Hybrid routing in delay tolerant networks

This work addresses the integration of today\'s infrastructure-based networks with infrastructure-less networks. The resulting Hybrid Routing System allows for communication over both network types and can help to overcome cost, communication, and overload problems. Mobility aspect resulting from infrastructure-less networks are analyzed and analytical models developed. For development and deployment of the Hybrid Routing System an overlay-based framework is presented.

[1]  Christophe Diot,et al.  Are you moved by your social network application? , 2008, WOSN '08.

[2]  Tracy Camp,et al.  A survey of mobility models for ad hoc network research , 2002, Wirel. Commun. Mob. Comput..

[3]  S. Keshav,et al.  Practical security for disconnected nodes , 2005, 1st IEEE ICNP Workshop on Secure Network Protocols, 2005. (NPSec)..

[4]  Uri Blumenthal,et al.  Pre-Shared Key (PSK) Ciphersuites with NULL Encryption for Transport Layer Security (TLS) , 2007, RFC.

[5]  Srinivasan Keshav,et al.  Low-cost communication for rural internet kiosks using mechanical backhaul , 2006, MobiCom '06.

[6]  Thierry Turletti,et al.  Towards truly heterogeneous internets: Bridging infrastructure-based and infrastructure-less networks , 2011, 2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011).

[7]  Christian Huitema,et al.  STUN - Simple Traversal of User Datagram Protocol (UDP) Through Network Address Translators (NATs) , 2003, RFC.

[8]  Christian Wagner,et al.  The Spatial Node Distribution of the Random Waypoint Mobility Model , 2002, WMAN.

[9]  Pan Hui,et al.  Pocket Switched Networking: Challenges, Feasibility and Implementation Issues , 2005, WAC.

[10]  Donald F. Towsley,et al.  Relays, base stations, and meshes: enhancing mobile networks with infrastructure , 2008, MobiCom '08.

[11]  Arun Venkataramani,et al.  DTN routing as a resource allocation problem , 2007, SIGCOMM '07.

[12]  Jörg Ott,et al.  Opportunistic web access via WLAN hotspots , 2010, 2010 IEEE International Conference on Pervasive Computing and Communications (PerCom).

[13]  Dharma P. Agrawal,et al.  Mobile Ad hoc Networking , 2002 .

[14]  Matthias Grossglauser,et al.  Age matters: efficient route discovery in mobile ad hoc networks using encounter ages , 2003, MobiHoc '03.

[15]  Martina Zitterbart,et al.  Reconnecting the internet with ariba: self-organizing provisioning of end-to-end connectivity in heterogeneous networks , 2010, CCRV.

[16]  Van Jacobson,et al.  TCP Extensions for High Performance , 1992, RFC.

[17]  P. Blanchard,et al.  Mathematical Analysis of Urban Spatial Networks , 2008 .

[18]  Robert Simon,et al.  A Simulation Study of Common Mobility Models for Opportunistic Networks , 2008, 41st Annual Simulation Symposium (anss-41 2008).

[19]  Jon Postel,et al.  User Datagram Protocol , 1980, RFC.

[20]  Lars Wolf,et al.  Impact of radio range on contact characteristics in bus-based delay tolerant networks , 2011, 2011 Eighth International Conference on Wireless On-Demand Network Systems and Services.

[21]  Devavrat Shah,et al.  Throughput-delay trade-off in wireless networks , 2004, IEEE INFOCOM 2004.

[22]  J. Redi,et al.  A brief overview of ad hoc networks: challenges and directions , 2002, IEEE Communications Magazine.

[23]  Qian Zhang,et al.  Shortest path routing in partially connected ad hoc networks , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).

[24]  David Mazières,et al.  Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.

[25]  Vania Conan,et al.  HYMAD: Hybrid DTN-MANET routing for dense and highly dynamic wireless networks , 2009, 2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops.

[26]  Mohan Kumar,et al.  Opportunities in Opportunistic Computing , 2010, Computer.

[27]  Adrian Hooke,et al.  The interplanetary Internet , 2001, CACM.

[28]  Injong Rhee,et al.  On the levy-walk nature of human mobility , 2011, TNET.

