skip to main content
10.1145/2348656.2348662acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
research-article

Could human intelligence enhance communication opportunities in mission-oriented opportunistic networks?

Published:26 August 2012Publication History

ABSTRACT

Mission-oriented networks change the network communications paradigm with the involvement of human beings in the network. In a mission-oriented network, nodes may exhibit purposeful mobility in order to achieve mission goals. Additionally, human beings, unlike simple sensor nodes, have innate intelligence and context awareness, which help them in making better decisions. In this work, we consider a specific mission-oriented network -- a post-disaster rescue scenario with human rescue workers. We define external nodes as a set of stationary nodes (representing victims, relief camps, and control centers), who require communication opportunities. We propose four simple, intuition-based schemes to model human intelligence, which imparts purposeful mobility to the internal nodes (representing rescue workers). Such mobility in the network is guaranteed through opportunistic contacts among the mobile nodes. Our results show that the number of contact opportunities with stationary nodes increases under such purposeful mobility schemes as compared to the Random Waypoint (RWP) mobility model.

References

  1. C. C. Aggarwal and T. F. Abdelzaher. Integrating sensors and social networks. In Social Network Data Analytics, pages 379--412. 2011.Google ScholarGoogle ScholarCross RefCross Ref
  2. H. M. Ammari. Stochastic k-coverage in wireless sensor networks. In Proceedings of the 4th International Conference on Wireless Algorithms, Systems, and Applications, WASA '09, pages 125--134, Berlin, Heidelberg, 2009. Springer-Verlag. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. H. M. Ammari. On the problem of k-coverage in mission-oriented mobile wireless sensor networks. Computer Networks, 56(7):1935--1950, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. H. M. Ammari and S. K. Das. Mission-oriented k-coverage in mobile wireless sensor networks. In ICDCN, pages 92--103. 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. C. Bettstetter, H. Hartenstein, and X. Pérez-Costa. Stochastic properties of the random waypoint mobility model. Wirel. Netw., 10(5):555--567, Sept. 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. C.-M. Huang, K.-c. Lan, and C.-Z. Tsai. A survey of opportunistic networks. In Proceedings of the 22nd International Conference on Advanced Information Networking and Applications - Workshops, AINAW '08, pages 1672--1677, Washington, DC, USA, 2008. IEEE Computer Society. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. P. Hui, A. Chaintreau, J. Scott, R. Gass, J. Crowcroft, and C. Diot. Pocket switched networks and human mobility in conference environments. In Proceedings of the 2005 ACM SIGCOMM Workshop on Delay-tolerant networking, WDTN '05, pages 244--251, New York, NY, USA, 2005. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. A. Keränen, J. Ott, and T. Kärkkäinen. The ONE Simulator for DTN Protocol Evaluation. In SIMUTools '09: Proceedings of the 2nd International Conference on Simulation Tools and Techniques, New York, NY, USA, 2009. ICST. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. S. Misra and P. Agarwal. Bio-inspired group mobility model for mobile ad hoc networks based on bird-flocking behavior. Soft Computing - A Fusion of Foundations, Methodologies and Applications, 16:437--450, 2012. 10.1007/s00500-011-0728-x. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. S. Misra and A. Jain. Policy controlled self-configuration in unattended wireless sensor networks. Journal of Network and Computer Applications, 34(5):1530--1544, 2011. Dependable Multimedia Communications: Systems, Services, and Applications. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. S. Misra, M. P. Kumar, and M. S. Obaidat. Connectivity preserving localized coverage algorithm for area monitoring using wireless sensor networks. Computer Communications, 34(12):1484--1496, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. S. Phoha. Guest editorial: Special section on mission-oriented sensor networks. IEEE Transactions on Mobile Computing, 3:209, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. R. Rao and G. Kesidis. Purposeful mobility for relaying and surveillance in mobile ad hoc sensor networks. IEEE Transactions on Mobile Computing, 3:225--232, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. M. Srivastava, T. Abdelzaher, and B. Szymanski. Human-centric sensing. Philosophical Transactions of the Royal Society A: Mathematical,Physical and Engineering Sciences, 370(1958):176--197, Jan. 2012.Google ScholarGoogle ScholarCross RefCross Ref
  15. M. Uddin, D. Nicol, T. Abdelzaher, and R. Kravets. A post-disaster mobility model for delay tolerant networking. In Simulation Conference (WSC), Proceedings of the 2009 Winter, pages 2785--2796, dec. 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. N. A. Vien, N. H. Viet, S. Lee, and T. Chung. Heuristic search based exploration in reinforcement learning. In IWANN, pages 110--118, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. H. Yu, J. V. Iyer, H. Kim, E. J. Kim, K. H. Yum, and P.-S. Mah. Assuring k-coverage in the presence of mobility in wireless sensor networks. In Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM 06, San Francisco, CA, USA, 27 November - 1 December 2006. IEEE, 2006.Google ScholarGoogle ScholarCross RefCross Ref
  18. Z. Zhou, S. Das, and H. Gupta. Connected k-coverage problem in sensor networks. In Proceedings of the International Conference on Computer Communications and Networks (IC3N), pages 373--378, 2004.Google ScholarGoogle Scholar

Index Terms

  1. Could human intelligence enhance communication opportunities in mission-oriented opportunistic networks?

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      MiSeNet '12: Proceedings of the first ACM international workshop on Mission-oriented wireless sensor networking
      August 2012
      66 pages
      ISBN:9781450315296
      DOI:10.1145/2348656

      Copyright © 2012 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 26 August 2012

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate8of12submissions,67%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader