Efficient neighbor discovery in mobile opportunistic networking using mobility awareness

Andrea Hess, Esa Hyytia, Jorg Ott

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

19 Scopus citations

Abstract

To detect peers in mobile opportunistic networks, mobile devices transmit and listen for beacons ('scanning'). If networks are sparse, devices spend quite a bit of energy scanning the vicinity for possible contacts with their radios. Numerous techniques were developed to adapt the scanning intervals as a function of the observed node density. In this paper, we complement such techniques by considering that protocol exchanges between nodes require contacts of a minimal time span and infer scanning opportunities from node mobility. The adaptive beaconing presented in this paper reduces the scanning effort significantly without 'losing' many contacts that last long enough to (i) fully establish an ad-hoc connection between two devices and to (ii) transfer a sizeable amount of data. We propose a theoretical model to derive connection probabilities from sojourn times in different mobility settings and evaluate the impact on energy consumption and data forwarding performance using simulations with different mobility models.

Original languageEnglish
Title of host publication2014 6th International Conference on Communication Systems and Networks, COMSNETS 2014
DOIs
StatePublished - 2014
Externally publishedYes
Event2014 6th International Conference on Communication Systems and Networks, COMSNETS 2014 - Bangalore, India
Duration: 7 Jan 201410 Jan 2014

Publication series

Name2014 6th International Conference on Communication Systems and Networks, COMSNETS 2014

Conference

Conference2014 6th International Conference on Communication Systems and Networks, COMSNETS 2014
Country/TerritoryIndia
CityBangalore
Period7/01/1410/01/14

Fingerprint

Dive into the research topics of 'Efficient neighbor discovery in mobile opportunistic networking using mobility awareness'. Together they form a unique fingerprint.

Cite this