Next Article in Journal
Hamilton–Jacobi Equation for a Charged Test Particle in the Stäckel Space of Type (2.0)
Previous Article in Journal
Multifractal Analysis of Movement Behavior in Association Football
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Data Transmission and Management Based on Node Communication in Opportunistic Social Networks

School of Computer Science and Engineering, Central South University, Changsha 410083, China
*
Author to whom correspondence should be addressed.
Symmetry 2020, 12(8), 1288; https://doi.org/10.3390/sym12081288
Submission received: 4 July 2020 / Revised: 27 July 2020 / Accepted: 30 July 2020 / Published: 3 August 2020
(This article belongs to the Section Computer)

Abstract

:
Due to the rapid popularization of various short distance communication mobile devices, the use scenarios of opportunistic networks are increasing day by day. However, in opportunistic networks, because of the complexity of community structure, many methods lack of symmetry between application and theoretical research. Thus, the connection strength between nodes is different, and the degree of message diffusion is different. If the above factors cannot be accurately estimated and analyzed, and effective data forwarding and scheduling strategies cannot be formulated, the delivery ratio will be low, the delay will be relatively high, and the network overhead will be large. In light of improving symmetry problems in opportunistic networks, this paper establishes the message duplicate adaptive allocation and spray routing strategy (MDASRS) algorithm model, measures the connection strength between nodes through social pressure, and estimates the diffusion of current messages in the network through the probability of messages leaving the current node successfully, so as to develop the self-adaptive control replication transmission mode and achieve the effect of reducing the network burden and network overhead. This is done through experiments and comparison of social network algorithms, comparing the MDASRS with Epidemic, Spray and Wait, and EIMST algorithms. The experiment results showed that this method improves the cache utilization of nodes, reduces data transmission delay, and improves the network’s overall efficiency.

1. Introduction

An opportunistic network is a kind of network that brings contact opportunities through the movement between nodes in order to complete the information forwarding in the network [1]. In an opportunistic network, the “store-carry-forward” mechanism [2,3] has been used in message delivery and data forwarding, that is, nodes store the messages to be sent in their own cache and then forward them to the nodes that meet until the target node receives them [4]. Due to the above characteristics of opportunistic networks, it is possible to apply this process to many kinds of portable mobile devices, such as vehicle networks, mobile phones, tablet computers, etc. At the same time, people’s social activities are not only in line with the characteristics of random movement of nodes in an opportunistic network [5], but also affected by social relations and other social characteristics. Therefore, the research of effective data forwarding strategy and scheduling based on a social opportunistic network is the focus of the current research.
In an opportunistic network, the mobility of nodes is very random, and its topology is dynamic. There is no end-to-end stable link. If we use the traditional internet and wireless ad hoc network algorithm example, the method based on topology information to calculate the route is not accurate. Furthermore, in the social network, nodes are people in a certain social relationship [6], and information interaction and mobile mode have a certain degree of sociality [7]. Therefore, in a social opportunistic network with a human terminal carrier, human behavior characteristics and social attributes are the essential characteristics that are different from other mobile network modes [8].
However, with the development of society, we need more and more social applications of opportunistic networks. The vehicles driving on the road need wireless short distance communication at all times, and remote villages without internet access need opportunistic networks [9]. Because there may not be a suitable transmission target in the transmission range, or the transmission target has not yet answered, data storage needs to occupy a large amount of cache space in a device, which causes the transmission delay [10] and increases the network burden. On the one hand, a large amount of information is stuck in the device, and the message cannot be delivered in time, which causes there to be no acceptance and response for a long period of time; on the other hand, because the cache space is occupied, new data reception, emergency information release, etc., cannot be updated.
This paper proposes a message duplicate adaptive allocation and spray routing strategy, the message duplicate adaptive allocation and spray routing strategy (MDASRS) algorithm, to solve the above problem. The algorithm estimates the probability of successful message delivery through the analysis of the connection strength between nodes. It estimates the diffusion of messages in the network in order to adaptively control the transmission mode and connection strength of the replica, as well as save cache space, thus not only effectively improving delivery ratio, reducing the delay, but also reducing the load of nodes and congestion.
The contributions of this paper mainly include:
(1)
Proposing an effective data forwarding and scheduling strategy in social opportunistic networks. By calculating the node connection strength, eliminating the influence of statistical window T, and adopting certain multi copy strategies, the message delivery rate is improved and the delay is reduced.
(2)
Given the problem that the network over-head may be large in the multi replica policy, the replica transmission policy is determined adaptively by comparing the connection strength and threshold value.
(3)
In the process of message copy forwarding, the probability of successful message transmission and obtaining the remaining cache size of neighbor nodes is evaluated, further considering the congestion degree, calculating the weight of neighbor nodes in the neighbor list, optimizing the message forwarding queue, and reducing node load and congestion.

