Collaboration in opportunistic networks

With the increasing integration of wireless short-range communication technologies in mobile devices, novel applications for spontaneous communication, interaction and collaboration are possible. In this book, we distinguish between active and passive collaboration. The devices help users become aware of each other and stimulate face-to-face conversation (active collaboration). Also, autonomous device communication for sharing information without user interaction is possible, i.e., devices pass information to other devices in their vicinity (passive collaboration). Spontaneous communication of mobile devices leads to so-called opportunistic networks, a new and promising evolution in mobile ad-hoc networking. They are formed by mobile devices which communicate with each other while users are in close proximity. This book investigates opportunistic networks in their entirety. The proposed concepts comprise system components, a node architecture, a system model and a simple one-hop communication paradigm for opportunistic network applications. One focus of this book is a profile-based data dissemination mechanism. Readers of this book would include graduate students and postgraduate researchers in both academia and industry, who wish to gain a deeper knowledge of opportunistic networks, its underlying idea and its potential capabilities.

[1]  Marco Conti,et al.  Opportunistic networking: data forwarding in disconnected mobile ad hoc networks , 2006, IEEE Communications Magazine.

[2]  Jussi Kangasharju,et al.  Incentives for electronic coupon systems , 2006, MobiShare '06.

[3]  Kaustubh S. Phanse,et al.  Opportunistic wireless access networks , 2006, AcessNets '06.

[4]  Arnold Pears,et al.  What & When?: Distributing Content in Opportunistic Networks , 2006, 2006 International Conference on Wireless and Mobile Communications (ICWMC'06).

[5]  Pan Hui,et al.  Impact of Human Mobility on the Design of Opportunistic Forwarding Algorithms , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[6]  Stanislav Kurkovsky,et al.  Using ubiquitous computing in interactive mobile marketing , 2006, Personal and Ubiquitous Computing.

[7]  Alex Pentland,et al.  Reality mining: sensing complex social systems , 2006, Personal and Ubiquitous Computing.

[8]  Miguel Nussbaum,et al.  Comparative Analysis of Ad-Hoc Networks Oriented to Collaborative Activities , 2006, ARCS.

[9]  Pan Hui,et al.  Haggle: A networking architecture designed around mobile users , 2006 .

[10]  Oliver P. Waldhorst,et al.  Design and quantitative analysis of protocols for epidemic information dissemination in mobile ad hoc networks , 2005, Ausgezeichnete Informatikdissertationen.

[11]  A. Boukerche Handbook of Algorithms for Wireless Networking and Mobile Computing , 2005 .

[12]  Pan Hui,et al.  Pocket Switched Networking: Challenges, Feasibility and Implementation Issues , 2005, WAC.

[13]  Klaus Wehrle,et al.  Peer-to-Peer Systems and Applications , 2005, Peer-to-Peer Systems and Applications.

[14]  Max Mühlhäuser,et al.  A Privacy Preserving Reputation System for Mobile Information Dissemination Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[15]  David A. Wagner,et al.  Security and Privacy Issues in E-passports , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[16]  Jordi Sabater-Mir,et al.  Review on Computational Trust and Reputation Models , 2005, Artificial Intelligence Review.

[17]  Pan Hui,et al.  Pocket switched networks and human mobility in conference environments , 2005, WDTN '05.

[18]  Thad Starner,et al.  Wearable computing for the developing world , 2005, IEEE Pervasive Comput..

[19]  Alex Pentland,et al.  Social serendipity: mobilizing social software , 2005, IEEE Pervasive Computing.

[20]  Russell Beale,et al.  Supporting social interaction with smart phones , 2005, IEEE Pervasive Computing.

[21]  Tobias Hoßfeld,et al.  Mapping of file-sharing onto mobile environments: feasibility and performance of eDonkey with GPRS , 2005, IEEE Wireless Communications and Networking Conference, 2005.

[22]  Tobias Hoßfeld,et al.  Mapping of file-sharing onto mobile environments: enhancement by UMTS , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.

[23]  David C. Wilson,et al.  Peer-to-peer information sharing in a mobile ad hoc environment , 2004, Sixth IEEE Workshop on Mobile Computing Systems and Applications.

[24]  Hartmut Pohl,et al.  RFID security , 2004, Inf. Secur. Tech. Rep..

[25]  Kevin C. Almeroth,et al.  Coupons: wide scale information distribution for wireless ad hoc networks , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..

