SoRoute: a reliable and effective social-based routing in cognitive radio ad hoc networks
© Jing et al.; licensee Springer. 2014
Received: 27 July 2014
Accepted: 7 October 2014
Published: 25 November 2014
A cognitive radio ad hoc network (CRAHN) can be considered as a special delay tolerant network (DTN) that is composed of mobile secondary users (SUs) with social characteristics. Given intermittent connectivity and spectrum availability, it is a challenging issue regarding how to transmit messages between SUs in a reliable and effective way in CRAHNs. To tackle this challenge, we propose a social-aware opportunistic routing and relay selection scheme, called SoRoute, which first predicts the link reliability based on a new social-relationship-aware mobility model and then fuses the relationships of SUs to make a routing and relay decision. In our design, different prediction schemes are employed for the nodes with different relationships. A message is forwarded to the relay node with the largest encounter probability with the destination. The evaluation results demonstrate that our social-based opportunistic routing scheme significantly improves the performance compared to the existing routing schemes such as Direct Delivery, First Contact, MaxProp, and Prophet.
KeywordsCognitive radio ad hoc networks Delay tolerant networks Social relationship Routing The ONE simulator
A cognitive radio (CR)  is a promising technology to address the spectrum scarcity problem and improve spectrum utilization, which enables secondary users (SUs) opportunistically access the vacant spectrum bands allocated to primary users (PUs) [2–8]. Due to the specific characteristics of CR, it has broad application prospects. For example, CR technology can be combined with mobile ad hoc networks, which is called cognitive radio ad hoc networks (CRAHNs) , in which wireless devices can dynamically establish networks using the vacant spectrum bands allocated to PUs without the need of fixed infrastructures. However, the distinct characteristics of CRAHNs, such as the mobility of nodes and the limitation of spectrum, result in intermittent connectivity in such networks. The lack of a sustainable end-to-end path makes CRAHNs appear to be delay tolerant networks (DTNs) [10, 11]. All of the DTN routing methods share a similar characteristic, the ‘store-carry-forward’ fashion. That means a DTN node can store and carry the data until it encounters a suitable node.
From a routing perspective, a link is considered to be reliable if the link duration time is longer than the time required for transmitting data. It is an unreliable link otherwise. An unreliable link may be broken frequently. When any link of a path fails, this path has to be either repaired by finding another link or replaced entirely with a new path. These rerouting operations waste the scarce radio resource and battery power, and rerouting delay may also affect quality of service (QoS) and degrade network performances . As a result, the reliability of a link is an important criterion of measuring whether a link can be used to forward a message. Furthermore, due to the limitation of spectrum availability and node mobility, routing in CRAHNs may incur a long delay. Thus, it is a challenging problem how to transmit messages reliably and efficiently in CRAHNs.
Most of the existing DTN routing schemes [13–17] are based on classic ad hoc networks, ignoring the spectrum availability. However, routing in CRAHNs should take into consideration not only the mobility of nodes but also the spectrum availability which is under the condition that SUs can not generate interference to PUs. In addition, many previous works on routing in ad hoc networks assumed that messages would be forwarded completely once two nodes encounter with each other . Obviously, this assumption is unreasonable when message size is large and mobility is high. Based on the analysis above, a link reliability prediction scheme is necessary in CRAHNs. Mobile SUs have social relationships. Portable devices, such as smart phones or ipads, are always carried by human beings. Therefore, the mobility pattern of these nodes corresponds to that of their users. Empirical observations indicate there exists certain social relationships between different people, and people of different relationships have different social behaviors. For example, friends stay together longer than strangers, and colleagues or classmates meet more frequently than distant relations. A link reliability can be better predicted and a routing decision can be better made by exploring these social relationships. A few of existing works considers the concept of social networks in DTN routing. However, most of these studies are made from the view of social characteristics such as community and centrality. Few of them model and conduct qualitative analysis on the link duration and encounter probabilities of SUs based on the different relationships of the nodes.
In this paper, we propose a novel opportunistic routing and relay selection scheme, called SoRoute, which forwards the messages based on the social relationships between the nodes in a reliable and efficient way. The main contributions of this paper are summarized as follows:
A new mobility model is proposed, which can represent the mobility patterns of nodes with the real-world social relationships.