2. Related Works

In an opportunistic network, each node is in constant change. We usually adopt the “store–carry–forward” transmission strategy and process the replica at the same time to forward the data. In terms of the current research, the way in which to adaptively control the transmission mode of message replica, optimize the message forwarding queue, and efficiently transfer information has become an important research direction in terms of opportunistic networks [9]. On the basis of the characteristics of the instability of opportunistic networks, the existing research focuses on reducing the routing overhead caused by data forwarding and improving the delivery ratio of data transmission. The existing routing algorithms are as follows.
In the studies by [10,11], the Epidemic algorithm was proposed, which can achieve the goal of flooding by exchanging the missing message information between each other when the nodes meet. In some scenarios, the algorithm has a high transmission success rate and a small delay, but at the same time, it will produce a large number of data copies, and thus the network load is great, while the algorithm has poor adaptability and scalability. Ren [12] and others have proposed an adaptive Epidemic algorithm based on the original algorithm. According to the surrounding nodes’ cache state, the number of message copies injected into the network can be adjusted in real time. Therefore, to a certain extent, it can improve the Epidemic algorithm’s performance while effectively reducing the routing overhead.
In the study by [13], the Spray and Wait algorithm was proposed. First, in the process of “Spray”, the source node copies the data information to be transmitted many times and distributes it to different encountered nodes.
In the study of [14], the SNOP (data forwarding algorithm based on the sociality of node in opportunistic networks) algorithm was proposed. On the basis of the social attributes of nodes, the algorithm analyzes the community structure in the network, selecting relay nodes purposefully according to the similarity between communities and the activity of nodes in the community. The algorithm decomposes the social and forwarding tasks between nodes and carries them out in offline and online forms, respectively, so as to achieve high data grouping and effective forwarding.
In the work by [15], the SRBet algorithm (a novel social-based forwarding algorithm) was proposed. It captures the dynamic topological structure of an opportunistic network by using the spatiotemporal metagraph model, proposing a social relationship based on the measurement of intermediary centrality according to the historical contact records of nodes to ensure that messages are forwarded through stronger social relationship nodes.
In the study by [16], the community-based data forwarding strategy is proposed, which is called BubbleRap. According to the algorithm, the active degree is obtained through the interaction information of nodes, and then all nodes are ranked globally and locally. In data forwarding, the node forwards the data to the node with higher global ranking until it is forwarded to a node in the same community as the destination node; then, it forwards the data according to the local ranking in the community until the destination node receives the data information [17]. The algorithm adopts the single copy strategy to improve the transmission rate, but the forwarding delay is high.
This paper proposes an adaptive multi-copy transmission strategy to solve the problems of low delivery ratio, high delay, and high network overhead. By estimating the spread of messages in the network, this strategy can adapt to the mode of selecting control copy transmission and optimize the message forwarding queue, reducing node load and network burden. Thus, the effect of high delivery rate, low delay, and lower network overhead can be achieved.

