It is our great pleasure to welcome you to the 2014 ACM Workshop on Challenged Networks -- CHANTS'14. Over the years, CHANTS has emerged to be a reference forum that brings together researchers from academia, industry, and government laboratories, in order to present cutting-edge work and results in various aspects of challenged networks. Typical aspects considered by the CHANTS community include very high delays, such as in inter-planetary networks, limited power, such as in sensor and wildlife monitoring networks, communication in settings that lack infrastructure, such as rural and remote areas, and military battlefields, or simply usual environments (urban, rural) where it is difficult or expensive to use the existing infrastructure (e.g., when roaming). Following recent trends CHANTS is also looking at mobile cloud computing, challenged networks in the IoT perspective, data-centric communications, traffic offloading from cellular networks, opportunistic and participatory sensing, green networking. Essentially, challenged networks are found in everyday settings, when access to traditional infrastructure is non-existent, restricted, expensive, overly complex or rapidly changing.
After the success of the previous Workshop on Delay-tolerant Networking (WDTN-05) and eight previous installments of CHANTS (2006-2013), this year CHANTS takes place jointly with ACM MobiCom 2014 in Maui, Hawaii, USA.
In response to the call for papers, we received a total of 37 submissions from Asia, Europe, and the United States, well distributed across the various workshop topics. This confirms that after several years CHANTS continues to be a reference forum by the community of researchers working in this field. After the review phase, the Technical Program Committee accepted 10 submissions as full papers, and 5 more as concise contributions. We also accepted 3 demo submissions. We are very pleased to present a well-balanced conference program that includes one keynote speech, given by Prof. Giovanni Pau (LIP6-UPMC, Paris, France), 3 full-paper sessions, 1 concise contributions session, and a demo session.
Proceeding Downloads
Enhancing opportunistic networks with legacy nodes
Mobile opportunistic networking utilizes device-to-device communication to provide messaging and content sharing mechanisms between mobile users without the need for supporting infrastructure networks. However, enabling opportunistic networking in ...
Opportunistic interaction in the challenged internet of things
Under intermittent Internet connectivity, enabling interaction between smart objects and mobile users in the Internet of Things (IoT) becomes a challenge. We thus discuss the notion of a 'Challenged IoT' and propose Direct Interaction with Smart ...
Mind the gap: modelling video delivery under expected periods of disconnection
In this work we model video delivery under expected periods of disconnection, such as the ones experienced in public transportation systems. Our main goal is to quantify the gains of users' collaboration in terms of Quality of Experience (QoE) in the ...
Flooding data in a cell: is cellular multicast better than device-to-device communications?
A natural method to disseminate popular data on cellular networks is to use multicast. Despite having clear advantages over unicast, multicast does not offer any kind of reliability and could result costly in terms of cellular resources in the case at ...
A message ferrying approach to low-cost backhaul in cellular networks
Cellular operators are considering large-scale small cell deployment in urban traffic hot spots to combat the looming capacity crisis in their networks. However, connecting a large number of small cells to the network core using current backhaul ...
Adaptive data offloading in opportunistic networks through an actor-critic learning method
Nowadays, the growing popularity of mobile phones has resulted in an exponential growth of mobile data, causing severe traffic overload in the cellular network. A promising approach to overcome this problem is offloading, i.e. to delegate part of the ...
Stalk me if you can: the anatomy of sybil attacks in opportunistic networks
Opportunistic Networks are envisioned to complement infrastruc-ture-based communication in overloaded cellular settings, in remote areas, during and immediately after large scale disasters. On account of their highly distributed and dynamic nature, as ...
Dynamic framework for building highly-localized mobile web DTN applications
Proximity-based mobile applications are increasing in popularity. Such apps engage users while in proximity of places of interest (malls, bus stops, restaurants, theatres), but remain closed or unused after the user goes away. Since the number of `...
Bundle protocol header compression
Delay Tolerant Networks (DTNs), especially the Bundle Protocol (BP), transmit data in self-contained bundles each of which carrying all necessary information to process it and route it to its destination. While this allows for long delays, link ...
WD2: an improved wifi-direct group formation protocol
WiFi-Direct is a recently proposed standard for mobile devices to create ad hoc networks. Its inclusion into the An- droid operating system provides a large user base, making WiFi-Direct a popular protocol in which to build applica- tions. In this paper,...
Shared content editing in opportunistic networks
This paper examines shared content editing in opportunistic networks. Instead of immutable messages, such as photos or music files that are often assumed in opportunistic network applications, we focus on mutable content, such as wiki-pages, that can be ...
Congestion control in disruption-tolerant networks: a comparative study for interplanetary networking applications
Controlling congestion is critical to ensure adequate network operation and performance. That is especially the case in networks operating in "challenged"- or "extreme" environments where episodic connectivity is part of the network's normal operation. ...
Hot spot selection in rural access nanosatellite networks
Nanosatellites architectures have been proposed as a cost-effective solution to extend the network access in rural and remote areas. To guarantee a reliable service and a large coverage, a good number of nanosatellites and ground stations (or hot spot) ...
Revisiting pitfalls of DTN datasets statistical analysis
Contact traces collected in real situations represent a popular material to assess the performance of a Delay Tolerant Network. These traces usually require some preprocessing to be fully usable. Especially, several assumptions can be made prior to ...
On efficient data collection and event detection with delay minimization in deep sea
Efficient data collection and event detection in the deep sea, as special applications of delay tolerant networks, pose some unique challenges due to the need for timeliness of data and event reporting of coverage areas and the delay of acoustic ...
Demo: RasPiNET: decentralised communication and sensing platform with satellite connectivity
This paper introduces the RasPiNET, which forms a Delay Tolerant Network consisting of Raspberry Pi computers. Each Raspberry Pi node equips WiFi communication capability together with a battery pack and RasPiNET can operate a data mule communication. ...
Demo: opportunistic communications to alleviate cellular infrastructures: the FP7-moto approach
Over the latest few years, we have witnessed the widespread diffusion of smartphones, tablets, and other mobile devices with diverse networking and multimedia capabilities. Major operators in the US and Europe are experiencing severe problems in coping ...
Demo: wireless IP mesh on android for fire-fighters monitoring
Recently, a few applications appeared that emulate the behaviour of a wireless ad-hoc network at the application layer, or make it accessible through a full programming framework on the Android platform. We show in this demo how to enable mesh ...
Demo: application-transparent deployment of DTN via SmartNet
In this paper, we present the SmartNet architecture, an open and extensible software framework for experimenting with and deploying application-transparent network adaptation solutions. The framework fashions a plugin-based system architecture where ...
Index Terms
- Proceedings of the 9th ACM MobiCom workshop on Challenged networks
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
CHANTS '18 | 27 | 9 | 33% |
CHANTS '17 | 16 | 6 | 38% |
CHANTS '16 | 27 | 14 | 52% |
CHANTS '15 | 27 | 7 | 26% |
CHANTS '14 | 37 | 15 | 41% |
CHANTS '13 | 25 | 10 | 40% |
Overall | 159 | 61 | 38% |