Based on this model, a link reliability metric and a prediction algorithm are derived for the SUs with different relationships, taking into account SUs’ transmission range limitation and interference with PUs.
We propose a routing and relay selection protocol based on the social-aware link reliability.
We demonstrate the proposed social-based opportunistic routing scheme that significantly improves the performance compared to the existing routing schemes such as Direct Delivery, First Contact, MaxProp, and Prophet.
To the best of our knowledge, this is the first work to combine the concept of social relationships with the prediction of link reliability for routing and relay selection. The rest of this paper is organized as follows. Section 2 presents the related work. In section 3, network model and mobility model are presented. Section 4 gives a brief introduction of the social relationships between human beings. The link reliability prediction algorithm is given in section 5. The social-based opportunistic routing scheme is described in section 6. In section 7, we demonstrate the validity of our link reliability prediction algorithm. The performance of the proposed routing scheme is also evaluated. Section 8 gives the conclusions.
2 Related work
The existing DTN routing schemes can be categorized into two classes, flooding [13, 19, 20] and forwarding [21–23]. A flooding approach is based on the principle of forwarding messages to all the neighboring nodes. Due to the limitation of bandwidth and buffer space, the flooding approach performs poorly in many situations. A forwarding strategy uses certain knowledge about the network to select a best path to the destination. Cheng et al.  propose a location-based routing method for DTN which can estimate the minimum distance between the source and destination, then messages are transmitted through the best path. In , the weight is assigned to each node, which represents the suitability of the node to deliver messages to a given destination. This algorithm only delivers messages to the relay which has a better weight than the current node, thus it is called gradient routing strategy. Srinivasa and Krishnamurthy  use ‘conditional inter-meeting time’ as a metric to estimate the best path towards the destination, which can achieve a high delivery rate and a short end-to-end delay.
In addition, social-based routing algorithms have been proposed to exploit certain social characteristics in DTN [14–17, 24, 25]. Hui et al.  propose a forwarding strategy named Bubble Rap, which focuses on the community and centrality of the nodes. It delivers messages by using the global ranking and the local ranking. In , a SimBet Routing is proposed which exploits the exchange of pre-estimated betweenness centrality metrics and locally determined social similarity to the destination node. Wang et al.  exploit the spatial locality, spatial regularity, and activity heterogeneity of human mobility to select relays. Wang et al.  summarize the behavioral traits of human beings employed by existing PSN routing schemes and give a survey on PSN routing techniques. Bulut and Szymanski  introduce a new metric for detecting the quality of friendships, and then the temporally differentiated friendships are used to make the forwarding decisions of messages. Gao et al.  study multicast in DTNs from the social network perspective, in which relay selections for multicast is formulated as a unified knapsack problem by exploiting node centrality and social community structures.
However, none of the above works considered CRAHNs. In CRNs, SUs can opportunistically access the vacant bands allocated to PUs [2–8]. Huang et al.  study a social-based routing in intermittently connected mobile cognitive radio network, but it did not consider the link reliability in message forwarding. Therefore, a link duration prediction scheme is needed to analyze the reliability of a link. The existing work on link reliability prediction is limited [26–28]. Han et al.  proposed an algorithm, named LBRP, which can predict link availability over a short time by a rough estimation of the distance between two nodes. However, LBRP is based on the random walk mobility model, which is too simple to reflect the mobility in real world. In [27, 28], a prediction-based link reliability estimation algorithm and its enhanced version were developed. These two algorithms try to predict the probability of an active link between two nodes being continuously available for a certain period of time. However, they are based on statistics and can only represent the general tendency of the link availability. In addition, a link prediction scheme is proposed for CR-MANETs , which is aware of the interference to primary users. However, this link prediction scheme is only based on the current node movement and cannot accurately calculate the link reliability. To the best of our knowledge, there is no link reliability prediction scheme available in literature that takes into account the social characteristics and mobility of nodes, as well as interference to the PUs.
3 System model
3.1 Network model
(Channel availability) SU i detects channel k is available when it satisfies: (1) SU i is out of the interference range ρ Pk of PU k ; (2) SU i is out of the interference range of PU base station; and (3) PU k and PU base station are both out of the interference range ρ Si of SU i .
In this model, we assume that SUs are mobile devices with CR functionality, which can detect the available channel through spectrum sensing. One condition for a successful communication between two SUs is that there exists at least one common available channel between them. In other words, only when two SUs detect the same available channel can they transmit messages on this common channel. The other condition is that the two SUs are within their transmission range. Due to the limitation of the transmission power, the distance between two SUs can not be far away. Here, we make an assumption that only when the distance between two nodes is no larger than R0 can they communicate successfully, where R0 is the transmission distance of each SU.
3.2 Mobility model
As it is mentioned above, PUs in this model are static nodes, while SUs are mobile devices, such as smart phones or ipads that are carried by human beings. As a result, the mobility pattern of SUs corresponds to that of their users. Empirical observation says the mobility of human beings has the characteristic of both randomness and sociality. Randomness means people can change their moving speed and direction arbitrarily, while sociality signifies that there exists certain regulations during the movement of each node. The traditional random walk mobility model is then no longer suitable. A new mobility model that can reflect the sociality between nodes is quite essential. In this paper, we first propose a social-based mobility model to simulate the mobility pattern of SUs. In this model, SUs are assumed to have their position information available, which could be obtained via techniques proposed in [30, 31]. The whole area is partitioned into multiple zones (Z m ,m=1,2,⋯,ω), which satisfies and . Each zone is determined by its functions, such as teaching buildings, dormitory areas, playgrounds, and dining rooms in a university campus. For different nodes, the probability of entering each zone is different. Let denote the probability for node i moving towards zone m. We assign a special landmark to each zone to represent all the places in this zone. For simplicity, the landmark is located at the center of the zone, and it is expressed as C m for zone Z m . Each node’s movement can be divided into a sequence of time intervals called mobility epochs ξ, during which a node moves in a constant direction and speed . The epoch length is constant for all the nodes. The speed of each SU node in one epoch is uniformly distributed over ), while the direction is discretely distributed, which points to Z m with probability for node i. After each epoch ends, the nodes will make a decision whether to have a pause. If there is any friend around him, the node and his friends will have a short stay. The pause time obeys a power law distribution because few people stay together for a long time, and most have a short stay. Speed, direction, epoch length, and pause time are uncorrelated . For a zone Z m , the more frequently a node visits, the larger the probability of moving towards C m is. The socially closer the two nodes are, the longer time they stay together. Obviously, the new mobility model is more coincidental to the mobility pattern of human beings in the real world.
4 Analysis of social relationships
The social relationships among mobile nodes are more likely to be long-term characteristic and less volatile than node mobility. People with different relationships may have different encounter frequencies and encounter durations. Therefore, the social relationship can be regarded as an important criterion to predict the encounter duration between two users, and it can also be used as a metric to guide the relay selection.
4.1 Classification of social relationships
Close friends: Nodes in this relationship have not only high encounter frequencies but also long durations just like close friends in the real world. Of course, this relationship is not common in the real world.
Familiar strangers: Two nodes are defined as familiar strangers if they encounter frequently but the duration of each meeting is short. For example, students who study in the same teaching building but not knowing each other encounter with each other several times a day; however, there exists no communication when they meet. As a result, their encounter duration is short.
Strangers: Nodes who have this relationship have both a low encounter frequency and a short duration time, just as the strangers in the real world, and this relationship is quite common.
Ordinary friends: If the encounter duration of two nodes is quite long once they meet each other, even if the encounter frequency is not high, we call these nodes ordinary friends. Just like we can not meet our friends frequently, but once we meet with each other, we will stop or walk together to have a conversation.
4.2 Application of social relationships in CRAHNs
From the analysis above, we can get that any two CR nodes in CRAHNs have a certain relationship which belongs to one of the above four categories. We propose to utilize the concept of social relationships into the routing in CRAHNs.
4.2.1 Application of social relationships in prediction of link duration
Due to the fragility of the communication link, a link reliability prediction scheme is essential. However, most of the current studies ignored this aspect or just predict the link duration without considering the social relationship. Obviously, different relationships will result in different link durations, for example, the link between two friends should have a longer duration than that of two strangers. Therefore, we propose to combine the concept of social relationship with link duration prediction.
4.2.2 Application of social relationships for relay selection
Based on a large number of experiments and data statistics, we find out that the social relationship has a good stability. People used to meet with each other frequently have a larger probability to encounter with each other in the near future. In this paper, we intend to use the social relationship as a metric to make a routing decision and select the relay so as to make the transmission more effective.
5 Analysis of link reliability
In this section, we propose a prediction scheme which can judge the reliability of a link in a period of time. First, we give the following definitions.
(Reliable link) If there exists at least one common available channel between node i and node j, and the available time of link (i,j) on any common channel is longer than the actual time required for transmitting a message, then link (i,j) is defined as a reliable one.
(Neighbors) The neighbors of node i is a set of nodes which are within the transmission range R0 of node i, denoted by N i .
where B k is the bandwidth of channel k, P i is the transmission power of node i, N0 is the noise spectral density, and represents the path loss between i and j, where κ is the path loss constant, μ is the pass loss exponent, and is the distance between i and j.
It is obvious that is the actual transmission time needed for link (i,j) transmitting data Q on channel k. To transmit the data completely, the time link (i,j) which remains available needs to be longer than . Next, we will predict the probability of link (i,j) on channel k remaining continuously available for time , denoted by , short for . If is larger than a predefined threshold, link (i,j) on channel k is considered to be reliable. Based on the specific characteristics of CRAHNs, the interruption of a link can be classified into the following two categories according to its contributing factors.
Physical interruption: A link will be interrupted if the distance between two nodes becomes larger than the transmission range R0. This kind of interruption is called physical interruption.
CR interruption: CR interruption is determined by spectrum availability. According to Definition 1, if the common channel k between node i and node j becomes unavailable, then link (i,j) on channel k will be CR interrupted.
It is well acknowledged that the social relationship between the two nodes has some effect on the prediction of . As a result, different prediction mechanisms are employed according to the friendship between the two nodes.
Close friends, Ordinary friends: Once the two nodes in this relationship encounter with each other, there is no doubt for them to have a pause for a chat. Consequently, we assume that the available time of link (i,j) is long enough for data transmission. We set directly in this situation.
Familiar strangers, Strangers: Nodes who have these relationships will not have any communication with each other when they encounter. The behaviors of each node are independent. As a result of this, prediction mechanisms are imperative to estimate and .
Next we will explain the evaluation of and in the stranger cases.
According to our proposed mobility model, once two nodes encounter with each other, the motion states of each node can be classified into two phases according to the mobility model: (1) Keep the current velocity until the current epoch ends; (2) Change its velocity at the start of its next epoch, then keep the new velocity. Assume time for the first phase is t1, and time for the second phase is t2. Obviously, different prediction schemes should be employed in these two phases.
5.1 Prediction of and
where and denote the probabilities for node i and node j bringing no interference to the PU k within time t1 given the initial distance and , and and denote the probabilities for node i and node j bringing no interference to PU base station. The derivation of , , and is similar, and we take as an example to illustrate the derivation process.
5.2 Prediction of and
where , as shown in Figure 4.
case 1: i, j are walking towards the same side of line AB.case 2: i, j are walking towards different sides of line AB.
5.3 Analysis of link reliability
6 Routing scheme
In the previous section, a link reliability prediction algorithm has been proposed. Based on this algorithm, we present a new social-based opportunistic routing scheme, named SoRoute, which selects relays in a reliable and efficient way.
Spectrum sensing: Once node i meets one of its neighbors j, j sends its location, current velocity, and social relationship information through a common control channel (CCC) to i. We also assume that the SUs are able to access a geo-database to obtain the PUs’ location. Then node i can detect the common available channels with node j.
Social-based relay selection: Node i checks the relationship between node j and the destination. If node j is the destination or one of the destination’s close friends, or has a destination encounter frequency greater than its own encounter frequency with the destination, node i will further check whether the link to node j is reliable (see step (3)). Otherwise, it will stop the process.
Reliable path selection: Node i computes link reliability of every common available channel with j according to the link reliability detection algorithm. Then node i can judge whether node j is a reliable relay. If node j is a reliable relay, then node i relays the message to node j.
Assume that node j is selected as the most suitable relay for node i by applying the above routing algorithm, then j conducts the same operation accordingly until the message is sent to the destination.
In this section, we evaluate the performance of the proposed social-based routing scheme in CRAHNs. First, we will verify the correctness of the proposed link reliability prediction algorithm. Then the proposed routing scheme is compared with the state-of-the-art DTN routing schemes: First Contact, Direct Delivery, MaxProp, and Prophet.
