skip to main content
10.1145/3616394.3618262acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
research-article

Topological Evaluation of Realistic Mobility Models for Spontaneous Wireless Networks Using Graph Theory Metrics

Published: 30 October 2023 Publication History

Abstract

In recent years, the exponential growth of mobile devices connected to access networks has led to the emergence of connection architectures characterized by a high density of end devices. This, in turn, has posed significant challenges in access management. As a result, the scientific community is increasingly recognizing the crucial need to develop equitable and unbiased access control mechanisms. A fundamental starting point is to conduct a comprehensive analysis of these massive end-device architectures, treating them as high-density graphs of interconnected nodes. In this work, we generated massive topologies/architectures using synthetic models of human mobility that accurately reflect real-world human behavior. Subsequently, we evaluated and compared these topologies using six key metrics derived from graph theory. Additionally, we established connections between nodes within each topology based on the concept of spontaneous Wireless Mesh Networks. The outcomes of our analysis shed light on mobility models that demonstrated superior performance in specific metrics, while also proposing a methodology to effectively characterize these mobility models.

References

[1]
N. Aschenbruck, E. Gerhards-Padilla, M. Gerharz, M. Frank, and P. Martini. 2007. Modelling mobility in disaster area scenarios. In Proceedings of the 10th ACM Symposium on Modeling, analysis, and simulation of wireless and mobile systems. 4--12.
[2]
E. M. Aylward, P. A. Parrilo, and J.-J. E. Slotine. 2008. Stability and robustness analysis of nonlinear systems via contraction metrics and SOS programming. Automatica 44, 8 (2008), 2163--2170.
[3]
M. Backhaus, M. Theil, M. Rossberg, and G. Schaefer. 2019. Robust and Scalable Routing in Wireless Mesh Networks Using Interference-Disjoint Backup Paths. In 2019 12th IFIP Wireless and Mobile Networking Conference (WMNC). IEEE, 103--110.
[4]
J. A. Barnes and F. Harary. 1983. Graph theory in network analysis. Social networks 5, 2 (1983), 235--244.
[5]
M. Bastian, S. Heymann, and M. Jacomy. 2009. Gephi: an open source software for exploring and manipulating networks. In Proceedings of the international AAAI conference on web and social media, Vol. 3. 361--362.
[6]
J. D. Belesaca, P. Avila-Campos, and A. Vazquez-Rodas. 2020. Artificial Neural Network Performance Evaluation for a Hybrid Power Domain Orthogonal/NonOrthogonal Multiple Access (OMA/NOMA) System. In Proceedings of the 17th ACM Symposium on PE-WASUN. 73--80.
[7]
S. Bhattarai, S. Wei, S. Rook, W. Yu, R. F. Erbacher, and H. Cam. 2015. On simulation studies of jamming threats against LTE networks. In 2015 International Conference on Computing, Networking and Communications (ICNC). IEEE, 99--103.
[8]
T. Camp, J. Boleng, and V. Davies. 2002. A survey of mobility models for ad hoc network research. Wireless communications and mobile computing 2, 5 (2002), 483--502.
[9]
E. K. Cetinkaya, D. Broyles, A. Dandekar, S. Srinivasan, and J. P. G. Sterbenz. 2010. A comprehensive framework to simulate network attacks and challenges. In International Congress on Ultra Modern Telecommunications and Control Systems. IEEE, 538--544.
[10]
A. Clauset, M. E. J. Newman, and C. Moore. 2004. Finding community structure in very large networks. Physical review E 70, 6 (2004), 066111.
[11]
C. de Waal and M. Gerharz. 2003. Bonnmotion: A mobility scenario generation and analysis tool.
[12]
L. C. Freeman. 1977. A set of measures of centrality based on betweenness. Sociometry (1977), 35--41.
[13]
A. Hirata, T. Oda, N. Saito, K. Kanahara, M. Hirota, and K. Katayama. 2020. Approach of a Solution Construction Method for Mesh Router Placement Optimization Problem. In 2020 IEEE 9th Global Conference on Consumer Electronics (GCCE). 467--468. https://doi.org/10.1109/GCCE50665.2020.9291943
[14]
X. Jiang, H. Zhang, E. A. Barsallo Yi, N. Raghunathan, C. Mousoulis, S. Chaterji, D. Peroulis, A. Shakouri, and S. Bagchi. 2021. Hybrid Low-Power Wide-Area Mesh Network for IoT Applications. IEEE IoT J. 8, 2 (2021), 901--915. https: //doi.org/10.1109/JIOT.2020.3009228
[15]
László Kajdocsi and János Kovács. 2018. Issue on implementation Possibility of Bluetooth Mesh Capabilities into OmNET. In 2018 IEEE 16th International Symposium on Intelligent Systems and Informatics (SISY). IEEE, 000203--000208.
[16]
D. Krajzewicz. 2010. Traffic simulation with SUMO--simulation of urban mobility. Fundamentals of traffic simulation (2010), 269--293.
[17]
K. Lee, S. Hong, S. J. Kim, I. Rhee, and S. Chong. 2011. SLAW: Self-similar least-action human walk. IEEE/ACM Transactions On Networking 20, 2 (2011), 515--529.
[18]
G. Ling. 2022. Learning with your Buddies: an investigation of community based UX design learning on Discord. (2022).
[19]
A. Mei and J. Stefa. 2009. SWIM: A simple model to generate small mobile worlds. In IEEE INFOCOM 2009. IEEE, 2106--2113.
[20]
A. Munjal, T. Camp, and W. C. Navidi. 2010. SMOOTH: a simple way to model human walks. ACM SIGMOBILE Mobile Computing and Communications Review 14, 4 (2010), 34--36.
[21]
Mark Newman. 2018. Networks: An Introduction. Oxford University Press, Oxford.
[22]
Z. Nurlan, T. Zhukabayeva, M. Othman, A. Adamova, and N. Zhakiyev. 2022. Wireless Sensor Network as a Mesh: Vision and Challenges. IEEE Access 10 (2022), 46--67. https://doi.org/10.1109/ACCESS.2021.3137341
[23]
P. Owczarek, M. Piechowiak, and P. Zwierzykowski. 2017. Analysis of Routing Protocols Metrics for Wireless Mesh Networks. In Information Systems Architecture and Technology: Proceedings of 37th International Conference on Information Systems Architecture and Technology--ISAT 2016--Part II. Springer, 177--186.
[24]
G. Paul, S. Sreenivasan, S. Havlin, and H. E. Stanley. 2006. Optimization of network robustness to random breakdowns. Physica A: Stat. Mech. Appl. 370 (2006), 854--862.
[25]
G. F. Riley and T. R. Henderson. 2010. The ns-3 network simulator. Modeling and tools for network simulation (2010), 15--34.
[26]
A. E. Sariyüce, K. Kaya, E. Saule, and Ü. V. Çatalyiirek. 2013. Incremental algorithms for closeness centrality. In 2013 IEEE International Conference on Big Data. IEEE, 487--492.
[27]
M. Schwamborn and N. Aschenbruck. 2013. Introducing geographic restrictions to the slaw human mobility model. In 2013 IEEE 21st international symposium on modelling, analysis and simulation of computer and telecommunication systems. IEEE, 264--272.
[28]
L. Solá, M. Romance, R. Criado, J. Flores, A. García del Amo, and S. Boccaletti. 2013. Eigenvector centrality of nodes in multiplex networks. Chaos: An Interdisciplinary Journal of Nonlinear Science 23, 3 (2013), 033131.
[29]
S. M. Taleb, Y. Meraihi, S. Yahia, A. B. Gabis, A. Ramdane-Cherif, and D. Acheli. 2022. Enhanced Whale Optimization Algorithm for mesh routers placement problem in wireless mesh networks. In 2022 3rd International Conference on Human-Centric Smart Environments for Health and Well-being (IHSH). 25--30. https://doi.org/10.1109/IHSH57076.2022.10092133
[30]
A. Vázquez-Rodas and Luis J. de la Cruz Llopis. 2015. A centrality-based topology control protocol for wireless mesh networks. Ad Hoc Networks 24 (2015), 34-- 54. https://doi.org/10.1016/j.adhoc.2014.07.026 Modeling and Performance Evaluation of Wireless Ad-Hoc Networks.
[31]
J. Yoon, M. Liu, and B. Noble. 2003. Random waypoint considered harmful. In IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No. 03CH37428), Vol. 2. IEEE, 1312--1321.
[32]
R. Zakrzewski, T. Martin, and G. Oikonomou. 2022. Graph modelled system change detection in WSNs. In 2022 11th Mediterranean Conference on Embedded Computing (MECO). 1--6. https://doi.org/10.1109/MECO55406.2022.9797209
[33]
D. Zhang, S. A. Gogi, D. S. Broyles, E. K. Cetinkaya, and J. P. G. Sterbenz. 2012. Modelling attacks and challenges to wireless networks. In 2012 IV International Congress on Ultra Modern Telecommunications and Control Systems. IEEE, 806-- 812.
[34]
S. Zhang, Z. Zhang, C. Liu, W. Gu, C. Yang, Y. Fang, and J. Wang. 2017. Vulnerabilities of Mobile Ad Hoc Network Using Centrality Metrics. In 2017 International Conference on Computer Technology, Electronics and Communication (ICCTEC). IEEE, 1370--1373

Index Terms

  1. Topological Evaluation of Realistic Mobility Models for Spontaneous Wireless Networks Using Graph Theory Metrics

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      PE-WASUN '23: Proceedings of the Int'l ACM Symposium on Performance Evaluation of Wireless Ad Hoc, Sensor, & Ubiquitous Networks
      October 2023
      129 pages
      ISBN:9798400703706
      DOI:10.1145/3616394
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 30 October 2023

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. centrality metrics
      2. graph theory
      3. human mobility models
      4. spontaneous wireless networks
      5. wireless mesh network

      Qualifiers

      • Research-article

      Conference

      MSWiM '23
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 70 of 240 submissions, 29%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 29
        Total Downloads
      • Downloads (Last 12 months)9
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 03 Mar 2025

      Other Metrics

      Citations

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media