Social structure based routing of intermittently connected network using contact information

Muyuan Wang, Klara Nahrstedt

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Social structure refers to relatively enduring patterns of behavior and relationship within social systems. In this paper, we propose a novel routing scheme, which takes advantage of the social structure of underlying 'owners' and their mobile devices in intermittently connected networks. We focus on routing by utilizing the social contact information. For example, device-owners come into contact with each other during attending regular meetings. We formulate the routing optimization problem, emphasizing the ever-changing network connectivity. Moreover, we propose an algorithm to infer the social structure by extracting contact information from online gathered traces. We further develop a routing protocol for intermittently connected networks based on that. The performance of our protocol is tested using real network traces. It is shown that the protocol is able to achieve a good delivery rate and latency, which is comparable with the optimal routing, and far outperforms the First Contact protocol. Our protocol is incrementally applicable to many current mobile ad hoc routing protocols.

Original languageEnglish (US)
Title of host publication2008 IEEE Military Communications Conference, MILCOM 2008 - Assuring Mission Success
DOIs
StatePublished - 2008
Event2008 IEEE Military Communications Conference, MILCOM 2008 - Assuring Mission Success - Washington, DC, United States
Duration: Nov 17 2008Nov 19 2008

Publication series

NameProceedings - IEEE Military Communications Conference MILCOM

Other

Other2008 IEEE Military Communications Conference, MILCOM 2008 - Assuring Mission Success
Country/TerritoryUnited States
CityWashington, DC
Period11/17/0811/19/08

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'Social structure based routing of intermittently connected network using contact information'. Together they form a unique fingerprint.

Cite this