[29]  Pekka Nikander,et al.  SEcure Neighbor Discovery (SEND) , 2005, RFC.

[30]  Jon Crowcroft,et al.  A survey and comparison of peer-to-peer overlay network schemes , 2005, IEEE Communications Surveys & Tutorials.

[31]  Scott C. Burleigh,et al.  Bundle Protocol Specification , 2007, RFC.

[32]  W. Woess Random walks on infinite graphs and groups, by Wolfgang Woess, Cambridge Tracts , 2001 .

[33]  Thierry Turletti,et al.  MeDeHa - Efficient Message Delivery in Heterogeneous Networks with Intermittent Connectivity , 2010 .

[34]  Jochen Dinger,et al.  Decentralized Bootstrapping of P2P Systems: A Practical View , 2009, Networking.

[35]  Marcelo Bagnulo,et al.  Multihoming L3 Shim Approach , 2005 .

[36]  Pan Hui,et al.  Pocket Switched Networks: Real-world mobility and its consequences for opportunistic forwarding , 2005 .

[37]  Donald E. Eastlake,et al.  US Secure Hash Algorithm 1 (SHA1) , 2001, RFC.

[38]  Cauligi S. Raghavendra,et al.  Spray and Focus: Efficient Mobility-Assisted Routing for Heterogeneous and Correlated Mobility , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).

[39]  Charles E. Perkins,et al.  IP Mobility Support for IPv4 , 2002, RFC.

[40]  Injong Rhee,et al.  Human Mobility Patterns and Their Impact on Delay Tolerant Networks , 2007, HotNets.

[41]  Arun Venkataramani,et al.  Augmenting mobile 3G using WiFi , 2010, MobiSys '10.

[42]  Amin Vahdat,et al.  MACEDON: Methodology for Automatically Creating, Evaluating, and Designing Overlay Networks , 2004, NSDI.

[43]  Erina Ferro,et al.  Bluetooth and Wi-Fi wireless protocols: a survey and a comparison , 2005, IEEE Wireless Communications.

[44]  Sokol Kosta,et al.  Small World in Motion (SWIM): Modeling Communities in Ad-Hoc Mobile Networking , 2010, 2010 7th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON).

[45]  Antony I. T. Rowstron,et al.  Virtual ring routing: network routing inspired by DHTs , 2006, SIGCOMM.

[46]  Jörg Ott,et al.  Integrating DTN and MANET routing , 2006, CHANTS '06.

[47]  Yin Zhang,et al.  Incentive-aware routing in DTNs , 2008, 2008 IEEE International Conference on Network Protocols.

[48]  Stephen Farrell,et al.  Delay- and Disruption-Tolerant Networking , 2006, IEEE Internet Computing.

[49]  David R. Karger,et al.  Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.

[50]  Donald F. Towsley,et al.  On the capacity of hybrid wireless networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[51]  Zhensheng Zhang,et al.  Routing in intermittently connected mobile ad hoc networks and delay tolerant networks: overview and challenges , 2006, IEEE Communications Surveys & Tutorials.

[52]  Paul Francis,et al.  The IP Network Address Translator (NAT) , 1994, RFC.

[53]  Mark E. J. Newman,et al.  Power-Law Distributions in Empirical Data , 2007, SIAM Rev..

[54]  Arunabha Sen,et al.  Broadcast scheduling algorithms for radio networks , 1995, Proceedings of MILCOM '95.

[55]  Anders Lindgren,et al.  Probabilistic Routing Protocol for Intermittently Connected Networks , 2012, RFC.

[56]  R.M. Fujimoto,et al.  Parallel and distributed simulation systems , 2001, Proceeding of the 2001 Winter Simulation Conference (Cat. No.01CH37304).

[57]  P. R. Kumar,et al.  Critical power for asymptotic connectivity , 1998, Proceedings of the 37th IEEE Conference on Decision and Control (Cat. No.98CH36171).

[58]  Anders Lindgren,et al.  Empirical evaluation of hybrid opportunistic networks , 2009, 2009 First International Communication Systems and Networks and Workshops.

