Skip to main content

Advertisement

Log in

Analysing social behaviour and message dissemination in human based delay tolerant network

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

Recent advances in mobile communication shows proliferation in networks formed by human carried devices known as the pocket switched network (PSN). Human beings are social animals. They tend to form groups and communities, and have repetitive mobility pattern which can be used to disseminate information in PSNs. In this paper, we give a deeper insight to the nature of community formation and how such information can be used to help opportunistic forwarding in mobile opportunistic networks. Using real world mobility traces, we first derive the adjacency list for each node and form the contact graph. Using tools from social network analysis we then determine various node properties like centrality and clustering coefficient and graph properties like average path length and modularity. Based on the derived graph properties, node encounter process and nature of message dissemination in PSNs, we propose two social based routing, known as the contact based routing and community aware two-hop routing. We compare the proposed routing techniques with generic epidemic and prophet routing and Bubble-Rap, a social based routing. Results show that the proposed algorithms is able to achieve better delivery ratio and lower delay than Bubble Rap, while reducing the high overhead ratio of epidemic and prophet routing.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

Notes

  1. Social scenario represent the group or population of individuals within a given area or location, about which one is interested. For example, group of students and staffs in an academic institution or set of individual visiting a shopping mall or conference

  2. However, nodes in campus scenario have greater contact duration compared to conference scenario since they tend to remain in contact for a longer duration in classes, labs or libraries.

  3. We compare with epidemic routing, since it tries to deliver messages along all possible paths and thus serves as a theoretical upper bound for delivery ratio and overhead ratio and a lower bound for delivery latency.

References

  1. Hui, P., Chaintreau, A., Scott, J., Gass, R., Crowcroft, J. & Diot, C. (2005). Pocket switched networks and the consequences of human mobility in conference environments. In Proceedings of the ACM SIGCOMM workshop on delay-tolerant networking (WDTN’05) (pp. 244–251).

  2. Fall, K. A delay tolerant networking architecture for challenged internet. In Proceedings of the 2003 conference on applications, technologies, architectures, and protocols for computer communications (SIGCOMM’03) (pp. 27–34).

  3. Brockmann, D., Hufnagel, L., & Geisel, T. (2006). The scaling laws of human travel. Nature, 439(7075), 462–465.

    Article  Google Scholar 

  4. Rhee, I., Shin, M., Hong, S., Lee, K., Kim, S. J., & Chong, S. J. (2011). On the levy-walk nature of human mobility. IEEE/ACM Transactions on Networking, 19(3), 630–643.

    Article  Google Scholar 

  5. Gonzalez, M. C., Hidalgo, C., & Barabasi, A. (2008). Understanding individual human mobility patterns. Nature, 453(7196), 779–782.

    Article  Google Scholar 

  6. Karagiannis, T., Le Boudec, J., & Vojnovi, M. (2007). Power law and exponential decay of intercontact times between mobile devices. In Proceedings of the ACM MobiCom (pp. 183–194).

  7. Chaintreau, A., Hui, P., Diot, C., Gass, R., Scott, J., & Crowcroft, J. (2007). Impact of human mobility on opportunistic forwarding algorithms. IEEE Transactions on Mobile Computing, 6(6), 606–620.

    Article  Google Scholar 

  8. Spyropoulos, T., Psounis, K. & Raghavendra, C. (2006). Performance analysis of mobility-assisted routing. IEEE INFOCOM (pp. 49–60).

  9. Vahdat, A. & Becker, D. (2000). Epidemic routing for partially connected Ad Hoc networks. Technical report CS-2000-06, Department of Computer Science, Duke University, Durham, NC.

  10. Lindgren, A., Doria, A., & Schelen, O. (2003). Probabilistic routing in intermittently connected networks. Proceedings of ACM SIGMOBILE Mobile Computing and Communications Review, 7(3), 19–20.

