Opportunistic Networks : The Concept and Research Challenges in Privacy and Security

  • Lilien L
  • Kamal Z
  • Bhuse V
 et al. 
  • 45


    Mendeley users who have this article in their library.
  • N/A


    Citations of this article.


We introduce a new paradigm and a new technology, which we call opportunistic networks or oppnets. An oppnet grows from its seedthe original set of nodes employed together at the time of the initial oppnet deployment. The seed grows into a larger network by extending invitations to join the oppnet to foreign devices, node clusters, or networks that it is able to contact. A new node that becomes a full-fledged member, or helper, may be allowed to invite external nodes. All helpers collaborate on realizing the goals of the oppnet. They can be employed to execute different kinds of tasks, even though in general they were not designed to become elements of the oppnet that invited them. Oppnets, as an epitome of pervasive computing, are subject to significant privacy and security challenges, inherent to all pervasive systems. To the best of our knowledge, we are the first to define and investigate opportunistic networks.

Author-supplied keywords

  • computer networks
  • disaster recovery
  • emergency
  • opportunistic networks
  • pervasive computing
  • privacy
  • response
  • security

Get free article suggestions today

Mendeley saves you time finding and organizing research

Sign up here
Already have an account ?Sign in


  • Leszek Lilien

  • Zille Huma Kamal

  • Vijay Bhuse

  • Ajay Gupta

Cite this document

Choose a citation style from the tabs below

Save time finding and organizing research with Mendeley

Sign up for free