[59]  Christoph P. Mayer,et al.  The Spontaneous Virtual Networks Architecture for Supporting Future Internet Services and Applications , 2008 .

[60]  Jörg Widmer,et al.  Network coding for efficient communication in extreme networks , 2005, WDTN '05.

[61]  Yongdae Kim,et al.  Attacking the Kad network , 2008, SecureComm.

[62]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .

[63]  Pan Hui,et al.  Distributed community detection in delay tolerant networks , 2007, MobiArch '07.

[64]  Bernhard Heep dCBR: A global view on network coordinates for more efficient peer-to-peer systems , 2010, 2010 Second International Conference on Ubiquitous and Future Networks (ICUFN).

[65]  Amin Vahdat,et al.  Epidemic Routing for Partially-Connected Ad Hoc Networks , 2009 .

[66]  Russ Housley,et al.  An Internet Attribute Certificate Profile for Authorization , 2010, RFC.

[67]  Do Young Eun,et al.  Toward stochastic anatomy of inter-meeting time distribution under general mobility models , 2008, MobiHoc '08.

[68]  Timur Friedman,et al.  DTN routing in a mobility pattern space , 2005, WDTN '05.

[69]  Aravind Srinivasan,et al.  Mobile data offloading in metropolitan area networks , 2010, MOCO.

[70]  Do Young Eun,et al.  Crossing over the bounded domain: from exponential to power-law inter-meeting time in MANET , 2007, MobiCom '07.

[71]  Charles E. Perkins,et al.  Ad hoc On-Demand Distance Vector (AODV) Routing , 2001, RFC.

[72]  Jörg Ott,et al.  The ONE simulator for DTN protocol evaluation , 2009, SimuTools.

[73]  Maria Udén,et al.  Providing connectivity to the Saami nomadic community , 2002 .

[74]  Christoph P. Mayer,et al.  SpoVNet: An Architecture for Easy Creation and Deployment of Service Overlays , 2011 .

[75]  Ben Y. Zhao,et al.  Towards a Common API for Structured Peer-to-Peer Overlays , 2003, IPTPS.

[76]  Brian Gallagher,et al.  MaxProp: Routing for Vehicle-Based Disruption-Tolerant Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[77]  Cauligi S. Raghavendra,et al.  Spray and wait: an efficient routing scheme for intermittently connected mobile networks , 2005, WDTN '05.

[78]  Ingmar Baumgart,et al.  Verteilter Namensdienst für dezentrale IP-Telefonie , 2010 .

[79]  Eric Rescorla,et al.  The Transport Layer Security (TLS) Protocol Version 1.2 , 2008, RFC.

[80]  Taoufik En-Najjary,et al.  A global view of kad , 2007, IMC '07.

[81]  Deepak Ganesan,et al.  Triage : A Power-Aware Software Architecture for Tiered Microservers , 2005 .

[82]  Pan Hui,et al.  BUBBLE Rap: Social-Based Forwarding in Delay-Tolerant Networks , 2008, IEEE Transactions on Mobile Computing.

[83]  Jennifer C. Hou,et al.  One Size Does Not Fit All: A Detailed Analysis and Modeling of P2P Traffic , 2007, IEEE GLOBECOM 2007 - IEEE Global Telecommunications Conference.

[84]  Mark Handley,et al.  Why the Internet only just works , 2006 .

[85]  Alex Pentland,et al.  Reality mining: sensing complex social systems , 2006, Personal and Ubiquitous Computing.

[86]  Ellen W. Zegura,et al.  Capacity Enhancement using Throwboxes in DTNs , 2006, 2006 IEEE International Conference on Mobile Ad Hoc and Sensor Systems.

[87]  Hugo Krawczyk,et al.  HMAC: Keyed-Hashing for Message Authentication , 1997, RFC.

[88]  Christoph P. Mayer,et al.  On the impact of graph structure on mobility in opportunistic mobile networks , 2011, 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[89]  Charles E. Perkins,et al.  Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.

[90]  Alex Pentland,et al.  DakNet: rethinking connectivity in developing nations , 2004, Computer.

