Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (45)

Search Parameters:
Keywords = Opportunistic Network Environment (ONE) simulator

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
16 pages, 3076 KB  
Article
A Q-Learning Based Scheme for Neighbor Discovery and Power Control in Marine Opportunistic Networks
by Jiahui Zhang, Shengming Jiang and Jinyu Duan
Sensors 2025, 25(18), 5720; https://doi.org/10.3390/s25185720 - 13 Sep 2025
Viewed by 445
Abstract
Opportunistic networks, as an emerging ad hoc networking technology, the sparse distribution of nodes poses significant challenges to data transmission. Additionally, unlike static nodes in traditional ad hoc networks that can replenish energy on demand, the inherent mobility of nodes further complicates energy [...] Read more.
Opportunistic networks, as an emerging ad hoc networking technology, the sparse distribution of nodes poses significant challenges to data transmission. Additionally, unlike static nodes in traditional ad hoc networks that can replenish energy on demand, the inherent mobility of nodes further complicates energy management. Thus, selecting an energy-efficient neighbor discovery algorithm is critical. Passive listening conserves energy by continuously monitoring channel activity, but it fails to detect inactive neighboring nodes. Conversely, active probing discovers neighbors by broadcasting probe packets, which increases energy consumption and may lead to network congestion due to excessive probe traffic. As the primary communication nodes in the maritime environment, vessels exhibit high mobility, and networks in oceanic regions often operate as opportunistic networks. To address the challenge of limited energy in maritime opportunistic networks, this paper proposes a hybrid neighbor discovery method that combines both passive and active discovery mechanisms. The method optimizes passive listening duration and employs Q-learning for adaptive power control. Furthermore, a more suitable wireless communication model has been adopted. Simulation results demonstrate its effectiveness in enhancing neighbor discovery performance. Notably, the proposed scheme improves network throughput while achieving up to 29% energy savings at most during neighbor discovery. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

39 pages, 4832 KB  
Article
Simulation-Based Aggregate Calibration of Destination Choice Models Using Opportunistic Data: A Comparative Evaluation of SPSA, PSO, and ADAM Algorithms
by Vito Busillo, Andrea Gemma and Ernesto Cipriani
Future Transp. 2025, 5(3), 118; https://doi.org/10.3390/futuretransp5030118 - 3 Sep 2025
Viewed by 486
Abstract
This paper presents an initial contribution to a broader research initiative focused on the aggregate calibration of travel demand sub-models using low-cost and widely accessible data. Specifically, this first phase investigates methods and algorithms for the aggregate calibration of destination choice models, with [...] Read more.
This paper presents an initial contribution to a broader research initiative focused on the aggregate calibration of travel demand sub-models using low-cost and widely accessible data. Specifically, this first phase investigates methods and algorithms for the aggregate calibration of destination choice models, with the objective of assessing the possible utilization of an external observed matrix, eventually derived from opportunistic data. It can be hypothesized that such opportunistic data may originate from processed mobile phone data or result from the application of data fusion techniques that produce an estimated observed trip matrix. The calibration problem is formulated as a simulation-based optimization task and its implementation has been tested using a small-scale network, employing an agent-based model with a nested demand structure. A range of optimization algorithms is implemented and tested in a controlled experimental environment, and the effectiveness of various objective functions is also examined as a secondary task. Three optimization techniques are evaluated: Simultaneous Perturbation Stochastic Approximation (SPSA), Particle Swarm Optimization (PSO), and Adaptive Moment Estimation (ADAM). The application of the ADAM optimizer in this context represents a novel contribution. A comparative analysis highlights the strengths and limitations of each algorithm and identifies promising avenues for further investigation. The findings demonstrate the potential of the proposed framework to advance transportation modeling research and offer practical insights for enhancing transport simulation models, particularly in data-constrained settings. Full article
Show Figures

Figure 1

22 pages, 3660 KB  
Article
Context-Aware Trust Prediction for Optimal Routing in Opportunistic IoT Systems
by Abdulkadir Abdulahi Hasan, Xianwen Fang, Sohaib Latif and Adeel Iqbal
Sensors 2025, 25(12), 3672; https://doi.org/10.3390/s25123672 - 12 Jun 2025
Cited by 1 | Viewed by 864
Abstract
The Social Opportunistic Internet of Things (SO-IoT) is a rapidly emerging paradigm that enables mobile, ad-hoc device communication based on both physical and social interactions. In such networks, routing decisions heavily depend on the selection of intermediate nodes to ensure secure and efficient [...] Read more.
The Social Opportunistic Internet of Things (SO-IoT) is a rapidly emerging paradigm that enables mobile, ad-hoc device communication based on both physical and social interactions. In such networks, routing decisions heavily depend on the selection of intermediate nodes to ensure secure and efficient data dissemination. Traditional approaches relying solely on reliability or social interest fail to capture the multifaceted trustworthiness of nodes in dynamic SO-IoT environments. This paper proposes a trust-based route optimization framework that integrates social interest and behavioral reliability using Bayesian inference and Jeffrey’s conditioning. A composite trust level is computed for each intermediate node to determine its suitability for data forwarding. To validate the framework, we conduct a two-phase simulation-based analysis: a scenario-driven evaluation that demonstrates the model’s behavior in controlled settings, and a large-scale NS-3-based simulation comparing our method with benchmark routing schemes, including random, greedy, and AI-based protocols. Results confirm that our proposed model achieves up to an 88.9% delivery ratio with minimal energy consumption and the highest trust accuracy (86.5%), demonstrating its robustness and scalability in real-world-inspired IoT environments. Full article
(This article belongs to the Special Issue Data Engineering in the Internet of Things—Second Edition)
Show Figures

Figure 1

18 pages, 1940 KB  
Article
An Intelligent Fuzzy-Based Routing Protocol for Vehicular Opportunistic Networks
by Ermioni Qafzezi, Kevin Bylykbashi, Shunya Higashi, Phudit Ampririt, Keita Matsuo and Leonard Barolli
Information 2025, 16(1), 52; https://doi.org/10.3390/info16010052 - 15 Jan 2025
Cited by 1 | Viewed by 1027
Abstract
Opportunistic networks are characterized by intermittent connectivity and dynamic topologies, which pose significant challenges for efficient message delivery, resource management, and routing decision-making. This paper introduces the Fuzzy Control Routing Protocol, a novel approach designed to address these challenges by leveraging fuzzy logic [...] Read more.
Opportunistic networks are characterized by intermittent connectivity and dynamic topologies, which pose significant challenges for efficient message delivery, resource management, and routing decision-making. This paper introduces the Fuzzy Control Routing Protocol, a novel approach designed to address these challenges by leveraging fuzzy logic to enhance routing decisions and improve overall network performance. The protocol considers buffer occupancy, angle to destination, and the number of unique connections of the target nodes to make context-aware routing decisions. It was implemented and evaluated using the FuzzyC framework for simulations and the opportunistic network environment simulator for realistic network scenarios. Simulation results demonstrate that the Fuzzy Control Routing Protocol achieves competitive delivery probability, efficient resource utilization, and low overhead compared to the Epidemic and MaxProp protocols. Notably, it consistently outperformed the Epidemic protocol across all metrics and exhibited comparable delivery probability to MaxProp while maintaining significantly lower overhead, particularly in low-density scenarios. The results demonstrate the protocol’s ability to adapt to varying network conditions, effectively balance forwarding and resource management, and maintain robust performance in dynamic vehicular environments. Full article
(This article belongs to the Special Issue Wireless Communication and Internet of Vehicles)
Show Figures

