Abstract
We present an example of the use of analytical models to predict global properties of large-scale information technology systems from the parameters of simple local interactions. The example is intended as a first step towards using complex systems modeling methods to control self-organization in organic systems. It is motivated by a concrete application scenario of information distribution in emergency situations, but is relevant to other domains such as malware spread or social interactions. Specifically, we show how the spread of information through ad-hoc interactions between mobile devices depends on simple local interaction rules and parameters such as user mobility and physical interaction range. We show how three qualitatively different regimes of information ‘infection rate’ can be analytically derived and validate our model in extensive simulations.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Arai, T., Yoshida, E., Ota, J.: Information diffusion by local communication of multiple mobilerobots. In: Systems, Man and Cybernetics, 1993. Systems Engineering in the Service of Humans, Conference Proceedings, pp. 535–540 (1993)
Boccara, N.: Modeling Complex Systems. Springer, Heidelberg (2004)
Chen, Z., Gao, L., Kwiat, K.: Modeling the spread of active worms. In: INFOCOM 2003. Twenty-Second Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 3. IEEE, Los Alamitos (2003)
Ferscha, A., Zia, K.: Lifebelt: Silent directional guidance for crowd evacuation. In: IEEE ISWC 2009 (2009)
Mainzer, K.: Organic Computing and Complex Dynamical Systems Conceptual Foundations and Interdisciplinary Perspectives. Organic Computing, 105 (2008)
Nicol, D.M., Liljenstam, M.: Models of active worm defenses. In: Proc. of Measurement, Modeling and Analysis of the Internet Workshop, IMA 2004 (2004)
Staniford, S., Paxson, V., Weaver, N.: How to own the internet in your spare time. In: Proceedings of the 11th USENIX Security Symposium, Berkeley, CA, USA, pp. 149–167. USENIX Association (2002)
Zou, C.C., Gong, W., Towsley, D.: Code red worm propagation modeling and analysis. In: CCS 2002: Proceedings of the 9th ACM conference on Computer and communications security, pp. 138–147. ACM, New York (2002)
Zou, C.C., Gong, W., Towsley, D.: Worm propagation modeling and analysis under dynamic quarantine defense. In: WORM 2003: Proceedings of the 2003 ACM workshop on Rapid malcode, pp. 51–60. ACM, New York (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kloch, K., Kantelhardt, J.W., Lukowicz, P., Wüchner, P., de Meer, H. (2010). Ad-Hoc Information Spread between Mobile Devices: A Case Study in Analytical Modeling of Controlled Self-organization in IT Systems. In: Müller-Schloer, C., Karl, W., Yehia, S. (eds) Architecture of Computing Systems - ARCS 2010. ARCS 2010. Lecture Notes in Computer Science, vol 5974. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11950-7_10
Download citation
DOI: https://doi.org/10.1007/978-3-642-11950-7_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-11949-1
Online ISBN: 978-3-642-11950-7
eBook Packages: Computer ScienceComputer Science (R0)