Intelligent distributed routing scheme based on social similarity for mobile social networks

Abstract In mobile social networks (MSNs), the social attributes of nodes are important factors driving the mobility of nodes. By studying the mobility of the daily activities of node carriers, an intelligent distributed routing algorithm based on social context information prediction was proposed. First, we study the data forwarding problem of mobile social networks from two aspects, the daily behavior of mobile nodes and the similarity of social attributes respectively. Then, our algorithm uses BP neural network to predict the encounter regularity of mobile nodes in terms of time and space dimensions. This information can provide a basis for routing decisions. Finally, a routing algorithm with predictive capability is designed in combination with synchronous delivery and asynchronous delivery. Simulation analysis and experimental results show that the proposed routing algorithm can effectively improve the message delivery ratio and reduce the network overhead.

[1]  Feng Xia,et al.  Vehicular Social Networks: A survey , 2018, Pervasive Mob. Comput..

[2]  Sagar Naik,et al.  SGBR: A Routing Protocol for Delay Tolerant Networks Using Social Grouping , 2013, IEEE Transactions on Parallel and Distributed Systems.

[3]  Pablo Rodriguez,et al.  Fair Routing in Delay Tolerant Networks , 2009, IEEE INFOCOM 2009.

[4]  Jing Chen,et al.  Dominating Set and Network Coding-Based Routing in Wireless Mesh Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.

[5]  Mads Haahr,et al.  Social network analysis for routing in disconnected delay-tolerant MANETs , 2007, MobiHoc '07.

[6]  Jie Wu,et al.  Community-Aware Opportunistic Routing in Mobile Social Networks , 2014, IEEE Transactions on Computers.

[7]  Honggang Wang,et al.  Security-oriented opportunistic data forwarding in Mobile Social Networks , 2017, Future Gener. Comput. Syst..

[8]  Pan Hui,et al.  BUBBLE Rap: Social-Based Forwarding in Delay-Tolerant Networks , 2011 .

[9]  Amin Vahdat,et al.  Epidemic Routing for Partially-Connected Ad Hoc Networks , 2009 .

[10]  Xiang-Yang Li,et al.  LASS: Local-Activity and Social-Similarity Based Data Forwarding in Mobile Social Networks , 2015, IEEE Transactions on Parallel and Distributed Systems.

[11]  Yunnan Wu,et al.  Minimum-energy multicast in mobile ad hoc networks using network coding , 2004, Information Theory Workshop.

[12]  Susana Sargento,et al.  Opportunistic routing based on daily routines , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).

[13]  Kun Yang,et al.  Socially-Aware Multi-phase Opportunistic Routing for Distributed Mobile Social Networks , 2014, Wirel. Pers. Commun..

[14]  Anil Kumar Verma,et al.  Experimental analysis of AODV, DSDV and OLSR routing protocol for flying adhoc networks (FANETs) , 2015, 2015 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT).

[15]  Marco Conti,et al.  HiBOp: a History Based Routing Protocol for Opportunistic Networks , 2007, 2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.

[16]  Qinghua Zheng,et al.  Towards Information Diffusion in Mobile Social Networks , 2016, IEEE Transactions on Mobile Computing.

[17]  Victor C. M. Leung,et al.  A Survey on Mobile Social Networks: Applications, Platforms, System Architectures, and Future Research Directions , 2015, IEEE Communications Surveys & Tutorials.

[18]  Antonio Iera,et al.  Context-Aware Information Diffusion for Alerting Messages in 5G Mobile Social Networks , 2017, IEEE Internet of Things Journal.

[19]  Zhu Han,et al.  A Survey on Socially Aware Device-to-Device Communications , 2018, IEEE Communications Surveys & Tutorials.

[20]  Ari Keränen Opportunistic Network Environment simulator , 2008 .

[21]  Yang Gao,et al.  Contacts-aware opportunistic forwarding in mobile social networks: A community perspective , 2018, 2018 IEEE Wireless Communications and Networking Conference (WCNC).

[22]  Pan Hui,et al.  How Small Labels Create Big Improvements , 2006, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).

[23]  Ziming Zhao,et al.  Uncovering the Face of Android Ransomware: Characterization and Real-Time Detection , 2018, IEEE Transactions on Information Forensics and Security.

[24]  Cecilia Mascolo,et al.  Designing mobility models based on social network theory , 2007, MOCO.