• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations | Disambiguate

Social network analysis for routing in disconnected delay-tolerant manets, (2007)

by E Daly, M Haahr
Venue:Proc. ACM MobiHoc,
Add To MetaCart

Tools

Sorted by:
Results 1 - 10 of 276
Next 10 →

BUBBLE Rap: Social-based forwarding in delay tolerant networks

by Pan Hui, Jon Crowcroft, Eiko Yoneki - in Proc. ACM MobiHoc , 2008
"... In this paper we seek to improve our understanding of human mobility in terms of social structures, and to use these structures in the design of forwarding algorithms for Pocket Switched Networks (PSNs). Taking human mobility traces from the real world, we discover that human interaction is heteroge ..."
Abstract - Cited by 284 (31 self) - Add to MetaCart
In this paper we seek to improve our understanding of human mobility in terms of social structures, and to use these structures in the design of forwarding algorithms for Pocket Switched Networks (PSNs). Taking human mobility traces from the real world, we discover that human interaction is heterogeneous both in terms of hubs (popular individuals) and groups or communities. We propose a social based forwarding algorithm, BUBBLE, which is shown empirically to improve the forwarding efficiency significantly compared to oblivious forwarding schemes and to PROPHET algorithm. We also show how this algorithm can be implemented in a distributed way, which demonstrates that it is applicable in the decentralised environment of PSNs.
(Show Context)

Citation Context

...ifferent approach by controlling the movement of each node. Recent attempts to uncover a hidden stable network structure in DTNs such as social networks have been emerged. For example, SimBet Routing =-=[3]-=- uses ego-centric centrality and its social similarity. Messages are forwarded towards the node with higher centrality to increase the possibility of finding the potential carrier to the final destina...

Socially-Aware Routing for Publish-Subscribe in Delay-Tolerant Mobile Ad Hoc Networks

by Paolo Costa, Cecilia Mascolo, Mirco Musolesi, Gian Pietro Picco
"... Abstract—Applications involving the dissemination of information directly relevant to humans (e.g., service advertising, news spreading, environmental alerts) often rely on publish-subscribe, in which the network delivers a published message only to the nodes whose subscribed interests match it. In ..."
Abstract - Cited by 94 (3 self) - Add to MetaCart
Abstract—Applications involving the dissemination of information directly relevant to humans (e.g., service advertising, news spreading, environmental alerts) often rely on publish-subscribe, in which the network delivers a published message only to the nodes whose subscribed interests match it. In principle, publishsubscribe is particularly useful in mobile environments, since it minimizes the coupling among communication parties. However, to the best of our knowledge, none of the (few) works that tackled publish-subscribe in mobile environments has yet addressed intermittently-connected human networks. Socially-related people tend to be co-located quite regularly. This characteristic can be exploited to drive forwarding decisions in the interest-based routing layer supporting the publish-subscribe network, yielding not only improved performance but also the ability to overcome high rates of mobility and long-lasting disconnections. In this paper we propose SocialCast, a routing framework for publish-subscribe that exploits predictions based on metrics of social interaction (e.g., patterns of movements among communities) to identify the best information carriers. We highlight the principles underlying our protocol, illustrate its operation, and evaluate its performance using a mobility model based on a social network validated with real human mobility traces. The evaluation shows that prediction of colocation and node mobility allow for maintaining a very high and steady event delivery with low overhead and latency, despite the variation in density, number of replicas per message or speed. Index Terms— I.
(Show Context)

Citation Context

...ile ad hoc networks founded on social network concepts is SOLAR [31] that exploits macromobility patterns between groups of nodes that are detected using machine learning techniques. More recently in =-=[32]-=- the authors use social network analysis to extract communities ties among the individuals carrying the devices. This a priori knowledge of the structure of the underlying social network is then used ...

Delegation Forwarding

by Vijay Erramilli, Mark Crovella, Augustin Chaintreau, Christophe Diot , 2008
"... ..."
Abstract - Cited by 91 (2 self) - Add to MetaCart
Abstract not found
(Show Context)

Citation Context

...it encounters another node that has seen the destination more recently; greedy-total [11] in which a node will forward if it encounters nodes with a higher contact rate than itself and SimBet routing =-=[8]-=- which relies on a metric calculated using social analysis techniques. In essence, most algorithms try to select good intermediate nodes for forwarding using only local information while endeavoring t...

Optimal and scalable distribution of content updates over a mobile social network

by Stratis Ioannidis, Augustin Chaintreau, Laurent Massoulie - In Proc. IEEE INFOCOM , 2009
"... Number: CR-PRL-2008-08-0001 ..."
Abstract - Cited by 81 (9 self) - Add to MetaCart
Number: CR-PRL-2008-08-0001

Routing in Socially Selfish Delay Tolerant Networks

by Qinghua Li, Sencun Zhu, Guohong Cao
"... Abstract—Existing routing algorithms for Delay Tolerant Networks (DTNs) assume that nodes are willing to forward packets for others. In the real world, however, most people are socially selfish; i.e., they are willing to forward packets for nodes with whom they have social ties but not others, and s ..."
Abstract - Cited by 67 (8 self) - Add to MetaCart
Abstract—Existing routing algorithms for Delay Tolerant Networks (DTNs) assume that nodes are willing to forward packets for others. In the real world, however, most people are socially selfish; i.e., they are willing to forward packets for nodes with whom they have social ties but not others, and such willingness varies with the strength of the social tie. Following the philosophy of design for user, we propose a Social Selfishness Aware Routing (SSAR) algorithm to allow user selfishness and provide better routing performance in an efficient way. To select a forwarding node, SSAR considers both users ’ willingness to forward and their contact opportunity, resulting in a better forwarding strategy than purely contact-based approaches. Moreover, SSAR formulates the data forwarding process as a Multiple Knapsack Problem with Assignment Restrictions (MKPAR) to satisfy user demands for selfishness and performance. Trace-driven simulations show that SSAR allows users to maintain selfishness and achieves better routing performance with low transmission cost. I.
(Show Context)

Citation Context

...m other wireless networks. For example, since an end-to-end connection is hard to setup, store-carry-andforward is used to deliver the packets to the destination. Although many routing algorithms [2]–=-=[7]-=- have been proposed to increase data delivery reliability, they are purely based on contact opportunity; i.e., they are designed without considering users’ willingness and implicitly assume that all n...

MobiClique: Middleware for Mobile Social Networking

by Anna-kaisa Pietiläinen, George Varghese, Earl Oliver, Jason Lebrun, Christophe Diot
"... We consider a mobile ad hoc network setting where Bluetooth enabled mobile devices communicate directly with other devices as they meet opportunistically. We design and implement a novel mobile social networking middleware named MobiClique. MobiClique forms and exploits ad hoc social networks to dis ..."
Abstract - Cited by 65 (5 self) - Add to MetaCart
We consider a mobile ad hoc network setting where Bluetooth enabled mobile devices communicate directly with other devices as they meet opportunistically. We design and implement a novel mobile social networking middleware named MobiClique. MobiClique forms and exploits ad hoc social networks to disseminate content using a store-carry-forward technique. Our approach distinguishes itself from other mobile social software by removing the need for a central server to conduct exchanges, by leveraging existing social networks to bootstrap the system, and by taking advantage of the social network overlay to disseminate content. We also propose an open API to encourage third-party application development. We discuss the system architecture and three example applications. We show experimentally that MobiClique successfully builds and maintains an ad hoc social network leveraging contact opportunities between friends and people sharing interest(s) for content exchanges. Our experience also provides insight into some of the key challenges and short-comings that researchers face when designing and deploying similar systems.
(Show Context)

Citation Context

...constant availability of centralized servers. Social networking in the context of opportunistic communications has been studied mainly to build efficient forwarding algorithms. Several recent studies =-=[9, 5, 3]-=- propose to use various properties of the social graph such as node centrality and community structures to make efficient forwarding decisions. MobiClique is an ideal environment to deploy and test th...

Measuring the mixing time of social graphs

by Abedelaziz Mohaisen, Aaram Yun, Yongdae Kim , 2010
"... Social networks provide interesting algorithmic properties that can be used to bootstrap the security of distributed systems. For example, it is widely believed that social networks are fast mixing, and many recently proposed designs of such systems make crucial use of this property. However, whethe ..."
Abstract - Cited by 59 (11 self) - Add to MetaCart
Social networks provide interesting algorithmic properties that can be used to bootstrap the security of distributed systems. For example, it is widely believed that social networks are fast mixing, and many recently proposed designs of such systems make crucial use of this property. However, whether real-world social networks are really fast mixing is not verified before, and this could potentially affect the performance of such systems based on the fast mixing property. To address this problem, we measure the mixing time of several social graphs, the time that it takes a random walk on the graph to approach the stationary distribution of that graph, using two techniques. First, we use the second largest eigenvalue modulus which bounds the mixing time. Second, we sample initial distributions and compute the random walk length required to achieve probability distributions close to the stationary distribution. Our findings show that the mixing time of social graphs is much larger than anticipated, and being used in literature, and this implies that either the current security systems based on fast mixing have weaker utility guarantees or have to be less efficient, with less security guarantees, in order to compensate for the slower mixing.
(Show Context)

