18,607 research outputs found

    Socially-Aware Networking: A Survey

    Full text link
    The widespread proliferation of handheld devices enables mobile carriers to be connected at anytime and anywhere. Meanwhile, the mobility patterns of mobile devices strongly depend on the users' movements, which are closely related to their social relationships and behaviors. Consequently, today's mobile networks are becoming increasingly human centric. This leads to the emergence of a new field which we call socially-aware networking (SAN). One of the major features of SAN is that social awareness becomes indispensable information for the design of networking solutions. This emerging paradigm is applicable to various types of networks (e.g. opportunistic networks, mobile social networks, delay tolerant networks, ad hoc networks, etc) where the users have social relationships and interactions. By exploiting social properties of nodes, SAN can provide better networking support to innovative applications and services. In addition, it facilitates the convergence of human society and cyber physical systems. In this paper, for the first time, to the best of our knowledge, we present a survey of this emerging field. Basic concepts of SAN are introduced. We intend to generalize the widely-used social properties in this regard. The state-of-the-art research on SAN is reviewed with focus on three aspects: routing and forwarding, incentive mechanisms and data dissemination. Some important open issues with respect to mobile social sensing and learning, privacy, node selfishness and scalability are discussed.Comment: accepted. IEEE Systems Journal, 201

    Social-aware Opportunistic Routing: The New Trend

    Full text link
    Since users move around based on social relationships and interests, the resulting movement patterns can represent how nodes are socially connected (i.e., nodes with strong social ties, nodes that meet occasionally by sharing the same working environment). This means that social interactions reflect personal relationships (e.g., family, friends, co-workers, passers-by) that may be translated into statistical contact opportunities within and between social groups over time. Such contact opportunities may be exploited to ensure good data dissemination and retrieval, even in the presence of intermittent connectivity. Thus, in the last years, a new trend based on social similarity emerged where social relationships, interests, popularity and among others, are used to improve opportunistic routing. In this chapter, the reader will learn about the different approaches related to opportunistic routing focusing on the social-aware approaches and how such approaches make use of social information derived from opportunistic contacts to improve data forwarding. Additionally, a brief overview on the existing taxonomies for opportunistic routing as well as an updated one are provided along with a set of experiments in scenarios based on synthetic mobility models and human traces in order to show the potential of social-aware solutions.Comment: 42 pages, 10 figures, 1 tabl

    Data Dissemination in Opportunistic Networks

    Full text link
    Mobile devices integrating wireless short-range communication technologies make possible new applications for spontaneous communication, interaction and collaboration. An interesting approach is to use collaboration to facilitate communication when mobile devices are not able to establish direct communication paths. Opportunistic networks, formed when mobile devices communicate with each other while users are in close proximity, can help applications still exchange data in such cases. In opportunistic networks routes are built dynamically, as each mobile device acts according to the store-carry-and-forward paradigm. Thus, contacts between mobile devices are seen as opportunities to move data towards destination. In such networks data dissemination is done using forwarding and is usually based on a publish/subscribe model. Opportunistic data dissemination also raises questions concerning user privacy and incentives. Such problems are addressed differently by various opportunistic data dissemination techniques. In this paper we analyze existing relevant work in the area of data dissemination in opportunistic networks. We present the categories of a proposed taxonomy that captures the capabilities of data dissemination techniques used in such networks. Moreover, we survey relevant data dissemination techniques and analyze them using the proposed taxonomy.Comment: Please cite this as "Radu Ciobanu, Ciprian Dobre, Data Dissemination in Opportunistic Networks, in Proc. of 18th International Conference on Control Systems and Computer Science (CSCS-18), Bucharest, Romania, 2011, pp. 529-536, ISSN: 2066-4451, Politehnica Press

    PRIF: A Privacy-Preserving Interest-Based Forwarding Scheme for Social Internet of Vehicles

    Full text link
    Recent advances in Socially Aware Networks (SANs) have allowed its use in many domains, out of which social Internet of vehicles (SIOV) is of prime importance. SANs can provide a promising routing and forwarding paradigm for SIOV by using interest-based communication. Though able to improve the forwarding performance, existing interest-based schemes fail to consider the important issue of protecting users' interest information. In this paper, we propose a PRivacy-preserving Interest-based Forwarding scheme (PRIF) for SIOV, which not only protects the interest information, but also improves the forwarding performance. We propose a privacy-preserving authentication protocol to recognize communities among mobile nodes. During data routing and forwarding, a node can know others' interests only if they are affiliated with the same community. Moreover, to improve forwarding performance, a new metric {\em community energy} is introduced to indicate vehicular social proximity. Community energy is generated when two nodes encounter one another and information is shared among them. PRIF considers this energy metric to select forwarders towards the destination node or the destination community. Security analysis indicates PRIF can protect nodes' interest information. In addition, extensive simulations have been conducted to demonstrate that PRIF outperforms the existing algorithms including the BEEINFO, Epidemic, and PRoPHET

    Modeling Human Mobility and its Applications in Routing in Delay-Tolerant Networks: a Short Survey

    Full text link
    Human mobility patterns are complex and distinct from one person to another. Nevertheless, motivated by tremendous potential benefits of modeling such patterns in enabling new mobile services and technologies, researchers have attempted to capture salient characteristics of human mobility. In this short survey paper, we review some of the major techniques for modeling humans' co-location, as well as predicting human location and trajectory. Further, we review one of the most important application areas of such models, namely, routing in delay-tolerant networks

    Friendship and Selfishness Forwarding: applying machine learning techniques to Opportunistic Networks data forwarding

    Full text link
    Opportunistic networks could become the solution to provide communication support in both cities where the cellular network could be overloaded, and in scenarios where a fixed infrastructure is not available, like in remote and developing regions. A critical issue that still requires a satisfactory solution is the design of an efficient data delivery solution. Social characteristics are recently being considered as a promising alternative. Most opportunistic network applications rely on the different mobile devices carried by users, and whose behavior affects the use of the device itself. This work presents the "Friendship and Selfishness Forwarding" (FSF) algorithm. FSF analyses two aspects to make message forwarding decisions when a contact opportunity arises: First, it classifies the friendship strength among a pair of nodes by using a machine learning algorithm to quantify the friendship strength among pairs of nodes in the network. Next, FSF assesses the relay node selfishness to consider those cases in which, despite a strong friendship with the destination, the relay node may not accept to receive the message because it is behaving selfishly, or because its device has resource constraints in that moment. By using trace-driven simulations through the ONE simulator, we show that the FSF algorithm outperforms previously proposed schemes in terms of delivery rate, average cost, and efficiency.Comment: 27 pages, 25 figure

    Survey of Important Issues in UAV Communication Networks

    Full text link
    Unmanned Aerial Vehicles (UAVs) have enormous potential in the public and civil domains. These are particularly useful in applications where human lives would otherwise be endangered. Multi-UAV systems can collaboratively complete missions more efficiently and economically as compared to single UAV systems. However, there are many issues to be resolved before effective use of UAVs can be made to provide stable and reliable context-specific networks. Much of the work carried out in the areas of Mobile Ad Hoc Networks (MANETs), and Vehicular Ad Hoc Networks (VANETs) does not address the unique characteristics of the UAV networks. UAV networks may vary from slow dynamic to dynamic; have intermittent links and fluid topology. While it is believed that ad hoc mesh network would be most suitable for UAV networks yet the architecture of multi-UAV networks has been an understudied area. Software Defined Networking (SDN) could facilitate flexible deployment and management of new services and help reduce cost, increase security and availability in networks. Routing demands of UAV networks go beyond the needs of MANETS and VANETS. Protocols are required that would adapt to high mobility, dynamic topology, intermittent links, power constraints and changing link quality. UAVs may fail and the network may get partitioned making delay and disruption tolerance an important design consideration. Limited life of the node and dynamicity of the network leads to the requirement of seamless handovers where researchers are looking at the work done in the areas of MANETs and VANETs, but the jury is still out. As energy supply on UAVs is limited, protocols in various layers should contribute towards greening of the network. This article surveys the work done towards all of these outstanding issues, relating to this new class of networks, so as to spur further research in these areas.Comment: arXiv admin note: substantial text overlap with arXiv:1304.3904 by other author

    Content Retrieval At the Edge: A Social-aware and Named Data Cooperative Framework

    Full text link
    Recent years with the popularity of mobile devices have witnessed an explosive growth of mobile multimedia contents which dominate more than 50\% of mobile data traffic. This significant growth poses a severe challenge for future cellular networks. As a promising approach to overcome the challenge, we advocate Content Retrieval At the Edge, a content-centric cooperative service paradigm via device-to-device (D2D) communications to reduce cellular traffic volume in mobile networks. By leveraging the Named Data Networking (NDN) principle, we propose sNDN, a social-aware named data framework to achieve efficient cooperative content retrieval. Specifically, sNDN introduces Friendship Circle by grouping a user with her close friends of both high mobility similarity and high content similarity. We construct NDN routing tables conditioned on Friendship Circle encounter frequency to navigate a content request and a content reply packet between Friendship Circles, and leverage social properties in Friendship Circle to search for the final target as inner-Friendship Circle routing. The evaluation results demonstrate that sNDN can save cellular capacity greatly and outperform other content retrieval schemes significantly.Comment: Lingjun Pu, Xu Chen, Jingdong Xu, and Xiaoming Fu, "Content Retrieval At the Edge: A Social-aware and Named Data Cooperative Framework," accepted by IEEE Transactions on Emerging Topics in Computing, 201

    A Survey of Delay Tolerant Networks Routing Protocols

    Full text link
    Advances in Micro-Electro-Mechanical Systems (MEMS) have revolutionized the digital age to a point where animate and inanimate objects can be used as a communication channel. In addition, the ubiquity of mobile phones with increasing capabilities and ample resources means people are now effectively mobile sensors that can be used to sense the environment as well as data carriers. These objects, along with their devices, form a new kind of networks that are characterized by frequent disconnections, resource constraints and unpredictable or stochastic mobility patterns. A key underpinning in these networks is routing or data dissemination protocols that are designed specifically to handle the aforementioned characteristics. Therefore, there is a need to review state-of-the-art routing protocols, categorize them, and compare and contrast their approaches in terms of delivery rate, resource consumption and end-to-end delay. To this end, this paper reviews 63 unicast, multicast and coding-based routing protocols that are designed specifically to run in delay tolerant or challenged networks. We provide an extensive qualitative comparison of all protocols, highlight their experimental setup and outline their deficiencies in terms of design and research methodology. Apart from that, we review research that aims to exploit studies on social networks and epidemiology in order to improve routing protocol performance. Lastly, we provide a list of future research directions.Comment: 56 page

    MPAR: A Movement Pattern-Aware Optimal Routing for Social Delay Tolerant Networks

    Full text link
    Social Delay Tolerant Networks (SDTNs) are a special kind of Delay Tolerant Network (DTN) that consists of a number of mobile devices with social characteristics. The current research achievements on routing algorithms tend to separately evaluate the available profit for each prospective relay node and cannot achieve the global optimal performance in an overall perspective. In this paper, we propose a Movement Pattern-Aware optimal Routing (MPAR) for SDTNs, by choosing the optimal relay node(s) set for each message, which eventually based on running a search algorithm on a hyper-cube solution space. Concretely, the movement pattern of a group of node(s) can be extracted from the movement records of nodes. Then the set of commonly visited locations for the relay node(s) set and the destination node is obtained, by which we can further evaluate the co-delivery probability of the relay node(s) set. Both local search scheme and tabu-search scheme are utilized in finding the optimal set, and the tabu-search based routing Tabu-MPAR is proved able to guide the relay node(s) set in evolving to the optimal one. We demonstrate how the MPAR algorithm significantly outperforms the previous ones through extensive simulations, based on the synthetic SDTN mobility model.Comment: 18 page
    • …
    corecore