學術產出-學位論文
文章檢視/開啟
書目匯出
-
題名 利用間歇連線P2P訊息擴散機制的WaterChat APP設計
A WaterChat APP Based on intermittent-connected P2P Message flooding Mechanism作者 羅尉晉
LUO, WEI-JIN貢獻者 蔡子傑
Tsai, Tzu-Chieh
羅尉晉
LUO, WEI-JIN關鍵詞 間歇連結移動網路
行動隨機網路
Intermittently connected networks
Opportunistic mobile network日期 2018 上傳時間 29-八月-2018 16:04:18 (UTC+8) 摘要 近年來隨著行動裝置及行動網路的普及,使得社群網路及各種社交聊天應用已融入使用者生活之中,但在許多場合如集會遊行、陳情抗議、大型室內外活動,因人潮聚集,使得行動無線網路訊號壅塞,致訊息無法正常傳遞。而隨著WiFi Direct及Bluetooth 4.0等無線技術的普及,行動裝置間的連線有了更多的選擇。 本論文研究中,參考WaterChat的概念,重新設計一個可彈性適用於四種聊天情境地系統架構,搭配兩種私人聊天室的邀請模式,利用控制閥值以及監測節點連線及同步,減少Flooding造成的效率低落。 實作一個基於隨機性社交網路且適用多聊天情境的社交聊天應用並加入了異地同步的機制,使得訊息傳遞範圍不再囿限於現實的地理限制,並在最後探討訊息加密的可能,提出並實作一新穎且功能完備的多群組行動聊天情境應用。
With the popularization of mobile devices and mobile networks, social networks and various social chat applications have played an important role in users’ daily life. However, in several large-scale events like protests or indoor/outdoor activities with large amount of people, due to mobile wireless network signal congestion, messages cannot be transmitted normally. Nowadays, new wireless technologies such as Wi-Fi Direct and Bluetooth 4.0 has provided more connection choices between mobile devices. First, we redesigned a system architecture based on the concept of WaterChat which is flexible and suitable for four different chat scenarios. Users can choose one of two invitation modes depending on their privacy requirements. Secondly, to solve flooding in opportunistic mobile network, we present threshold and connection control to improve the efficiency in our system. We also present an off-site synchronization, so the message transmission scope is no longer limited to the physical geographical restrictions. In the end, we will some discuss security issue and how to encrypt messages in four chat scenarios. To sum up, we design and implement a novel and full-featured WaterChat App based on intermittent-connected P2P Message flooding Mechanism.參考文獻 [1] FireChat, Retrieved January, 15, 2017 from http://opengarden.com/firechat/ [2] Apple iOS MultipeerConnectivity Framework, Retrieved January, 15, 2017 https://developer.apple.com/documentation/multipeerconnectivity/ [3] Misra, S., Saha, B. K., & Pal, S. (2016). Opportunistic mobile networks. [4] Pelusi, L., Passarella, A., & Conti, M. (2006). Opportunistic networking: data forwarding in disconnected mobile ad hoc networks. IEEE communications Magazine, 44(11). [5] Gao, W., & Li, Q. (2013, April). Wakeup scheduling for energy-efficient communication in opportunistic mobile networks. In INFOCOM, 2013 Proceedings IEEE (pp. 2058-2066). IEEE. [6] Perkins, C., Belding-Royer, E., & Das, S. (2003). Ad hoc on-demand distance vector (AODV) routing (No. RFC 3561). [7] Johnson, D. B., & Maltz, D. A. (1996). Dynamic source routing in ad hoc wireless networks. Mobile computing, 153-181. [8] Trifunovic, S., Distl, B., Schatzmann, D., & Legendre, F. (2011, September). WiFi-Opp: ad-hoc-less opportunistic networking. In Proceedings of the 6th ACM workshop on Challenged networks (pp. 37-42). ACM. [9] Vu, L., Nahrstedt, K., Retika, S., & Gupta, I. (2010, October). Joint bluetooth/wifi scanning framework for characterizing and leveraging people movement in university campus. In Proceedings of the 13th ACM international conference on Modeling, analysis, and simulation of wireless and mobile systems (pp. 257-265). ACM. [10] Funai, C., Tapparello, C., & Heinzelman, W. (2016, December). Mobile to Mobile Computational Offloading in Multi-hop Cooperative Networks. In Global Communications Conference (GLOBECOM), 2016 IEEE (pp. 1-7). IEEE. [11] Funai, C., Tapparello, C., & Heinzelman, W. (2015). Supporting multi-hop