3. System Model Design

A social opportunistic network can be regarded as a two-layer network composed of social networks and opportunistic communication networks. An opportunistic communication network is a physical mobile wireless communication network composed of wireless communication links and wireless terminal device entities, which can be expressed as Gc = {Vc,Ec(t)}. A social network is a network formed by people’s interaction with online information sharing and offline movement on the information network, and it can be expressed as Gs = {Vs,Es(t)}. Social networks and opportunistic communication networks are time-varying dynamic networks that are affected by the interaction; location changes of corresponding networks; and the changes of communication distance, connection, and disconnection caused by wireless signals and communication modes over time.
The results show a connection between the change of strength and weakness [18]. The strength of this connection is called the connection strength. The connection strength between nodes i and j is expressed by wij. The connection strength of a physical opportunistic network is affected by the signal strength, signal interference, communication range, network connection, and access mode of nodes. The connection strength between nodes of opportunistic network is affected by the encounter frequency, geographical location, and access frequency of nodes. The connection relationship between social network and communication network determines the node connection strength of social opportunistic network wij.
To measure the connection strength between nodes, the physical network mainly considers the communication range of nodes and the continuous connection time of links. The social network mainly considers the connection characteristics such as node encounter frequency and encounter rule. Generally, the higher the frequency of encounters between the nodes in the opportunistic network, the longer the connection duration, the stronger the regularity of the movement and encounter between nodes, and the stronger the connection relationship between the two nodes. The social pressure metric (SPM) is used to measure the connection strength w between nodes.
S P M = t = 0 T f ( t ) d t T , w i j = 1 S P M i j
SPMij represents the social pressure between nodes i and j, T is the statistical time window, and SPMij meets 0 ≤ SPMij T 2 , (SPMij)max = T 2 .
f(t) represents the remaining time between two nodes from the next meeting time, f(t) = 0 when two nodes are connected, and f(t) = t2t1 when they are disconnected, where t2 and t1 represent the time of the next meeting and the current time, respectively.
The strength of the connection between them is inversely proportional to the social pressure between the above nodes; the smaller the social pressure, the stronger the connection between the nodes, and on the contrary, the greater of the social pressure, the weaker the connection between nodes. When SPMij = 0, wij tends to infinity, indicating that the connection between nodes is robust, and when SPMij = 1, wij = 1, wherein the connection between nodes is the weakest. The influence of the value of statistical window T on the calculation of social pressure is normalized, which is shown as follows:
S P M i j = S P M i j ( S P M i j ) m a x = 2 t = 0 T f ( t ) d t T 2 , 0 S P M i j 1
After eliminating the influence of statistical window T on social pressure and normalizing the social pressure value SPM, the connection strength wij is quantified to the range of 0–1, that is, wij = 1 indicates the strongest connection state between nodes, and wij = 0 indicates the weakest connection state between nodes. The connection strength wij between nodes is expressed in the following equation:
w i j = e b ( 1 S P M i j ) 1 e b 1 , 0 w i j 1
where b is a positive coefficient.
Multiple copies strategy not only effectively improves the success rate of message delivery [19,20] and reduces the delay, but also brings more network overhead. Therefore, to obtain the benefits of multi-replica strategy and reduce the cost of network by targeted replication and proliferation, this paper estimates the probability of message successfully leaving the current carrying node, and also estimates the current expansion of the network to determine the replication and forwarding strategy of the decision messages, controlling the transmission mode of copy adaptively in order to control the number of message copies. When the strength of nodes wij and threshold wth meet wijwth, the node forwards messages in single copy mode. On the other hand, when wij < wth, the node uses the mode of binary spray focusing to transmit multiple copies.
The messages of an opportunistic network are carried by nodes. In the future, nodes move and forward messages to the next hop node when they have transmission conditions [21,22]. The transmission conditions should meet the requirements that nodes contact each other, and the length of contact can complete the correct transmission of messages. Therefore, the estimation of the probability of a message successfully leaving the node and forwarding to the next hop node should be considered in combination with the factors such as the node mobility characteristics and link characteristics that affect message transmission.
According to the study of the mobility of human beings in opportunistic networks, the motion model, and motion characteristics of nodes in opportunistic networks, the contact interval Δtij between nodes i and j in the network conforms to the episodic exponential distribution with the parameter λij. λij is used to represent the contact probability between nodes i and j; tpre and t represent the last contact time of nodes i and j and their next contact time, and thus the probability density function of the contact between nodes i and j at time t can be expressed as
f i j ( t ) = λ i j e λ i j ( t t p r e )
When node i and j make contact, whether the transmission of the message is successful or is affected by the contact time length of nodes, wireless signal stability, and other factors, B 0 represents the transmission data between nodes and the probability Qij of successful transmission of the message m in the opportunistic communication network when there is a wireless communication link between nodes, which is expressed as follows:
Q i j = e λ i j m B 0
From the current time t1, in the future period of time C, considering that the node i has only one neighbor node j, the probability of the message m successfully leaving the node and i forwarding to the node j can be expressed as:
P i j ( m ) = t 1 t 1 + C Q i j ( m ) f i j ( t ) d t = t 1 t 1 + C λ i j e λ i j m B 0 ( t t p r e ) d t
Node i has n neighbor nodes. If the number of neighbor nodes is from 1 to n, then the probability of message m leaving the node successfully in the time range of C is expressed by the probability expectation of passing the message m to all neighbor nodes, as shown below:
P i ( m ) = j = 1 n p i j ( m ) r i j
Among them, the weight of neighbor node j in lists of all neighbor nodes of i is represented by rij, and when combined with Equation (3) is as follows:
r i j = w i j j = 1 n w i j
On the one hand, the strategy of multiple copies can improve the delivery rate of messages and reduce the delay of message delivery. On the other hand, compared with the strategy of multiple copies, the single copy strategy increases the burden of the network. Moreover, the opportunistic network carries messages according to the nodes and uses the opportunity of meeting with the neighbor nodes to forward messages. Therefore, opportunistic networks are more prone to congestion than mobile ad hoc networks. In order to reduce the probability of congestion and consider the load of nodes on the basis of the adaptive network connection strength to control the number of message copies, we should further consider the congestion degree of nodes when forwarding the message copy and optimize the message forwarding queue. The degree of congestion is related to the size of the remaining cache space and the nodes’ service ability. In this paper, the ratio of the message receiving speed si of the node in time Δt to the remaining memory size bi is used as the measure of the congestion degree of the node i, which is called Ci:
C i = s i b i
and the degree of the node free is expressed as
F i = 1 s i b i
According to Equation (7), considering the probability of submitting and leaving the node i successfully for the message m, p m i _ s t / C C presents the message m transmission in societies, and the probability psi (m) that the message m is successfully transmitted in time C through node i can be obtained.
p s i ( m ) = p i ( m ) ( 1 p m i _ s t / C C )
When the node i meets the neighbor node j, first, the message sequence List = {m1, m2, …, mk, …, mn} is obtained by sorting the ps−i (m) values of n messages to be transmitted in node i cache from large to small. Next, the neighbor node j calculates its congestion level Fj and takes k = [n Fj] messages from the message sequence list as the messages to be transmitted.
We define the utility value of the message in the list as um = ps−i(m) hopm. hopm is the number of hops that message m has passed. According to the utility value of messages, the order of forwarding messages is optimized, and the problem is transformed into a 0–1 knapsack problem to solve the optimized forwarding set List.
{ m a x T = k = 1 z u k χ k , s . t .   k = 1 z u k χ k θ i , χ k { 0 , 1 }
In the formula, θj means the remaining space of node j’s cache—χk ∈ {0, 1}, whose values 1 and 0 respectively mean that the node i chooses to put the message into the forwarding queue or not. To solve the optimized message forwarding sequence list, each message’s utility value in the alternative set List1 needs to be calculated first. The messages in List1 are sorted in descending order, according to the ratio of the message’s utility value to the message’s length, and the message m is viewed in order.
On the basis of the message duplicate adaptive allocation and spray routing strategy (message duplicate adaptive allocation and spray routing strategy, MDASRS in Figure 1), taking the node i forwarding message copy to j as an example, the operation steps are as shown as follows:
Node i and node j encounter each other and discover each other.
Node obtains the status information of neighbor node j, and calculates the connection strength wij between them. When the connection strength wij between nodes and threshold value wth satisfy wij wth, the node uses single copy mode to forward messages. On the contrary, when wij < wth, the node uses the mode of binary spray focusing to transmit multiple copies.
The node i evaluates the probability of successful message transmission ps− (m), the remaining cache size of the node θj, and the degree of empty village Fj.
The node i optimizes the message forwarding queue and forwards messages to the neighbor nodes.
The algorithm MDASRS is designed as follow (Algorithm 1):
Algorithm 1 Message Duplicate Adaptive Allocation And Spray Routing Strategy (MDASRS)
Input: Ni, Nj
Output: forward message List
1: Begin
2: If Ni and Nj meet
   /* the strength of the connection wi is inversely proportional to the social pressure between the above nodes */
3:   f(t) = 0,    S P M = 0 , w i j = 1 ;
4: End if
5: If (wij ≥ wth)
   forward messages in single copy mode;
6: Else
   binary-spray focus mode for multi copy distribution transmission;
7: End else if
 /* If the node i has only one neighbor node j */
8: If (Ni.hasOnlyOneNeighbor(j))
9:     P i j ( m ) = Ni.leaveForOtherNode(Nj);
10: Else
  /* If the node i has multi neighbor nodes */
11:   For (node Nj in Ni.neighBorList)
12:    Pi(m) + = Ni.leaveForOtherNode(Nj)*Nj.weightInNeighboList(Ni);
13:   End for
14: End else
  /* According to Formulas (9)–(11), all of these are calculated. */
15: Set C i , F i ,   p s i ( m ) ;
16: When Ni and Nj meet
  /* sorting the ps−i (m) values of n messages to be transmitted in node i cache from large to small */
   List = {m1, m2, …, mk, …, mn};
  k = [n⋅ Fj] //the number of messages to be transmitted;
  um = ps−i(m) ⋅ hopm //utility values for messages in the list;
17: Update List
   /* According to Formula (12) */
18:      { m a x T = k = 1 z u k χ k , s . t .           k = 1 z u k χ k θ i , χ k { 0 , 1 }
19: If (χk = 0)
  Put in forwarding queue;
20: Else if (χk = 1)
   Do not put in forwarding queue;
21: Output List;
22: End

4. Experimental Analysis

In order to test the validity of the MDASRS algorithm, this model uses OMNET+ + as the system simulation software to realize the network model of simulation experiment. This method uses different mobile device models to describe the mobile center and record data transmission in the model. In this study, MDASRS was compared with the following algorithms:
(1)
Epidemic routing algorithm [9].
(2)
Spray and wait routing algorithm [11].
(3)
EIMST routing algorithm (effective information multicontrolling node transmission algorithm) [2].
The experimental parameters are as follows:
ParameterValue
Simulation time1–6 h
Simulation area range2500 × 3600 m
Number of nodes960
Communication modebroadcast
Maximum transmission area20 m2
Data grouping generation frequency25–35 s
The energy of nodes consuming when sending packets0.125 J
The initial energy of node100 J
Number of packets carried by a single node10
Node transport modelsocial model
Packet loss threshold15%
Diffusion threshold0.8
Number of cooperative nodes in a community2
Node transmission speed0.5–4.5 m/s
Node cache5 MB
The nodes are randomly generated in the region. If the number of collaboration nodes increases, so does the number of collaboration nodes in the community.
In order to analyze the network performance accurately, this paper mainly studied the following parameters:
  • Transmission rate ( D n o d e ): this parameter indicates the probability of selecting a related node in the transmission process, D n o d e = D r e c / D s e n , which is the message received from the neighbor node/the message sent by the node.
  • Average cost ( O n o d e ): this parameter indicates the cost between two nodes in information transmission, O n o d e = ( N t r N s ) N s where N t r is the total transmission time and N s is the successful transmission time.
  • Energy consumption: record the energy consumption of nodes in the transmission process.
  • Average end-to-end delay: this parameter includes the delay of finding route, waiting in data classification queue, transmission delay, and redelivery in MAC. Delay has the accumulation of each node.
Here is the impact of the number of collaboration nodes:
Figure 2 shows the relationship between the number of collaboration nodes and the deliver ratio of message transmission. When the number of cooperation nodes is small, with the increase of cooperation nodes, the transmission rate increases, and the message transmission becomes easier. However, when the number of cooperation nodes exceeds 5, a large amount of storage space is occupied by nodes. Due to the lack of storage space, a large amount of data stored in the memory must wait to be sent. As a result, the deliver ratio gradually decreases.
Figure 3 shows the impact of the number of collaboration nodes and the average cost. When messages are transmitted through nodes, the transmission success rate will increase, and the overhead will decrease because more cache space is occupied. When the number of nodes exceeds 5, redundant messages will reduce the transmission rate, and thus the overhead will gradually return to the initial state.
Figure 4 shows the relationship between the number of collaboration nodes and energy consumption. When the number of cooperative nodes is small, the energy consumption increases sharply as the number increases because the nodes have enough buffer space to store messages. However, when the number of nodes exceeds 5, the blocking wait state will reduce the deliver ratio. In addition, since many messages are in the waiting queue, energy consumption can be reduced.
Figure 5 shows the relationship between the number of cooperative nodes and the average end-to-end delay. When the number of nodes is small, there will be lower network delay in opportunistic social networks. However, when the number of cooperative nodes exceeds 6, the limited buffer space will cause more messages to remain in the waiting queue, which will result in higher end-to-end network latency.