[91]  Oliver Brock,et al.  MV routing and capacity building in disruption tolerant networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[92]  Scott Shenker,et al.  Internet indirection infrastructure , 2004, IEEE/ACM Transactions on Networking.

[93]  David B. Johnson,et al.  Routing in Ad Hoc Networks of Mobile Hosts , 1994, 1994 First Workshop on Mobile Computing Systems and Applications.

[94]  J. Jubin,et al.  The DARPA packet radio network protocols , 1987, Proceedings of the IEEE.

[95]  Marcelo Dias de Amorim,et al.  Relieving the wireless infrastructure: When opportunistic networks meet guaranteed delays , 2011, 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.

[96]  Werner Vogels,et al.  Dynamo: amazon's highly available key-value store , 2007, SOSP.

[97]  Anders Lindgren,et al.  Networking in the land of northern lights: two years of experiences from DTN system deployments , 2008, WiNS-DR '08.

[98]  Cecilia Mascolo,et al.  Adaptive routing for intermittently connected mobile ad hoc networks , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.

[99]  Bobby Bhattacharjee,et al.  Scalable application layer multicast , 2002, SIGCOMM '02.

[100]  Quynh H. Dang,et al.  Recommendation for Applications Using Approved Hash Algorithms , 2009 .

[101]  L. Asz Random Walks on Graphs: a Survey , 2022 .

[102]  Ger Koole,et al.  The message delay in mobile ad hoc networks , 2005, Perform. Evaluation.

[103]  Panganamala Ramana Kumar,et al.  RHEINISCH-WESTFÄLISCHE TECHNISCHE HOCHSCHULE AACHEN , 2001 .

[104]  Aruna Balasubramanian,et al.  DOME: a diverse outdoor mobile testbed , 2009, HotPlanet '09.

[105]  Stephen Farrell,et al.  Report on an Arctic summer DTN trial , 2011, Wirel. Networks.

[106]  Célio Vinicius N. de Albuquerque,et al.  NECTAR: a DTN routing protocol based on neighborhood contact history , 2009, SAC '09.

[107]  Yakov Rekhter,et al.  Address Allocation for Private Internets , 1994, RFC.

[108]  Charles M. Grinstead,et al.  Introduction to probability , 1999, Statistics for the Behavioural Sciences.

[109]  Paul V. Mockapetris,et al.  Domain names - implementation and specification , 1987, RFC.

[110]  Ralph Holz,et al.  SpoVNet Security Task Force Report , 2009 .

[111]  András Varga,et al.  An overview of the OMNeT++ simulation environment , 2008, SimuTools.

[112]  Kazuyuki Shudo,et al.  Overlay Weaver: An overlay construction toolkit , 2008, Computer Communications.

[113]  Eric Rescorla,et al.  SSL and TLS: Designing and Building Secure Systems , 2000 .

[114]  Christophe Diot,et al.  Impact of Human Mobility on Opportunistic Forwarding Algorithms , 2007, IEEE Transactions on Mobile Computing.

[115]  Lixia Zhang,et al.  Stream Control Transmission Protocol , 2000, RFC.

[116]  Naoki Masuda,et al.  Return times of random walk on generalized random graphs. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.

[117]  Vijay Erramilli,et al.  Delegation forwarding , 2008, MobiHoc '08.

[118]  Joab Jackson The Interplanetary Internet , 2005 .

[119]  Stephen Farrell,et al.  Licklider Transmission Protocol - Specification , 2008, RFC.

[120]  Jörg Ott,et al.  Message fragmentation in opportunistic DTNs , 2008, 2008 International Symposium on a World of Wireless, Mobile and Multimedia Networks.

[121]  Jari Arkko,et al.  A Node Identity Internetworking Architecture , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[122]  Pan Hui,et al.  How Small Labels Create Big Improvements , 2006, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).

[123]  Martin Vetterli,et al.  Locating nodes with EASE: last encounter routing in ad hoc networks through mobility diffusion , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[124]  Christopher D. Gill,et al.  Accommodating Transient Connectivity in Ad Hoc and Mobile Settings , 2004, Pervasive.