Figure 1

20 pages, 1355 KB  
Article
Context-Aware Trust and Reputation Routing Protocol for Opportunistic IoT Networks
by Jagdeep Singh, Sanjay Kumar Dhurandher, Isaac Woungang and Han-Chieh Chao
Sensors 2024, 24(23), 7650; https://doi.org/10.3390/s24237650 - 29 Nov 2024
Cited by 7 | Viewed by 1907
Abstract
In opportunistic IoT (OppIoT) networks, non-cooperative nodes present a significant challenge to the data forwarding process, leading to increased packet loss and communication delays. This paper proposes a novel Context-Aware Trust and Reputation Routing (CATR) protocol for opportunistic IoT networks, which leverages the [...] Read more.
In opportunistic IoT (OppIoT) networks, non-cooperative nodes present a significant challenge to the data forwarding process, leading to increased packet loss and communication delays. This paper proposes a novel Context-Aware Trust and Reputation Routing (CATR) protocol for opportunistic IoT networks, which leverages the probability density function of the beta distribution and some contextual factors, to dynamically compute the trust and reputation values of nodes, leading to efficient data dissemination, where malicious nodes are effectively identified and bypassed during that process. Simulation experiments using the ONE simulator show that CATR is superior to the Epidemic protocol, the so-called beta-based trust and reputation evaluation system (denoted BTRES), and the secure and privacy-preserving structure in opportunistic networks (denoted PPHB+), achieving an improvement of 22%, 15%, and 9% in terms of average latency, number of messages dropped, and average hop count, respectively, under varying number of nodes, buffer size, time to live, and message generation interval. Full article
Show Figures

Figure 1

21 pages, 4943 KB  
Article
Cross-Layer Optimization for Enhanced IoT Connectivity: A Novel Routing Protocol for Opportunistic Networks
by Ayman Khalil and Besma Zeddini
Future Internet 2024, 16(6), 183; https://doi.org/10.3390/fi16060183 - 22 May 2024
Cited by 4 | Viewed by 2176
Abstract
Opportunistic networks, an evolution of mobile Ad Hoc networks (MANETs), offer decentralized communication without relying on preinstalled infrastructure, enabling nodes to route packets through different mobile nodes dynamically. However, due to the absence of complete paths and rapidly changing connectivity, routing in opportunistic [...] Read more.
Opportunistic networks, an evolution of mobile Ad Hoc networks (MANETs), offer decentralized communication without relying on preinstalled infrastructure, enabling nodes to route packets through different mobile nodes dynamically. However, due to the absence of complete paths and rapidly changing connectivity, routing in opportunistic networks presents unique challenges. This paper proposes a novel probabilistic routing model for opportunistic networks, leveraging nodes’ meeting probabilities to route packets towards their destinations. Thismodel dynamically builds routes based on the likelihood of encountering the destination node, considering factors such as the last meeting time and acknowledgment tables to manage network overload. Additionally, an efficient message detection scheme is introduced to alleviate high overhead by selectively deleting messages from buffers during congestion. Furthermore, the proposed model incorporates cross-layer optimization techniques, integrating optimization strategies across multiple protocol layers to maximize energy efficiency, adaptability, and message delivery reliability. Through extensive simulations, the effectiveness of the proposed model is demonstrated, showing improved message delivery probability while maintaining reasonable overhead and latency. This research contributes to the advancement of opportunistic networks, particularly in enhancing connectivity and efficiency for Internet of Things (IoT) applications deployed in challenging environments. Full article
Show Figures

Figure 1

22 pages, 9131 KB  
Article
Research on Secure Community Opportunity Network Based on Trust Model
by Bing Su and Jiwu Liang
Future Internet 2024, 16(4), 121; https://doi.org/10.3390/fi16040121 - 1 Apr 2024
Cited by 2 | Viewed by 1686
Abstract
With the innovation of wireless communication technology and the surge of data in mobile networks, traditional routing strategies need to be improved. Given the shortcomings of existing opportunistic routing strategies in transmission performance and security, this paper proposes a community opportunistic routing decision-making [...] Read more.
With the innovation of wireless communication technology and the surge of data in mobile networks, traditional routing strategies need to be improved. Given the shortcomings of existing opportunistic routing strategies in transmission performance and security, this paper proposes a community opportunistic routing decision-making method based on the trust model. This algorithm calculates the node’s trust value through the node’s historical forwarding behavior and then calculates the node’s trust value based on the trust model. Thresholds and trust attenuation divide dynamic security communities. For message forwarding, nodes in the security community are prioritized as next-hop relay nodes, thus ensuring that message delivery is always in a safe and reliable environment. On this basis, better relay nodes are further selected for message forwarding based on the node centrality, remaining cache space, and remaining energy, effectively improving the message forwarding efficiency. Through node trust value and community cooperation, safe and efficient data transmission is achieved, thereby improving the transmission performance and security of the network. Through comparison of simulation and opportunistic network routing algorithms, compared with traditional methods, this strategy has the highest transmission success rate of 81% with slightly increased routing overhead, and this algorithm has the lowest average transmission delay. Full article
Show Figures

Figure 1

18 pages, 797 KB  
Article
Dynamic Co-Operative Energy-Efficient Routing Algorithm Based on Geographic Information Perception in Opportunistic Mobile Networks
by Tong Wang, Jianqun Cui, Yanan Chang, Feng Huang and Yi Yang
Electronics 2024, 13(5), 868; https://doi.org/10.3390/electronics13050868 - 23 Feb 2024
Cited by 3 | Viewed by 1336
Abstract
Opportunistic mobile networks, as an important supplement to the traditional communication methods in unique environments, are composed of mobile communication devices. It is a network form that realizes message transmission by using the opportune encounter of these mobile communication devices. Consequently, mobile communication [...] Read more.
Opportunistic mobile networks, as an important supplement to the traditional communication methods in unique environments, are composed of mobile communication devices. It is a network form that realizes message transmission by using the opportune encounter of these mobile communication devices. Consequently, mobile communication devices necessitate periodic contact detection in order to identify potential communication opportunities, thereby leading to a substantial reduction in the already limited battery life of such devices. Previous studies on opportunistic networks have often utilized geographic information in routing design to enhance message delivery rate. However, the significance of geographic information in energy conservation has been overlooked. Furthermore, previous research on energy-efficient routing has lacked diversification in terms of the methods employed. Therefore, this paper proposes a dynamic co-operative energy-efficient routing algorithm based on geographic information perception (DCEE-GIP) to leverage geographic information to facilitate dynamic co-operation among nodes and optimize node sleep time through probabilistic analysis. The DCEE-GIP routing and other existing algorithms were simulated using opportunistic network environment (ONE) simulation. The results demonstrate that DCEE-GIP effectively extends network service time and successfully delivers the most messages. The service time of DCEE-GIP increased by 8.05∼31.11%, and more messages were delivered by 14.82∼115.9%. Full article
(This article belongs to the Special Issue Delay Tolerant Networks and Applications, 2nd Edition)
Show Figures

Figure 1

26 pages, 5128 KB  
Article
Energy-Efficient Opportunistic Routing Algorithm for Post-Disaster Mine Internet of Things Networks
by Qing Zhao, Wei Yang and Liya Zhang
Sensors 2023, 23(16), 7213; https://doi.org/10.3390/s23167213 - 16 Aug 2023
Cited by 3 | Viewed by 1702
Abstract
The Mine Internet of Things (MIoT), as a key technology for reconstructing post-disaster communication networks, enables a user to monitor and control the safety of an affected roadway. However, due to the challenging underground mine environment, the MIoT suffers from severe signal attenuation, [...] Read more.
The Mine Internet of Things (MIoT), as a key technology for reconstructing post-disaster communication networks, enables a user to monitor and control the safety of an affected roadway. However, due to the challenging underground mine environment, the MIoT suffers from severe signal attenuation, vulnerable nodes, and limited energy, which result in a low level of network reliability for the post-disaster MIoT. To improve transmission reliability and reduce energy consumption, a directional-area-forwarding-based energy-efficient opportunistic routing (DEOR) approach for the post-disaster MIoT is proposed. DEOR defines a forwarding zone (FZ) for each node to route packets toward the sink. The candidate forwarding set (CFS) is constructed by the nodes within the FZ that satisfy the energy constraint and the neighboring node degree constraint. The nodes in the CFS are prioritized based on a routing quality evaluation, which takes the local attributes of the nodes, such as the directional angle, transmission distance, and residual energy, into consideration. DEOR adopts a recovery mechanism to address the issue of void nodes. The simulation results verify that the proposed DEOR approach outperforms the ORR, OBRN and ECSOR methods in terms of energy consumption, average hop count, packet delivery rate, and network lifetime. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

22 pages, 974 KB  
Article
DR-ALOHA-Q: A Q-Learning-Based Adaptive MAC Protocol for Underwater Acoustic Sensor Networks
by Slavica Tomovic and Igor Radusinovic
Sensors 2023, 23(9), 4474; https://doi.org/10.3390/s23094474 - 4 May 2023
Cited by 19 | Viewed by 3363
Abstract
Underwater acoustic sensor networks (UASNs) are challenged by the dynamic nature of the underwater environment, large propagation delays, and global positioning system (GPS) signal unavailability, which make traditional medium access control (MAC) protocols less effective. These factors limit the channel utilization and performance [...] Read more.
Underwater acoustic sensor networks (UASNs) are challenged by the dynamic nature of the underwater environment, large propagation delays, and global positioning system (GPS) signal unavailability, which make traditional medium access control (MAC) protocols less effective. These factors limit the channel utilization and performance of UASNs, making it difficult to achieve high data rates and handle congestion. To address these challenges, we propose a reinforcement learning (RL) MAC protocol that supports asynchronous network operation and leverages large propagation delays to improve the network throughput.he protocol is based on framed ALOHA and enables nodes to learn an optimal transmission strategy in a fully distributed manner without requiring detailed information about the external environment. The transmission strategy of sensor nodes is defined as a combination of time-slot and transmission-offset selection. By relying on the concept of learning through interaction with the environment, the proposed protocol enhances network resilience and adaptability. In both static and mobile network scenarios, it has been compared with the state-of-the-art framed ALOHA for the underwater environment (UW-ALOHA-Q), carrier-sensing ALOHA (CS-ALOHA), and delay-aware opportunistic transmission scheduling (DOTS) protocols. The simulation results show that the proposed solution leads to significant channel utilization gains, ranging from 13% to 106% in static network scenarios and from 23% to 126% in mobile network scenarios.oreover, using a more efficient learning strategy, it significantly reduces convergence time compared to UW-ALOHA-Q in larger networks, despite the increased action space. Full article
(This article belongs to the Collection Underwater Sensor Networks and Internet of Underwater Things)
Show Figures

Figure 1

19 pages, 359 KB  
Article
VORTEX: Network-Driven Opportunistic Routing for Ad Hoc Networks
by Ryo Yamamoto, Taku Yamazaki and Satoshi Ohzahata
Sensors 2023, 23(6), 2893; https://doi.org/10.3390/s23062893 - 7 Mar 2023
Cited by 2 | Viewed by 2304
Abstract
The potential of ad hoc networks, which enable flexible and dynamic network establishment only by mobile terminals equipped with wireless communication devices, has recently attracted attention for the coming IoT era. Although the nature of ad hoc networks shows the advantages of their [...] Read more.
The potential of ad hoc networks, which enable flexible and dynamic network establishment only by mobile terminals equipped with wireless communication devices, has recently attracted attention for the coming IoT era. Although the nature of ad hoc networks shows the advantages of their autonomous and distributed network management, a manifestation of drawbacks owing to the nature of wireless communication and the mobility of terminals are inevitable. Many routing protocols have already been proposed to address the issues by adapting to nature and achieving a certain level of improvement. However, the routing protocols still suffer from difficulties in information collection for routing and adaptive route management during communication. Moreover, there is another issue that end pair-based routing procedures prevent other end pairs from reusing the routing information effectively. To address the drawbacks of conventional routing protocols, this paper proposes VORTEX, a novel routing protocol that employs an opportunistic routing strategy using hierarchization. One of the characteristic features of VORTEX is its network-driven opportunistic forwarding, in which packets travel toward destination terminals using hierarchy as a guide without conventional route discovery procedures. Moreover, another characteristic feature of VORTEX is that the hierarchical structure also contributes to adapting to communication environment changes in an autonomous manner. In other words, VORTEX enables flexible network-wide information-based routing only with the locally collected information. The simulation results show that the proposed VORTEX could provide better service quality and reliability with improved efficiency compared to the conventional routing protocols. Furthermore, the most significant contribution is not only in the communication performance but also VORTEX omits route discovery or route maintenance from routing protocols, and formed networks themselves have a function to deliver packets toward destination terminals. Full article
(This article belongs to the Special Issue Communication, Security, and Privacy in IoT)
Show Figures

Figure 1

19 pages, 13159 KB  
Article
Using Mobile Monitoring and Atmospheric Dispersion Modeling for Capturing High Spatial Air Pollutant Variability in Cities
by Grazia Fattoruso, Domenico Toscano, Antonella Cornelio, Saverio De Vito, Fabio Murena, Massimiliano Fabbricino and Girolamo Di Francia
Atmosphere 2022, 13(11), 1933; https://doi.org/10.3390/atmos13111933 - 20 Nov 2022
Cited by 7 | Viewed by 2862
Abstract
Air pollution is still one of the biggest environmental threats to human health on a global scale. In urban environments, exposure to air pollution is largely influenced by the activity patterns of the population as well as by the high spatial and temporal [...] Read more.
Air pollution is still one of the biggest environmental threats to human health on a global scale. In urban environments, exposure to air pollution is largely influenced by the activity patterns of the population as well as by the high spatial and temporal variability in air pollutant concentrations. Over the last years, several studies have attempted to better characterize the spatial variations in air pollutant concentrations within a city by deploying dense, fixed as well as mobile, low-cost sensor networks and more recently opportunistic sampling and by improving the spatial resolution of air quality models up to a few meters. The purpose of this work has been to investigate the use of properly designed mobile monitoring campaigns along the streets of an urban neighborhood to assess the capability of an operational air dispersion model as SIRANE at the district scale to capture the local variability of pollutant concentrations. To this end, an IoT ecosystem—MONICA (an Italian acronym for Cooperative Air Quality Monitoring), developed by ENEA, has been used for mobile measurements of CO and NO2 concentration in the urban area of the City of Portici (Naples, Southern Italy). By comparing the mean concentrations of CO and NO2 pollutants measured by MONICA devices and those simulated by SIRANE along the urban streets, the former appeared to exceed the simulated ones by a factor of 3 and 2 for CO and NO2, respectively. Furthermore, for each pollutant, this factor is higher within the street canyons than in open roads. However, the mobile and simulated mean concentration profiles largely adapt, although the simulated profiles appear smoother than the mobile ones. These results can be explained by the uncertainty in the estimation of vehicle emissions in SIRANE as well as the different temporal resolution of measurements of MONICA able to capture local high concentrations. Full article
(This article belongs to the Special Issue Feature Papers in Air Quality)
Show Figures

Figure 1

16 pages, 2476 KB  
Article
Low-Delay and Energy-Efficient Opportunistic Routing for Maritime Search and Rescue Wireless Sensor Networks
by Jiangfeng Xian, Huafeng Wu, Xiaojun Mei, Xinqiang Chen and Yongsheng Yang
Remote Sens. 2022, 14(20), 5178; https://doi.org/10.3390/rs14205178 - 17 Oct 2022
Cited by 14 | Viewed by 2725
Abstract
After the occurrence of a maritime disaster, to save human life and search for important property equipment in the first time, it is indispensable to efficiently transmit search and rescue sea area data to the maritime search and rescue command center (MSRCC) in [...] Read more.
After the occurrence of a maritime disaster, to save human life and search for important property equipment in the first time, it is indispensable to efficiently transmit search and rescue sea area data to the maritime search and rescue command center (MSRCC) in real-time, so that the MSRCC can make timely and accurate decisions. The key to determining the efficiency of data forwarding is the quality of the routing protocol. Due to the high dynamics of the marine environment and the limited energy of the marine node, the coverage hole and routing path failure problems occur frequently when using the existing routing algorithm for marine data forwarding. Based on the above background, in this work, we study a low-latency and energy-efficient opportunistic routing protocol for maritime search and rescue wireless sensor networks (MSR-WSNs). Considering the adverse impact of wave shadowing on signal transmission, an effective link reliability prediction method is first investigated to quantify the link connectivity among nodes. To mitigate the end-to-end time delay, an optimal expected packet advancement is then derived by combining link con-nectivity with geographic progress threshold θ. After that, based on the link connectivity between marine nodes, the optimal expected packet advancement prediction, the distance from the sensing nodes to the sink, and the remaining energy distribution of the nodes, the priority of candidate nodes is calculated and sorted in descending order. Finally, timer-based coordination algorithm is adopted to perform the marine data packet forwarding so as to avoid packet conflict. Computer simulation results demonstrate that compared with benchmark algorithms, the data packet delivery ratio, the delay performance and the average node energy consumption (the average node speed is 20 m/s) of the proposed opportunistic routing protocol are improved by more than 21.4%, 39.2% and 18.1%, respectively. Full article
(This article belongs to the Special Issue Remote Sensing in Intelligent Maritime Research)
Show Figures