Figure 6 shows the transmission rates corresponding to several algorithms. Compared with EIMST, Epidemic, Spray and Wait, the MDASRS algorithm has the highest transmission rate. When the cache space is 40 M, the transmission rate of MDASRS is as high as 0.94. The reason behind this is that in MDASRS, all packet transmission will rely on cache cooperation, and the effective cache space will be fully utilized. In MDASRS, packets can be transmitted accurately. Moreover, new messages can be transmitted from other communities because of social pressure between nodes controlling and discovering new neighbors from other communities. If cache could increase, the transmission rate would be added. Other algorithms typically find effective neighbors very slowly. They spend a large amount of time in improving the transmission rate. Thus, cache may make it hard to improve other methods in terms of delivery ratio. However, the delivery ratio in EIMST is better than in Epidemic and Spray and Wait. In EIMST, nodes may calculate the probability of meeting in the social network, and also consider the cooperative nodes. However, the algorithm does not establish a suitable cache space management method, and thus its transmission rate is only about 0.8. In Epidemic, a large number of the same packets are widely transmitted to the communication area, and there is not enough cache space to store messages. Moreover, many packets carrying new messages are lost, and thus the transmission rate is only 0.33–0.36. Spray and Wait is also similar to the Epidemic algorithm. On the basis of the analysis above, we can conclude that the average transmission rate of MDASRS algorithm is 82% higher than that of traditional algorithms.
Figure 7 shows the average overhead. From the figure, we can see that the average cost of Spray and Wait is the highest due to large amount of data distribution. With the increase of the cache, the average delay of the EIMST algorithm and the MDASRS algorithm finally dropped to about 20. In MDASRS, almost all communication communities can meet the probability of cooperation, and they may consume the cost of the social network. Therefore, in terms of probability calculation, MDASRS can predict neighbor nodes better than EIMST.
In Figure 8, we can see the change of surplus energy corresponding to the four algorithms as the cache changes. In Spray and Wait, the surplus energy of all neighbor nodes is the largest because they receive packets. In the Epidemical algorithm, the strategy of meeting and transmitting is adopted. As the cache increases, more messages are transmitted, thus consuming more energy. EIMST adopts effective data transmission, and all neighbors have node selection, and thus surplus energy will be reduced. In MDASRS, when the cache exceeds 40 Mb, the surplus energy reaches 45 J. We can see that by using an effective cache management strategy, we can effectively improve surplus energy, and thus more energy can be transferred.
Figure 9 shows the average end-to-end delay of the four algorithms discussed above. Among them, the Epidemic algorithm has the highest delay, which exceeded 360. In the EIMST and Spray and Wait algorithms, many data packets are lost due to the use of the replication transmission strategy, resulting in a slightly lower average delay. In the MDASRS algorithm, due to the use of neighbor nodes and collaboration nodes in the transmission, the delay is basically stable below 50, and a large amount of shared memory can also be used. In this case, the algorithm balances the waiting and sending nodes, reducing the delay by 75% on average.

5. Conclusions

For the problems existing in the social opportunistic network, this paper analyzes the node connection strength and proposes an adaptive message replication and distribution routing forwarding strategy, MDASRS. In this paper, by analyzing the spread of messages in the network, the transmission mode of message replicas is adaptively controlled, the number of message replicas is further controlled, and the message forwarding queue is optimized, so as to achieve the effect of reducing node load and reducing congestion on the basis of reducing delay and improving transmission rate. A large number of simulation experiments showed that it is better than the traditional three routing algorithms in transmission rate, routing overhead, energy consumption, and average end-to-end delay. In fact, due to the complexity of the community and other social attributes, messages will be interfered by various factors in the dissemination process, and the spread of messages presents diversity and uncertainty. Therefore, further optimization and implementation of the information management routing and forwarding strategy in the social opportunistic network with multiple characteristics is the priority of the following work.