[125]  Jörg Ott,et al.  Simulating Mobility and DTNs with the ONE (Invited Paper) , 2010, J. Commun..

[126]  Patrick Weber,et al.  OpenStreetMap: User-Generated Street Maps , 2008, IEEE Pervasive Computing.

[127]  Mostafa Ammar,et al.  Routing in Space and Time in Networks with Predictable Mobility , 2004 .

[128]  Marco Conti,et al.  Mobile Ad-hoc Networking - Minitrack Introduction , 2001, HICSS.

[129]  Paolo Giaccone,et al.  Capacity scaling in delay tolerant networks with heterogeneous mobile nodes , 2007, MobiHoc '07.

[130]  Klaus Wehrle,et al.  OCALA: An Architecture for Supporting Legacy Applications over Overlays , 2006, NSDI.

[131]  Klaus Wehrle,et al.  Peer-to-Peer Systems and Applications , 2005, Peer-to-Peer Systems and Applications.

[132]  W. K. Hale Frequency assignment: Theory and applications , 1980, Proceedings of the IEEE.

[133]  David Tse,et al.  Mobility increases the capacity of ad hoc wireless networks , 2002, TNET.

[134]  Jean-Yves Le Boudec,et al.  Power Law and Exponential Decay of Intercontact Times between Mobile Devices , 2010, IEEE Trans. Mob. Comput..

[135]  Jon Postel,et al.  Transmission Control Protocol , 1981, RFC.

[136]  Julinda Stefa,et al.  SWIM: A Simple Model to Generate Small Mobile Worlds , 2008, IEEE INFOCOM 2009.

[137]  Yakov Rekhter,et al.  An Architecture for IP Address Allocation with CIDR , 1993, RFC.

[138]  K. Psounis,et al.  Efficient Routing in Intermittently Connected Mobile Networks: The Single-Copy Case , 2008, IEEE/ACM Transactions on Networking.

[139]  C. M. Sperberg-McQueen,et al.  Extensible Markup Language (XML) , 1997, World Wide Web J..

[140]  M. Frans Kaashoek,et al.  Uia: a global connectivity architecture for mobile personal devices , 2008 .

[141]  Jon Crowcroft Cold topics in networking , 2008, CCRV.

[142]  Mostafa Ammar,et al.  Hybrid routing in clustered DTNs with message ferrying , 2007, MobiOpp '07.

[143]  Ralph Holz,et al.  Spontaneous Virtual Networks: On the Road Towards the Internet´s Next GenerationSpontane Virtuelle Netze: Auf dem Weg zur nächsten Generation des Internets , 2008, it Inf. Technol..

[144]  Xue Chen,et al.  HRing: A Structured P2P Overlay Based on Harmonic Series , 2008, IEEE Transactions on Parallel and Distributed Systems.

[145]  Gabriel Montenegro,et al.  Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses , 2002, NDSS.

[146]  Brian Neil Levine,et al.  An Energy-Efficient Architecture for DTN Throwboxes , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[147]  Klaus Wehrle,et al.  SimBetAge: utilizing temporal changes in social networks for pocket switched networks , 2009, U-NET '09.

[148]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[149]  Anders Lindgren,et al.  Probabilistic routing in intermittently connected networks , 2003, MOCO.

[150]  Christoph P. Mayer,et al.  Offloading infrastructure using Delay Tolerant Networks and assurance of delivery , 2011, 2011 IFIP Wireless Days (WD).

[151]  Seif Haridi,et al.  A Practical Approach to Network Size Estimation for Structured Overlays , 2008, IWSOS.

[152]  Jon Postel,et al.  Internet Protocol , 1981, RFC.

[153]  Robin Kravets,et al.  Encounter: based routing in DTNs , 2009, MOCO.

[154]  Eiko Yoneki The Importance of Data Collection for Modelling Contact Networks , 2009, 2009 International Conference on Computational Science and Engineering.

[155]  Wolfgang Kellerer,et al.  ProtoPeer: a P2P toolkit bridging the gap between simulation and live deployement , 2009, SimuTools.

