Fuzzy Geocasting in Opportunistic Networks

  • Sanjay K. Dhurandher
  • Jagdeep Singh
  • Isaac WoungangEmail author
  • Makoto Takizawa
  • Geetanshu Gupta
  • Raghav Kumar
Conference paper
Part of the Lecture Notes in Networks and Systems book series (LNNS, volume 97)


Opportunistic Networks are composed of wireless nodes opportunistically communicating with each other following the store, carry and forward mechanism. These networks are designed to operate in an environment characterized by high delay, intermittent connectivity and non-guarantee of the end-to-end path between the sender and the destination. Opportunistic networks can play a crucial role, when cellular networks are heavily stressed and where infrastructure is unavailable due to terrorist attacks, wars, or natural disasters and censorship. Geocasting, where messages are scheduled to specific regions instead of individual devices, has a large potential in real-world communication systems. In this paper, we propose a fuzzy geocasting mechanism in opportunistic networks, termed as F-GSAF. The proposed protocol employs fuzzy attributes, that are very much likely to affect a network in the real world, to determine the next hop for the message. These attributes are Movement (direction and speed), remaining energy, and remaining buffer space. Mamdani is the fuzzy controller, which has been used in this work. Obtained simulation results confirm that the proposed F-GSAF protocol is more efficient than traditional routing protocols for opportunistic networks.



This work is supported in part by a grant from the National Science and Engineering Research Council of Canada (NSERC), held by the 3rd author, under reference number: RGPIN-2017-04423.


  1. 1.
    Huang, C.M., Lan, K.C., Tsai, C.Z.: A survey of opportunistic networks. In: Proceedings of IEEE International Conference on Advanced Information Networking and Applications Workshops, Okinawa, Japan, 25–28 March, pp. 1–6 (2008)Google Scholar
  2. 2.
    Mauve, M., Widmer, J., Hartenstein, H.: A survey on position-based routing in mobile ad hoc networks. IEEE Netw. 15, 30–39 (2001)CrossRefGoogle Scholar
  3. 3.
    Teotia, A., Dhurandher, S.K., Woungang, I., Obaidat, M.S., Gupta, S., Rodrigues, J.: An altruism-based trust-dependent message forwarding protocol for opportunistic networks. Int. J. Commun. Syst. 30, 1–11 (2017)Google Scholar
  4. 4.
    Mantas, N., Louta, M., Karapistoli, E., Karetos, G., Kraounakis, S., Obaidat, M.S.: Towards an incentive-compatible, reputation-based framework for stimulating cooperation in opportunistic networks: a survey. In: IET Networks (2017). Scholar
  5. 5.
    Borah, S., Dhurandher, S.K., Tibarewala, S., Woungang, I., Obaidat, M.S.: Energy efficient prophet-PRoWait-EDR protocols for opportunistic networks. In: Proceedings of IEEE GLOBECOM 2017, Singapore, December 2017Google Scholar
  6. 6.
    Bai, Y., Xu, J.: Access control scheme based on fuzzy identity in opportunistic network. Procedia Comput. Sci. 131, 1122–1127 (2018)CrossRefGoogle Scholar
  7. 7.
    Nabhani, P., Bidgoli, A.M.: Adaptive fuzzy routing in opportunistic network (AFRON). Int. J. Comput. Appl. 52, 7–11 (2012)Google Scholar
  8. 8.
    Sharma, D.K., Dhurandher, S.K., Obaidat, M.S., Pruthi, S., Sadoun, B.: A priority based message forwarding scheme for opportunistic networks. In: Proceedings of IEEE International Conference on CITS 2016, Kunming, China, pp. 236–240 (2016)Google Scholar
  9. 9.
    Dhurandher, S.K., Borah, S., Obaidat, M.S., Sharma, D.K., Baruah, B.: Probability based controlled flooding in opportunistic networks. In: Proceedings of 2015 IEEE International Conference on WINSYS 2015, Colmar, France, pp. 3–8, July 2015Google Scholar
  10. 10.
    Sabeetha, K., Kumar, A.V.A., Wahidabanu, R.S.D., Othman, W.A.M.: Encounter based fuzzy logic routing in delay tolerant networks. Wirel. Netw. 21, 173–185 (2015)CrossRefGoogle Scholar
  11. 11.
    Jain, S., Chawla, M., Soares, V.N., Rodrigues, J.J.: Enhanced fuzzy logic based spray and wait routing protocol for delay tolerant networks. Int. J. Commun. Syst. 29, 1820–1843 (2016)CrossRefGoogle Scholar
  12. 12.
    Ahmad, K., Fathima, M., Jain, V., Fathima, A.: FUZZY-PRoPHET: a novel routing protocol for opportunistic network. Int. J. Inf. Technol. 9, 121–127 (2017)Google Scholar
  13. 13.
    Rajaei, A., Chalmers, D., Wakeman, I., Parisis, G.: GSAF: efficient and flexible geocasting for opportunistic networks. In: International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM), pp. 1–9. IEEE (2016)Google Scholar
  14. 14.
    Zhang, X., Neglia, G., Kurose, J., Towsley, D.: Performance modeling of epidemic routing. In: International Conference on Research in Networking, pp. 827–839. Springer (2006)Google Scholar
  15. 15.
    Keranen, A., Ott, J., Karkkainen, T.: The ONE simulator for DTN protocol evaluation. In: Proceedings of SIMUTools 2009, Rome, Italy, 2–6 March, pp. 1–9 (2009)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Sanjay K. Dhurandher
    • 1
  • Jagdeep Singh
    • 2
  • Isaac Woungang
    • 3
    Email author
  • Makoto Takizawa
    • 4
  • Geetanshu Gupta
    • 5
  • Raghav Kumar
    • 5
  1. 1.Department of Information TechnologyNetaji Subhas University of TechnologyNew DelhiIndia
  2. 2.Division of Information Technology, Netaji Subhas Institute of TechnologyUniversity of DelhiNew DelhiIndia
  3. 3.Department of Computer ScienceRyerson UniversityTorontoCanada
  4. 4.Department of Advanced Sciences, Faculty of Science and EngineeringHosei UniversityTokyoJapan
  5. 5.Division of Computer Engineering, Netaji Subhas Institute of TechnologyUniversity of DelhiNew DelhiIndia

Personalised recommendations