Data Dissemination strategy based on Time Validity for opportunistic networks

Chun Chih Lo, Yau Hwang Kuo, Jung Yi Jiang

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

This paper present a Data Dissemination strategy based on Time Validity (DDTV) to deal with time-sensitive contents in opportunistic networks. Time sensitivity refers to the constraint that the content must be delivered to the destinations within a given time frame called time validity. A content delivery fails when the time constraint cannot be satisfied. Thus, DDTV exploits user's mobility and historical travel records to obtain the delivery probability of contents to its destination within the designated time. Then, the expected delivery probability obtained at each time interval is used to select the most suitable content carrier that can satisfy the contents time validity. To further increase the content delivery probability, a successor is selected to continue the delivery of the contents. Simulations show that DDTV has a remarkable improvement when dealing with time-sensitive contents on delivery rate and delivery efficiency with lesser transmission overhead when compared to other existing methods.

Original languageEnglish
Title of host publicationICUFN 2016 - 8th International Conference on Ubiquitous and Future Networks
PublisherIEEE Computer Society
Pages1040-1045
Number of pages6
ISBN (Electronic)9781467399913
DOIs
Publication statusPublished - 2016 Aug 9
Event8th International Conference on Ubiquitous and Future Networks, ICUFN 2016 - Vienna, Austria
Duration: 2016 Jul 52016 Jul 8

Publication series

NameInternational Conference on Ubiquitous and Future Networks, ICUFN
Volume2016-August
ISSN (Print)2165-8528
ISSN (Electronic)2165-8536

Other

Other8th International Conference on Ubiquitous and Future Networks, ICUFN 2016
CountryAustria
CityVienna
Period16-07-0516-07-08

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Computer Science Applications
  • Hardware and Architecture

Cite this