Author Contributions

J.W. and Y.X. designed the project and drafted the manuscript, collected the data, wrote the code, and performed the analysis. Both individuals participated in finalizing. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by The National Natural Science Foundation of China (61672540), Hunan Provincial Natural Science Foundation of China (2018JJ3299, 2018JJ3682), and Fundamental Research Funds for the Central Universities of Central South University (2019zzts152).

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Wu, J.; Chen, Z.; Zhao, M. Community recombination and duplication node traverse algorithm in opportunistic social networks. Peer Peer Netw. Appl. 2020, 13, 940–947. [Google Scholar] [CrossRef]
  2. Wu, J.; Chen, Z.G.; Zhao, M. Effective information transmission based on socialization nodes in opportunistic networks. Comput. Netw. 2017, 129, 297–305. [Google Scholar] [CrossRef]
  3. Wu, J.; Chen, Z.G. Sensor communication area and node extend routing algorithm in opportunistic networks. Peer Peer Netw. Appl. 2018, 11, 90–100. [Google Scholar] [CrossRef]
  4. Guan, P.; Wu, J. Effective data communication based on social community in social opportunistic networks. IEEE Access 2019, 7, 12405–12414. [Google Scholar] [CrossRef]
  5. Ma, H.D.; Yuan, P.Y.; Zhao, D. Research progress on routing problem in mobile opportunistic networks. J. Softw. 2015, 26, 600–616. [Google Scholar]
  6. Becchetti, L.; Clementi, A.; Pasquale, F.; Resta, G.; Santi, P.; Silvestri, R. Flooding time in opportunistic networks under power law and exponential intercontact times. IEEE Trans. Parallel Distrib. Syst. 2014, 25, 2297–2306. [Google Scholar] [CrossRef] [Green Version]
  7. Michalski, R.; Kazienko, P. Maximizing social influence in real-world networks—The state of the art and current challenges. In Propagation Phenomena in Real World Networks; Springer International Publishing: Cham, Switzerland, 2015; pp. 329–359. [Google Scholar]
  8. Wang, X.; Leng, S.; Yin, J.; Fan, B.; Yang, K. ESD: An energy saving data delivery scheme in mobile social networks. In Proceedings of the IEEE Global Communications Conference (GLOBECOM), San Diego, CA, USA, 6–10 December 2015; pp. 1–6. [Google Scholar]
  9. Wu, J.; Cheng, Z.; Zhao, M. Information cache management and data transmission algorithm in opportunistic social networks. Wirel. Netw. 2019, 25, 2977–2988. [Google Scholar] [CrossRef]
  10. Wu, Y.; Su, D.; Huang, H. Optimal forwarding and beaconing control of epidemic routing in delay tolerant networks. Adhoc Sens. Wirel. Netw. 2014, 20, 71–93. [Google Scholar]
  11. Zhang, G.-H.; Pang, S.-B.; Yang, Y.-H.; Chen, Z.-G. Improved epidemic algorithm based on trust mechanism in opportunistic networks. Chin. J. Netw. Inf. Secur. 2017, 3, 1–7. [Google Scholar]
  12. Ren, Z.; Peng, S.; Chen, H.; Fang, J.; Chen, Q. Epidemic routing based on adaptive compression of vectors: Efficient low -delay routing for opportunistic networks based on adaptive compression of vectors. Int. J. Commun. Syst. 2015, 28, 560–573. [Google Scholar] [CrossRef]
  13. Kim, E.-H.; Nam, J.-C.; Choi, J.-I.; Cho, Y.-Z. Probability-based spray and wait protocol in delay tolerant networks. In Proceedings of the International Conference on Information Networking (IEEE 2014), Phuket, Thailand, 10–12 February 2014; pp. 412–416. [Google Scholar]
  14. Peng, J.; Li, M.-S.; Liu, T.; Li, L.-F. Nodal sociality-based data forwarding for opportunistic networks. J. Sichuan Univ. (Eng. Sci. Ed.) 2013, 45, 57–63. [Google Scholar]
