireless ad hoc network routing protocols. In: Proc. of the 4th Annual ACM/IEEE Int'l Conf. on Mobile Computing and Networking. Dallas: ACM, 1998. 85-97.
    [39] Bettstetter C. Mobility modeling in wireless networks: Categorization, smooth movement, and border effects. ACM SIGMOBILE Mobile Computing and Communications Review, 2001,5(3):55-66.
    [40] Small T, Haas ZJ. Resource and performance tradeoffs in delay-tolerant wireless networks. In: Proc. of the 2005 ACM SIGCOMM Workshop on Delay-Tolerant Networking. Philadelphia: ACM, 2005. 260-267.
    [41] Jindal A, Psounis K. Performance analysis of epidemic routing under contention. In: Proc. of the 2006 Int'l Conf. on Wireless Communications and Mobile Computing. Vancouver: ACM, 2006. 539-544.
    [42] Eagle N, Pentland A. Reality mining: sensing complex social systems. Personal Ubiquitous Computing, 2006,10(4):255-268.
    [43] UCSD. Wireless topology discovery project, 2004. http://sysnet.ucsd.edu/wtd/wtd.html
    [44] Diot C, et al. Haggle project. 2004. http://www.haggleproject.org
    [45] Zhang X, Kurose J, Levine BN, Towsley D, Zhang H. Study of a bus-based disruption-tolerant network: Mobility modeling and impact on routing. In: Proc. of the 13th Annual ACM Int'l Conf. on Mobile Computing and Networking. Montréal: ACM, 2007. 195-206.
    [46] Cai H, Eun DY. Crossing over the bounded domain: from exponential to power-law inter-meeting time in MANET. In: Proc. of the 13th Annual ACM Int'l Conf. on Mobile Computing and Networking. Montréal: ACM, 2007. 159-170.
    [47] Musolesi M, Mascolo C. A community based mobility model for ad hoc network research. In: Proc. of the 2nd Int'l Workshop on Multi-Hop Ad Hoc Networks: From Theory to Reality. New York: ACM, 31-38.
    [48] Spyropoulos T, Psounis K, Raghavendra CS. Performance analysis of mobility-assisted routing. In: Proc. of the 7th ACM Int'l Symp. on Mobile Ad Hoc Networking and Computing. Florence: ACM, 2006. 49-60.
    [49] Hsu WJ, Spyropoulos T, Psounis K, Helmy A. Modeling time-variant user mobility in wireless mobile networks. In: Proc. of the 26th IEEE Int'l Conf. on Computer Communications. IEEE, 2007. 758-766.
    [50] Hui P, Crowcroft J. How small labels create big improvements. In: Proc. of the 5th IEEE Int'l Conf. on Pervasive Computing and Communications Workshops. IEEE Computer Society, 2007. 65-70.
    [51] Daly EM, Haahr M. Social network analysis for routing in disconnected delay-tolerant MANETs. In: Proc. of the 8th ACM Int'l Symp. on Mobile Ad Hoc Networking and Computing. Montreal: ACM, 2007. 32-40.
    [52] http://www.amillionpeople.net/
    [53] Sollazzo G, Musolesi M, Mascolo C. TACO-DTN: A time-aware content-based dissemination system for delay tolerant networks. In: Proc. of the 1st Int'l MobiSys Workshop on Mobile Opportunistic Networking. San Juan: ACM, 2007. 83-90.
    [54] Leontiadis I, Mascolo C. Opportunistic spatio-temporal dissemination system for vehicular networks. In: Proc. of the 1st Int'l MobiSys Workshop on Mobile Opportunistic Networking. San Juan: ACM, 2007. 39-46.
    [55] Guidec F, Maheo Y. Opportunistic content-based dissemination in disconnected mobile Ad Hoc networks. In: Proc. of the UBICOMM 2007 Int'l Conf. on Mobile Ubiquitous Computing, Systems, Services and Technologies. 2007. 49-54.
    [56] Roberto B, Leonardo Q. Content-Based routing in highly dynamic mobile Ad Hoc networks. Pervasive Comput. & COMM, 2005, V1(4):277-288.
    [57] Pan H, Leguay J, Crowcroft J, Scott J, Friedman T, Conan V. Osmosis in pocket switched networks. In: Proc. of the 1st Int'l Conf. on Communications and Networking in China, the ChinaCom 2006. 2006. 1-6.
    [58] Zhou Y, Levine BN, Croft WB. Distributed information retrieval for disruption-tolerant mobile networks. CIIR Technical Report, IR-412, University of Massachusetts Amherst, 2007.
    [59] Wolfson O, Xu B, Yin H, Cao H. Search-and-Discover in mobile P2P network databases. In: Proc. of the 26th IEEE Int'l Conf. on Distributed Computing Systems, ICDCS 2006. 2006. 65.
    [60] Scott J, Hui P, Crowcroft J, Diot C. Haggle: A networking architecture designed around mobile users. In: Proc. of the 3rd Annual IFIP Conf. on Wireless on-Demand Network Systems and Services (WONS 2006). Les Menuires, 2006.
    [61] Panagakis A, Vaios A, Stavrakakis I. On the effects of cooperation in DTNs. In: Proc. of the 2nd Int'l Conf. on Communication Systems Software and Middleware, the COMSWARE 2007. 2007. 1-6.
    [62] Defrawy KE, Zarki ME, Tsudik G. Incentive-Based cooperative and secure inter-personal networking. In: Proc. of the 1st Int'l MobiSys Workshop on Mobile Opportunistic Networking. San Juan: ACM, 2007. 57-61.
    [63] Buttyan L, Dora L, Felegyhazi M, Vajda I. Barter-Based cooperation in delay-tolerant personal wireless networks. In: Proc. of the IEEE Int'l Symp. on World of Wireless, Mobile and Multimedia Networks, WoWMoM 2007. 2007. 1-6.
    [64] Asokan N, Kostiainen K, Ginzboorg P, Ott J, Luo C. Applicability of identity-based cryptography for disruption-tolerant networking. In: Proc. of the 1st Int'l MobiSys Workshop on Mobile Opportunistic Networking. San Juan: ACM, 2007. 52-56.
    [65] el Fawal A, le Boudec J, Salamatian K. Vulnerabilities in epidemic forwarding. In: Proc. of the IEEE Int'l Symp. on World of Wireless, Mobile and Multimedia Networks, WoWMoM 2007. 2007. 1-6.
    [66] Tan F, Ardon S, Ott M. UbiStore: Ubiquitous and opportunistic backup architecture. In: Proc. of the 5th IEEE Int'l Conf. on Pervasive Computing and Communications Workshops. IEEE Computer Society, 2007. 71-78.
    [67] Ott J, Pitkanen M. DTN-Based content storage and retrieval. In: Proc. of the IEEE Int'l Symp. on World of Wireless, Mobile and Multimedia Networks, WoWMoM 2007. 2007. 1-7, 18-21.
    Comments
    Comments
    分享到微博
    Submit
Get Citation

熊永平,孙利民,牛建伟,刘 燕.机会网络.软件学报,2009,20(1):124-137

Copy
Share
Article Metrics
  • Abstract:17250
  • PDF: 25232
  • HTML: 0
  • Cited by: 0
History
  • Received:May 23,2008
  • Revised:August 28,2008
You are the first2044090Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063