Human Mobility Centric Efficient Framework for Opportunistic Mobile Social Network


Book Description

Throughout the last decade, increasing penetration of portable devices like smartphones and tablets with their incessant enrichment in strong peer-to-peer networking (e.g., Bluetooth, WiFi Direct) and sensing capabilities, have made opportunistic networks as one of the most auspicious communication methods for the next generation mobile applications. The contemporary decade also experienced the rise of social networks attracting massive interest from scholars of diverse fields. While the internet based social networks has evolved to certain level of maturity, once again it is the mobile devices and their applications that are changing the landscapes in studying social networks. New challenges and promises brought up by the emerging mobile technologies have surfaced a novel field blending the opportunistic network and social network concepts. Opportunistic Mobile Social Network can be described as the platform that provides human mobility aided services via hand held devices for the fostering and maintaining social interactions and connections. Traditional concepts of internet based social networks have not been very concerned about the opportunistically occurring portable device based new mobile social networks. Similar to the internet based social networks, where social applications are the core driving force behind the networks' existence, in opportunistic mobile social networks social applications are supposed to provide the shared environment where the content can be easily produced, disseminated and where conversations can take place in real time. These expose several research challenges related to the basic communication support for the applications, between the mobile devices. First, how to maximize the efficiency of encounter-based, short-lived, and disruption-prone communication links between the mobile nodes? Second, how to keep provisions for real-time communications alive, something that is crucial in social networks, but usually relinquished in opportunistic networks scenario? Third, how to localize the network nodes characterized by the smartphones or tablets, since the continuous usage of the location sensor (e.g., GPS) can drain the battery in few hours? Clearly, the current internet protocols (i.e., the TCP/IP protocol stack) used in internet based social networks suffer and fail in opportunistic mobile social networks. Instead, connectivity disruption, limited network capacity, energy and storage constraints of those devices, mobile device types and the human mobility driven arbitrary movement of the nodes are only a few among all challenges that must be dealt with by the protocol stack. In this dissertation, we first propose a novel framework to reveal the inherent connected virtual backbone in an opportunistic network through the consociation of the neighbors in the network. This backbone can pave the way for designing an architecture for real-time mobile social applications. The backbone may change in terms of time, location and crowd density. Experimenting on real world as well as synthetic human mobility traces and pause times, we first structure the pattern of human halt durations at popular places. Infusing this pattern, we then prove the existence of the intrinsic backbone in those networking environments, where people show regularity in their movements. Applying graph-theoretic concepts like Minimum Connected Dominating Set and Unit Node Weighted Steiner Tree we further optimize and ensure the robustness of the backbone. Simulation results show the effectiveness of our approach in exposing a newer dimension in the form of real time interaction prospects in opportunistic networks. Next we propose a novel scheme called HiPCV, which uses a distributed learning approach to capture preferential movement of the individuals, with spatial contexts and directional information and paves the way for mobility history assisted contact volume prediction (i.e., link capacity prediction). Experimenting on real world human mobility traces, HiPCV first learns and structures human walk patterns, along her frequently chosen trails. By creating a Mobility Markov Chain (MMC) out of this pattern and embedding it into HiPCV algorithm,we then devise a decision model for data transmissions during opportunistic contacts.Experimental results show the robustness of HiPCV in terms mobility prediction,reliable opportunistic data transfers and bandwidth saving, at places where peoples how regularity in their movements. For challenged environments where previous mobility history is scarce, we further extend the idea of contact volume prediction and propose a energy effcient framework called EPCV. EPCV re-introduces a form of localization approach, aware of the communication technology diversity across the portable devices. Experimental results on real traces confirm that EPCV can help determining the encounter-triggered opportunistic link capacities and exploit it in mobile social network paradigm, keeping the energy usage minimal.




Opportunistic Mobile Social Networks


Book Description

The widespread availability of mobile devices along with recent advancements in networking capabilities make opportunistic mobile social networks (MSNs) one of the most promising technologies for next-generation mobile applications. Opportunistic Mobile Social Networks supplies a new perspective of these networks that can help you enhance spontaneous interaction and communication among users that opportunistically encounter each other, without additional infrastructure support. The book explores recent developments in the theoretical, algorithmic, and application-based aspects of opportunistic MSNs. It presents the motivation behind opportunistic MSNs, describes their underpinning and key concepts, and also explores ongoing research. Supplies a systematic study of the constrained information flow problem Reviews the recent literature on social influence in complex social networks Presents a complete overview of the fundamental characteristics of link-level connectivity in opportunistic networks Explains how mobility and dynamic network structure impact the processing capacity of opportunistic MSNs for cloud applications Provides a comprehensive overview of the routing schemes proposed in opportunistic MSNs Taking an in-depth look at multicast protocols, the book explains how to provide pervasive data access to mobile users without the support of cellular or Internet infrastructures. Considering privacy and security issues, it surveys a collection of cutting-edge approaches for minimizing privacy leakage during opportunistic user profile exchange. The book concludes by introducing a framework for mobile peer rating using a multi-dimensional metric scheme based on encounter and location testing. It also explains how to develop a network emulation test bed for validating the efficient operation of opportunistic network applications and protocols in scenarios that involve both node mobility and wireless communication.




