Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
A delay-tolerant network architecture for challenged internets
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
Developing locally relevant software applications for rural areas: a South African example
SAICSIT '04 Proceedings of the 2004 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries
Spray and wait: an efficient routing scheme for intermittently connected mobile networks
Proceedings of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking
Communication as information-seeking: the case for mobile social software for developing regions
Proceedings of the 16th international conference on World Wide Web
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Impact of Human Mobility on Opportunistic Forwarding Algorithms
IEEE Transactions on Mobile Computing
DTN routing as a resource allocation problem
Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
Surviving attacks on disruption-tolerant networks without authentication
Proceedings of the 8th ACM international symposium on Mobile ad hoc networking and computing
Bubble rap: social-based forwarding in delay tolerant networks
Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing
Media sharing based on colocation prediction in urban transport
Proceedings of the 14th ACM international conference on Mobile computing and networking
Networking in the land of northern lights: two years of experiences from DTN system deployments
Proceedings of the 2008 ACM workshop on Wireless networks and systems for developing regions
Deploying Open Source IP Telephony in Rural Environments
NGMAST '08 Proceedings of the 2008 The Second International Conference on Next Generation Mobile Applications, Services, and Technologies
Sharing airtime with Shair avoids wasting time and money
Proceedings of the 10th workshop on Mobile Computing Systems and Applications
Design considerations for a network of information
CoNEXT '08 Proceedings of the 2008 ACM CoNEXT Conference
Delay tolerant bulk data transfers on the internet
Proceedings of the eleventh international joint conference on Measurement and modeling of computer systems
Analysis of information and communication needs in rural primary health care in developing countries
IEEE Transactions on Information Technology in Biomedicine
An opportunistic platform for Android-based mobile devices
MobiOpp '10 Proceedings of the Second International Workshop on Mobile Opportunistic Networking
Managing workplace resources in office environments through ephemeral social networks
UIC'10 Proceedings of the 7th international conference on Ubiquitous intelligence and computing
ARDEN: Anonymous networking in delay tolerant networks
Ad Hoc Networks
SSN: a seamless spontaneous network design around opportunistic contacts
Journal of Mobile Multimedia
Study on the potential for delay tolerant networks by health workers in low resource settings
Computer Methods and Programs in Biomedicine
Shaping opportunistic networks
Computer Communications
A context-rich and extensible framework for spontaneous smartphone networking
Computer Communications
Hi-index | 0.00 |
Delay Tolerant Networking (DTN) has attracted a lot of attention from the research community in recent years. Much work have been done regarding network architectures and algorithms for routing and forwarding in such networks. At the same time as many show enthusiasm for this exciting new research area there are also many sceptics, who question the usefulness of research in this area. In the past, we have seen other research areas become over-hyped and later die out as there was no killer app for them that made them useful in real scenarios. Real deployments of DTN systems have so far mostly been limited to a few niche scenarios, where they have been done as proof-of-concept field tests in research pro jects. In this paper, we embark upon a quest to find out what characterizes a potential killer applications for DTNs. Are there applications and situations where DTNs provide services that could not be achieved otherwise, or have potential to do it in a better way than other techniques? Further, we highlight some of the main challenges that needs to be solved to realize these applications and make DTNs a part of the mainstream network landscape.