Opportunistic mobile social network explained

Opportunistic mobile social networks are a form of mobile ad hoc networks that exploit the human social characteristics, such as similarities, daily routines, mobility patterns, and interests to perform the message routing and data sharing.[1] [2] In such networks, the users with mobile devices are able to form on-the-fly social networks to communicate with each other and share data objects.[3]

Definition

In recent years, opportunistic mobile social networks emerged as a new mechanism of communications in wireless networks. Unlike mobile ad hoc networks (MANETs) that require end-to-end communication paths for message exchange, the communication in opportunistic mobile social networks takes place on the establishment of opportunistic contacts among mobile nodes, without availability of end-to-end message routing paths. As the mobile devices can make contact only when humans come into contact, such networks are tightly coupled with human social networks. Therefore, the opportunistic mobile social networks exploit the human behaviors and social relationships to build more efficient and trustworthy message dissemination schemes.[4]

Opportunism in social networks

The GSMA estimates that as of January 2019, more than 5 billion people worldwide use mobile phones.[5] That is more than half of the world's population. Most of the mobile phones in the current era are equipped with Wi-Fi, Bluetooth, cameras, sensors, and numerous other components. Moreover, most of the modern vehicles are also installed with communication interfaces and sensory equipment. Such a widespread use and availability of mobile communication devices create a huge number of contact opportunities among humans, and are key to the establishment of opportunistic mobile social networks.[6] The human mobility is the key factor in opportunistic communications, and there could be delays in message transfers as long as the humans carrying mobile devices do not come into each other's transmission range. Therefore, several research projects are conducted in various parts of the world to analyze the human mobility and social interaction patterns, and on the basis of that to build efficient message routing models that incur minimum message delays.[7]

Social metrics

The most common social metrics that are widely utilized to build message communications by exploiting social networks are betweenness centrality, degree centrality, and closeness centrality.[1] [2] The betweenness centrality measures the extent a node appears on the shortest communication paths (taken by messages) among the other mobile devices.[1] [2] In specific terms, betweenness centrality quantifies the extent of information flow through the current node on the behalf of other nodes. In contrast, degree centrality gives a measurement of the direct interactions of a node with other nodes in an opportunistic mobile social network.[1] [2] The closeness centrality is regarded as a measure of information spread time from a given node to the other nodes in the network.[1] [2] Bubble Rap[8] is a famous message routing scheme developed for opportunistic mobile social networks that exploits the aforementioned metrics to establish communications.

Challenges

Opportunistic mobile social networks face numerous challenges due to the frequent disruptions and delays, and intermittent connectivity environment. One of the major challenges is the insecure communication in such networks, as due to the distributed nature, it is not possible to utilize mature security mechanisms, such as cryptography that requires centralized trusted authorities.[9] Moreover, it is also difficult to maintain trust among the peer nodes due to the disconnected and decentralized environments.[9] Data related to the reputation of the participating entities can be exchanged between them in order to build robust trust scores.[10]

Applications

There are numerous applications of opportunistic mobile social networks, and more applications are evolving as the smartphone technology is advancing.

Opportunistic computing

Opportunistic computing utilize the shared resources, content, services, applications, and computing resources, by the devices connected in an opportunistic mobile social network, to provide a platform for the execution of distributed computing tasks.[11] However, opportunistic computing requires middleware services to cope with the intermittent connectivity and delay of the opportunistic communication environments. Also, participating entities need to be compensated and for that they should be able to negotiate the cost of opportunistic computing tasks and pay each other.[12]

Recommender systems

A novel application area of opportunistic mobile social networks is the recommender systems. Such systems track the user activities, mobility patterns, and utilize the user's contextual information to provide recommendations on variety of items.[13]

Mobile data offloading

An active area of research in the applications of opportunistic mobile social networks is the mobile data offloading. With large number of ever increasing smartphone users, most of the 3G networks are overloaded.[14] [15] Several research works are performed to utilize opportunistic mobile social networks in offloading of mobile data traffic to reduce the load on 3G networks.[14]

Simulators

There are numerous simulators available that are used to analyze and replay human mobility patterns extracted from the real traces collected through various experiments. Some simulators are capable of generating synthetic human mobility patterns, as well as can simulate real traces; a few examples are given below:

ONE

ONE is a Java-based simulator, and supports the simulation of realistic and synthetic mobility patterns. ONE simulator has many rich features for simulating opportunistic mobile social networks.[16]

LEPTON

LEPTON is a lightweight emulation platform for opportunistic networking systems. Like many simulators it can simulate the mobility of nodes based on synthetic models or real-world traces, and drive the communication between these nodes accordingly. Being an emulator, though, it makes it possible to run for each node a full-featured instance of an existing opportunistic networking system (such as DoDWAN, IBRDTN, or aDTN for example).[17]