device-to-device networks through WiFi direct multi-group networking. arXiv preprint arXiv:1601.00028. [12] Mao, Z., Jiang, Y., Min, G., Leng, S., Jin, X., & Yang, K. (2017). Mobile social networks: Design requirements, architecture, and state-of-the-art technology. Computer Communications, 100, 1-19. [13] Ott, J., & Pitkanen, M. J. (2007, June). Dtn-based content storage and retrieval. In World of Wireless, Mobile and Multimedia Networks, 2007. WoWMoM 2007. IEEE International Symposium on a (pp. 1-7). IEEE. [14] Liu, H. Q., Zhao, S. W., & Shang, J. (2014). Research on Delay-Tolerant Network and Increasing Probability of Opportunistic Communication. In Applied Mechanics and Materials (Vol. 496, pp. 2095-2098). Trans Tech Publications. [15] Conti, M., Delmastro, F., Minutiello, G., & Paris, R. (2013, November). Experimenting opportunistic networks with WiFi Direct. In Wireless Days (WD), 2013 IFIP (pp. 1-6). IEEE. [16] Keränen, A., Ott, J., & Kärkkäinen, T. (2009, March). The ONE simulator for DTN protocol evaluation. In Proceedings of the 2nd international conference on simulation tools and techniques (p. 55). ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering). [17] Moreira, W., Ferreira, R., Cirqueira, D., Mendes, P., & Cerqueira, E. (2013, September). SocialDTN: a DTN implementation for digital and social inclusion. In Proceedings of the 2013 ACM MobiCom workshop on Lowest cost denominator networking for universal access (pp. 25-28). ACM. [18] Tsai, T. C., Liu, T. S., & Han, C. C. (2017). WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks. Journal of Communications, 12(7). [19] Tsai, T. C., Chan, H. H., Han, C. C., & Chen, P. C. (2016, November). A Social Behavior Based Interest-Message Dissemination Approach in Delay Tolerant Networks. In International Conference on Future Network Systems and Security (pp. 62-80). Springer International Publishing. [20] Tsai, T. C., Han, C. C., & Yen, S. Y. (2016, November). Collaborative Network Coding in Opportunistic Mobile Social Network. In International Conference on Future Network Systems and Security (pp. 187-194). Springer International Publishing. [21] Tsai, T. C., & Chan, H. H. (2015). NCCU Trace: Social-network-aware mobility trace. IEEE Communications Magazine, 53(10), 144-149. [22] Chen, Y., Liu, X., Liu, J., Taylor, W., & Moore, J. H. (2015). Delay-tolerant networks and network coding: Comparative studies on simulated and real-device experiments. Computer Networks, 83, 349-362. [23] Xiao, M., Wu, J., & Huang, L. (2014). Community-aware opportunistic routing in mobile social networks. IEEE Transactions on Computers, 63(7), 1682-1695. [24] Kwon, T. J., & Gerla, M. (2002). Efficient flooding with passive clustering (PC) in ad hoc networks. ACM SIGCOMM Computer Communication Review, 32(1), 44-56. [25] Sasson, Y., Cavin, D., & Schiper, A. (2003, March). Probabilistic broadcast for flooding in wireless mobile ad hoc networks. In Wireless Communications and Networking, 2003. WCNC 2003. 2003 IEEE (Vol. 2, pp. 1124-1130). IEEE. [26] Shukla, S., Munjal, A., & Singh, Y. N. (2015). Routing protocol Approaches in Delay Tolerant Networks. In International Conference on Educational and Information Technology MCNC(pp. 91-95). [27] Baker, C. E., Starke, A., Xing, S., & McNair, J. (2017, May). Demo abstract: A research platform for real-world evaluation of routing schemes in delay tolerant social networks. In Computer Communications Workshops (INFOCOM WKSHPS), 2017 IEEE Conference on (pp. 978-979). IEEE. [28] Zhai, Y., Bai, X., & Liu, Q. (2017, July). Incentive mechanisms in mobile delay tolerant network. In Electronics Information and Emergency Communication (ICEIEC), 2017 7th IEEE International Conference on (pp. 184-188). IEEE. [29] Wang, X., Zhang, Y., Leung, V. C., Guizani, N., & Jiang, T. (2018). D2D Big Data: Content Deliveries over Wireless Device-to-Device Sharing in Large-Scale Mobile Networks. IEEE Wireless Communications, 25(1), 32-38. [30] Qin, X., Xie, G., & Gao, J. (2017, July). A dynamic topological potential and social relationship based routing protocol for mobile social delay tolerant networks. In Computer, Information and Telecommunication Systems (CITS), 2017 International Conference on (pp. 98-102). IEEE. [31] Mao, Z., Jiang, Y., Min, G., Leng, S., Jin, X., & Yang, K. (2017). Mobile social networks: Design requirements, architecture, and state-of-the-art technology. Computer Communications, 100, 1-19. [32] Zhang, Y., Song, L., Jiang, C., Tran, N. H., Dawy, Z., & Han, Z. (2017). A social-aware framework for efficient information dissemination in wireless ad hoc networks. IEEE Communications Magazine, 55(1), 174-179. [33] Trifunovic, S., Kouyoumdjieva, S. T., Distl, B., Pajevic, L., Karlsson, G., & Plattner, B. (2017). A decade of research in opportunistic networks: challenges, relevance, and future directions. IEEE Communications Magazine, 55(1), 168-173. [34] Liu, X., Li, Z., Yang, P., & Dong, Y. (2017). Information-centric mobile ad hoc networks and content routing: a survey. Ad Hoc Networks, 58, 255-268. [35] Zhou, H., Leung, V. C., Zhu, C., Xu, S., & Fan, J. (2017). Predicting temporal social contact patterns for data forwarding in opportunistic mobile networks. IEEE Transactions on Vehicular Technology, 66(11), 10372-10383. [36] Liu, Y., Wu, H., Xia, Y., Wang, Y., Li, F., & Yang, P. (2017). Optimal online data dissemination for resource constrained mobile opportunistic networks. IEEE Transactions on Vehicular Technology, 66(6), 5301-5315. [37] Li, F., Jiang, H., Li, H., Cheng, Y., & Wang, Y. (2017). SEBAR: social-energy-based routing for mobile social delay-tolerant networks. IEEE Transactions on Vehicular Technology, 66(8), 7195-7206. [38] Liu, Y., Wang, K., Guo, H., Lu, Q., & Sun, Y. (2017). Social-aware computing based congestion control in delay tolerant networks. Mobile Networks and Applications, 22(2), 174-185. [39] Jedari, B., Liu, L., Qiu, T., Rahim, A., & Xia, F. (2017). A game-theoretic incentive scheme for social-aware routing in selfish mobile social networks. Future Generation Computer Systems, 70, 178-190. [40] Daly, E. M., & Haahr, M. (2007, September). Social network analysis for routing in disconnected delay-tolerant manets. In Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing (pp. 32-40). ACM. [41] Gao, W., Li, Q., Zhao, B., & Cao, G. (2009, May). Multicasting in delay tolerant networks: a social network perspective. In Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing (pp. 299-308). ACM. 描述 碩士
國立政治大學
資訊科學系碩士在職專班
102971005資料來源 http://thesis.lib.nccu.edu.tw/record/#G0102971005 資料類型 thesis dc.contributor.advisor 蔡子傑 zh_TW dc.contributor.advisor Tsai, Tzu-Chieh en_US dc.contributor.author (作者) 羅尉晉 zh_TW dc.contributor.author (作者) LUO, WEI-JIN en_US dc.creator (作者) 羅尉晉 zh_TW dc.creator (作者) LUO, WEI-JIN en_US dc.date (日期) 2018 en_US dc.date.accessioned 29-八月-2018 16:04:18 (UTC+8) - dc.date.available 29-八月-2018 16:04:18 (UTC+8) - dc.date.issued (上傳時間) 29-八月-2018 16:04:18 (UTC+8) - dc.identifier (其他 識別碼) G0102971005 en_US dc.identifier.uri (URI) http://nccur.lib.nccu.edu.tw/handle/140.119/119800 - dc.description (描述) 碩士 zh_TW dc.description (描述) 國立政治大學 zh_TW dc.description (描述) 資訊科學系碩士在職專班 zh_TW dc.description (描述) 102971005 zh_TW dc.description.abstract (摘要) 近年來隨著行動裝置及行動網路的普及,使得社群網路及各種社交聊天應用已融入使用者生活之中,但在許多場合如集會遊行、陳情抗議、大型室內外活動,因人潮聚集,使得行動無線網路訊號壅塞,致訊息無法正常傳遞。