[156]  Waylon Brunette,et al.  Data MULEs: modeling a three-tier architecture for sparse sensor networks , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[157]  J. Ott,et al.  Simulating Mobility and DTNs with the ONE , 2010 .

[158]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[159]  Christoph P. Mayer,et al.  The Ariba Framework for Application Development using Service Overlays , 2010, PIK Prax. Informationsverarbeitung Kommun..

[160]  Christoph P. Mayer,et al.  Ariba: A Framework for Developing Decentralized Services , 2009 .

[161]  Analog Vlsi,et al.  On the Design of , 2000 .

[162]  Tuomas Aura,et al.  Cryptographically Generated Addresses (CGA) , 2005, ISC.

[163]  James A. Davis,et al.  Wearable computers as packet transport mechanisms in highly-partitioned ad-hoc networks , 2001, Proceedings Fifth International Symposium on Wearable Computers.

[164]  Scott Oaks,et al.  JXTA in a Nutshell , 2002 .

[165]  Thierry Turletti,et al.  Message delivery in heterogeneous networks prone to episodic connectivity , 2011, Wirel. Networks.

[166]  Lixia Zhang,et al.  Report from the IAB Workshop on Routing and Addressing , 2007, RFC.

[167]  S. Chandrasekhar Stochastic problems in Physics and Astronomy , 1943 .

[168]  Arun Venkataramani,et al.  Replication Routing in DTNs: A Resource Allocation Approach , 2010, IEEE/ACM Transactions on Networking.

[169]  Injong Rhee,et al.  SLAW: A New Mobility Model for Human Walks , 2009, IEEE INFOCOM 2009.

[170]  Jörg Hähner,et al.  Graph-based mobility model for mobile ad hoc network simulation , 2002, Proceedings 35th Annual Simulation Symposium. SS 2002.

[171]  Martina Zitterbart,et al.  Using Legacy Applications in Future Heterogeneous Networks with ariba , 2010, INFOCOM 2010.

[172]  Jörg Ott,et al.  Working day movement model , 2008, MobilityModels '08.

[173]  Taoufik En-Najjary,et al.  Long Term Study of Peer Behavior in the kad DHT , 2009, IEEE/ACM Transactions on Networking.

[174]  Mun Choon Chan,et al.  MobiCent: a Credit-Based Incentive System for Disruption Tolerant Network , 2010, 2010 Proceedings IEEE INFOCOM.

[175]  M. Newman Power laws, Pareto distributions and Zipf's law , 2005 .

[176]  Mads Haahr,et al.  Social network analysis for routing in disconnected delay-tolerant MANETs , 2007, MobiHoc '07.

[177]  Srinivasan Keshav,et al.  Design and implementation of the KioskNet system , 2007, 2007 International Conference on Information and Communication Technologies and Development.

[178]  Mark Handley,et al.  SIP: Session Initiation Protocol , 1999, RFC.

[179]  Ellen W. Zegura,et al.  A message ferrying approach for data delivery in sparse mobile ad hoc networks , 2004, MobiHoc '04.

[180]  S. Krause,et al.  OverSim: A Flexible Overlay Network Simulation Framework , 2007, 2007 IEEE Global Internet Symposium.

[181]  Ian Clarke,et al.  Freenet: A Distributed Anonymous Information Storage and Retrieval System , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[182]  Albert-László Barabási,et al.  Understanding individual human mobility patterns , 2008, Nature.

[183]  Yves Lepage,et al.  MBONE, multicasting tomorrow's Internet , 1996 .

[184]  Guohong Cao,et al.  Win-Coupon: An incentive framework for 3G traffic offloading , 2011, 2011 19th IEEE International Conference on Network Protocols.

[185]  Kyunghan Lee,et al.  Mobile Data Offloading: How Much Can WiFi Deliver? , 2013, IEEE/ACM Transactions on Networking.

[186]  Mads Haahr,et al.  Social Network Analysis for Information Flow in Disconnected Delay-Tolerant MANETs , 2009, IEEE Transactions on Mobile Computing.

[187]  Augustin Chaintreau,et al.  The age of impatience: optimal replication schemes for opportunistic networks , 2009, CoNEXT '09.