Citation Context

...he path between other nodes in the graph, for building Sybil defense as well [19]. There are also designs which use betweenness and similarity for building routing algorithms in disconnected networks =-=[2]-=-, among many other designs based on different assumptions. The applicability and effectiveness of these designs are critically dependent on the quality or degree of these properties in underlying soci...

Social Network Analysis for Information Flow in Disconnected Delay-Tolerant MANETs

by Elizabeth M. Daly, Mads Haahr
"... Abstract—Message delivery in sparse mobile ad hoc networks (MANETs) is difficult due to the fact that the network graph is rarely (if ever) connected. A key challenge is to find a route that can provide good delivery performance and low end-to-end delay in a disconnected network graph where nodes ma ..."
Abstract - Cited by 58 (0 self) - Add to MetaCart
Abstract—Message delivery in sparse mobile ad hoc networks (MANETs) is difficult due to the fact that the network graph is rarely (if ever) connected. A key challenge is to find a route that can provide good delivery performance and low end-to-end delay in a disconnected network graph where nodes may move freely. We cast this challenge as an information flow problem in a social network. This paper presents social network analysis metrics that may be used to support a novel and practical forwarding solution to provide efficient message delivery in disconnected delay-tolerant MANETs. These metrics are based on social analysis of a node’s past interactions and consists of three locally evaluated components: a node’s “betweenness ” centrality (calculated using ego networks), a node’s social “similarity ” to the destination node, and a node’s tie strength relationship with the destination node. We present simulations using three real trace data sets to demonstrate that by combining these metrics delivery performance may be achieved close to Epidemic Routing but with significantly reduced overhead. Additionally, we show improved performance when compared to PRoPHET Routing. Index Terms—Delay- and disruption-tolerant networks, MANETs, sparse networks, ego networks, social network analysis.
(Show Context)

Citation Context

...l network analysis techniques in order to exploit the underlying social structure in order to provide information flow from source to destination in a DDTM which extends on the authors’ previous work =-=[10]-=-. The remainder of this paper is organized as follows: Section II reviews related work in the area of message delivery in disconnected networks. Section III examines network theory that may be applied...

User-Centric Data Dissemination in Disruption Tolerant Networks

by Wei Gao, Guohong Cao
"... Abstract—Data dissemination is useful for many applications ..."
Abstract - Cited by 41 (13 self) - Add to MetaCart
Abstract—Data dissemination is useful for many applications

PeopleRank: Social Opportunistic Forwarding

by Abderrahmen Mtibaa, Martin May, Christophe Diot, Mostafa Ammar
"... In opportunistic networks, end-to-end paths between two communicating nodes are rarely available. In such situations, the nodes might still copy and forward messages to nodes that are more likely to meet the destination. The question is which forwarding algorithm offers the best trade off between co ..."
Abstract - Cited by 31 (7 self) - Add to MetaCart
In opportunistic networks, end-to-end paths between two communicating nodes are rarely available. In such situations, the nodes might still copy and forward messages to nodes that are more likely to meet the destination. The question is which forwarding algorithm offers the best trade off between cost (number of message replicas) and rate of successful message delivery. We address this challenge by developing the PeopleRank approach in which nodes are ranked using a tunable weighted social information. Similar to the PageRank idea, PeopleRank gives higher weight to nodes if they are socially connected to other important nodes of the network. We develop centralized and distributed variants for the computation of PeopleRank. We present an evaluation using real mobility traces of nodes and their social interactions to show that PeopleRank manages to deliver messages with near optimal success rate (i.e., close to Epidemic Routing) while reducing the number of message retransmissions by 50 % compared to Epidemic Routing. I.
(Show Context)

Citation Context

...ntacts with other devices [3], [4], [1], [12], [10], information about device mobility patterns [16], or, most relevant to this work, information about the social interaction between the participants =-=[7]-=-, [11], [14]. Those latter ones implicitly assume that the opportunistic contacts relate with the social property used to design the algorithms. In this paper, we develop a systematic approach to the ...

Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University