Exploiting social paradigms as routing strategies in Delay Tolerant Networks: an introduction

8

Click here to load reader

description

The article illustrates several approaches developed in literature that exploit social paradigms to improve the routing in Delay Tolerant Networks (DTNs). Moreover, it gives an overview on the mobility models adopted, focusing the attention to those ones useful in opportunistic networks.

Transcript of Exploiting social paradigms as routing strategies in Delay Tolerant Networks: an introduction

Page 1: Exploiting social paradigms as routing strategies in Delay Tolerant Networks: an introduction

Exploiting social paradigms as routingstrategies in Delay Tolerant Networks:

an introduction

Claudio [email protected]

August 27, 2012

Abstract

The article illustrates several approaches developed in literaturethat exploit social paradigms to improve the routing in Delay TolerantNetworks (DTNs). Moreover, it gives an overview on the mobility mod-els adopted, focusing the attention to those ones useful in opportunisticnetworks.

Contents

1 Motivations 1

2 The strategies developed 22.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22.2 The analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2

2.2.1 Mobility models . . . . . . . . . . . . . . . . . . . . . 22.2.2 Routing strategies . . . . . . . . . . . . . . . . . . . . 3

Bibliography 5

1 Motivations

The application of social paradigms to DTNs it is a very well known conceptin literature and researchers largely explored this field by developing a lot ofdifferent algorithms and strategies.

The basic idea behind all, is to exploit social relations to identify humanmobility patterns; as result, socially-aware algorithms achieve better perfor-mances than non-socially-aware algorithms since to spread the informationby means of social paradigms allow to be fast (thus latency is reduced) and

1

Page 2: Exploiting social paradigms as routing strategies in Delay Tolerant Networks: an introduction

to increase the delivery ratio with a lower cost (in terms of the number ofmessage replicas).

The detection of human mobility pattern is a fundamental part since ithas been noticed that people tend to meet frequently when they have interestin common in physical places as streets, squares, conferences, etc . . . In [29]authors proved this concept by highlighting the relations between the socialgraph and the contact graph.

2 The strategies developed

2.1 Introduction

A survey on the various social approaches already used in literature is givenin [12]: in this section, a better picture of the state of the art is provided byenhancing [12].

2.2 The analysis

2.2.1 Mobility models

Some experiments to study human relations and to build social traces weredone with the help of volunteers at conferences [20] or in a campus [38].More deeply, [38] proves that the user mobility form a network. However,this studies consider just a small number of individuals. Other studies as[33, 22, 14] rely on traces already available in the Internet that contains thecontact history of taxicabs while [37] takes into account the mobility patternsof 22 341 students to efficiently design aggregation algorithms. Furthermore,the Haggle Project [40] creates a DTN by connecting human mobile devices.

In [36] authors propose a community model able to characterize the real-life mobility features. Based on this concept, [28] shows that the separationof people into two groups, friends and strangers, allows to improve the routingperformances. Moreover, they try to address security issues and they showthat people encounters have daily and weekly cycles. An improvement ofthis work has been shown in [42]; individuals, here, are divided into fourgroups: familiar, familiar stranger, friends and strangers.

Similarly to [37], [9] analysed the human mobility: their contribute is theproof that the distribution of contact and inter-contact times follow a power-law distribution with heavy-tail. On this bases, [31] developed community-based mobility models (CMM), showing that they present contact times andinter-contact times heavy-tailed. Another mobility model is presented in [13]and this model tries to mimic the behaviour of the average person. Foundedon social networks theory, authors in [32] provide an interesting mobilitymodel: individual are grouped together based on their social-relationship

2

Page 3: Exploiting social paradigms as routing strategies in Delay Tolerant Networks: an introduction

and groups are mapped on a topographical space. They also forecast thatsocial-relationship may change over time.

How mobility models affect routing performances has been studied in[2]; the analysis is based on groups and the conclusion is that social-awarerouting schemes reduces congestion and provide acceptable QoS with loweroverhead.

Some other studies rely on simplistic random mobility models (RandomWalk, Random Way Point) and they try to address problems like:

• single-copy based routing algorithms [25, 21, 8, 35];

• multi-copy based routing algorithms [34, 5];

• erasure coding based routing algorithms (they allow the use of a largenumber of relays while maintaining a constant overhead) [41, 6].

However, [9] proved that these mobility models are not suitable for DTNssince they do not have heavy-tailed distributed contact times and inter-contact times.

A work that exploits the history of the social relations among users is[3]. The developed algorithm, HiBOp, automatically learns which are themost efficient connectivity opportunities that are based on users’ movementpatterns.

2.2.2 Routing strategies

Now algorithms that try to detect which are the best individuals to forwardthe information to will be analysed.

PRoPHET [24] makes routing decision based on the delivery probability,a paradigm in which last encountered are more relevant as individuals toforward the information to. Due to this reason, it is possible to claim thatPRoPHET uses an indirect social metric because, usually, social-connectedindividuals meet themselves more frequently. SimBet [11] introduces twonew paradigms: similarity and betweenness. The former measures how twonodes are socially closed each other by comparing their mutual contacts whilethe latter estimates the centrality of a node, that is how much it is importantin the network. Bubble rap [19] uses as paradigms community and centrality:they measure the relevance of an individual locally and in a global fashionrespectively. The routing strategy forecast that messages are forwarded toindividuals with high global popularity until it is reached the destinationcommunity; once there, messages are forwarded to the individual withhighest local popularity because it has more change to get in contact withthe recipient. PeopleRank [30] takes inspiration from the famous PageRankto detect the best individual to which data is forwarded.

In [17] authors proved that the performances of SimBet and Bubble rapheavily depends on the way in which the contact aggregation (mapping) has

3

Page 4: Exploiting social paradigms as routing strategies in Delay Tolerant Networks: an introduction

been done. The same author in [18] propose a new mapping algorithm tocope previous issues that builds better contact-graphs based on concepts ofspectral graph theory and unsupervised learning.

SimBet, Bubble rap and PeopleRank look at the single individual; adifferent approach has been taken from authors of [7]: they consider theaverage inter-meeting times between groups of nodes.

Other community-based approaches are DelQue [15] and [23] in whichauthors present a distributed algorithm, LocalCom, that utilizes local informa-tion to detect communities. Moreover, they developed two schemes able tofacilitate the forwarding by control the redundancy of gateway that connectcommunities.

SimBet, Bubble rap and LocalCom are unicast algorithms. A multicastone has been proposed by [16].

Another algorithm is “SMART” [39]: it bases its own forwarding strategyon the so called travel companions, individuals that more frequently meetthe destination. In the first phase, a fixed number of copies of the messageare injected in the network destined to a travel companion and in the secondphase, the travel companion forwards the message to the destination (if met)or to a fixed number of other travel companions.

In [4] authors introduce a different routing algorithm. They defined anew social metric that does not rely on the encounter frequency, total oraverage contact period, but it takes into account contemporaneously thefollowing features: frequency, longevity and regularity. Friendship, therefore,is ensured when two individuals get in contact with frequently, for a longperiod each time and regularly. Notice that frequency and regularity here aredifferent: two individuals that get in contact with regularly during months,but unfrequently (once a month for example) should still be consideredfriends (in a weaker fashion). The three properties form the so called SocialPressure Metric (SPM): it measure how much an individual is motivated toshare contents with others.

In [10] is proposed SocialCast, an interest-based routing algorithm. Thebasic paradigm is publish/subscribing: the publisher simply inject the messageinto the network and it will be delivered just to nodes that previously declaredto be interested in (subscription phase). The algorithm relies on the fact thatsocially-related people tend to be co-located regularly and this allows to makereasonable predictions to select good carries. This approach allows to infer aone-to-many communication paradigm without extracting community tiesamong the individuals. SocialCast allows, with a small number of replicas inthe system, to achieve a very high delivery ratio by keeping the same networktraffic of a non-predictive algorithm. Still related to the publish/subscribingparadigm are Still related to the publish/subscribing paradigm are [43], [44]and [26].

Another work of this kind and that exploits social relationship to transmitmessages is [1] with the ContentPlace framework. When a node gets in

4

Page 5: Exploiting social paradigms as routing strategies in Delay Tolerant Networks: an introduction

contact with another one, it advertises the data object it is interested inand exchanges summaries of the data object it holds. Since each objecthas an utility value, individuals can decide where to place their object (thepublisher can decide the direction and the propagation range) such that theiravailability for the whole network is maximize.

The above strategies are “stateful” strategie, that is the improvement ofperformances comes at the cost of knowing information like past encountersor portion of the social network graph. In [27] authors provide an approachin which they model individuals’ interests in m-dimensional interest spaceand they create individuals’ interest profiles, that are m-dimensional vectorscorresponding to a point in the interest space. The forwarding is based onthe similarity of the individuals’ interest profiles.

References

[1] C. Boldrini, M. Conti, and A. Passarella. “ContentPlace: social-awaredata dissemination in opportunistic networks”. In: Proceedings of the11th international symposium on Modeling, analysis and simulation ofwireless and mobile systems. ACM. 2008, pp. 203–210.

[2] C. Boldrini, M. Conti, and A. Passarella. “Impact of social mobilityon routing protocols for opportunistic networks”. In: World of Wire-less, Mobile and Multimedia Networks, 2007. WoWMoM 2007. IEEEInternational Symposium on a. IEEE. 2007, pp. 1–6.