    Article  Google Scholar 

  11. Spyropoulos, Thrasyvoulos, Psounis, Konstantinos, & Raghavendra, Cauligi S. (2008). Efficent routing in intermittently connected mobile networks: The multiple-copy case. IEEE/ACM Transactions on Networking, 16(1), 77–90.

    Article  Google Scholar 

  12. Burgess, J., Gallagher, B., Jensen, D. & Levine, B. N. (2006). Maxprop: Routing for vehicle-based disruption-tolerant networks. In Proceedings of the IEEE INFOCOM (pp. 1688–1698).

  13. Musolesi, M., & Mascolo, C. (2009). Car: Context-aware adaptive routing for delay-tolerant mobile networks. IEEE Transactions on Mobile Computing, 8(2), 246–260.

    Article  Google Scholar 

  14. Cao, Y., & Sun, Z. (2013). Routing in delay/disruption tolerant networks: A taxonomy, survey and challenges. Communications Surveys & Tutorials, IEEE, 15(2), 654–677.

    Article  Google Scholar 

  15. Hui, P. & Crowcroft, J. (2007). How small labels create big improvements. IEEE pervasive computing and communications workshops (PerCom’07) (pp. 65–70), 19–23 March 2007.

  16. Hui, P., Crowcroft, J. & Yonek, E. (2008). Bubble rap: Social-based forwarding in delay tolerant networks. In Proceedings of the 9th ACM international symposium on mobile Ad Hoc networking and computing (MobiHoc’08) (pp. 241–250).

  17. Daly, E. M. & Haahr, M. (2007). Social network analysis for routing in disconnected delay-tolerant manets. In Proceedings of the 8th ACM international symposium on mobile ad hoc networking and computing (MobiHoc’07) (pp. 32–40).

  18. Zhu, Y., Xu, B., Shi, X., & Wang, Y. (2013). A survey of social-based routing in delay tolerant networks: Positive and negative social effects. Communications Surveys & Tutorials, IEEE, 15(1), 387–401.

    Article  Google Scholar 

  19. Musolesi, M., & Mascolo, C. (2007). Designing mobility models based on social network theory. SIGMOBILE Mobile Computing Communications Review, 11, 59–70.

    Article  Google Scholar 

  20. Boldrini, Chiara, & Passarella, Andrea. (2010). HCMM: Modelling spatial and temporal properties of human mobility driven by users’ social relationships. Computer Communications, 33(9), 1056–1074.

    Article  Google Scholar 

  21. Spyropoulos, T., Psounis, K. & Raghavendra, C. (2006). Performance analysis of mobility-assisted routing. In IEEE INFOCOM.

  22. Hsu, W., Spyropoulos, T., Psounis, K. & Helmy, A. (2007). Modeling time-variant user mobility in wireless mobile networks. IEEE international conference on computer communications (INFOCOM’07) (pp. 758–766), 6–12.

  23. Wasserman, S., & Faust, K. (1994). Social network analysis: Methods and applications. Cambridge: Cambridge University Press.

    Book  Google Scholar 

  24. Gao, W., Li, Q., Zhao, B. & Cao, G. (2009). Multicasting in delay tolerant networks: A social network perspective networks. Proceedings of the 10th ACM international symposium on mobile ad hoc networking and computing (MobiHoc ’09) (pp. 299–308).

  25. McPherson, M., Smith-Lovin, L., & Cook, J. M. (2001). Birds of a feather: Homophily in social networks. Annual Review of Sociology, 27, 415–444.

    Article  Google Scholar 

  26. Zhang, Y. & Zhao, J. (2009). Social network analysis on data diffusion in delay tolerant networks. In Proceedings of the tenth ACM international symposium on mobile ad hoc networking and computing (MobiHoc ’09) (pp. 345–346).

  27. Bulut, E. & Szymanski, B.K. Friendship based routing in delay tolerant mobile social networks. IEEE global telecommunications conference (GLOBECOM’10) (pp. 1–5).

