Home > Research > Publications & Outputs > Resilience and opportunistic forwarding

Associated organisational unit

Links

Text available via DOI:

View graph of relations

Resilience and opportunistic forwarding: Beyond average value analysis

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Published

Standard

Resilience and opportunistic forwarding: Beyond average value analysis. / Bjurefors, Fredrik; Karaliopoulos, Merkourios; Rohner, Christian et al.
In: Computer Communications, Vol. 48, 15.07.2014, p. 111-120.

Research output: Contribution to Journal/MagazineJournal articlepeer-review

Harvard

Bjurefors, F, Karaliopoulos, M, Rohner, C, Smith, P, Theodoropoulos, G & Gunningberg, P 2014, 'Resilience and opportunistic forwarding: Beyond average value analysis', Computer Communications, vol. 48, pp. 111-120. https://doi.org/10.1016/j.comcom.2014.04.004

APA

Bjurefors, F., Karaliopoulos, M., Rohner, C., Smith, P., Theodoropoulos, G., & Gunningberg, P. (2014). Resilience and opportunistic forwarding: Beyond average value analysis. Computer Communications, 48, 111-120. https://doi.org/10.1016/j.comcom.2014.04.004

Vancouver

Bjurefors F, Karaliopoulos M, Rohner C, Smith P, Theodoropoulos G, Gunningberg P. Resilience and opportunistic forwarding: Beyond average value analysis. Computer Communications. 2014 Jul 15;48:111-120. Epub 2014 Apr 16. doi: 10.1016/j.comcom.2014.04.004

Author

Bjurefors, Fredrik ; Karaliopoulos, Merkourios ; Rohner, Christian et al. / Resilience and opportunistic forwarding : Beyond average value analysis. In: Computer Communications. 2014 ; Vol. 48. pp. 111-120.

Bibtex

@article{d8f85cfcad3f4631bc76220cbeddf78f,
title = "Resilience and opportunistic forwarding: Beyond average value analysis",
abstract = "Opportunistic networks are systems with highly distributed operation, relying on the altruistic cooperation of highly heterogeneous, and not always software and hardware-compatible, user nodes. Moreover, the absence of central coordination and control makes them vulnerable to malicious attacks. In this paper, we study the resilience of popular forwarding protocols to a representative set of challenges to their normal operation. These include jamming locally disturbing message transfer between nodes, hardware/software failures and incompatibility among nodes rendering contact opportunities useless, and free-riding phenomena. We first formulate and promote the metric envelope concept as a tool for assessing the resilience of opportunistic forwarding schemes. Metric envelopes depart from the standard practice of average value analysis and explicitly account for the differentiated challenge impact due to node heterogeneity (device capabilities, mobility) and attackers{\textquoteright} intelligence. We then propose heuristics to generate worst- and best-case challenge realization scenarios and approximate the lower and upper bounds of the metric envelopes. Finally, we demonstrate the methodology in assessing the resilience of three popular forwarding protocols in the presence of the three challenges, and under a comprehensive range of mobility patterns. The metric envelope approach provides better insights into the level of protection path diversity and message replication provide against different challenges, and enables more informed choices in opportunistic forwarding when network resilience becomes important.",
keywords = "Opportunistic networking, Forwarding, Routing, Simulations",
author = "Fredrik Bjurefors and Merkourios Karaliopoulos and Christian Rohner and Paul Smith and George Theodoropoulos and Per Gunningberg",
year = "2014",
month = jul,
day = "15",
doi = "10.1016/j.comcom.2014.04.004",
language = "English",
volume = "48",
pages = "111--120",
journal = "Computer Communications",
issn = "0140-3664",
publisher = "Elsevier",

}

RIS

TY - JOUR

T1 - Resilience and opportunistic forwarding

T2 - Beyond average value analysis

AU - Bjurefors, Fredrik

AU - Karaliopoulos, Merkourios

AU - Rohner, Christian

AU - Smith, Paul

AU - Theodoropoulos, George

AU - Gunningberg, Per

PY - 2014/7/15

Y1 - 2014/7/15

N2 - Opportunistic networks are systems with highly distributed operation, relying on the altruistic cooperation of highly heterogeneous, and not always software and hardware-compatible, user nodes. Moreover, the absence of central coordination and control makes them vulnerable to malicious attacks. In this paper, we study the resilience of popular forwarding protocols to a representative set of challenges to their normal operation. These include jamming locally disturbing message transfer between nodes, hardware/software failures and incompatibility among nodes rendering contact opportunities useless, and free-riding phenomena. We first formulate and promote the metric envelope concept as a tool for assessing the resilience of opportunistic forwarding schemes. Metric envelopes depart from the standard practice of average value analysis and explicitly account for the differentiated challenge impact due to node heterogeneity (device capabilities, mobility) and attackers’ intelligence. We then propose heuristics to generate worst- and best-case challenge realization scenarios and approximate the lower and upper bounds of the metric envelopes. Finally, we demonstrate the methodology in assessing the resilience of three popular forwarding protocols in the presence of the three challenges, and under a comprehensive range of mobility patterns. The metric envelope approach provides better insights into the level of protection path diversity and message replication provide against different challenges, and enables more informed choices in opportunistic forwarding when network resilience becomes important.

AB - Opportunistic networks are systems with highly distributed operation, relying on the altruistic cooperation of highly heterogeneous, and not always software and hardware-compatible, user nodes. Moreover, the absence of central coordination and control makes them vulnerable to malicious attacks. In this paper, we study the resilience of popular forwarding protocols to a representative set of challenges to their normal operation. These include jamming locally disturbing message transfer between nodes, hardware/software failures and incompatibility among nodes rendering contact opportunities useless, and free-riding phenomena. We first formulate and promote the metric envelope concept as a tool for assessing the resilience of opportunistic forwarding schemes. Metric envelopes depart from the standard practice of average value analysis and explicitly account for the differentiated challenge impact due to node heterogeneity (device capabilities, mobility) and attackers’ intelligence. We then propose heuristics to generate worst- and best-case challenge realization scenarios and approximate the lower and upper bounds of the metric envelopes. Finally, we demonstrate the methodology in assessing the resilience of three popular forwarding protocols in the presence of the three challenges, and under a comprehensive range of mobility patterns. The metric envelope approach provides better insights into the level of protection path diversity and message replication provide against different challenges, and enables more informed choices in opportunistic forwarding when network resilience becomes important.

KW - Opportunistic networking

KW - Forwarding

KW - Routing

KW - Simulations

U2 - 10.1016/j.comcom.2014.04.004

DO - 10.1016/j.comcom.2014.04.004

M3 - Journal article

VL - 48

SP - 111

EP - 120

JO - Computer Communications

JF - Computer Communications

SN - 0140-3664

ER -