Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 3/2020

06.01.2020

Community recombination and duplication node traverse algorithm in opportunistic social networks

verfasst von: Jia Wu, Zhigang Chen, Ming Zhao

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 3/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In social communication, mobile devices can be regarded as socialization nodes in opportunistic social networks. Furthermore, they can carry and store useful information. Mobile devices can select destination nodes and deliver messages through opportunistic social networks because messages can be securely and conveniently stored, carried, and transmitted with nodes. However, many communities in traditional methods, may deliver messages often depending on one or two nodes, such as messages exchange by two nodes in Epidemic algorithm, or messages are sprayed with node in Spray and Wait algorithm. If those nodes are not enough cache and over-flooding, data transmission in communities may wait for a long time. In this study, communities are recombined and then duplication nodes are filtered in our method. According to evaluate contribution by node and restructure community, deliver ratio and overhead can be improved in opportunistic networks. With satisfactory results from simulation and comparison with some existing algorithms, the average delivery ratio of new research method is 0.91, which is 30% higher than that of Epidemic algorithm; the end-to-end delay reduces 75% with Spray and wait algorithm.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Cheong M, Lee VCS (2011) A microblogging-based approach to terrorism informatics: exploration and chronicling civilian sentiment and response to terrorism events via Twitter. Inf Syst Front 13(13):45–59CrossRef Cheong M, Lee VCS (2011) A microblogging-based approach to terrorism informatics: exploration and chronicling civilian sentiment and response to terrorism events via Twitter. Inf Syst Front 13(13):45–59CrossRef
4.
Zurück zum Zitat Ristanovic N, Theodorakopoulos G, Le Boudec JY (2012) Traps and pitfalls of using contact traces in performance studies of opportunistic networks. NFOCOM, 2012 Proceedings IEEE. IEEE, 2012, pp 1377–1385 Ristanovic N, Theodorakopoulos G, Le Boudec JY (2012) Traps and pitfalls of using contact traces in performance studies of opportunistic networks. NFOCOM, 2012 Proceedings IEEE. IEEE, 2012, pp 1377–1385
7.
Zurück zum Zitat Mehak KKSAS (2014) Nature based trust security protocol against Greyhole attacks in opportunistic networks. Nature 1(3) Mehak KKSAS (2014) Nature based trust security protocol against Greyhole attacks in opportunistic networks. Nature 1(3)
8.
Zurück zum Zitat Yuan P, Wang W, Wang C (2015) Poster: an adaptive copy spraying scheme for data forwarding in mobile opportunistic networks. In: Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing. ACM, 2015, pp 377–378 Yuan P, Wang W, Wang C (2015) Poster: an adaptive copy spraying scheme for data forwarding in mobile opportunistic networks. In: Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing. ACM, 2015, pp 377–378
10.
Zurück zum Zitat Zhao D, Ma H, Tang S et al (2015) COUPON: a cooperative framework for building sensing maps in mobile opportunistic networks. IEEE Trans Parallel Distrib Syst 26(2):392–402CrossRef Zhao D, Ma H, Tang S et al (2015) COUPON: a cooperative framework for building sensing maps in mobile opportunistic networks. IEEE Trans Parallel Distrib Syst 26(2):392–402CrossRef
12.
Zurück zum Zitat Trifunovic S, Kurant M, Hummel KA et al (2014) Preventing spam in opportunistic networks. Comput Commun 41:31–42CrossRef Trifunovic S, Kurant M, Hummel KA et al (2014) Preventing spam in opportunistic networks. Comput Commun 41:31–42CrossRef
13.
Zurück zum Zitat Cheng H, Sun F, Buthpitiya S, Griss M (2012) SensOrchestra: collaborative sensing for symbolic location recognition. Mob Comput Appl Serv 76:195–210 Cheng H, Sun F, Buthpitiya S, Griss M (2012) SensOrchestra: collaborative sensing for symbolic location recognition. Mob Comput Appl Serv 76:195–210
14.