[3] C. Boldrini et al. “Hibop: a history based routing protocol for op-portunistic networks”. In: World of Wireless, Mobile and MultimediaNetworks, 2007. WoWMoM 2007. IEEE International Symposium on a.IEEE. 2007, pp. 1–12.

[4] E. Bulut and B.K. Szymanski. “Friendship based routing in delaytolerant mobile social networks”. In: GLOBECOM 2010, 2010 IEEEGlobal Telecommunications Conference. IEEE. 2010, pp. 1–5.

[5] E. Bulut, Z. Wang, and B.K. Szymanski. “Cost-effective multiperiodspraying for routing in delay-tolerant networks”. In: IEEE/ACM Trans-actions on Networking (TON) 18.5 (2010), pp. 1530–1543.

[6] E. Bulut, Z. Wang, and B.K. Szymanski. “Cost Efficient Erasure Codingbased Routing in Delay Tolerant Networks”. In: Communications (ICC),2010 IEEE International Conference on. IEEE. 2010, pp. 1–5.

[7] E. Bulut, Z. Wang, and B.K. Szymanski. “Impact of social networkson delay tolerant routing”. In: Global Telecommunications Conference,2009. GLOBECOM 2009. IEEE. IEEE. 2009, pp. 1–6.

5

Page 6: Exploiting social paradigms as routing strategies in Delay Tolerant Networks: an introduction

[8] J. Burgess et al. “Maxprop: Routing for vehicle-based disruption-tolerant networks”. In: Proc. ieee infocom. Vol. 6. Barcelona, Spain.2006, pp. 1–11.

[9] A. Chaintreau et al. “Impact of human mobility on opportunisticforwarding algorithms”. In: Mobile Computing, IEEE Transactions on6.6 (2007), pp. 606–620.

[10] P. Costa et al. “Socially-aware routing for publish-subscribe in delay-tolerant mobile ad hoc networks”. In: Selected Areas in Communica-tions, IEEE Journal on 26.5 (2008), pp. 748–760.

[11] E.M. Daly and M. Haahr. “Social network analysis for routing indisconnected delay-tolerant manets”. In: Proceedings of the 8th ACMinternational symposium on Mobile ad hoc networking and computing.ACM. 2007, pp. 32–40.

[12] RJ D’souza and J. Jose. “Routing approaches in delay tolerant net-works: A survey”. In: International Journal of Computer ApplicationsIJCA 1.17 (2010), pp. 9–15.

[13] F. Ekman et al. “Working day movement model”. In: Proceeding ofthe 1st ACM SIGMOBILE workshop on Mobility models. ACM. 2008,pp. 33–40.

[14] F. Fabbri and R. Verdone. “A sociability-based routing scheme for delay-tolerant networks”. In: EURASIP Journal on Wireless Communicationsand Networking 2011 (2011), p. 1.

[15] J. Fan et al. “DelQue: A Socially-Aware Delegation Query Scheme inDelay Tolerant Networks”. In: Vehicular Technology, IEEE Transactionson 99 (2011), pp. 1–1.

[16] W. Gao et al. “Multicasting in delay tolerant networks: a social networkperspective”. In: Proceedings of the tenth ACM international symposiumon Mobile ad hoc networking and computing. ACM. 2009, pp. 299–308.

[17] T. Hossmann, F. Legendre, and T. Spyropoulos. “From contacts tographs: Pitfalls in using complex network analysis for dtn routing”. In:INFOCOM Workshops 2009, IEEE. IEEE. 2009, pp. 1–6.

[18] T. Hossmann, T. Spyropoulos, and F. Legendre. “Know thy neighbor:Towards optimal mapping of contacts to social graphs for dtn routing”.In: INFOCOM, 2010 Proceedings IEEE. IEEE. 2010, pp. 1–9.

[19] P. Hui, J. Crowcroft, and E. Yoneki. “Bubble rap: social-based for-warding in delay tolerant networks”. In: Proceedings of the 9th ACMinternational symposium on Mobile ad hoc networking and computing.ACM. 2008, pp. 241–250.

6

Page 7: Exploiting social paradigms as routing strategies in Delay Tolerant Networks: an introduction

[20] P. Hui et al. “Pocket switched networks and human mobility in con-ference environments”. In: Proceedings of the 2005 ACM SIGCOMMworkshop on Delay-tolerant networking. ACM. 2005, pp. 244–251.

[21] S. Jain, K. Fall, and R. Patra. Routing in a delay tolerant network.Vol. 34. 4. ACM, 2004.

[22] J.G. Jetcheva et al. CRAWDAD data set rice ad hoc city (v. 2003-09-11).2003.

[23] F. Li and J. Wu. “LocalCom: a community-based epidemic forwardingscheme in disruption-tolerant networks”. In: Sensor, Mesh and Ad HocCommunications and Networks, 2009. SECON’09. 6th Annual IEEECommunications Society Conference on. IEEE. 2009, pp. 1–9.

[24] A. Lindgren, A. Doria, and O. Schelén. “Probabilistic routing in inter-mittently connected networks”. In: ACM SIGMOBILE Mobile Computingand Communications Review 7.3 (2003), pp. 19–20.

[25] A. Lindgren, A. Doria, and O. Schelen. “Probabilistic routing in inter-mittently connected networks”. In: Service Assurance with Partial andIntermittent Resources (2004), pp. 239–254.

[26] N. Liu et al. “A community-based event delivery protocol in pub-lish/subscribe systems for delay tolerant sensor networks”. In: Sensors9.10 (2009), pp. 7580–7594.

[27] A. Mei et al. “Social-aware stateless forwarding in pocket switchednetworks”. In: INFOCOM, 2011 Proceedings IEEE. IEEE. 2011, pp. 251–255.

[28] A.G. Miklas et al. “Exploiting social interactions in mobile systems”. In:Proceedings of the 9th international conference on Ubiquitous computing.Springer-Verlag. 2007, pp. 409–428.

[29] A. Mtibaa et al. “Are you moved by your social network application?”In: Proceedings of the first workshop on Online social networks. ACM.2008, pp. 67–72.

[30] A. Mtibaa et al. “Peoplerank: Social opportunistic forwarding”. In:INFOCOM, 2010 Proceedings IEEE. IEEE. 2010, pp. 1–5.

[31] M. Musolesi and C. Mascolo. “A community based mobility modelfor ad hoc network research”. In: Proceedings of the 2nd internationalworkshop on Multi-hop ad hoc networks: from theory to reality. ACM.2006, pp. 31–38.

[32] M. Musolesi and C. Mascolo. “Designing mobility models based onsocial network theory”. In: ACM SIGMOBILE Mobile Computing andCommunications Review 11.3 (2007), pp. 59–70.

[33] M. Piorkowski, N. Sarafijanovic-Djukic, and M. Grossglauser. CRAW-DAD data set epfl/mobility (v. 2009-02-24). 2009.

7

Page 8: Exploiting social paradigms as routing strategies in Delay Tolerant Networks: an introduction

[34] T. Spyropoulos, K. Psounis, and C.S. Raghavendra. “Efficient routingin intermittently connected mobile networks: the multiple-copy case”.In: Networking, IEEE/ACM Transactions on 16.1 (2008), pp. 77–90.

[35] T. Spyropoulos, K. Psounis, and C.S. Raghavendra. “Efficient routing inintermittently connected mobile networks: The single-copy case”. In:IEEE/ACM Transactions on Networking (TON) 16.1 (2008), pp. 63–76.

[36] T. Spyropoulos, K. Psounis, and C.S. Raghavendra. “Performance anal-ysis of mobility-assisted routing”. In: Proceedings of the 7th ACM inter-national symposium on Mobile ad hoc networking and computing. ACM.2006, pp. 49–60.

[37] V. Srinivasan, M. Motani, and W.T. Ooi. “Analysis and implications ofstudent contact patterns derived from campus schedules”. In: Proceed-ings of the 12th annual international conference on Mobile computingand networking. ACM. 2006, pp. 86–97.

[38] J. Su et al. “User mobility for opportunistic ad-hoc networking”. In:Mobile Computing Systems and Applications, 2004. WMCSA 2004. SixthIEEE Workshop on. IEEE. 2004, pp. 41–50.

[39] L. Tang et al. “Smart: a selective controlled-flooding routing for delaytolerant networks”. In: Broadband Communications, Networks andSystems, 2007. BROADNETS 2007. Fourth International Conference on.IEEE. 2007, pp. 356–365.

[40] The Haggle Project. 2006. URL: http://www.haggleproject.org/.

[41] Y. Wang et al. “Erasure-coding based routing for opportunistic net-works”. In: Proceedings of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking. ACM. 2005, pp. 229–236.

[42] E. Yoneki, P. Hui, and J. Crowcroft. “Visualizing community detectionin opportunistic networks”. In: Proceedings of the second ACM workshopon Challenged networks. ACM. 2007, pp. 93–96.

[43] E. Yoneki et al. “A socio-aware overlay for publish/subscribe commu-nication in delay tolerant networks”. In: Proceedings of the 10th ACMSymposium on Modeling, analysis, and simulation of wireless and mobilesystems. ACM. 2007, pp. 225–234.

[44] Y. Zhao and J. Wu. “Socially-Aware Publish/Subscribe System forHuman Networks”. In: Wireless Communications and Networking Con-ference (WCNC), 2010 IEEE. IEEE. 2010, pp. 1–6.

8