[26]  David V. Keyson,et al.  The human side of sharing in peer-to-peer networks , 2004, EUSAI '04.

[27]  Jon Crowcroft,et al.  Rethinking incentives for mobile ad hoc networks , 2004, PINS '04.

[28]  K. Höök,et al.  MobiTip: Using Bluetooth as a Mediator of Social Context , 2004 .

[29]  Aris M. Ouksel,et al.  Opportunistic resource exchange in inter-vehicle ad-hoc networks , 2004, IEEE International Conference on Mobile Data Management, 2004. Proceedings. 2004.

[30]  Kevin C. Almeroth,et al.  Coupon based incentive systems and the implications of equilibrium theory , 2004, Proceedings. IEEE International Conference on e-Commerce Technology, 2004. CEC 2004..

[31]  Hannes Frey,et al.  Scalable geographic routing algorithms for wireless ad hoc networks , 2004, IEEE Network.

[32]  Karl Aberer,et al.  Autonomous Gossiping: A Self-Organizing Epidemic Algorithm for Selective Information Dissemination in Wireless Mobile Ad-Hoc Networks , 2004, ICSNW.

[33]  Timo Ojala,et al.  Bluetooth and WAP push based location-aware mobile advertising system , 2004, MobiSys '04.

[34]  Bernhard Bauer,et al.  Towards a general approach to mobile profile based distributed grouping , 2004, Personal and Ubiquitous Computing.

[35]  Tobias Straub,et al.  An anonymous bonus point system for mobile commerce based on word-of-mouth recommendation , 2004, SAC '04.

[36]  Bharat K. Bhargava,et al.  Peer-to-peer file-sharing over mobile ad hoc networks , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[37]  Giuseppe Anastasi,et al.  Wi-fi in ad hoc mode: a measurement study , 2004, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the.

[38]  Bernhard Bauer,et al.  MPDG - mobile profile based distributed grouping , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.

[39]  Timo Ojala,et al.  SmartRotuaari - Context-Aware Mobile Multimedia Services , 2003 .

[40]  R. Bharat Rao,et al.  Evolution of mobile location-based services , 2003, CACM.

[41]  Oliver P. Waldhorst,et al.  Peer-to-Peer Computing in Mobile Ad Hoc Networks , 2003, MASCOTS Tutorials.

[42]  Timothy W. Finin,et al.  eNcentive: a framework for intelligent marketing in mobile peer-to-peer environments , 2003, ICEC '03.

[43]  Kevin C. Almeroth,et al.  Towards realistic mobility models for mobile ad hoc networks , 2003, MobiCom '03.

[44]  Miguel Nussbaum,et al.  Encouraging Face-to-Face Collaborative Learning through the Use of Handheld Computers in the Classroom , 2003, Mobile HCI.

[45]  Max Mühlhäuser,et al.  iClouds - Peer-to-Peer Information Sharing in Mobile Environments , 2003, Euro-Par.

[46]  Christian Seitz,et al.  Towards an Approach for Mobile Profile Based Distributed Clustering , 2003, Euro-Par.

[47]  Krishna P. Gummadi,et al.  Measuring and analyzing the characteristics of Napster and Gnutella hosts , 2003, Multimedia Systems.

[48]  Xiaoyan Hong,et al.  ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks , 2003, MobiHoc '03.

[49]  M. Conti,et al.  IEEE 802.11 ad hoc networks: performance measurements , 2003, 23rd International Conference on Distributed Computing Systems Workshops, 2003. Proceedings..

[50]  Mahadev Satyanarayanan,et al.  Predictive Resource Management for Wearable Computing , 2003, MobiSys '03.

[51]  Eija Kaasinen,et al.  User needs for location-aware mobile services , 2003, Personal and Ubiquitous Computing.

[52]  Max Mühlhäuser,et al.  Engineering multimedia-aware personalized ubiquitous services , 2002, Fourth International Symposium on Multimedia Software Engineering, 2002. Proceedings..

[53]  Baochun Li,et al.  Efficient peer-to-peer data dissemination in mobile ad-hoc networks , 2002, Proceedings. International Conference on Parallel Processing Workshop.

[54]  Christian Becker,et al.  An epidemic model for information diffusion in MANETs , 2002, MSWiM '02.

[55]  Roy H. Campbell,et al.  Advertising in a pervasive computing environment , 2002, WMC '02.

[56]  Oliver P. Waldhorst,et al.  A distributed search service for peer-to-peer file sharing in mobile applications , 2002, Proceedings. Second International Conference on Peer-to-Peer Computing,.

[57]  Tracy Camp,et al.  A survey of mobility models for ad hoc network research , 2002, Wirel. Commun. Mob. Comput..

[58]  Jörg Hähner,et al.  Graph-based mobility model for mobile ad hoc network simulation , 2002, Proceedings 35th Annual Simulation Symposium. SS 2002.

[59]  Oliver P. Waldhorst,et al.  Eine Protokollumgebung für Peer-to-Peer Dokumentenaustausch in infrastrukturlosen mobilen Umgebungen , 2002, WMAN.

[60]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[61]  A. Laouiti,et al.  Optimized link state routing protocol for ad hoc networks , 2001, Proceedings. IEEE International Multi Topic Conference, 2001. IEEE INMIC 2001. Technology for the 21st Century..

[62]  Einar Snekkenes,et al.  Concepts for personal location privacy policies , 2001, EC '01.

[63]  Kevin Leyton-Brown,et al.  Incentives for sharing in peer-to-peer networks , 2001, EC '01.

[64]  Gerd Kortuem,et al.  When peer-to-peer comes face-to-face: collaborative peer-to-peer computing in mobile ad-hoc networks , 2001, Proceedings First International Conference on Peer-to-Peer Computing.

[65]  Rüdiger Schollmeier,et al.  A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications , 2001, Proceedings First International Conference on Peer-to-Peer Computing.

[66]  C. Gavoille,et al.  Routing in Trees , 2001, ICALP.

[67]  David A. Maltz,et al.  DSR: the dynamic source routing protocol for multihop wireless ad hoc networks , 2001 .

[68]  Eytan Adar,et al.  Free Riding on Gnutella , 2000, First Monday.

[69]  Arjen K. Lenstra,et al.  Selecting Cryptographic Key Sizes , 2000, Journal of Cryptology.

[70]  Gerd Kortuem,et al.  Close Encounters: Supporting Mobile Collaboration through Interchange of User Profiles , 1999, HUC.

[71]  Bartosz Mielczarek,et al.  Scenario-based performance analysis of routing protocols for mobile ad-hoc networks , 1999, MobiCom.

[72]  Elizabeth M. Belding-Royer,et al.  A review of current routing protocols for ad hoc mobile wireless networks , 1999, IEEE Wirel. Commun..

[73]  Lars Erik Holmquist,et al.  Supporting group collaboration with interpersonal awareness devices , 1999, Personal Technologies.

[74]  Charles E. Perkins,et al.  Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.

[75]  David A. Maltz,et al.  A performance comparison of multi-hop wireless ad hoc network routing protocols , 1998, MobiCom '98.

[76]  Mario Gerla,et al.  On-demand multicast in mobile wireless networks , 1998, Proceedings Sixth International Conference on Network Protocols (Cat. No.98TB100256).

[77]  Michael Luby,et al.  A digital fountain approach to reliable distribution of bulk data , 1998, SIGCOMM '98.

[78]  Berry Schoenmakers,et al.  Security Aspects of the EcashTM Payment System , 1997, State of the Art in Applied Cryptography.

[79]  Hannes Federrath,et al.  MIXes in Mobile Communication Systems: Location Management with Privacy , 1996, Information Hiding.

[80]  Charles E. Perkins,et al.  Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.

[81]  Mark Weiser,et al.  The world is not a desktop , 1994, INTR.

[82]  M. Weiser,et al.  Hot topics-ubiquitous computing , 1993 .

[83]  Mark Weiser,et al.  Some computer science issues in ubiquitous computing , 1993, CACM.

[84]  Amos Fiat,et al.  Untraceable Electronic Cash , 1990, CRYPTO.

[85]  Scott Shenker,et al.  Epidemic algorithms for replicated database maintenance , 1988, OPSR.

[86]  David Chaum,et al.  Security without identification: transaction systems to make big brother obsolete , 1985, CACM.

[87]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[88]  Pierangela Samarati,et al.  Location privacy in pervasive computing , 2008 .

[89]  Tobias Straub,et al.  Digitale Reisepässe in Deutschland - Prozesse und Sicherheitsinfrastruktur , 2006, Sicherheit.

[90]  Marco Conti,et al.  Peer-to-Peer Computing in Mobile Ad Hoc Networks , 2006, The Handbook of Mobile Middleware.

[91]  Andreas Heinemann,et al.  Survey on Location Privacy in Pervasive Computing , 2005 .

[92]  Oliver P. Waldhorst,et al.  Epidemic Data Dissemination for Mobile Peer-to-Peer Lookup Services , 2005, Peer-to-Peer Systems and Applications.

[93]  Hannes Frey,et al.  Information Dissemination Based on the En-Passent Communication Pattern , 2005, KiVS.

[94]  Max Mühlhäuser,et al.  Spontaneous Collaboration in Mobile Peer-to-Peer Networks , 2005, Peer-to-Peer Systems and Applications.

[95]  Nathan Eagle,et al.  Machine perception and learning of complex social systems , 2005 .

[96]  Alex Pentland,et al.  DakNet: rethinking connectivity in developing nations , 2004, Computer.

[97]  M. Berger,et al.  moPiMine - mobile profile mining , 2004, International Workshop on Wireless Ad-Hoc Networks, 2004..

[98]  Tobias Straub,et al.  Zur rechtsverträglichen Technikgestaltung anheind einer M-Commerce-Anwendung , 2004, Workshop Mobile Commerce.

[99]  M. Mühlhäuser,et al.  Allgegenwärtige Rechner : eine neue Dimension der IT-Sicherheitsproblematik , 2004 .

[100]  Omer Mahmood,et al.  Combining Mobile Data Transport and Mobile Data Recharging to Address Public Transport Information Maintenance Problems in Rural and Remote Australia , 2004, ISI.

[101]  A. Beresford,et al.  Location Privacy in Pervasive Computing , 2003, IEEE Pervasive Comput..

[102]  Anwitaman Datta,et al.  MobiGrid: Peer-to-Peer Overlay and Mobile Ad-Hoc Network Rendezvous - a Data Management Perspective. , 2003 .

[103]  Jörg Hähner,et al.  Usenet-on-the-fly - Supporting Locality of Information in Spontaneous Networking Environments , 2003 .

[104]  Y. C. Hu,et al.  USENIX Association Proceedings of HotOS IX : The 9 th Workshop on Hot Topics in Operating Systems , 2003 .

[105]  Max Mühlhäuser,et al.  Ad hoc collaboration and information services using information clouds , 2003 .

[106]  Tobias Straub,et al.  Mund-zu-Mund-Propaganda mit Bonussystem in mobilen Ad-Hoc-Netzen , 2003, GI Jahrestagung.

[107]  Oliver P. Waldhorst,et al.  A special-purpose peer-to-peer file sharing system for mobile ad hoc networks , 2003, 2003 IEEE 58th Vehicular Technology Conference. VTC 2003-Fall (IEEE Cat. No.03CH37484).

[108]  T D'Roza,et al.  An Overview of Location-Based Services , 2003 .

[109]  Ronald L. Rivest,et al.  Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.

[110]  A. Sadeghi,et al.  Electronic Payment Systems , 2003, Digital Rights Management.

[111]  Kurt Geihs,et al.  Shark - a System for Management, Synchronization and Exchange of Knowledge in Mobile User Groups , 2002, J. Univers. Comput. Sci..

[112]  Max Mühlhäuser,et al.  Towards personalized ubiquitous computing services , 2002 .

[113]  Gerd Kortuem,et al.  A methodology and software platform for building wearable communities , 2002 .

[114]  Kalle Lyytinen,et al.  Issues and Challenges in Ubiquitous Computing , 2002 .

[115]  Miguel Nussbaum,et al.  An Agent-Based Middleware for Supporting Spontaneous Collaboration among Co-Located , Mobile , and not necessarily Known People , 2002 .

[116]  Wolfgang Blochinger,et al.  Dependable High Performance Computing on a Parallel Sysplex Cluster , 2000, PDPTA.

[117]  Joseph P. Macker,et al.  Mobile Ad hoc Networking (MANET): Routing Protocol Performance Issues and Evaluation Considerations , 1999, RFC.

[118]  James H. Aylor,et al.  Computer for the 21st Century , 1999, Computer.

[119]  Michael Waidner Electronic Payment Systems , 1996 .

[120]  David Chaum,et al.  Blind Signatures for Untraceable Payments , 1982, CRYPTO.