Zurück zum Zitat Toledano E, Sawaday D, Lippman A, Holtzman H, Casalegno F (2013) CoCam: a collaborative content sharing framework based on opportunistic P2P networking. In: Proceedings of the IEEE CCNC 2013, pp 158–163 Toledano E, Sawaday D, Lippman A, Holtzman H, Casalegno F (2013) CoCam: a collaborative content sharing framework based on opportunistic P2P networking. In: Proceedings of the IEEE CCNC 2013, pp 158–163
15.
Zurück zum Zitat Han B, Pan H, Kumar A (2012) Mobile data offloading through opportunistic communications and social participation. IEEE Trans Mob Comput 11(5):821–834CrossRef Han B, Pan H, Kumar A (2012) Mobile data offloading through opportunistic communications and social participation. IEEE Trans Mob Comput 11(5):821–834CrossRef
17.
Zurück zum Zitat Ra M, Liu B, Porta T, Govindan R. Medusa: a programming framework for crowd-sensing applications. In: Proceedings of the ACM MobiSys 2012, pp 337–350 Ra M, Liu B, Porta T, Govindan R. Medusa: a programming framework for crowd-sensing applications. In: Proceedings of the ACM MobiSys 2012, pp 337–350
21.
Zurück zum Zitat Menon VG, Prathap PJ (2016) Comparative analysis of opportunistic routing protocols for underwater acoustic sensor networks. In 2016 International Conference on Emerging Technological Trends (ICETT). IEEE, pp 1–5 Menon VG, Prathap PJ (2016) Comparative analysis of opportunistic routing protocols for underwater acoustic sensor networks. In 2016 International Conference on Emerging Technological Trends (ICETT). IEEE, pp 1–5
22.
Zurück zum Zitat Menon VG, Prathap J, J. (2016) Analyzing the behavior and performance of opportunistic routing protocols in highly mobile wireless ad hoc networks. Int J Eng Technol 8(5):1916–1924CrossRef Menon VG, Prathap J, J. (2016) Analyzing the behavior and performance of opportunistic routing protocols in highly mobile wireless ad hoc networks. Int J Eng Technol 8(5):1916–1924CrossRef
23.
Zurück zum Zitat Menon VG, Prathap J (2018) Vehicular fog computing: challenges applications and future directions. In: Fog computing: breakthroughs in research and practice. IGI global, pp 220–229 Menon VG, Prathap J (2018) Vehicular fog computing: challenges applications and future directions. In: Fog computing: breakthroughs in research and practice. IGI global, pp 220–229
24.
Zurück zum Zitat Wu XH, Gu XF, Poslad S (2016) Routing algorithm based on social relations in opportunistic networks. In: International Computer Conference on Wavelet Active Media Technology and Information Processing. IEEE, 2016, pp 146–149 Wu XH, Gu XF, Poslad S (2016) Routing algorithm based on social relations in opportunistic networks. In: International Computer Conference on Wavelet Active Media Technology and Information Processing. IEEE, 2016, pp 146–149
25.
Zurück zum Zitat Mayer JM, Hiltz SR, Barkhuus L et al (2016) Supporting opportunities for context-aware social matching: an experience sampling study. In: Conference on Human Factors in Computing Systems. ACM, 2016 Mayer JM, Hiltz SR, Barkhuus L et al (2016) Supporting opportunities for context-aware social matching: an experience sampling study. In: Conference on Human Factors in Computing Systems. ACM, 2016
26.
Zurück zum Zitat Nguyen P, Nahrstedt K (2016) Context-aware crowd-sensing in opportunistic mobile social networks. In: IEEE, International Conference on Mobile Ad Hoc and Sensor Systems. IEEE, 2016, pp 477–478 Nguyen P, Nahrstedt K (2016) Context-aware crowd-sensing in opportunistic mobile social networks. In: IEEE, International Conference on Mobile Ad Hoc and Sensor Systems. IEEE, 2016, pp 477–478
27.
Zurück zum Zitat Talipov E, Chon Y, Cha H (2015) User context-based data delivery in opportunistic smartphone networks. Pervasive Mob Comput 17:122’lC138CrossRef Talipov E, Chon Y, Cha H (2015) User context-based data delivery in opportunistic smartphone networks. Pervasive Mob Comput 17:122’lC138CrossRef
Metadaten
Titel
Community recombination and duplication node traverse algorithm in opportunistic social networks
verfasst von
Jia Wu
Zhigang Chen
Ming Zhao
Publikationsdatum
06.01.2020
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 3/2020
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-019-00833-0

Weitere Artikel der Ausgabe 3/2020

Peer-to-Peer Networking and Applications 3/2020 Zur Ausgabe