7.1 Validation of the proposed link reliability prediction algorithm
Figure 6 shows the results of . It is clear from the figure that the red lines are fairly close with the blue ones, which means our prediction of the probability with no CR interruption is quite accurate.
Figure 7 gives the results of , which is the probability of nodes i and j remaining in the transmission range of each other within time t. From the figure, we can see that there is about 30% deviation.
However, the final results of link reliability is the product of the former two parameters, and the results are shown in Figure 8. We can observe that the two lines are close enough with a maximum deviation of 13%. Therefore, we can draw the conclusion that our proposed scheme is precise enough to predict the link reliability in actual mobile environments.
7.2 Statistics of the social relationship between nodes
(4,500 m,3,400 m)
R0: radio transmission range
ρ P , ρ S : interference range of PUs and SUs
Uniform [ 0,8 m/s]
Towards the landmark of each zone
Number of primary base station
Number of PU
Number of SU
7.3 Performance of the proposed social-based routing scheme
In this section, we compare the performance of our SoRoute with several alternative routing schemes based on the simulation.
Direct delivery routing: This routing scheme is the simplest one. In this algorithm, messages are forwarded only when they encounter with the destination node.
First contact routing: In this scheme , messages are forwarded to a randomly chosen contact or to the first available contact if none of them are connected at the time of message arrival.
Maxprop routing: MaxProp  is based on prioritizing the schedule of packets transmitted to other peers and the schedule of packets to be dropped. These priorities are based on the path likelihoods to peers according to the historical data and also on several complementary mechanisms, including acknowledgments, a head-start for new packets, and lists of previous intermediaries.
Prophet routing: Prophet  is a DTN routing protocol aiming at using knowledge obtained from past encounters with other nodes to optimize packet delivery. Each node keeps a vector of delivery predictability estimates and uses it to decide whether an encountered node were a better carrier for a DTN packet.
We consider four important metrics to compare the performance of our social-based forwarding strategy with the above routing schemes:
Packet loss rate: It refers to the ratio of the aborted messages to the total number of messages during the transmission of each hop.
Packet delivery rate: It refers to the ratio of the successfully delivered messages to the total number of created messages at the end of an experiment.
Average latency: An end-to-end delay refers to the delay for a message to be received at its destination. Here we consider the average value of delays for all successfully delivered messages during the experiment time.
Overhead ratio: It is a metric of measuring the system costs, and it’s defined as follows:
Figure 14 illustrates that only the MaxProp scheme outperforms our SoRoute in packet delivery ratio. More precisely, our routing scheme has a stable packet delivery ratio of 92.3%, with only 5.7% degradation compared to the MaxProp.The results of the average end-to-end delay are shown in Figure 15. Maxprop and Prophet, in which multiple message copies coexisting in the networks help spread the messages, have the minimum delay. In contrast, there exists only a single copy of messages in the network for First Contact, Direct Delivery, and our SoRoute. It is obvious that SoRoute has the best performance among the three single-copy schemes.Finally, the overhead ratio is illustrated in Figure 16; it can be seen from the figure that SoRoute has quite a low overhead. In contrast, the overheads of Maxprop and Prophet are much higher because of their multi-copy characteristics. These results prove that SoRoute is a reliable, low-overhead, and low-latency routing algorithm.
In this paper, we propose a social-based routing scheme for CRAHNs. The proposed routing scheme utilizes the social relationships between people to select relays in a reliable and effective way. The simulation results show that our routing scheme achieves a much better performance in terms of packet loss rate and overhead ratio than the existing routing schemes such as Direct Delivery, First Contact, MaxProp, and Prophet. Our future work involves improving the mobility model and validate it using more realistic data.
The authors would like to thank the support from the National Natural Science Foundation of China (Grant No. 61272505, 61172074, and 61371069) and the National Science Foundation of the US (CNS-1162057).
- Akyildiz IF, Lee W-Y, Vuran MC, Mohanty S: Next generation/dynamic spectrum access/cognitive radio wireless networks: a survey. Comput. Netw 2006, 50(13):2127-2159. 10.1016/j.comnet.2006.05.001MATHView ArticleGoogle Scholar
- Li W, Cheng X, Jing T, Cui Y, Xing K, Wang W: Spectrum assignment and sharing for delay minimization in multi-hop multi-flow crns. IEEE J. Selected Areas Commun. (JSAC) 2013, 31(11):2483-2493.View ArticleGoogle Scholar
- Li H, Cheng X, Li K, Xing X, Jing T: Utility-based cooperative spectrum sensing scheduling in cognitive radio networks. In Proceedings. INFOCOM Mini-Conference, 2013. Italy; 2013:165-169.View ArticleGoogle Scholar
- Li W, Cheng X, Jing T, Xing X: Cooperative multi-hop relaying via network formation games in cognitive radio networks. In Proceedings. INFOCOM, 2013. Italy; 2013:971-979.View ArticleGoogle Scholar
- Xing X, Jing T, Cheng W, Huo Y, Cheng X: Spectrum prediction in cognitive radio networks. IEEE Wireless Commun 2013, 20(2):90-96.View ArticleGoogle Scholar
- Xing X, Jing T, Huo Y, Li H, Cheng X: Channel quality prediction based on bayesian inference in cognitive radio networks. In Proceedings. INFOCOM, 2013. Italy; 2013:1465-1473.View ArticleGoogle Scholar
- Jing T, Chen X, Huo Y, Cheng X: Achievable transmission capacity of cognitive mesh networks with different media access control. In Proceedings. IEEE INFOCOM, 2012. USA; 2012:1764-1772.View ArticleGoogle Scholar
- Song M, Xin C, Zhao Y, Cheng X: Dynamic spectrum access: from cognitive radio to network radio. IEEE Wireless Commun 2012, 19(1):23-29.View ArticleGoogle Scholar
- Akyildiz IF, Lee W-Y, Chowdhury KR: Crahns: Cognitive radio ad hoc networks. Ad Hoc Netw 2009, 7(5):810-836. 10.1016/j.adhoc.2009.01.001View ArticleGoogle Scholar
- Zhang Z: Routing in intermittently connected mobile ad hoc networks and delay tolerant networks: overview and challenges. IEEE Commun. Surv. Tutor 2006, 8(1):24-37.View ArticleGoogle Scholar
- Huang J, Wang S, Cheng X, Liu M, Li Z, Chen B: Mobility-assisted routing in intermittently connected mobile cognitive radio networks. IEEE Transaction on Parallel Distributed Systems (TPDS) 2014, 2956-2968.Google Scholar
- Chen S, Nahrstedt K: Distributed quality-of-service routing in ad hoc networks. IEEE J on Selected Areas Communication 1999, 17(8):1488-1505. 10.1109/49.780354View ArticleGoogle Scholar
- Vahdat A, Becker D: Epidemic routing for partially connected ad hoc networks. Technical report, Technical Report CS-200006, Duke University 2000.Google Scholar
- Hui P, Crowcroft J, Yoneki E: Bubble rap: social-based forwarding in delay-tolerant networks. IEEE Transaction on Mobile Computing 2011, 10(11):1576-1589.View ArticleGoogle Scholar
- Daly EM, Haahr M: Social network analysis for routing in disconnected delay-tolerant manets. In Proceedings. The 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing. ACM; 2007:32-40.Google Scholar
- Wang S, Liu M, Cheng X, Li Z, Huang J, Chen B: Opportunistic routing in intermittently connected mobile p2p networks. IEEE J on Selected Areas Communication 2013, 31(9):369-378.View ArticleGoogle Scholar
- Wang S, Liu M, Cheng X, Song M: Routing in pocket switched networks. IEEE Wireless Commun 2012, 19(2):67-73.View ArticleGoogle Scholar
- Zhu H, Dong M, Chang S, Zhu Y, Li M, Shen X: Zoom: scaling the mobility for fast opportunistic forwarding in vehicular networks. Proceedings. INFOCOM 2013 2013, 2832-2840.View ArticleGoogle Scholar
- Spyropoulos T, Psounis K, Raghavendra CS: Spray and focus: efficient mobility-assisted routing for heterogeneous and correlated mobility. Proceedings. The Fifth Annual IEEE International Conference On Pervasive Computing and Communications Workshops, 2007 2007, 79-85.Google Scholar