而隨著WiFi Direct及Bluetooth 4.0等無線技術的普及,行動裝置間的連線有了更多的選擇。 本論文研究中,參考WaterChat的概念,重新設計一個可彈性適用於四種聊天情境地系統架構,搭配兩種私人聊天室的邀請模式,利用控制閥值以及監測節點連線及同步,減少Flooding造成的效率低落。 實作一個基於隨機性社交網路且適用多聊天情境的社交聊天應用並加入了異地同步的機制,使得訊息傳遞範圍不再囿限於現實的地理限制,並在最後探討訊息加密的可能,提出並實作一新穎且功能完備的多群組行動聊天情境應用。 zh_TW dc.description.abstract (摘要) With the popularization of mobile devices and mobile networks, social networks and various social chat applications have played an important role in users’ daily life. However, in several large-scale events like protests or indoor/outdoor activities with large amount of people, due to mobile wireless network signal congestion, messages cannot be transmitted normally. Nowadays, new wireless technologies such as Wi-Fi Direct and Bluetooth 4.0 has provided more connection choices between mobile devices. First, we redesigned a system architecture based on the concept of WaterChat which is flexible and suitable for four different chat scenarios. Users can choose one of two invitation modes depending on their privacy requirements. Secondly, to solve flooding in opportunistic mobile network, we present threshold and connection control to improve the efficiency in our system. We also present an off-site synchronization, so the message transmission scope is no longer limited to the physical geographical restrictions. In the end, we will some discuss security issue and how to encrypt messages in four chat scenarios. To sum up, we design and implement a novel and full-featured WaterChat App based on intermittent-connected P2P Message flooding Mechanism. en_US dc.description.tableofcontents 第一章 簡介 1 1.1 背景 1 1.2 動機 2 1.3 目的 2 第二章 相關研究 4 2.1 機會性行動社群網路 4 2.2無線隨意網路(Wireless ad hoc Network) 4 2.3 FireChat 5 2.4 WaterChat 5 2.5 Wi-Fi Direct 5 2.6 低耗電藍芽Bluetooth Low Energy 5 2.7 社群聊天應用 6 第三章 系統架構與設計 7 3.1 聊天情境(Chat Scenario) 7 3.2訊息交換 9 3.3系統架構 9 3.3.1 訊息(Message) 11 3.3.2 使用者(User) 12 3.3.3 聊天室(Chatroom) 13 3.4情境過濾器 (Scenario filter) 14 3.5 工作階段(Working Phase) 16 3.6 同步演算法 19 3.7 聊天室邀請與審核Invitation 20 3.8 Flooding控制 21 第四章 實作 27 4.1 手機端應用程式 WaterChat 27 4.2 異地同步 Off-site synchronization 31 4.3 使用情境演示 32 第五章 安全性議題 34 5.1 安全性問題 34 5.2 四種聊天情境加密探討 34 第六章 結語 38 zh_TW dc.source.uri (資料來源) http://thesis.lib.nccu.edu.tw/record/#G0102971005 en_US dc.subject (關鍵詞) 間歇連結移動網路 zh_TW dc.subject (關鍵詞) 行動隨機網路 zh_TW dc.subject (關鍵詞) Intermittently connected networks en_US dc.subject (關鍵詞) Opportunistic mobile network en_US dc.title (題名) 利用間歇連線P2P訊息擴散機制的WaterChat APP設計 zh_TW dc.title (題名) A WaterChat APP Based on intermittent-connected P2P Message flooding Mechanism en_US dc.type (資料類型) thesis en_US dc.relation.reference (參考文獻) [1] FireChat, Retrieved January, 15, 2017 from http://opengarden.com/firechat/ [2] Apple iOS MultipeerConnectivity Framework, Retrieved January, 15, 2017 https://developer.apple.com/documentation/multipeerconnectivity/ [3] Misra, S., Saha, B. K., & Pal, S. (2016). Opportunistic mobile networks. [4] Pelusi, L., Passarella, A., & Conti, M. (2006). Opportunistic networking: data forwarding in disconnected mobile ad hoc networks. IEEE communications Magazine, 44(11). [5] Gao, W., & Li, Q. (2013, April). Wakeup scheduling for energy-efficient communication in opportunistic mobile networks. In INFOCOM, 2013 Proceedings IEEE (pp. 2058-2066). IEEE. [6] Perkins, C., Belding-Royer, E., & Das, S. (2003). Ad hoc on-demand distance vector (AODV) routing (No. RFC 3561). [7] Johnson, D. B., & Maltz, D. A. (1996). Dynamic source routing in ad hoc wireless networks. Mobile computing, 153-181. [8] Trifunovic, S., Distl, B., Schatzmann, D., & Legendre, F. (2011, September). WiFi-Opp: ad-hoc-less