Opportunistic Mobile Social Networks


Book Description

The widespread availability of mobile devices along with recent advancements in networking capabilities make opportunistic mobile social networks (MSNs) one of the most promising technologies for next-generation mobile applications. Opportunistic Mobile Social Networks supplies a new perspective of these networks that can help you enhance spontaneous interaction and communication among users that opportunistically encounter each other, without additional infrastructure support. The book explores recent developments in the theoretical, algorithmic, and application-based aspects of opportunistic MSNs. It presents the motivation behind opportunistic MSNs, describes their underpinning and key concepts, and also explores ongoing research. Supplies a systematic study of the constrained information flow problem Reviews the recent literature on social influence in complex social networks Presents a complete overview of the fundamental characteristics of link-level connectivity in opportunistic networks Explains how mobility and dynamic network structure impact the processing capacity of opportunistic MSNs for cloud applications Provides a comprehensive overview of the routing schemes proposed in opportunistic MSNs Taking an in-depth look at multicast protocols, the book explains how to provide pervasive data access to mobile users without the support of cellular or Internet infrastructures. Considering privacy and security issues, it surveys a collection of cutting-edge approaches for minimizing privacy leakage during opportunistic user profile exchange. The book concludes by introducing a framework for mobile peer rating using a multi-dimensional metric scheme based on encounter and location testing. It also explains how to develop a network emulation test bed for validating the efficient operation of opportunistic network applications and protocols in scenarios that involve both node mobility and wireless communication.




Mobile Social Networking and Computing


Book Description

Recent advancements in mobile device technologies are revolutionizing how we socialize, interact, and connect. By connecting the virtual community with the local environment, mobile social networks (MSNs) create the opportunity for a multitude of new personalized services for mobile users. Along with that comes the need for new paradigms, mechanisms, and techniques with the capacity to autonomously manage their functioning and evolution. Currently, most books about mobile networks focus mainly on the technical point of view. Mobile Social Networking and Computing: A Multidisciplinary Integrated Perspective not only addresses the theoretical aspects of MSN and computing, but also introduces and categorizes existing applications. It supplies a multidisciplinary perspective that considers the technology, economics, social sciences, and psychology behind MSNs. In addition to fundamental theory, the book investigates the practical issues in MSN, including characteristics, inner structural relationship, incentive mechanisms, resource allocating, information diffusion, search, ranking, privacy, trust, and reputation. Introducing recently developed technologies, modes, and models, the book provides two distinct (but related) viewpoints about MSN applications: socially inspired networking technology and networking technology that uses recent advancements to enhance quality of life. The text illustrates the interaction between the macrolevel structure and the local rational behaviors (microlevel) in MSN. It summarizes currently available MSN development platforms, including Android and iOS, and introduces and categorizes existing applications related to MSN and computing. Both location-based service (LBS) and mobile social networks in proximity (MSNPs) are presented in a comprehensive manner. Highlighting key research opportunities, this much-needed reference outlines incentive mechanisms inspired by classical economics, behavioral economics, and social psychology, and, perhaps for the first time, it presents a summary of the economic and business models of MSNs.




Handbook of Mobile Ad Hoc Networks for Mobility Models


Book Description

The Mobile Ad Hoc Network (MANET) has emerged as the next frontier for wireless communications networking in both the military and commercial arena. Handbook of Mobile Ad Hoc Networks for Mobility Models introduces 40 different major mobility models along with numerous associate mobility models to be used in a variety of MANET networking environments in the ground, air, space, and/or under water mobile vehicles and/or handheld devices. These vehicles include cars, armors, ships, under-sea vehicles, manned and unmanned airborne vehicles, spacecrafts and more. This handbook also describes how each mobility pattern affects the MANET performance from physical to application layer; such as throughput capacity, delay, jitter, packet loss and packet delivery ratio, longevity of route, route overhead, reliability, and survivability. Case studies, examples, and exercises are provided throughout the book. Handbook of Mobile Ad Hoc Networks for Mobility Models is for advanced-level students and researchers concentrating on electrical engineering and computer science within wireless technology. Industry professionals working in the areas of mobile ad hoc networks, communications engineering, military establishments engaged in communications engineering, equipment manufacturers who are designing radios, mobile wireless routers, wireless local area networks, and mobile ad hoc network equipment will find this book useful as well.




