3DLS: density-driven data location service for mobile ad-hoc networks
Proceedings of the tenth ACM international symposium on Mobile ad hoc networking and computing
Autonomic Application-Level Message Delivery Using Virtual Magnetic Fields
Journal of Network and Systems Management
MobiSN: semantics-based mobile ad hoc social network framework
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Middleware support for service discovery in special operations mobile ad hoc networks
Journal of Network and Computer Applications
A Semantics-based Approach to Large-Scale Mobile Social Networking
Mobile Networks and Applications
Self-configuration in MANETs: different perspectives
IWSOS'07 Proceedings of the Second international conference on Self-Organizing Systems
Hi-index | 0.00 |
Service discovery in mobile ad hoc networks is challenging because of the absence of any central intelligence in the network. Traditional solutions as used in the Internet are hence not well suited for mobile ad hoc networks. In this paper, we present a novel decentralized service discovery mechanism for ad hoc networks. The basic idea is to distribute information about available services to the network neighborhood. We achieve this by using the analogy of an electrostatic field: A service is modeled by a (positive) point charge, and service request packets are seen as (negative) test charges which are attracted by the service instances. In our approach, we map the physical model to a mobile ad hoc network in a way where each network element calculates a potential value and routes service requests towards the neighbor with the highest potential, hence towards a service instance. Our approach allows for differentiation of service instances based on their capacity. We define the required protocols and methods which we implemented in a network simulator. Using extensive simulations, we evaluate the performance and robustness of the mechanisms. The results indicate good performance and convergence even in highly mobile environments. We believe that this technique can and should be further exploited, e.g., as a routing protocol in mobile networks.