Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
156 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Context-Aware Configuration and Management of WiFi Direct Groups for Real Opportunistic Networks (2307.03126v1)

Published 6 Jul 2023 in cs.NI and cs.LG

Abstract: Wi-Fi Direct is a promising technology for the support of device-to-device communications (D2D) on commercial mobile devices. However, the standard as-it-is is not sufficient to support the real deployment of networking solutions entirely based on D2D such as opportunistic networks. In fact, WiFi Direct presents some characteristics that could limit the autonomous creation of D2D connections among users' personal devices. Specifically, the standard explicitly requires the user's authorization to establish a connection between two or more devices, and it provides a limited support for inter-group communication. In some cases, this might lead to the creation of isolated groups of nodes which cannot communicate among each other. In this paper, we propose a novel middleware-layer protocol for the efficient configuration and management of WiFi Direct groups (WiFi Direct Group Manager, WFD-GM) to enable autonomous connections and inter-group communication. This enables opportunistic networks in real conditions (e.g., variable mobility and network size). WFD-GM defines a context function that takes into account heterogeneous parameters for the creation of the best group configuration in a specific time window, including an index of nodes' stability and power levels. We evaluate the protocol performances by simulating three reference scenarios including different mobility models, geographical areas and number of nodes. Simulations are also supported by experimental results related to the evaluation in a real testbed of the involved context parameters. We compare WFD-GM with the state-of-the-art solutions and we show that it performs significantly better than a Baseline approach in scenarios with medium/low mobility, and it is comparable with it in case of high mobility, without introducing additional overhead.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (25)
  1. M. Conti, S. K. Das, C. Bisdikian, M. Kumar, L. M. Ni, A. Passarella, G. Roussos, G. Tröster, G. Tsudik, and F. Zambonelli, “Looking ahead in pervasive computing: Challenges and opportunities in the era of cyber–physical convergence,” Pervasive and Mobile Computing, vol. 8, no. 1, pp. 2–21, 2012.
  2. L. Pelusi, A. Passarella, and M. Conti, “Opportunistic networking: data forwarding in disconnected mobile ad hoc networks,” IEEE Communications Magazine, vol. 44, no. 11, 2006.
  3. F. Delmastro, V. Arnaboldi, and M. Conti, “People-centric computing and communications in smart cities,” IEEE Communications Magazine, vol. 54, no. 7, pp. 122–128, 2016.
  4. V. Arnaboldi, M. G. Campana, F. Delmastro, and E. Pagani, “A personalized recommender system for pervasive social networks,” Pervasive and Mobile Computing, 2016.
  5. G. Lo Giusto, A. J. Mashhadi, and L. Capra, “Folksonomy-based reasoning for content dissemination in mobile settings,” in Proceedings of the 5th ACM workshop on Challenged networks.   ACM, 2010, pp. 39–46.
  6. A. Sharma, V. Navda, R. Ramjee, V. N. Padmanabhan, and E. M. Belding, “Cool-tether: energy efficient on-the-fly wifi hot-spots using mobile phones,” in Proceedings of the 5th international conference on Emerging networking experiments and technologies.   ACM, 2009, pp. 109–120.
  7. K. Keshav, V. R. Indukuri, and P. Venkataram, “Energy efficient scheduling in 4g smart phones for mobile hotspot application,” in Communications (NCC), 2012 National Conference on.   IEEE, 2012, pp. 1–5.
  8. K.-H. Jung, Y. Qi, C. Yu, and Y.-J. Suh, “Energy efficient wifi tethering on a smartphone,” in INFOCOM, 2014 Proceedings IEEE.   IEEE, 2014, pp. 1357–1365.
  9. Y. Wu, Y. Zhao, M. Riguidel, G. Wang, and P. Yi, “Security and trust management in opportunistic networks: a survey,” Security and Communication Networks, vol. 8, no. 9, pp. 1812–1827, 2015.
  10. W.-F. Peer-to Peer, “Technical specification v1.7,” Wi-Fi Alliance Technical Committee P2P Task Group, 2016.
  11. D. Camps-Mur, A. Garcia-Saavedra, and P. Serrano, “Device-to-device communications with wi-fi direct: overview and experimentation,” IEEE wireless communications, vol. 20, no. 3, pp. 96–104, 2013.
  12. I. S. Association et al., “802.11-2012-ieee standard for information technology–telecommunications and information exchange between systems local and metropolitan area networks–specific requirements part 11: Wireless lan medium access control (mac) and physical layer (phy) specifications,” IEEE Std, vol. 802, 2012.
  13. M. Conti, F. Delmastro, G. Minutiello, and R. Paris, “Experimenting opportunistic networks with wifi direct,” in 2013 IFIP Wireless Days (WD), Nov 2013, pp. 1–6.
  14. W.-F. Alliance, “Wi-fi simple configuration technical specification,” URL http://www.wi-fi.org, 2011.
  15. H. Zhang, Y. Wang, and C. C. Tan, “Wd2: An improved wifi-direct group formation protocol,” in Proceedings of the 9th ACM MobiCom workshop on Challenged networks.   ACM, 2014, pp. 55–60.
  16. U. Botrel Menegato, L. Souza Cimino, S. E. Delabrida Silva, F. A. Medeiros Silva, J. Castro Lima, and R. A. R. Oliveira, “Dynamic clustering in wifi direct technology,” in Proceedings of the 12th ACM international symposium on Mobility management and wireless access.   ACM, 2014, pp. 25–29.
  17. A. Laha, X. Cao, W. Shen, X. Tian, and Y. Cheng, “An energy efficient routing protocol for device-to-device based multihop smartphone networks,” in Communications (ICC), 2015 IEEE International Conference on.   IEEE, 2015, pp. 5448–5453.
  18. P. Wong, V. Varikota, D. Nguyen, and A. Abukmail, “Automatic android-based wireless mesh networks,” Informatica, vol. 38, no. 4, p. 313, 2014.
  19. A. A. Shahin and M. Younis, “Efficient multi-group formation and communication protocol for wi-fi direct,” in Local Computer Networks (LCN), 2015 IEEE 40th Conference on.   IEEE, 2015, pp. 233–236.
  20. ——, “Ip subnet negotiation in wi-fi direct for seamless multi-group communications,” in Wireless and Mobile Computing, Networking and Communications (WiMob), 2016 IEEE 12th International Conference on.   IEEE, 2016, pp. 1–7.
  21. C. Casetti, C. F. Chiasserini, L. C. Pelle, C. Del Valle, Y. Duan, and P. Giaccone, “Content-centric routing in wi-fi direct multi-group networks,” in World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2015 IEEE 16th International Symposium on a.   IEEE, 2015, pp. 1–9.
  22. A. A. Shahin and M. Younis, “Alert dissemination protocol using service discovery in wi-fi direct,” in Communications (ICC), 2015 IEEE International Conference on.   IEEE, 2015, pp. 7018–7023.
  23. A. Tsiridis, J. Hill, and P. Gardner-Stephen, “Adding an unusual transport to the serval project,” 2016.
  24. A. Keränen, J. Ott, and T. Kärkkäinen, “The ONE Simulator for DTN Protocol Evaluation,” in SIMUTools ’09: Proceedings of the 2nd International Conference on Simulation Tools and Techniques.   New York, NY, USA: ICST, 2009.
  25. F. Ekman, A. Keränen, J. Karvo, and J. Ott, “Working day movement model,” in Proceedings of the 1st ACM SIGMOBILE workshop on Mobility models.   ACM, 2008, pp. 33–40.
Citations (7)

Summary

We haven't generated a summary for this paper yet.