Opportunistic mobile social network

Opportunistic mobile social networks are a form of mobile ad hoc networks that exploit the human social characteristics, such as similarities, daily routines, mobility patterns, and interests to perform the message routing and data sharing.[1][2] In such networks, the users with mobile devices are able to form on-the-fly social networks to communicate with each other and share data objects.[3]

Definition

In recent years, opportunistic mobile social networks emerged as a new mechanism of communications in wireless networks. Unlike mobile ad hoc networks (MANETs) that require end-to-end communication paths for message exchange, the communication in opportunistic mobile social networks takes place on the establishment of opportunistic contacts among mobile nodes, without availability of end-to-end message routing paths. As the mobile devices can make contact only when humans come into contact, such networks are tightly coupled with human social networks. Therefore, the opportunistic mobile social networks exploit the human behaviors and social relationships to build more efficient and trustworthy message dissemination schemes.[4]

Opportunism in social networks

It is reported that the estimated number of mobile phone users are 3.3 billion worldwide, which is more than half of the world's population.[5][6] Most of the mobile phones in the current era are equipped with Wi-Fi, Bluetooth, cameras, sensors, and numerous other components. Moreover, most of the modern vehicles are also installed with communication interfaces and sensory equipment. Such a widespread use and availability of mobile communication devices create a huge number of contact opportunities among humans, and are key to the establishment of opportunistic mobile social networks.[7] The human mobility is the key factor in opportunistic communications, and there could be delays in message transfers as long as the humans carrying mobile devices do not come into each other’s transmission range. Therefore, several research projects are conducted in various parts of the world to analyze the human mobility and social interaction patterns, and on the basis of that to build efficient message routing models that incur minimum message delays.[8]

Social metrics

The most common social metrics that are widely utilized to build message communications by exploiting social networks are betweenness centrality, degree centrality, and closeness centrality.[1][2] The betweenness centrality measures the extent a node appears on the shortest communication paths (taken by messages) among the other mobile devices.[1][2] In specific terms, betweenness centrality quantifies the extent of information flow through the current node on the behalf of other nodes. In contrast, degree centrality gives a measurement of the direct interactions of a node with other nodes in an opportunistic mobile social network.[1][2] The closeness centrality is regarded as a measure of information spread time from a given node to the other nodes in the network.[1][2] Bubble Rap[9] is a famous message routing scheme developed for opportunistic mobile social networks that exploits the aforementioned metrics to establish communications.

Challenges

Opportunistic mobile social networks face numerous challenges due to the frequent disruptions and delays, and intermittent connectivity environment. One of the major challenges is the insecure communication in such networks, as due to the distributed nature, it is not possible to utilize mature security mechanisms, such as cryptography that requires centralized trusted authorities.[10] Moreover, it is also difficult to maintain trust among the peer nodes due to the disconnected and decentralized environments.[10]

Applications

There are numerous applications of opportunistic mobile social networks, and more applications are evolving as the smart phone technology is advancing.

Opportunistic computing

Opportunistic computing utilize the shared resources, content, services, applications, and computing resources, by the devices connected in an opportunistic mobile social network, to provide a platform for the execution of distributed computing tasks.[11] However, opportunistic computing requires middleware services to cope with the intermittent connectivity and delay of the opportunistic communication environments.

Recommender systems

A novel application area of opportunistic mobile social networks is the recommender systems. Such systems track the user activities, mobility patterns, and utilize the user’s contextual information to provide recommendations on variety of items.[12]

Mobile data offloading

An active area of research in the applications of opportunistic mobile social networks is the mobile data offloading. With large number of ever increasing smart phone users, most of the 3G networks are overloaded.[13][14] Several research works are performed to utilize opportunistic mobile social networks in offloading of mobile data traffic to reduce the load on 3G networks.[13]

Simulators

There are numerous simulators available that are used to analyze and replay human mobility patterns extracted from the real traces collected through various experiments. Some simulators are capable of generating synthetic human mobility patterns, as well as can simulate real traces; a few examples are given below:

ONE

ONE is a Java-based simulator, and supports the simulation of realistic and synthetic mobility patterns. ONE simulator has many rich features for simulating opportunistic mobile social networks.[15]

References

  1. 1 2 3 4 5 Nikolaos Vastardis and Kun Yang, "Mobile Social Networks: Architectures, Social Properties, and Key Research Challenges," IEEE Communications Surveys and Tutorials, vol. 15, no. 3, 2013, pp. 1355.
  2. 1 2 3 4 5 Behrouz Jedari and Feng Xia, "A Survey on Routing and Data Dissemination in Opportunistic Mobile Social Networks," http://arxiv.org/abs/1311.0347
  3. O. Khalid, S. U. Khan, S. A. Madani, K. Hayat, L. Wang, D. Chan, and R. Ranjan, "Opportunistic Databank: A Context-aware on-the-fly Data Center for Mobile Networks," in Handbook on Data Centers, S. U. Khan and A. Y. Zomaya, Eds., Springer-Verlag, New York, USA.
  4. J. Kolodziej, S. U. Khan, L. Wang, N. Min-Allah, S. A. Madani, N. Ghani, and H. Li, "An Application of Markov Jump Process Model for Activity-Based Indoor Mobility Prediction in Wireless Networks," in 9th IEEE International Conference on Frontiers of Information Technology (FIT), Islamabad, Pakistan, December 2011, pp. 51-56.
  5. M. Conti and M. Kumar, "Opportunities in opportunistic computing," IEEE Computer, 43 (1) (2010), pp. 42–50
  6. Virki, Tarmo (29 November 2007). "Global cell phone use at 50 percent". Reuters. Retrieved 15 February 2014.
  7. O. Khalid, S. U. Khan, J. Kolodziej, L. Zhang, J. Li, K. Hayat, S. A. Madani, L. Wang, and D. Chen, "A Checkpoint Based Message Forwarding Approach for Opportunistic Communication," in 26th European Conference on Modeling and Simulation (ECMS), Koblenz, Germany, May 2012, pp. 512-518.
  8. https://code.google.com/p/haggle/
  9. P. Hui, J. Crowcroft, and E. Yoneki. Bubble rap: social-based forwarding in delay tolerant networks. Proc. MobiHoc, pages 241–250, 2008.
  10. 1 2 O. Khalid, S. U. Khan, S. A. Madani, K. Hayat, M. I. Khan, N. Min-Allah, J. Kolodziej, L. Wang, S. Zeadally, and D. Chen, "Comparative Study of Trust and Reputation Systems for Wireless Sensor Networks," Security and Communication Networks, 2012.
  11. S. U. Khan, "Mosaic-Net: A Game Theoretical Method for Selection and Allocation of Replicas in Ad Hoc Networks," Journal of Supercomputing, vol. 55, no. 3, pp. 321-366, 2011.
  12. O. Khalid, M. U. S. Khan, S. U. Khan, and A. Y. Zomaya, "OmniSuggest: A Ubiquitous Cloud based Context Aware Recommendation System for Mobile Social Networks," IEEE Transactions on Services Computing.
  13. 1 2 B. Han, P. Hui, V. Kumar, M. Marathe, J. Shao, and A. Srinivasan. Mobile data offloading through opportunistic communications and social participation. IEEE Transactions on Mobile Computing, (99)1:11, 2011.
  14. Yong Li, D. Jin, Z. Wang, P. Hui, L. Zeng, Sheng Chen. Multiple Mobile Data Offloading Through Disruption Tolerant Networks, IEEE Transactions on Mobile Computing, Vol. 13, No. 7, June 2014.
  15. A. Keränen, J. Ott, and T. Kärkkäinen, "The ONE simulator for DTN protocol evaluation," in Proc. of 2nd International Conference on Simulation Tools and Techniques, 2009, doi.10.4108.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.