Ubiquitous Interpersonal Communication over Ad-hoc Networks and the Internet
Title | Ubiquitous Interpersonal Communication over Ad-hoc Networks and the Internet |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Biagioni, E. |
Conference Name | System Sciences (HICSS), 2014 47th Hawaii International Conference on |
Date Published | Jan |
Keywords | Ad hoc networks, ad-hoc 802.11 networks, Ad-Hoc Network, authentication, Bluetooth, Cognitive radio, cryptography, decentralized model, decentralized network routing, delay tolerant networking, delay tolerant networks, Delay-Tolerant Network, DHT, distributed hash tables, DTN, Encryption, flexible trust network, hop-limited broadcast, Infrastructureless Communication, Internet, Interpersonal Communication, IP networks, low-level software, mobile ad hoc networks, mobile computing, mobile devices, mobile-to-mobile communication, Networking Protocol, packet radio networks, Priority Mechanism, Public key, Receivers, rendezvous points, RP, social network, Social network services, telecommunication network routing, ubiquitous interpersonal communication, Wireless communication, wireless LAN |
Abstract | The hardware and low-level software in many mobile devices are capable of mobile-to-mobile communication, including ad-hoc 802.11, Bluetooth, and cognitive radios. We have started to leverage this capability to provide interpersonal communication both over infrastructure networks (the Internet), and over ad-hoc and delay-tolerant networks composed of the mobile devices themselves. This network is decentralized in the sense that it can function without any infrastructure, but does take advantage of infrastructure connections when available. All interpersonal communication is encrypted and authenticated so packets may be carried by devices belonging to untrusted others. The decentralized model of security builds a flexible trust network on top of the social network of communicating individuals. This social network can be used to prioritize packets to or from individuals closely related by the social network. Other packets are prioritized to favor packets likely to consume fewer network resources. Each device also has a policy that determines how many packets may be forwarded, with the goal of providing useful interpersonal communications using at most 1% of any given resource on mobile devices. One challenge in a fully decentralized network is routing. Our design uses Rendezvous Points (RPs) and Distributed Hash Tables (DHTs) for delivery over infrastructure networks, and hop-limited broadcast and Delay Tolerant Networking (DTN) within the wireless ad-hoc network. |
DOI | 10.1109/HICSS.2014.633 |
Citation Key | 6759236 |
- Public key
- IP networks
- low-level software
- mobile ad hoc networks
- mobile computing
- mobile devices
- mobile-to-mobile communication
- Networking Protocol
- packet radio networks
- Priority Mechanism
- Interpersonal Communication
- Receivers
- rendezvous points
- RP
- social network
- Social network services
- telecommunication network routing
- ubiquitous interpersonal communication
- Wireless communication
- wireless LAN
- delay tolerant networks
- ad-hoc 802.11 networks
- Ad-Hoc Network
- authentication
- Bluetooth
- cognitive radio
- Cryptography
- decentralized model
- decentralized network routing
- delay tolerant networking
- Ad hoc networks
- Delay-Tolerant Network
- DHT
- distributed hash tables
- DTN
- encryption
- flexible trust network
- hop-limited broadcast
- Infrastructureless Communication
- internet