  28. Mei, A., Morabito, G., Santi, P. & Stefa, J. (2011). Social-aware stateless forwarding in pocket switched networks. Proceedings of the IEEE INFOCOM (pp. 251–255).

  29. Hossmann, T., Spyropoulos, T. & Legendre, F. Know thy neighbor: Towards optimal mapping of contacts to social graphs for DTN routing. In Proceedings of the IEEE INFOCOM, 2010 (pp. 1–9).

  30. Hui, P. & Yoneki, E., et al. (2007). Distributed community detection in delay tolerant networks. In Proceedings of the 2nd ACM/IEEE international workshop on mobility in the evolving internet architecture (MobiArch’07) 2007. Article No. 7.

  31. CRAWDAD: A community resource for archiving wireless data at Dartmouth. Dartmouth College, Hanover, NH [Online]. http://crawdad.cs.dartmouth.edu/.

  32. Scott, J., Hui, P., Crowcroft, J. & Diot, C. (2006). Haggle: A networking architecture designed around mobile users. In Proceedings of the third IFIP wireless on demand network systems conference.

  33. Eagle, N. & Pentland, A. (2006). Reality mining: Sensing complex social systems. Journal of Personal and Ubiquitous Computing, 10(4), 255–268.

  34. Keränen, A., Kärkkäinen, T., & Ott, J. (2010). Simulating mobility and DTNs with the ONE. Journal of Communications, 5(2), 92–105.

    Article  Google Scholar 

  35. http://cran.r-project.org/web/packages/igraph/index.html.

  36. www.r-project.org/.

  37. Marsden, P. V. (2002). Egocentric and sociocentric measures of network centrality. Social Networks, 24(4), 407–422.

    Article  Google Scholar 

  38. Zhang, Xiaolan, Neglia, Giovanni, Kurose, Jim, & Towsley, Don. (2007). Performance modeling of epidemic routing. Computer Networks: The International Journal of Computer and Telecommunications Networking archive, 51(10), 2867–2891.

    Article  MATH  Google Scholar 

  39. Batabyal, S. & Bhaumik, P. (2013). Estimators for global information in mobile opportunistic network. In Proceedings of IEEE advanced networks and telecommunications systems (ANTS 15–18 December, 2013) (pp. 1–6).

  40. Balasubramanian, A., Levine, B. & Venkataramani, A. DTN routing as a resource allocation problem. In Proceedings of the 2007 conference on applications, technologies, architectures, and protocols for computer communications (SIGCOMM’07) (pp. 373–384).

  41. Krifa, A., Barakat, C., & Spyropoulos, T. (2008). Optimal buffer management policies for delay tolerant networks. Proceedings of IEEE SECON (pp. 260–268).

  42. Li, Y., Qian, M., Jin, D., Su, L. & Zeng, L. (2009). Adaptive optimal buffer management policies for realistic DTN. IEEE global telecommunications conference (GLOBECOM’09) (pp. 1–5).

  43. Batabyal, S. & Bhaumik, P. (2013). A fundamental traffic management strategy for mobile opportunistic network. International conference on advances in computing, communications and informatics (ICACCI’13) (pp. 822–827).

  44. Groenevelt, R., Nain, P. & Koole, G. (2005). The message delay in mobile ad hoc networks. Performance Evaluation, 62(1-4), 210–228.

  45. Boldrini, C., Conti, M. & Passarella, A. (2007). Impact of social mobility on routing protocols for opportunistic networks. IEEE international symposium world of wireless, mobile and multimedia networks (WoWMoM’07) (pp. 1–6).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Suvadip Batabyal.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Batabyal, S., Bhaumik, P. Analysing social behaviour and message dissemination in human based delay tolerant network. Wireless Netw 21, 513–529 (2015). https://doi.org/10.1007/s11276-014-0790-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-014-0790-2

Keywords

Navigation