Mining Human Mobility in Location-Based Social Networks


Book Description

In recent years, there has been a rapid growth of location-based social networking services, such as Foursquare and Facebook Places, which have attracted an increasing number of users and greatly enriched their urban experience. Typical location-based social networking sites allow a user to "check in" at a real-world POI (point of interest, e.g., a hotel, restaurant, theater, etc.), leave tips toward the POI, and share the check-in with their online friends. The check-in action bridges the gap between real world and online social networks, resulting in a new type of social networks, namely location-based social networks (LBSNs). Compared to traditional GPS data, location-based social networks data contains unique properties with abundant heterogeneous information to reveal human mobility, i.e., "when and where a user (who) has been to for what," corresponding to an unprecedented opportunity to better understand human mobility from spatial, temporal, social, and content aspects. The mining and understanding of human mobility can further lead to effective approaches to improve current location-based services from mobile marketing to recommender systems, providing users more convenient life experience than before. This book takes a data mining perspective to offer an overview of studying human mobility in location-based social networks and illuminate a wide range of related computational tasks. It introduces basic concepts, elaborates associated challenges, reviews state-of-the-art algorithms with illustrative examples and real-world LBSN datasets, and discusses effective evaluation methods in mining human mobility. In particular, we illustrate unique characteristics and research opportunities of LBSN data, present representative tasks of mining human mobility on location-based social networks, including capturing user mobility patterns to understand when and where a user commonly goes (location prediction), and exploiting user preferences and location profiles to investigate where and when a user wants to explore (location recommendation), along with studying a user's check-in activity in terms of why a user goes to a certain location.










Opportunistic Networks


Book Description

Opportunistic networks allow mobile users to share information without any network infrastructure.This book is suitable for both undergraduates and postgraduates as it discusses various aspects of opportunistic networking including, foundations of ad hoc network; taxonomy of mobility models, etc.




Peer-to-peer Communication in Mobile Social Network


Book Description

In recent times, the growth of mobile devices (especially smartphones) is phenomenal. These devices support Bluetooth and Wifi connectivity. Further, they are equipped with good computing power and memory. Because of this, an entirely new network paradigm has emerged in which encounters between these mobile devices can be exploited for opportunistic data transfer without using any fixed network infrastructure[5]. This opportunistic network paradigm is called Pocket Switched Network (PSN) as we carry smartphones in our pockets. Message broadcast, news spread, traffic updates, microblogging and peer-to-peer file sharing are some of the applications which can run on such type of network. Further, it can significantly offload infrastructure based networks such as cellular network and infrastructure based Wifi network and reduce data cost for users considerably[6]. As these devices are carried by humans, their encounter patterns depend on human mobility patterns. Thus, knowledge of human movement behaviour and social structure can be exploited for efficient peer-to-peer communication[7, 8]. As a result, this network paradigm is also called Mobile Social Network (MSN).




Vehicular Social Networks


Book Description

The book provides a comprehensive guide to vehicular social networks. The book focuses on a new class of mobile ad hoc networks that exploits social aspects applied to vehicular environments. Selected topics are related to social networking techniques, social-based routing techniques applied to vehicular networks, data dissemination in VSNs, architectures for VSNs, and novel trends and challenges in VSNs. It provides significant technical and practical insights in different aspects from a basic background on social networking, the inter-related technologies and applications to vehicular ad-hoc networks, the technical challenges, implementation and future trends.




Wisdom Web of Things


Book Description

This book provides a thorough overview of the Wisdom Web of Things (W2T), a holistic framework for computing and intelligence in an emerging hyper-world with a social-cyber-physical space. Fast-evolving Web intelligence research and development initiatives are now moving toward understanding the multifaceted nature of intelligence and incorporating it at the Web scale in a ubiquitous environment with data, connection and service explosion. The book focuses on the framework and methodology of W2T, as well as its applications in different problem domains, such as intelligent businesses, urban computing, social computing, brain informatics and healthcare. From the researcher and developer perspectives, the book takes a systematic, structured view of various W2T facets and their overall contribution to the development of W2T as a whole. Written by leading international researchers, this book is an essential reference for researchers, educators, professionals, and tertiary HDR students working on the World Wide Web, ubiquitous computing, knowledge management, and business intelligence.




Online Social Networks Security


Book Description

In recent years, virtual meeting technology has become a part of the everyday lives of more and more people, often with the help of global online social networks (OSNs). These help users to build both social and professional links on a worldwide scale. The sharing of information and opinions are important features of OSNs. Users can describe recent activities and interests, share photos, videos, applications, and much more. The use of OSNs has increased at a rapid rate. Google+, Facebook, Twitter, LinkedIn, Sina Weibo, VKontakte, and Mixi are all OSNs that have become the preferred way of communication for a vast number of daily active users. Users spend substantial amounts of time updating their information, communicating with other users, and browsing one another’s accounts. OSNs obliterate geographical distance and can breach economic barrier. This popularity has made OSNs a fascinating test bed for cyberattacks comprising Cross-Site Scripting, SQL injection, DDoS, phishing, spamming, fake profile, spammer, etc. OSNs security: Principles, Algorithm, Applications, and Perspectives describe various attacks, classifying them, explaining their consequences, and offering. It also highlights some key contributions related to the current defensive approaches. Moreover, it shows how machine-learning and deep-learning methods can mitigate attacks on OSNs. Different technological solutions that have been proposed are also discussed. The topics, methodologies, and outcomes included in this book will help readers learn the importance of incentives in any technical solution to handle attacks against OSNs. The best practices and guidelines will show how to implement various attack-mitigation methodologies.