Notes and References

  1. Nikolaos Vastardis and Kun Yang, "Mobile Social Networks: Architectures, Social Properties, and Key Research Challenges," IEEE Communications Surveys and Tutorials, vol. 15, no. 3, 2013, pp. 1355.
  2. Behrouz Jedari and Feng Xia, "A Survey on Routing and Data Dissemination in Opportunistic Mobile Social Networks," https://arxiv.org/abs/1311.0347
  3. O. Khalid, S. U. Khan, S. A. Madani, K. Hayat, L. Wang, D. Chan, and R. Ranjan, "Opportunistic Databank: A Context-aware on-the-fly Data Center for Mobile Networks," in Handbook on Data Centers, S. U. Khan and A. Y. Zomaya, Eds., Springer-Verlag, New York, US.
  4. J. Kolodziej, S. U. Khan, L. Wang, N. Min-Allah, S. A. Madani, N. Ghani, and H. Li, "An Application of Markov Jump Process Model for Activity-Based Indoor Mobility Prediction in Wireless Networks," in 9th IEEE International Conference on Frontiers of Information Technology (FIT), Islamabad, Pakistan, December 2011, pp. 51-56.
  5. Web site: GSMA Intelligence data . . 24 January 2019 . https://web.archive.org/web/20190310035408/https://www.gsmaintelligence.com/ . 10 March 2019 . dead .
  6. O. Khalid, S. U. Khan, J. Kolodziej, L. Zhang, J. Li, K. Hayat, S. A. Madani, L. Wang, and D. Chen, "A Checkpoint Based Message Forwarding Approach for Opportunistic Communication," in 26th European Conference on Modeling and Simulation (ECMS), Koblenz, Germany, May 2012, pp. 512-518.
  7. Web site: Google Code Archive - Long-term storage for Google Code Project Hosting.. code.google.com.
  8. P. Hui, J. Crowcroft, and E. Yoneki. Bubble rap: social-based forwarding in delay tolerant networks. Proc. MobiHoc, pages 241–250, 2008.
  9. O. Khalid, S. U. Khan, S. A. Madani, K. Hayat, M. I. Khan, N. Min-Allah, J. Kolodziej, L. Wang, S. Zeadally, and D. Chen, "Comparative Study of Trust and Reputation Systems for Wireless Sensor Networks," Security and Communication Networks, 2012.
  10. D. Chatzopoulos, M. Ahmadi, S. Kosta and P. Hui, "OPENRP: a reputation middleware for opportunistic crowd computing," in IEEE Communications Magazine, vol. 54, no. 7, pp. 115-121, July 2016.doi: 10.1109/MCOM.2016.7509388.
  11. S. U. Khan, "Mosaic-Net: A Game Theoretical Method for Selection and Allocation of Replicas in Ad Hoc Networks," Journal of Supercomputing, vol. 55, no. 3, pp. 321-366, 2011.
  12. D. Chatzopoulos, M. Ahmadi, S. Kosta and P. Hui, "FlopCoin: A Cryptocurrency for Computation Offloading," in IEEE Transactions on Mobile Computing, doi: 10.1109/TMC.2017.2748133.
  13. O. Khalid, M. U. S. Khan, S. U. Khan, and A. Y. Zomaya, "OmniSuggest: A Ubiquitous Cloud based Context Aware Recommendation System for Mobile Social Networks," IEEE Transactions on Services Computing.
  14. B. Han, P. Hui, V. Kumar, M. Marathe, J. Shao, and A. Srinivasan. Mobile data offloading through opportunistic communications and social participation. IEEE Transactions on Mobile Computing, (99)1:11, 2011.
  15. Yong Li, D. Jin, Z. Wang, P. Hui, L. Zeng, Sheng Chen. Multiple Mobile Data Offloading Through Disruption Tolerant Networks, IEEE Transactions on Mobile Computing, Vol. 13, No. 7, June 2014.
  16. A. Keränen, J. Ott, and T. Kärkkäinen, "The ONE simulator for DTN protocol evaluation," in Proc. of 2nd International Conference on Simulation Tools and Techniques, 2009, doi.10.4108.
  17. Adrián Sánchez-Carmona, Frédéric Guidec, Pascale Launay, Yves Mahéo, Sergi Robles, "Filling in the Missing Link between Simulation and Application in Opportunistic Networking", in Journal of Systems and Software, Elsevier, 2018, 142, pp.57 – 72, doi.10.1016.