Graphical abstract

30 pages, 1038 KB  
Article
Improving the Performance of Opportunistic Networks in Real-World Applications Using Machine Learning Techniques
by Samaneh Rashidibajgan and Thomas Hupperich
J. Sens. Actuator Netw. 2022, 11(4), 61; https://doi.org/10.3390/jsan11040061 - 26 Sep 2022
Cited by 7 | Viewed by 3838
Abstract
In Opportunistic Networks, portable devices such as smartphones, tablets, and wearables carried by individuals, can communicate and save-carry-forward their messages. The message transmission is often in the short range supported by communication protocols, such as Bluetooth, Bluetooth Low Energy, and Zigbee. These devices [...] Read more.
In Opportunistic Networks, portable devices such as smartphones, tablets, and wearables carried by individuals, can communicate and save-carry-forward their messages. The message transmission is often in the short range supported by communication protocols, such as Bluetooth, Bluetooth Low Energy, and Zigbee. These devices carried by individuals along with a city’s taxis and buses represent network nodes. The mobility, buffer size, message interval, number of nodes, and number of messages copied in such a network influence the network’s performance. Extending these factors can improve the delivery of the messages and, consequently, network performance; however, due to the limited network resources, it increases the cost and appends the network overhead. The network delivers the maximized performance when supported by the optimal factors. In this paper, we measured, predicted, and analyzed the impact of these factors on network performance using the Opportunistic Network Environment simulator and machine learning techniques. We calculated the optimal factors depending on the network features. We have used three datasets, each with features and characteristics reflecting different network structures. We collected the real-time GPS coordinates of 500 taxis in San Francisco, 320 taxis in Rome, and 196 public transportation buses in Münster, Germany, within 48 h. We also compared the network performance without selfish nodes and with 5%, 10%, 20%, and 50% selfish nodes. We suggested the optimized configuration under real-world conditions when resources are limited. In addition, we compared the performance of Epidemic, Prophet, and PPHB++ routing algorithms fed with the optimized factors. The results show how to consider the best settings for the network according to the needs and how self-sustaining nodes will affect network performance. Full article
(This article belongs to the Topic Wireless Sensor Networks)
Show Figures

Figure 1

23 pages, 4032 KB  
Article
Improving Traffic Load Distribution Fairness in Mobile Social Networks
by Bambang Soelistijanto and Vittalis Ayu
Algorithms 2022, 15(7), 222; https://doi.org/10.3390/a15070222 - 22 Jun 2022
Cited by 1 | Viewed by 2615
Abstract
Mobile social networks suffer from an unbalanced traffic load distribution due to the heterogeneity in mobility of nodes (humans) in the network. A few nodes in these networks are highly mobile, and the proposed social-based routing algorithms are likely to choose these most [...] Read more.
Mobile social networks suffer from an unbalanced traffic load distribution due to the heterogeneity in mobility of nodes (humans) in the network. A few nodes in these networks are highly mobile, and the proposed social-based routing algorithms are likely to choose these most “social” nodes as the best message relays. Finally, this could lead to inequitable traffic load distribution and resource utilisation, such as faster battery drain and/or storage consumption of the most (socially) popular nodes. We propose a framework called Traffic Load Distribution Aware (TraLDA) to improve traffic load balancing across network nodes. We present a novel method for calculating node popularity which takes into account both node inherent and social-relations popularity. The former is purely determined by the node’s sociability level in the network, and in TraLDA is computed using the Kalman prediction which considers the node’s periodicity behaviour. However, the latter takes the benefit of interactions with more popular neighbours (acquaintances) to boost the popularity of lower (social) level nodes. Using extensive simulations in the Opportunistic Network Environment (ONE) driven by real human mobility scenarios, we show that our proposed strategy enhances the traffic load distribution fairness of the classical, yet popular social-aware routing algorithms BubbleRap and SimBet without negatively impacting the overall delivery performance. Full article
(This article belongs to the Special Issue Algorithms for Communication Networks)
Show Figures

Figure 1

Back to TopTop