  15. Gao, Z.; Shi, Y.; Chen, S.; Li, Q. Exploiting social relationship for opportunistic routing in mobile social networks. IEICE Trans. Commun. 2015, 98, 2040–2048. [Google Scholar] [CrossRef]
  16. Luo, J.; Wu, J.; WU, Y. Advanced Data Delivery Strategy Base on Multi-Perceived Community with IoT in Social Complex Networks. Complexity 2020, 2020. [Google Scholar] [CrossRef]
  17. Yan, Y.; Chen, Z.; Wu, J.; Wang, L. Effective data forwarding strategy integrating social relationships in opportunistic networks. J. Front. Comput. Sci. Technol. 2019, 13, 800–811. [Google Scholar]
  18. Yang, W.; Wu, J.; Luo, J. Effective date transmission and control base on social communication in social opportunistic complex networks. Alghorithms 2018, 11. [Google Scholar] [CrossRef] [Green Version]
  19. Hernández-Orallo, E.; Cano, J.-C.; Calafate, C.T.; Manzoni, P. A representative and accurate characterization of inter-contact times in mobile opportunistic networks. In Proceedings of the 16th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (ACM 2013), Barcelona, Spain, 1–3 November 2013. [Google Scholar]
  20. Dede, J.; Förster, A.; Hernández-Orallo, E.; Herrera-Tapica, J.; Kuladinithi, K.; Kuppusamy, V.; Manzoni, P.; Muslim, A.B.; Udugama, A.; Vatandas, Z. Simulating Opportunistic networks: Survey and future directions. IEEE Commun. Surv. Tutor. 2017, 20, 1547–1573. [Google Scholar] [CrossRef] [Green Version]
  21. Herrera-Tapia, J.; Hernández-Orallo, E.; Manzoni, P.; Tomas, A.; Tavares Calafate, C.; Cano, J.-C. Evaluating the impact of data transfer time and mobility patterns in opportunistic networks. In Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (IEEE 2017), Touluse, France, 18–21 July 2016. [Google Scholar]
  22. Herrera-Tapia, J.; Hernández-Orallo, E.; Andrés, T.; Manzoni, P.; Tomas, A.; Tavares Calafate, C.; Cano, J.-C. Improving message delivery performance in opportunistic networks using a forced-stop diffusion scheme. In Ad-Hoc, Mobile and Wireless Networks; Springer: Cham, Switzerland, 2016. [Google Scholar]
Figure 1. Node interaction sequence diagram.
Figure 1. Node interaction sequence diagram.
Symmetry 12 01288 g001
Figure 2. Delivery ratio.
Figure 2. Delivery ratio.
Symmetry 12 01288 g002
Figure 3. Overhead.
Figure 3. Overhead.
Symmetry 12 01288 g003
Figure 4. Energy consumption.
Figure 4. Energy consumption.
Symmetry 12 01288 g004
Figure 5. Delay.
Figure 5. Delay.
Symmetry 12 01288 g005
Figure 6. Delivery ratio.
Figure 6. Delivery ratio.
Symmetry 12 01288 g006
Figure 7. Overhead on average.
Figure 7. Overhead on average.
Symmetry 12 01288 g007
Figure 8. Surplus energy.
Figure 8. Surplus energy.
Symmetry 12 01288 g008
Figure 9. Delay on average.
Figure 9. Delay on average.
Symmetry 12 01288 g009

Share and Cite

MDPI and ACS Style

Xiao, Y.; Wu, J. Data Transmission and Management Based on Node Communication in Opportunistic Social Networks. Symmetry 2020, 12, 1288. https://doi.org/10.3390/sym12081288

AMA Style

Xiao Y, Wu J. Data Transmission and Management Based on Node Communication in Opportunistic Social Networks. Symmetry. 2020; 12(8):1288. https://doi.org/10.3390/sym12081288

Chicago/Turabian Style

Xiao, Yutong, and Jia Wu. 2020. "Data Transmission and Management Based on Node Communication in Opportunistic Social Networks" Symmetry 12, no. 8: 1288. https://doi.org/10.3390/sym12081288

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop