Export Citations
Welcome to the first edition of the Workshop on Mobile Opportunistic Networking, MobiOpp 2007. The workshop is co-located with ACM MobiSys 2007 and is sponsored by ACM SIGMOBILE.
Opportunistic networking is one of the most exciting evolutions of the Mobile Ad hoc Networking (MANET) paradigm, in which the assumption of complete paths between data senders and receivers is released. Opportunistic networks enable users' communication in disconnected environments, in which islands of connected devices appear, disappear, and reconfigure dynamically. Opportunistic networks thus encompass the scope of delay or disruption tolerant networks (DTN), and are very suitable to accommodate the pervasive networking view, in which a huge number of devices carried by users and embedded in the environment communicate wirelessly without requiring any pre-existing infrastructure.
The response to the Call for Papers shows that MobiOpp has been particularly well received by researchers working in the field of opportunistic Networks. Specifically, we received thirty-five submissions, addressing topics related to all fields of opportunistic networks. Out of them, the Program Committee selected ten regular papers for presentation in the workshop sessions. In addition, four papers have been selected as short contributions, and will be presented in the Work-in-Progress session. These figures and the quality of the received papers, show that MobiOpp is already seen as a premiere forum for presenting and discussing ideas and results in all the fields of opportunistic networking.
The MobiOpp program also includes a Keynote Speech by Prof. Gaetano Borriello of the University of Washington, and a panel.
Proceeding Downloads
Contention-aware analysis of routing schemes for mobile opportunistic networks
A large body of work has theoretically analyzed the performance of routing schemes for mobile opportunistic networks. But a vast majority of these prior studies have ignored wireless contention. Recent papers have shown through simulations that ignoring ...
A comparison of opportunistic and deterministic forwarding in mobile multihop wireless networks
While opportunistic packet forwarding has been extensively studied in the case of single hop communication, only recently has opportunistic forwarding for multihop networks been explored. One key aspect of opportunistic forwarding is that the node that ...
Evaluating contacts for routing in highly partitioned mobile networks
The movement of real users often follows some patterns that can be characterized by certain statistical metrics of the contacts. Such metrics are useful for nodes to make routing decisions, especially in sparse mobile ad hoc networks where instantaneous ...
Reactive sink mobility in wireless sensor networks
The ability of a sink node to move can greatly improve the fault tolerance and load balancing properties of a sensor network. Rather than assuming extensive mobility and trying to minimize the large-scale path loss between the mobile sink and the nodes, ...
Energy-efficient opportunistic topology control in wireless sensor networks
Topology control has been proposed as a promising technique to achieve energy-efficiency in wireless sensor networks (WSNs). However, existing topology control algorithms assume that wireless links are static, either connected or disconnected. Taking ...
Opportunistic spatio-temporal dissemination system for vehicular networks
Opportunistic dissemination protocols have potentially applications in the domain of vehicular networking, ranging from advertising to emergency/traffic/parking information spreading: one of the characteristics of vehicular networks is that they are ...
Evaluating vehicle network strategies for downtown Portland: opportunistic infrastructure and the importance of realistic mobility models
In an urban environment, vehicles can opportunistically exploit infrastructure through open Access Points (APs) to efficiently communicate with other vehicles. This is to avoid long wireless ad hoc paths, and to alleviate congestion in the wireless ...
Applicability of identity-based cryptography for disruption-tolerant networking
Traditional approaches for communication security do not work well in disruption- and delay-tolerant networks (DTNs). Recently, the use of identity-based cryptography (IBC) has been proposed as one way to help solve some of the DTN security issues. We ...
Incentive-based cooperative and secure inter-personal networking
In this paper we describe a framework for enabling a "stranded" mobile user to negotiate connectivity and networking resources through another user's devices. (A "stranded" user is one who has no direct means to access a network for communication ...
Prioritized epidemic routing for opportunistic networks
We describe PRioritized EPidemic (PREP) for routing in opportunistic networks. PREP prioritizes bundles based on costs to destination, source, and expiry time. Costs are derived from per-link "average availability" information that is disseminated in an ...
Performance modeling of network coding in epidemic routing
Epidemic routing has been proposed to reduce the data transmission delay in opportunistic networks, in which data can be either replicated or network coded along the opportunistic multiple paths. In this paper, we introduce an analytical framework to ...
Hybrid routing in clustered DTNs with message ferrying
The mobile wireless research community has invested in the development of routing algorithms and protocols for two distinct environments. The mobile ad-hoc network (MANET) environment is generally assumed to contain relatively dense nodes connected by ...
TACO-DTN: a time-aware content-based dissemination system for delay tolerant networks
Content dissemination applications are becoming more and more popular on fixed infrastructure: in this paper we introduce TACO-DTN, a content dissemination system which, by virtue of being time-aware in terms of subscriptions and events, is appropriate ...
Reliable and efficient message delivery in delay tolerant networks using rateless codes
In this paper, we consider the problem of multiple unicast message delivery in Delay Tolerant Networks (DTNs). Long delays, mobility of nodes, and lack of connectivity that are characteristics of such network make this problem very challenging. ...
Recommendations
Report on the First MobiSys ACM workshop on mobile opportunistic networking (MobiOpp'07)
The aim of the MobiOpp workshop series is to bring together the (increasing) community of researchers working in the area of Mobile Opportunistic Networking. The first workshop in this series, MobiOpp'07, was held on June 11, 2007 in San Juan, Puerto ...