Research challenges towards the Future Internet

The convergence of computer-communication networks towards an all-IP integrated network has transformed Internet in a commercial commodity that has stimulated an un-precedent offer of novel communication services that are pushing the Internet architecture and protocols well beyond their original design. This calls for extraordinary research efforts at all levels of the protocol stack to address the challenges of existing and future networked applications and services in terms of scalability, mobility, flexibility, security, etc. In this article we focus on some hot research areas and discuss the research issues that need to be tackled for addressing the multiple challenges of the Future Internet. Far from being a comprehensive analysis of all the challenges faced by the Future Internet, this article tries to call the attention of Computer Communications readers to new and promising research areas, identified by members of the journal editorial board to stimulate further research activities in these areas. The survey of these research areas is then complemented with a brief review of the on-going activities in the other important research areas towards the Future Internet.

[1]  Yuguang Fang,et al.  Privacy and security for online social networks: challenges and opportunities , 2010, IEEE Network.

[2]  Marianne Winslett,et al.  Secure aggregation in a publish-subscribe system , 2008, WPES '08.

[3]  Xiaodong Wang,et al.  Coordinated Scheduling and Power Allocation in Downlink Multicell OFDMA Networks , 2009, IEEE Transactions on Vehicular Technology.

[4]  Andrew T. Campbell,et al.  Fast track article: Bubble-sensing: Binding sensing tasks to the physical world , 2010 .

[5]  Rajashekhar C. Biradar,et al.  A survey on routing protocols in Wireless Sensor Networks , 2012, 2012 18th IEEE International Conference on Networks (ICON).

[6]  M. Hansen,et al.  Participatory Sensing , 2019, Internet of Things.

[7]  Reza Curtmola,et al.  Secure network coding for wireless mesh networks: Threats, challenges, and directions , 2009, Comput. Commun..

[8]  Andrea Passarella,et al.  HCMM: Modelling spatial and temporal properties of human mobility driven by users' social relationships , 2010, Comput. Commun..

[9]  Makoto Takizawa,et al.  A Survey on Clustering Algorithms for Wireless Sensor Networks , 2010, NBiS.

[10]  Yu Wang,et al.  Routing in vehicular ad hoc networks: A survey , 2007, IEEE Vehicular Technology Magazine.

[11]  Zheng Wang,et al.  Internet traffic engineering without full mesh overlaying , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).

[12]  Marco Conti,et al.  Autonomic detection of dynamic social communities in Opportunistic Networks , 2011, 2011 The 10th IFIP Annual Mediterranean Ad Hoc Networking Workshop.

[13]  Refik Molva,et al.  Privacy and confidentiality in context-based and epidemic forwarding , 2010, Comput. Commun..

[14]  Marco Mellia,et al.  Energy-Aware Networks: Reducing Power Consumption By Switching Off Network Elements (invited paper) , 2008 .

[15]  Mikkel Thorup,et al.  Optimizing OSPF/IS-IS weights in a changing world , 2002, IEEE J. Sel. Areas Commun..

[16]  Larry Peterson,et al.  Inter-AS traffic patterns and their implications , 1999, Seamless Interconnection for Universal Services. Global Telecommunications Conference. GLOBECOM'99. (Cat. No.99CH37042).

[17]  Dharma P. Agrawal,et al.  Mobile Ad hoc Networking , 2002 .

[18]  Giuseppe Anastasi,et al.  A Comprehensive Analysis of the MAC Unreliability Problem in IEEE 802.15.4 Wireless Sensor Networks , 2011, IEEE Transactions on Industrial Informatics.

[19]  Brian D. Davison,et al.  Performance comparison of different multicast routing strategies in disruption tolerant networks , 2009, Comput. Commun..

[20]  K DasSajal,et al.  QoS-aware data reporting control in cluster-based wireless sensor networks , 2010 .

[21]  Weijia Jia,et al.  Mobility: A Double-Edged Sword for HSPA Networks: A Large-Scale Test on Hong Kong Mobile HSPA Networks , 2010, IEEE Transactions on Parallel and Distributed Systems.

[22]  Deniz Gündüz,et al.  Source and Channel Coding for Cooperative Relaying , 2005, IEEE Transactions on Information Theory.

[23]  Thierry Turletti,et al.  Routing in Delay-Tolerant Networks Comprising Heterogeneous Node Populations , 2009, IEEE Transactions on Mobile Computing.

[24]  Jie Gao,et al.  Moving beyond end-to-end path information to optimize CDN performance , 2009, IMC '09.

[25]  Robert Cole,et al.  Computer Communications , 1982, Springer New York.

[26]  Farnam Jahanian,et al.  Internet routing instability , 1997, SIGCOMM '97.

[27]  Tomas Olovsson,et al.  Passive internet measurement: Overview and guidelines based on experiences , 2010, Comput. Commun..

[28]  Joseph Mitola,et al.  Cognitive Radio Architecture: The Engineering Foundations of Radio XML , 2006 .

[29]  Rodney S. Tucker,et al.  The future Internet - An energy consumption perspective , 2009, 2009 14th OptoElectronics and Communications Conference.

[30]  Sidi-Mohammed Senouci,et al.  A Cooperative Low Power Mac Protocol for Wireless Sensor Networks , 2011, 2011 IEEE International Conference on Communications (ICC).

[31]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[32]  Moshe Zukerman,et al.  Optimizing multi-layered networks towards a transparently optical internet , 2010, 2010 12th International Conference on Transparent Optical Networks.

[33]  Yung Yi,et al.  Practical dynamic interference management in multi-carrier multi-cell wireless networks: A reference user based approach , 2010, 8th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks.

[34]  Simon Haykin,et al.  Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.

[35]  L. Chiaraviglio,et al.  Optimal Energy Savings in Cellular Access Networks , 2009, 2009 IEEE International Conference on Communications Workshops.

[36]  Rodrigo Roman,et al.  Trust management systems for wireless sensor networks: Best practices , 2010, Comput. Commun..

[37]  Marco Conti,et al.  Exploiting users' social relations to forward data in opportunistic networks: The HiBOp solution , 2008, Pervasive Mob. Comput..

[38]  Pedro Merino,et al.  QoS analysis of video streaming service in live cellular networks , 2010, Comput. Commun..

[39]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2005, Wirel. Networks.

[40]  Jörg Ott,et al.  Drive-thru Internet: IEEE 802.11b for "automobile" users , 2004, IEEE INFOCOM 2004.

[41]  Dan Forsberg,et al.  LTE key management analysis with session keys context , 2010, Comput. Commun..

[42]  R.S. Tucker,et al.  Energy Consumption in Optical IP Networks , 2009, Journal of Lightwave Technology.

[43]  Joseph Mitola,et al.  Cognitive Radio An Integrated Agent Architecture for Software Defined Radio , 2000 .

[44]  Larry L. Constantine,et al.  Back to the future , 2001, CACM.

[45]  Eytan Modiano,et al.  Fairness and Optimal Stochastic Control for Heterogeneous Networks , 2005, IEEE/ACM Transactions on Networking.

[46]  Mihaela Cardei,et al.  Improving network lifetime with mobile wireless sensor networks , 2010, Comput. Commun..

[47]  Oliver W. W. Yang,et al.  Vehicular telematics over heterogeneous wireless networks: A survey , 2010, Comput. Commun..

[48]  Shouhuai Xu,et al.  Establishing pairwise keys for secure communication in ad hoc networks: a probabilistic approach , 2003, 11th IEEE International Conference on Network Protocols, 2003. Proceedings..

[49]  Songwu Lu,et al.  SmartSiren: virus detection and alert for smartphones , 2007, MobiSys '07.

[50]  Akbar M. Sayeed,et al.  Secure wireless communications: Secret keys through multipath , 2008, 2008 IEEE International Conference on Acoustics, Speech and Signal Processing.

[51]  William G. Griswold,et al.  Peopletones: a system for the detection and notification of buddy proximity on mobile phones , 2008, MobiSys '08.

[52]  Adel Javanmard,et al.  Analytical evaluation of average delay and maximum stable throughput along a typical two-way street for vehicular ad hoc networks in sparse situations , 2009, Comput. Commun..

[53]  Jean-Yves Le Boudec,et al.  Power Law and Exponential Decay of Intercontact Times between Mobile Devices , 2010, IEEE Trans. Mob. Comput..

[54]  Keith W. Ross,et al.  Measuring and Evaluating Large-Scale CDNs , 2008 .

[55]  Nirvana Meratnia,et al.  A directional data dissemination protocol for vehicular environments , 2011, Comput. Commun..

[56]  Marco Di Felice,et al.  SEARCH: A routing protocol for mobile cognitive radio ad-Hoc networks , 2009, 2009 IEEE Sarnoff Symposium.

[57]  Anja Feldmann,et al.  Improving content delivery using provider-aided distance information , 2010, IMC '10.

[58]  Richard G. Clegg,et al.  A critical look at power law modelling of the Internet , 2009, Comput. Commun..

[59]  Byung-Gon Chun,et al.  Augmented Smartphone Applications Through Clone Cloud Execution , 2009, HotOS.

[60]  Baochun Li,et al.  XOR-Assisted Cooperative Diversity in OFDMA Wireless Networks: Optimization Framework and Approximation Algorithms , 2009, IEEE INFOCOM 2009.

[61]  Emiliano Miluzzo,et al.  A survey of mobile phone sensing , 2010, IEEE Communications Magazine.

[62]  Raffaele Bruno,et al.  Survey on diversity-based routing in wireless mesh networks: Challenges and solutions , 2010, Comput. Commun..

[63]  Xiaojiang Du,et al.  A survey of key management schemes in wireless sensor networks , 2007, Comput. Commun..

[64]  Elza Erkip,et al.  Increasing uplink capacity via user cooperation diversity , 1998, Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252).

[65]  Paul E. Green Fiber to the Home: The New Empowerment , 2005 .

[66]  Nick Feamster,et al.  Behavioral Clustering of HTTP-Based Malware and Signature Generation Using Malicious Network Traces , 2010, NSDI.

[67]  Weijia Jia,et al.  Mobility: A Double-Edged Sword for HSPA Networks: A Large-Scale Test on Hong Kong Mobile HSPA Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.

[68]  Ajmone Marsan,et al.  [IEEE 2009 IEEE International Conference on Communications Workshops - Dresden, Germany (2009.06.14-2009.06.18)] 2009 IEEE International Conference on Communications Workshops - Optimal Energy Savings in Cellular Access Networks , 2009 .

[69]  Marco Conti,et al.  Throughput and Fairness Analysis of 802.11-Based Vehicle-to-Infrastructure Data Transfers , 2011, 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems.

[70]  Van Jacobson,et al.  Networking named content , 2009, CoNEXT '09.

[71]  Martin Maier,et al.  Fiber-wireless (FiWi) access networks: Challenges and opportunities , 2011, IEEE Network.

[72]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[73]  Weijia Jia,et al.  Effective Channel Exploitation in IEEE 802.16j Networks for Maritime Communications , 2011, 2011 31st International Conference on Distributed Computing Systems.

[74]  Leandros Tassiulas,et al.  Linear complexity algorithms for maximum throughput in radio networks and input queued switches , 1998, Proceedings. IEEE INFOCOM '98, the Conference on Computer Communications. Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies. Gateway to the 21st Century (Cat. No.98.

[75]  Devavrat Shah,et al.  Distributed algorithm and reversible network , 2008, 2008 42nd Annual Conference on Information Sciences and Systems.

[76]  Lachlan L. H. Andrew,et al.  Dynamic Right-Sizing for Power-Proportional Data Centers , 2011, IEEE/ACM Transactions on Networking.

[77]  Refik Molva,et al.  Privacy in Content-Based Opportunistic Networks , 2009, 2009 International Conference on Advanced Information Networking and Applications Workshops.

[78]  Nick McKeown,et al.  Optical Packet Buffers for Backbone Internet Routers , 2010, IEEE/ACM Transactions on Networking.

[79]  Prasant Mohapatra,et al.  Comparing simulation tools and experimental testbeds for wireless mesh networks , 2011, Pervasive Mob. Comput..

[80]  Martin Reisslein,et al.  The Audacity of Fiber-Wireless (FiWi) Networks (Invited Paper) , 2009 .

[81]  David Sandham,et al.  Into the darkness - [comms fibre networks] , 2009 .

[82]  Ian F. Akyildiz,et al.  Wireless sensor and actor networks: research challenges , 2004, Ad Hoc Networks.

[83]  J E Simsarian,et al.  Architectures, Components, and Subsystems for Future Optical Packet Switches , 2010, IEEE Journal of Selected Topics in Quantum Electronics.

[84]  Chiara Orsini,et al.  C Consiglio Nazionale delle Ricerche The Impact of IXPs on the AS-level Topology Structure of the Internet , 2010 .

[85]  Michael J. Demmer,et al.  The design and implementation of a session layer for delay-tolerant networks , 2009, Comput. Commun..

[86]  Randy H. Katz,et al.  Characterizing the Internet hierarchy from multiple vantage points , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[87]  Michael Rabinovich,et al.  Content Delivery Networks: Protection or Threat? , 2009, ESORICS.

[88]  Marco Conti,et al.  Characterising Aggregate Inter-contact Times in Heterogeneous Opportunistic Networks , 2011, Networking.

[89]  Hannes Hartenstein,et al.  A tutorial survey on vehicular ad hoc networks , 2008, IEEE Communications Magazine.

[90]  Tracy Camp,et al.  Trace-based mobility modeling for multi-hop wireless networks , 2011, Comput. Commun..

[91]  David Tse,et al.  Channel Identification: Secret Sharing Using Reciprocity in Ultrawideband Channels , 2007, IEEE Transactions on Information Forensics and Security.

[92]  Kevin C. Almeroth,et al.  DBS-IC: An adaptive Data Bundling System for Intermittent Connectivity , 2009, Comput. Commun..

[93]  Sergiu Nedevschi,et al.  Reducing Network Energy Consumption via Sleeping and Rate-Adaptation , 2008, NSDI.

[94]  Ness B. Shroff,et al.  Joint Congestion Control and Distributed Scheduling for Throughput Guarantees in Wireless Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[95]  Raj Jain,et al.  Architectures for the future networks and the next generation Internet: A survey , 2011, Comput. Commun..

[96]  David Tse,et al.  Fundamentals of Wireless Communication , 2005 .

[97]  Hongseok Yoo,et al.  Repetition-based cooperative broadcasting for vehicular ad-hoc networks , 2011, Comput. Commun..

[98]  Eddie Kohler,et al.  The Click modular router , 1999, SOSP.

[99]  Jörg Ott,et al.  Controlling resource hogs in mobile delay-tolerant networks , 2010, Comput. Commun..

[100]  Weijia Jia,et al.  DragonNet: A Robust Mobile Internet Service System for Long-Distance Trains , 2013, IEEE Transactions on Mobile Computing.

[101]  Marco Conti,et al.  Multihop Ad Hoc Networking: The Reality , 2007, IEEE Communications Magazine.

[102]  Guobin Shen,et al.  MobiUS: enable together-viewing video experience across two mobile devices , 2007, MobiSys '07.

[103]  Mark Billinghurst,et al.  Face to face collaborative AR on mobile phones , 2005, Fourth IEEE and ACM International Symposium on Mixed and Augmented Reality (ISMAR'05).

[104]  Marco Conti,et al.  Load-aware routing in mesh networks: Models, algorithms and experimentation , 2011, Comput. Commun..

[105]  Leandros Tassiulas,et al.  Stability properties of constrained queueing systems and scheduling policies for maximum throughput in multihop radio networks , 1992 .

[106]  Xu Li,et al.  A new paradigm for urban surveillance with vehicular sensor networks , 2011, Comput. Commun..

[107]  Marco Conti,et al.  Mobile Ad-hoc Networking - Minitrack Introduction , 2001, HICSS.

[108]  Martin Reisslein,et al.  Trends in Optical Switching Techniques: A Short Survey , 2008, IEEE Network.

[109]  Hannes Frey,et al.  Fading-resistant low-latency broadcasts in wireless multihop networks: the probabilistic cooperation diversity approach , 2010, MobiHoc '10.

[110]  Christian Bonnet,et al.  Mobility models for vehicular ad hoc networks: a survey and taxonomy , 2009, IEEE Communications Surveys & Tutorials.

[111]  Ioannis Psaras,et al.  Deep-Space Transport Protocol: A novel transport scheme for Space DTNs , 2009, Comput. Commun..

[112]  Danilo De Donno,et al.  Deploying multiple interconnected gateways in heterogeneous wireless sensor networks: An optimization approach , 2010, Comput. Commun..

[113]  Per Ödling,et al.  The fourth generation broadband concept , 2009, IEEE Communications Magazine.

[114]  Alexander L. Stolyar,et al.  Maximizing Queueing Network Utility Subject to Stability: Greedy Primal-Dual Algorithm , 2005, Queueing Syst. Theory Appl..

[115]  Pasi Ojala,et al.  Media coding for the next generation mobile system LTE , 2010, Comput. Commun..

[116]  Christopher Krügel,et al.  Identifying Dormant Functionality in Malware Programs , 2010, 2010 IEEE Symposium on Security and Privacy.

[117]  Ellen W. Zegura,et al.  Message ferries as generalized dominating sets in intermittently connected mobile networks , 2010, MobiOpp '10.

[118]  Jiann-Liang Chen,et al.  Android/OSGi-based vehicular network management system , 2010, 2010 The 12th International Conference on Advanced Communication Technology (ICACT).

[119]  L.G. Roberts A radical new router , 2009, IEEE Spectrum.

[120]  Marco Conti,et al.  Routing Internet traffic in heterogeneous mesh networks: Analysis and algorithms , 2011, Perform. Evaluation.

[121]  Kevin C. Almeroth,et al.  On the implications of routing metric staleness in delay tolerant networks , 2009, Comput. Commun..

[122]  Mark Handley,et al.  Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics , 2001, USENIX Security Symposium.

[123]  Clint Schow,et al.  Get On The Optical Bus , 2010, IEEE Spectrum.

[124]  Wen Hu,et al.  Preserving privacy in participatory sensing systems , 2010, Comput. Commun..

[125]  Pan Hui,et al.  BUBBLE Rap: Social-Based Forwarding in Delay-Tolerant Networks , 2008, IEEE Transactions on Mobile Computing.

[126]  Mario Di Francesco,et al.  Energy conservation in wireless sensor networks: A survey , 2009, Ad Hoc Networks.

[127]  Franco Davoli,et al.  Energy Efficiency in the Future Internet: A Survey of Existing Approaches and Trends in Energy-Aware Fixed Network Infrastructures , 2011, IEEE Communications Surveys & Tutorials.

[128]  Carlo Contavalli,et al.  Client IP information in DNS requests , 2010 .

[129]  Makoto Takizawa,et al.  A Survey on Clustering Algorithms for Wireless Sensor Networks , 2010, 2010 13th International Conference on Network-Based Information Systems.

[130]  Abhijit Bose,et al.  Delayed internet routing convergence , 2000, SIGCOMM.

[131]  Refik Molva,et al.  Privacy-Preserving Content-Based Publish/Subscribe Networks , 2009, SEC.

[132]  Jörg Ott,et al.  Special issue of computer communications on delay and disruption tolerant networking , 2009, Computer Communications.

[133]  Martin Reisslein,et al.  The Audacity of Fiber-Wireless (FiWi) Networks , 2008, AccessNets.

[134]  Roberto Rojas-Cessa,et al.  Task-execution scheduling schemes for network measurement and monitoring , 2010, Comput. Commun..

[135]  Olav Tirkkonen,et al.  LTE, the radio technology path towards 4G , 2010, Comput. Commun..

[136]  Paul Vixie,et al.  What DNS is not , 2009, Commun. ACM.

[137]  Ryan W. Thomas,et al.  Cognitive networks , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..

[138]  FroehlichJon,et al.  Fast track article , 2012 .

[139]  Volker Springel Into the darkness , 2007, Nature.

[140]  Keri Schreiner Where We At? Mobile Phones Bring GPS to the Masses , 2007, IEEE Computer Graphics and Applications.

[141]  H. Vincent Poor,et al.  Towards utility-optimal random access without message passing , 2010, Wirel. Commun. Mob. Comput..

[142]  John B. Shoven,et al.  I , Edinburgh Medical and Surgical Journal.

[143]  Didier Colle,et al.  Power reduction techniques in multilayer traffic engineering , 2009, 2009 11th International Conference on Transparent Optical Networks.

[144]  Michael Weber,et al.  Measuring long-term location privacy in vehicular communication systems , 2010, Comput. Commun..

[145]  George C. Polyzos,et al.  Review of some fundamental approaches for power control in wireless networks , 2011, Comput. Commun..

[146]  Ying Li,et al.  DaVinci: dynamically adaptive virtual networks for a customized internet , 2008, CoNEXT '08.

[147]  Vinton G. Cerf,et al.  Delay-Tolerant Networking Architecture , 2007, RFC.

[148]  Sunghyun Choi,et al.  Energy-aware WLAN scanning in integrated IEEE 802.16e/802.11 networks , 2009, Comput. Commun..

[149]  Qinghua Li,et al.  Multicasting in delay tolerant networks: a social network perspective , 2009, MobiHoc '09.

[150]  Katerina J. Argyraki,et al.  RouteBricks: exploiting parallelism to scale software routers , 2009, SOSP '09.

[151]  Chris Kanich,et al.  Spamalytics: an empirical analysis of spam marketing conversion , 2009, CACM.

[152]  Yee Wei Law,et al.  Survey and benchmark of block ciphers for wireless sensor networks , 2006, TOSN.

[153]  R S Tucker,et al.  Green Optical Communications—Part II: Energy Limitations in Networks , 2011, IEEE Journal of Selected Topics in Quantum Electronics.

[154]  Mooi Choo Chuah,et al.  An encounter-based multicast scheme for disruption tolerant networks , 2009, Comput. Commun..

[155]  Fikret Sivrikaya,et al.  Time synchronization in sensor networks: a survey , 2004, IEEE Network.

[156]  Marco Conti,et al.  Mesh networks: commodity multihop ad hoc networks , 2005, IEEE Communications Magazine.

[157]  Jinsung Lee,et al.  Implementing utility-optimal CSMA , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[158]  Claudio Casetti,et al.  Planning roadside infrastructure for information dissemination in intelligent transportation systems , 2010, Comput. Commun..

[159]  Moshe Zukerman,et al.  Commentary: back to the future , 2009 .

[160]  Roberto Di Pietro,et al.  Location privacy and resilience in wireless sensor networks querying , 2011, Comput. Commun..

[161]  David Grace,et al.  Use of aerial platforms for energy efficient medium access control in wireless sensor networks , 2010, Comput. Commun..

[162]  Balachander Krishnamurthy,et al.  A Socratic method for validation of measurement-based networking research , 2011, Comput. Commun..

[163]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[164]  Mark Handley,et al.  XORP: an open platform for network research , 2003, CCRV.

[165]  Juan-Carlos Cano,et al.  An overview of vertical handover techniques: Algorithms, protocols and tools , 2011, Comput. Commun..

[166]  Alhussein A. Abouzeid,et al.  Connectivity in time-graphs , 2011, Pervasive Mob. Comput..

[167]  Panganamala Ramana Kumar,et al.  A cautionary perspective on cross-layer design , 2005, IEEE Wireless Communications.

[168]  C.-C. Jay Kuo,et al.  Cooperative Communications and Networking , 2010 .

[169]  Sajal K. Das,et al.  Coverage and connectivity issues in wireless sensor networks: A survey , 2008, Pervasive Mob. Comput..

[170]  Marco Conti,et al.  From opportunistic networks to opportunistic computing , 2010, IEEE Communications Magazine.

[171]  Jennifer Rexford,et al.  Future Internet architecture , 2010, Commun. ACM.

[172]  Z. Li,et al.  IEEE 802.16: History, status and future trends , 2010, Comput. Commun..

[173]  Sajal K. Das,et al.  QoS-aware data reporting control in cluster-based wireless sensor networks , 2010, Comput. Commun..

[174]  Di Ma,et al.  A survey of movement strategies for improving network coverage in wireless sensor networks , 2009, Comput. Commun..

[175]  Frank Thomson Leighton,et al.  Improving performance on the internet , 2008, CACM.

[176]  Chris Kanich,et al.  Spamcraft: An Inside Look At Spam Campaign Orchestration , 2009, LEET.

[177]  Marco Conti,et al.  Multihop Ad Hoc Networking: The Theory , 2007, IEEE Communications Magazine.

[178]  Valtteri Niemi Editorial for the LTE special section , 2010, Comput. Commun..

[179]  Rodney S. Tucker,et al.  Green Cloud Computing: Balancing Energy in Processing, Storage, and Transport , 2011, Proceedings of the IEEE.

[180]  Xuemin Shen,et al.  OFDMA Based Two-Hop Cooperative Relay Network Resources Allocation , 2008, 2008 IEEE International Conference on Communications.

[181]  Li Xiao,et al.  Channel allocation in multi-channel wireless mesh networks , 2011, Comput. Commun..

[182]  Rui Zhang,et al.  PriSense: Privacy-Preserving Data Aggregation in People-Centric Urban Sensing Systems , 2010, 2010 Proceedings IEEE INFOCOM.

[183]  Ratul Mahajan,et al.  Understanding BGP misconfiguration , 2002, SIGCOMM 2002.

[184]  William Webb Wireless Communications: The Future , 2007 .

[185]  R.S. Tucker,et al.  Evolution of WDM Optical IP Networks: A Cost and Energy Perspective , 2009, Journal of Lightwave Technology.

[186]  Kemal Akkaya,et al.  Self-deployment of sensors for maximized coverage in underwater acoustic sensor networks , 2009, Comput. Commun..

[187]  Mikkel Thorup,et al.  Internet traffic engineering by optimizing OSPF weights , 2000, Proceedings IEEE INFOCOM 2000. Conference on Computer Communications. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies (Cat. No.00CH37064).

[188]  Ellen W. Zegura,et al.  Hierarchical power management in disruption tolerant networks using traffic-aware optimization , 2009, Comput. Commun..

[189]  Mamoru Sawahashi,et al.  Coordinated multipoint transmission/reception techniques for LTE-advanced [Coordinated and Distributed MIMO] , 2010, IEEE Wireless Communications.

[190]  R. Wilder,et al.  Wide-area Internet traffic patterns and characteristics , 1997, IEEE Netw..

[191]  Y. Ofek,et al.  Time for a "Greener" Internet , 2009, 2009 IEEE International Conference on Communications Workshops.

[192]  Sajal K. Das,et al.  Data Collection in Wireless Sensor Networks with Mobile Elements: A Survey , 2011, TOSN.

[193]  Marco Conti,et al.  Human mobility models for opportunistic networks , 2011, IEEE Communications Magazine.

[194]  Franco Zambonelli,et al.  Looking ahead in pervasive computing: Challenges and opportunities in the era of cyber-physical convergence , 2012, Pervasive Mob. Comput..

[195]  Niels Provos,et al.  The Ghost in the Browser: Analysis of Web-based Malware , 2007, HotBots.

[196]  Brian Gallagher,et al.  MaxProp: Routing for Vehicle-Based Disruption-Tolerant Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[197]  John Murphy,et al.  Using cross-layer metrics to improve the performance of end-to-end handover mechanisms , 2009, Comput. Commun..

[198]  Robert Tappan Morris,et al.  DNS performance and the effectiveness of caching , 2001, IMW '01.

[199]  Mehmet C. Vuran,et al.  Special issue of "Computer Communications" on Cognitive Radio and Dynamic Spectrum Sharing Systems , 2009, Comput. Commun..

[200]  Vern Paxson,et al.  How to Own the Internet in Your Spare Time , 2002, USENIX Security Symposium.

[201]  Balachander Krishnamurthy,et al.  On the use and performance of content distribution networks , 2001, IMW '01.

[202]  George C. Polyzos,et al.  Traffic characteristics of the T1 NSFNET backbone , 1993, IEEE INFOCOM '93 The Conference on Computer Communications, Proceedings.

[203]  Bahador Bakhshi,et al.  On-line joint QoS routing and channel assignment in multi-channel multi-radio wireless mesh networks , 2011, Comput. Commun..

[204]  Mohamed F. Younis,et al.  A survey on routing protocols for wireless sensor networks , 2005, Ad Hoc Networks.

[205]  Marco Mellia,et al.  Energy aware Networks: Reducing Power Consumption by Switching Off Network Portions , 2008 .

[206]  Sajal K. Das,et al.  Privacy preservation in wireless sensor networks: A state-of-the-art survey , 2009, Ad Hoc Networks.

[207]  Cem Ersoy,et al.  MAC protocols for wireless sensor networks: a survey , 2006, IEEE Communications Magazine.

[208]  Tzi-cker Chiueh,et al.  A Study of the Packer Problem and Its Solutions , 2008, RAID.

[209]  Ian F. Akyildiz,et al.  Wireless underground sensor networks: Research challenges , 2006, Ad Hoc Networks.

[210]  Ellen W. Zegura,et al.  Message ferries as generalized dominating sets in intermittently connected mobile networks , 2011, Pervasive Mob. Comput..

[211]  Marco Conti,et al.  Design and performance evaluation of ContentPlace, a social-aware data dissemination system for opportunistic networks , 2010, Comput. Networks.

[212]  Ajay D. Kshemkalyani,et al.  Clock synchronization for wireless sensor networks: a survey , 2005, Ad Hoc Networks.

[213]  VojnovicMilan,et al.  Power Law and Exponential Decay of Intercontact Times between Mobile Devices , 2010 .

[214]  Michele Zorzi,et al.  Protocol design issues in underwater acoustic networks , 2011, Comput. Commun..

[215]  M. Medard,et al.  Design and Analysis of Optical Flow-Switched Networks , 2009, IEEE/OSA Journal of Optical Communications and Networking.

[216]  Jin Li,et al.  Measuring and evaluating large-scale CDNs Paper withdrawn at Mirosoft's request , 2008, IMC '08.

[217]  Miguel A. Labrador,et al.  On the applicability of available bandwidth estimation techniques and tools , 2010, Comput. Commun..

[218]  Janne Riihijärvi,et al.  Cognitive Wireless Networks : Your Network Just Became a Teenager , 2006 .

[219]  Ozan K. Tonguz,et al.  Broadcast storm mitigation techniques in vehicular ad hoc networks , 2007, IEEE Wireless Communications.

[220]  Farnam Jahanian,et al.  Internet inter-domain traffic , 2010, SIGCOMM '10.

[221]  Christophe Diot,et al.  Impact of Human Mobility on Opportunistic Forwarding Algorithms , 2007, IEEE Transactions on Mobile Computing.

[222]  Yuan-Cheng Lai,et al.  Hardware-Software Codesign for High-Speed Signature-based Virus Scanning , 2009, IEEE Micro.

[223]  A Coiro,et al.  Reducing Power Consumption in Wavelength Routed Networks by Selective Switch Off of Optical Links , 2011, IEEE Journal of Selected Topics in Quantum Electronics.

[224]  Jie Wu,et al.  Survey on anonymous communications in computer networks , 2010, Comput. Commun..

[225]  Wolfgang Mühlbauer,et al.  Comparing DNS resolvers in the wild , 2010, IMC '10.

[226]  Refik Molva,et al.  Safebook: A privacy-preserving online social network leveraging on real-life trust , 2009, IEEE Communications Magazine.

[227]  Christopher Krügel,et al.  Your botnet is my botnet: analysis of a botnet takeover , 2009, CCS.

[228]  B. Mukherjee,et al.  Hybrid Wireless-Optical Broadband-Access Network (WOBAN): A Review of Relevant Challenges , 2007, Journal of Lightwave Technology.

[229]  Gordon T. Wilfong,et al.  An analysis of BGP convergence properties , 1999, SIGCOMM '99.

[230]  Mads Haahr,et al.  Social network analysis for routing in disconnected delay-tolerant MANETs , 2007, MobiHoc '07.

[231]  R. Srikant,et al.  Joint congestion control, routing, and MAC for stability and fairness in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[232]  Jeffrey G. Andrews,et al.  A primer on spatial modeling and analysis in wireless networks , 2010, IEEE Communications Magazine.

[233]  Marco Conti,et al.  Opportunistic networking: data forwarding in disconnected mobile ad hoc networks , 2006, IEEE Communications Magazine.

[234]  Marco Conti,et al.  Data dissemination in opportunistic networks using cognitive heuristics , 2011, 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.

[235]  Mark Handley,et al.  Towards high performance virtual routers on commodity hardware , 2008, CoNEXT '08.

[236]  Junichi Kani,et al.  Next-generation PON-part I: Technology roadmap and general requirements , 2009, IEEE Communications Magazine.

[237]  AtiquzzamanMohammed,et al.  Using cross-layer metrics to improve the performance of end-to-end handover mechanisms , 2009 .

[238]  Cecilia Mascolo,et al.  Designing mobility models based on social network theory , 2007, MOCO.

[239]  Joseph Mitola Aware, Adaptive and Cognitive Radio: The Engineering Foundations of Radio XML , 2006 .

[240]  Stefan Valentin,et al.  When Do Cooperative Networks Profit from CSI Feedback? - An Outage Capacity Perspective , 2010, 2010 Proceedings of 19th International Conference on Computer Communications and Networks.

[241]  Joseph Mitola An Integrated Agent Architecture for Software Defined Radio , 2000 .

[242]  Nick McKeown,et al.  OpenFlow: enabling innovation in campus networks , 2008, CCRV.

[243]  Yih-Chun Hu,et al.  Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks , 2002, MobiCom '02.

[244]  Biswanath Mukherjee,et al.  Greening the Optical Backbone Network: A Traffic Engineering Approach , 2010, 2010 IEEE International Conference on Communications.

[245]  Jean C. Walrand,et al.  A Distributed CSMA Algorithm for Throughput and Utility Maximization in Wireless Networks , 2010, IEEE/ACM Transactions on Networking.

[246]  Marco Conti,et al.  Modelling Social-Aware Forwarding in Opportunistic Networks , 2010, PERFORM.

[247]  Mark H. Hansen,et al.  Urban sensing: out of the woods , 2008, CACM.

[248]  Peter I. Corke,et al.  ERTP: Energy-efficient and Reliable Transport Protocol for data streaming in Wireless Sensor Networks , 2009, Comput. Commun..

[249]  Prasant Mohapatra,et al.  Comparing simulation tools and experimental testbeds for wireless mesh networks , 2010, 2010 IEEE International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).