[188]  Jie Wu,et al.  Predict and relay: an efficient routing in disruption-tolerant networks , 2009, MobiHoc '09.

[189]  Robert Simon,et al.  Characteristics of common mobility models for opportunistic networks , 2007, PM2HW2N '07.

[190]  D Volchenkov,et al.  Random walks along the streets and canals in compact cities: spectral analysis, dynamical modularity, information, and statistical mechanics. , 2007, Physical review. E, Statistical, nonlinear, and soft matter physics.

[191]  Aravind Srinivasan,et al.  Cellular traffic offloading through opportunistic communications: a case study , 2010, CHANTS '10.

[192]  Oliver P. Waldhorst,et al.  Autonomous detection of connectivity , 2011, 2011 IEEE International Conference on Peer-to-Peer Computing.

[193]  Richard H. Thayer,et al.  Standards, Guidelines, and Examples on System and Software Requirements Engineering , 1994 .

[194]  Rabin K. Patra,et al.  Using redundancy to cope with failures in a delay tolerant network , 2005, SIGCOMM '05.

[195]  Vinton G. Cerf,et al.  Delay-Tolerant Networking Architecture , 2007, RFC.

[196]  Pan Hui,et al.  Haggle: A networking architecture designed around mobile users , 2006 .

[197]  Gabriel Montenegro,et al.  Crypto-based identifiers (CBIDs): Concepts and applications , 2004, TSEC.

[198]  The Design of Cities , 1989 .

[199]  Anders Lindgren,et al.  Impact of communication infrastructure on forwarding in pocket switched networks , 2006, CHANTS '06.

[200]  Stephen E. Deering,et al.  Host extensions for IP multicasting , 1986, Request for Comments.

[201]  Jianping Wang,et al.  Programming Overlay Networks with Overlay Sockets , 2003, Networked Group Communication.

[202]  Anders Lindgren,et al.  Phase Transitions of Opportunistic Communications , 2008, MobiCom 2008.

[203]  Christophe Diot,et al.  Deployment issues for the IP multicast service and architecture , 2000, IEEE Netw..

[204]  Ram Ramanathan,et al.  Tracking Highly Mobile Endpoints , 2001, WOWMOM '01.

[205]  Andrei Gurtov Host Identity Protocol (HIP): Towards the Secure Mobile Internet , 2008 .

[206]  Stephen E. Deering,et al.  Internet Protocol, Version 6 (IPv6) Specification , 1995, RFC.

[207]  Antony I. T. Rowstron,et al.  Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.

[208]  Henning Schulzrinne,et al.  An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol , 2004, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[209]  Leandros Tassiulas,et al.  Throughput capacity of random ad hoc networks with infrastructure support , 2003, MobiCom '03.

[210]  Martina Zitterbart,et al.  ariba: Rahmenwerk für Overlay-basierte Dienste , 2011, PIK Prax. Informationsverarbeitung Kommun..

[211]  E. Jones Routing Strategies for Delay-Tolerant Networks , 2006 .

[212]  Hagit Attiya,et al.  Wiley Series on Parallel and Distributed Computing , 2004, SCADA Security: Machine Learning Concepts for Intrusion Detection and Prevention.

[213]  Christoph P. Mayer,et al.  User-Perceived Performance of the NICE Application Layer Multicast Protocol in Large and Highly Dynamic Groups , 2010, MMB/DFT.

[214]  Panganamala Ramana Kumar,et al.  Capacity bounds for ad hoc and hybrid wireless networks , 2004, CCRV.

[215]  Jörg Ott,et al.  Time scales and delay-tolerant routing protocols , 2008, CHANTS '08.

[216]  Inwhee Joe,et al.  A Message Priority Routing Protocol for Delay Tolerant Networks (DTN) in Disaster Areas , 2010, FGIT.

[217]  M. Penrose The longest edge of the random minimal spanning tree , 1997 .

[218]  Michael Roe,et al.  Child-proof authentication for MIPv6 (CAM) , 2001, CCRV.

[219]  Kang-Won Lee,et al.  Scaling properties of delay tolerant networks with correlated motion patterns , 2009, CHANTS '09.