- Burgess J, Gallagher B, Jensen D, Levine BN: Maxprop: Routing for vehicle-based disruption-tolerant networks. In Proceedings. INFOCOM 2006. 25th IEEE International Conference on Computer Communications. Spain; 2006:1-11.View ArticleGoogle Scholar
- Cheng P-C, Weng J-T, Tung L-C, Lee KC, Gerla M, Haerri J: Geodtn+ nav: a hybrid geographic and dtn routing with navigation assistance in urban vehicular networks. In Proceedings. The 1st International Symposium on Vehicular Computing Systems (ISVCS’08). Dublin, Ireland; July 2008.Google Scholar
- Khadar F, Razafindralambo T: Performance evaluation of gradient routing strategies for wireless sensor networks. In NETWORKING 2009. Springer, Berlin; 2009:535-547.View ArticleGoogle Scholar
- Srinivasa S, Krishnamurthy S: Crest: An opportunistic forwarding protocol based on conditional residual time. Proceedings. The 6th Annual IEEE Communications Society Conference On Sensor, Mesh and Ad Hoc Communications and Networks, 2009 2009, 1-9.View ArticleGoogle Scholar
- Bulut E, Szymanski BK: Friendship based routing in delay tolerant mobile social networks. In Proceedings. Global Telecommunications Conference (GLOBECOM 2010), 2010. IEEE, USA; 2010:1-5.View ArticleGoogle Scholar
- Gao W, Li Q, Zhao B, Cao G: Multicasting in delay tolerant networks: a social network perspective. In Proceedings. The Tenth ACM International Symposium on Mobile Ad Hoc Networking and Computing. ACM; 2009:299-308.View ArticleGoogle Scholar
- Han Q, Bai Y, Gong L, Wu W: Link availability prediction-based reliable routing for mobile ad hoc networks. Commun. IET 2011, 5(16):2291-2300. doi:10.1049/iet-com.2010.0946 10.1049/iet-com.2010.0946MathSciNetView ArticleGoogle Scholar
- Jiang S, He D, Rao J: A prediction-based link availability estimation for mobile ad hoc networks. Proceedings. IEEE INFOCOM 2001. Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 3 2001, 1745-17523. doi:10.1109/INFCOM.2001.916672View ArticleGoogle Scholar
- Jiang S: An enhanced prediction-based link availability estimation for manets. IEEE Trans Commun 2004, 52(2):183-186. doi:10.1109/TCOMM.2003.822739 10.1109/TCOMM.2003.822739View ArticleGoogle Scholar
- Guan Q, Yu FR, Jiang S, Wei G: Prediction-based topology control and routing in cognitive radio mobile ad hoc networks. IEEE Trans on Vehic. Technol 2010, 59(9):4443-4452. doi:10.1109/TVT.2010.2069105View ArticleGoogle Scholar
- Cheng X, Thaeler A, Xue G, Chen D: Tps: a time-based positioning scheme for outdoor sensor networks. In Proceedings. IEEE INFOCOM, 2004, vol. 4. HK; 2004:2685-2696.Google Scholar
- Cheng W, Thaeler A, Cheng X, Liu F, Lu X, Lu Z: Time-synchronization free localization in large scale underwater acoustic sensor networks. Proceedings. The Sixth Workshop on Wireless Ad Hoc and Sensor Networks (WWASN2009) 2009.Google Scholar
- Granovetter M: The strength of weak ties. Am. J. Sociol 1973, 78(6):1360-1380. 10.1086/225469View ArticleGoogle Scholar
- Gonzalez MC, Hidalgo CA, Barabasi A-L: Understanding individual human mobility patterns. Nature 2008, 453(7196):779-782. 10.1038/nature06958View ArticleGoogle Scholar
- Keränen A, Ott J, Kärkkäinen T: The one simulator for dtn protocol evaluation. Proceedings. The 2nd International Conference on Simulation Tools and Techniques 2009, 55-55.Google Scholar
- Jain S, Fall K, Patra R: Routing in a delay tolerant network. ACM, USA 2004, 34(4):145-158.Google Scholar
- Lindgren A, Doria A, Schelén O: Probabilistic routing in intermittently connected networks. ACM SIGMOBILE Mobile Comput. Commun. Rev 2003, 7(3):19-20. 10.1145/961268.961272View ArticleGoogle Scholar
This article is published under license to BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly credited.