opportunistic networking. In Proceedings of the 6th ACM workshop on Challenged networks (pp. 37-42). ACM. [9] Vu, L., Nahrstedt, K., Retika, S., & Gupta, I. (2010, October). Joint bluetooth/wifi scanning framework for characterizing and leveraging people movement in university campus. In Proceedings of the 13th ACM international conference on Modeling, analysis, and simulation of wireless and mobile systems (pp. 257-265). ACM. [10] Funai, C., Tapparello, C., & Heinzelman, W. (2016, December). Mobile to Mobile Computational Offloading in Multi-hop Cooperative Networks. In Global Communications Conference (GLOBECOM), 2016 IEEE (pp. 1-7). IEEE. [11] Funai, C., Tapparello, C., & Heinzelman, W. (2015). Supporting multi-hop device-to-device networks through WiFi direct multi-group networking. arXiv preprint arXiv:1601.00028. [12] Mao, Z., Jiang, Y., Min, G., Leng, S., Jin, X., & Yang, K. (2017). Mobile social networks: Design requirements, architecture, and state-of-the-art technology. Computer Communications, 100, 1-19. [13] Ott, J., & Pitkanen, M. J. (2007, June). Dtn-based content storage and retrieval. In World of Wireless, Mobile and Multimedia Networks, 2007. WoWMoM 2007. IEEE International Symposium on a (pp. 1-7). IEEE. [14] Liu, H. Q., Zhao, S. W., & Shang, J. (2014). Research on Delay-Tolerant Network and Increasing Probability of Opportunistic Communication. In Applied Mechanics and Materials (Vol. 496, pp. 2095-2098). Trans Tech Publications. [15] Conti, M., Delmastro, F., Minutiello, G., & Paris, R. (2013, November). Experimenting opportunistic networks with WiFi Direct. In Wireless Days (WD), 2013 IFIP (pp. 1-6). IEEE. [16] Keränen, A., Ott, J., & Kärkkäinen, T. (2009, March). The ONE simulator for DTN protocol evaluation. In Proceedings of the 2nd international conference on simulation tools and techniques (p. 55). ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering). [17] Moreira, W., Ferreira, R., Cirqueira, D., Mendes, P., & Cerqueira, E. (2013, September). SocialDTN: a DTN implementation for digital and social inclusion. In Proceedings of the 2013 ACM MobiCom workshop on Lowest cost denominator networking for universal access (pp. 25-28). ACM. [18] Tsai, T. C., Liu, T. S., & Han, C. C. (2017). WaterChat: A Group Chat Application Based on Opportunistic Mobile Social Networks. Journal of Communications, 12(7). [19] Tsai, T. C., Chan, H. H., Han, C. C., & Chen, P. C. (2016, November). A Social Behavior Based Interest-Message Dissemination Approach in Delay Tolerant Networks. In International Conference on Future Network Systems and Security (pp. 62-80). Springer International Publishing. [20] Tsai, T. C., Han, C. C., & Yen, S. Y. (2016, November). Collaborative Network Coding in Opportunistic Mobile Social Network. In International Conference on Future Network Systems and Security (pp. 187-194). Springer International Publishing. [21] Tsai, T. C., & Chan, H. H. (2015). NCCU Trace: Social-network-aware mobility trace. IEEE Communications Magazine, 53(10), 144-149. [22] Chen, Y., Liu, X., Liu, J., Taylor, W., & Moore, J. H. (2015). Delay-tolerant networks and network coding: Comparative studies on simulated and real-device experiments. Computer Networks, 83, 349-362. [23] Xiao, M., Wu, J., & Huang, L. (2014). Community-aware opportunistic routing in mobile social networks. IEEE Transactions on Computers, 63(7), 1682-1695. [24] Kwon, T. J., & Gerla, M. (2002). Efficient flooding with passive clustering (PC) in ad hoc networks. ACM SIGCOMM Computer Communication Review, 32(1), 44-56. [25] Sasson, Y., Cavin, D., & Schiper, A. (2003, March). Probabilistic broadcast for flooding in wireless mobile ad hoc networks. In Wireless Communications and Networking, 2003. WCNC 2003. 2003 IEEE (Vol. 2, pp. 1124-1130). IEEE. [26] Shukla, S., Munjal, A., & Singh, Y. N. (2015). Routing protocol Approaches in Delay Tolerant Networks. In International Conference on Educational and Information Technology MCNC(pp. 91-95). [27] Baker, C. E., Starke, A., Xing, S., & McNair, J. (2017, May). Demo abstract: A research platform for real-world evaluation of routing schemes in delay tolerant social networks. In Computer Communications Workshops (INFOCOM WKSHPS), 2017 IEEE Conference on (pp. 978-979). IEEE. [28] Zhai, Y., Bai, X., & Liu, Q. (2017, July). Incentive mechanisms in mobile delay tolerant network. In Electronics Information and Emergency Communication (ICEIEC), 2017 7th IEEE International Conference on (pp. 184-188). IEEE. [29] Wang, X., Zhang, Y., Leung, V. C., Guizani, N., & Jiang, T. (2018). D2D Big Data: Content Deliveries over Wireless Device-to-Device Sharing in Large-Scale Mobile Networks. IEEE Wireless Communications, 25(1), 32-38. [30] Qin, X., Xie, G., & Gao, J. (2017, July). A dynamic topological potential and social relationship based routing protocol for mobile social delay tolerant networks. In Computer, Information and Telecommunication Systems (CITS), 2017 International Conference on (pp. 98-102). IEEE. [31] Mao, Z., Jiang, Y., Min, G., Leng, S., Jin, X., & Yang, K. (2017). Mobile social networks: Design requirements, architecture, and state-of-the-art technology. Computer Communications, 100, 1-19. [32] Zhang, Y., Song, L., Jiang, C., Tran, N. H., Dawy, Z., & Han, Z. (2017). A social-aware framework for efficient information dissemination in wireless ad hoc networks. IEEE Communications Magazine, 55(1), 174-179. [33] Trifunovic, S., Kouyoumdjieva, S. T., Distl, B., Pajevic, L., Karlsson, G., & Plattner, B. (2017). A decade of research in opportunistic networks: challenges, relevance, and future directions. IEEE Communications Magazine, 55(1), 168-173. [34] Liu, X., Li, Z., Yang, P., & Dong, Y. (2017). Information-centric mobile ad hoc networks and content routing: a survey. Ad Hoc Networks, 58, 255-268. [35] Zhou, H., Leung, V. C., Zhu, C., Xu, S., & Fan, J. (2017). Predicting temporal social contact patterns for data forwarding in opportunistic mobile networks. IEEE Transactions on Vehicular Technology, 66(11), 10372-10383. [36] Liu, Y., Wu, H., Xia, Y., Wang, Y., Li, F., & Yang, P. (2017). Optimal online data dissemination for resource constrained mobile opportunistic networks. IEEE Transactions on Vehicular Technology, 66(6), 5301-5315. [37] Li, F., Jiang, H., Li, H., Cheng, Y., & Wang, Y. (2017). SEBAR: social-energy-based routing for mobile social delay-tolerant networks. IEEE Transactions on Vehicular Technology, 66(8), 7195-7206. [38] Liu, Y., Wang, K., Guo, H., Lu, Q., & Sun, Y. (2017). Social-aware computing based congestion control in delay tolerant networks. Mobile Networks and Applications, 22(2), 174-185. [39] Jedari, B., Liu, L., Qiu, T., Rahim, A., & Xia, F. (2017). A game-theoretic incentive scheme for social-aware routing in selfish mobile social networks. Future Generation Computer Systems, 70, 178-190. [40] Daly, E. M., & Haahr, M. (2007, September). Social network analysis for routing in disconnected delay-tolerant manets. In Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing (pp. 32-40). ACM. [41] Gao, W., Li, Q., Zhao, B., & Cao, G. (2009, May). Multicasting in delay tolerant networks: a social network perspective. In Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing (pp. 299-308). ACM. zh_TW dc.identifier.doi (DOI) 10.6814/THE.NCCU.EMCS.006.2018.B02 -