Mobility Models for Next Generation Wireless Networks


Book Description

Mobility Models for Next Generation Wireless Networks: Ad Hoc, Vehicular and Mesh Networks provides the reader with an overview of mobility modelling, encompassing both theoretical and practical aspects related to the challenging mobility modelling task. It also: Provides up-to-date coverage of mobility models for next generation wireless networks Offers an in-depth discussion of the most representative mobility models for major next generation wireless network application scenarios, including WLAN/mesh networks, vehicular networks, wireless sensor networks, and opportunistic networks Demonstrates the practices for designing effective protocol/applications for next generation wireless networks Includes case studies showcasing the importance of properly understanding fundamental mobility model properties in wireless network performance evaluation




Mining Human Mobility in Location-Based Social Networks


Book Description

In recent years, there has been a rapid growth of location-based social networking services, such as Foursquare and Facebook Places, which have attracted an increasing number of users and greatly enriched their urban experience. Typical location-based social networking sites allow a user to "check in" at a real-world POI (point of interest, e.g., a hotel, restaurant, theater, etc.), leave tips toward the POI, and share the check-in with their online friends. The check-in action bridges the gap between real world and online social networks, resulting in a new type of social networks, namely location-based social networks (LBSNs). Compared to traditional GPS data, location-based social networks data contains unique properties with abundant heterogeneous information to reveal human mobility, i.e., "when and where a user (who) has been to for what," corresponding to an unprecedented opportunity to better understand human mobility from spatial, temporal, social, and content aspects. The mining and understanding of human mobility can further lead to effective approaches to improve current location-based services from mobile marketing to recommender systems, providing users more convenient life experience than before. This book takes a data mining perspective to offer an overview of studying human mobility in location-based social networks and illuminate a wide range of related computational tasks. It introduces basic concepts, elaborates associated challenges, reviews state-of-the-art algorithms with illustrative examples and real-world LBSN datasets, and discusses effective evaluation methods in mining human mobility. In particular, we illustrate unique characteristics and research opportunities of LBSN data, present representative tasks of mining human mobility on location-based social networks, including capturing user mobility patterns to understand when and where a user commonly goes (location prediction), and exploiting user preferences and location profiles to investigate where and when a user wants to explore (location recommendation), along with studying a user's check-in activity in terms of why a user goes to a certain location.




Data Dissemination and Query in Mobile Social Networks


Book Description

With the increasing popularization of personal hand-held mobile devices, more people use them to establish network connectivity and to query and share data among themselves in the absence of network infrastructure, creating mobile social networks (MSNet). Since users are only intermittently connected to MSNets, user mobility should be exploited to bridge network partitions and forward data. Currently, data route/forward approaches for such intermittently connected networks are commonly "store-carry-and-forward" schemes, which exploit the physical user movements to carry data around the network and overcome path disconnection. And since the source and destination may be far away from each other, the delay for the destination to receive the data from the source may be long. MSNets can be viewed as one type of socially-aware delay tolerant networks (DTNs). Observed from social networks, the contact frequencies are probably different between two friends and two strangers, and this difference should be taken into consideration when designing data dissemination and query schemes in MSNets. In this book, the fundamental concepts of MSNets are introduced including the background, key features and potential applications of MSNets, while also presenting research topics, such as, MSNets as realistic social contact traces and user mobility models. Because the ultimate goal is to establish networks that allow mobile users to quickly and efficiently access interesting information, particular attention is paid to data dissemination and query schemes in subsequent sections. Combined with geography information, the concepts of community and centrality are employed from a social network perspective to propose several data dissemination and query schemes, and further use real social contact traces to evaluate their performance, demonstrating that such schemes achieve better performance when exploiting more social relationships between users.




Proceedings of First International Conference on Computing, Communications, and Cyber-Security (IC4S 2019)


Book Description

This book features selected research papers presented at the First International Conference on Computing, Communications, and Cyber-Security (IC4S 2019), organized by Northwest Group of Institutions, Punjab, India, Southern Federal University, Russia, and IAC Educational Trust, India along with KEC, Ghaziabad and ITS, College Ghaziabad as an academic partner and held on 12–13 October 2019. It includes innovative work from researchers, leading innovators and professionals in the area of communication and network technologies, advanced computing technologies, data analytics and intelligent learning, the latest electrical and electronics trends, and security and privacy issues.




Ad-hoc, Mobile, and Wireless Networks


Book Description

This book constitutes the refereed proceedings of the 11th International Conference on Ad-hoc, Mobile, and Wireless Networks, ADHOC-NOW 2012 held in Belgrade, Serbia, July 9-11, 2012. The 36 revised full papers presented were carefully reviewed and selected from 76 submissions. The accepted papers cover a wide spectrum of traditional networking topics ranging from routing to the application layer, to localization in various networking environments such as wireless sensor and ad-hoc networks, and give insights in a variety of application areas.




Human Mobility Centric Efficient Framework for Opportunistic Mobile Social Network


Book Description

Throughout the last decade, increasing penetration of portable devices like smartphones and tablets with their incessant enrichment in strong peer-to-peer networking (e.g., Bluetooth, WiFi Direct) and sensing capabilities, have made opportunistic networks as one of the most auspicious communication methods for the next generation mobile applications. The contemporary decade also experienced the rise of social networks attracting massive interest from scholars of diverse fields. While the internet based social networks has evolved to certain level of maturity, once again it is the mobile devices and their applications that are changing the landscapes in studying social networks. New challenges and promises brought up by the emerging mobile technologies have surfaced a novel field blending the opportunistic network and social network concepts. Opportunistic Mobile Social Network can be described as the platform that provides human mobility aided services via hand held devices for the fostering and maintaining social interactions and connections. Traditional concepts of internet based social networks have not been very concerned about the opportunistically occurring portable device based new mobile social networks. Similar to the internet based social networks, where social applications are the core driving force behind the networks' existence, in opportunistic mobile social networks social applications are supposed to provide the shared environment where the content can be easily produced, disseminated and where conversations can take place in real time. These expose several research challenges related to the basic communication support for the applications, between the mobile devices. First, how to maximize the efficiency of encounter-based, short-lived, and disruption-prone communication links between the mobile nodes? Second, how to keep provisions for real-time communications alive, something that is crucial in social networks, but usually relinquished in opportunistic networks scenario? Third, how to localize the network nodes characterized by the smartphones or tablets, since the continuous usage of the location sensor (e.g., GPS) can drain the battery in few hours? Clearly, the current internet protocols (i.e., the TCP/IP protocol stack) used in internet based social networks suffer and fail in opportunistic mobile social networks. Instead, connectivity disruption, limited network capacity, energy and storage constraints of those devices, mobile device types and the human mobility driven arbitrary movement of the nodes are only a few among all challenges that must be dealt with by the protocol stack. In this dissertation, we first propose a novel framework to reveal the inherent connected virtual backbone in an opportunistic network through the consociation of the neighbors in the network. This backbone can pave the way for designing an architecture for real-time mobile social applications. The backbone may change in terms of time, location and crowd density. Experimenting on real world as well as synthetic human mobility traces and pause times, we first structure the pattern of human halt durations at popular places. Infusing this pattern, we then prove the existence of the intrinsic backbone in those networking environments, where people show regularity in their movements. Applying graph-theoretic concepts like Minimum Connected Dominating Set and Unit Node Weighted Steiner Tree we further optimize and ensure the robustness of the backbone. Simulation results show the effectiveness of our approach in exposing a newer dimension in the form of real time interaction prospects in opportunistic networks. Next we propose a novel scheme called HiPCV, which uses a distributed learning approach to capture preferential movement of the individuals, with spatial contexts and directional information and paves the way for mobility history assisted contact volume prediction (i.e., link capacity prediction). Experimenting on real world human mobility traces, HiPCV first learns and structures human walk patterns, along her frequently chosen trails. By creating a Mobility Markov Chain (MMC) out of this pattern and embedding it into HiPCV algorithm,we then devise a decision model for data transmissions during opportunistic contacts.Experimental results show the robustness of HiPCV in terms mobility prediction,reliable opportunistic data transfers and bandwidth saving, at places where peoples how regularity in their movements. For challenged environments where previous mobility history is scarce, we further extend the idea of contact volume prediction and propose a energy effcient framework called EPCV. EPCV re-introduces a form of localization approach, aware of the communication technology diversity across the portable devices. Experimental results on real traces confirm that EPCV can help determining the encounter-triggered opportunistic link capacities and exploit it in mobile social network paradigm, keeping the energy usage minimal.