Modeling Opportunistic Social Networks with Decayed Aggregation Graph

The emerging mobile applications including contact-based forwarding and online worm containment have put a heavy burden on opportunistic social networks (OSNs), the first goal is to develop an effective model that can reveal the hidden, important social features underlying the OSNs. This problem is especially challenging because of the time-varying network topology. Traditional time expanded graph caches each snapshot of networks, resulting in low computation efficiency and high storage overhead. By aggregating past contact events between two nodes to a simple boolean indicator, the binary graph model can alleviate this issue. However, it only provides a coarse-grained level of identifying the relationship between nodes. It neglects the differences in contact events. Intuitively, recent contact events are generally more important than old ones, and in computing an aggregation, we should assign bigger weights to them. In addition, since each contact has its own duration, we should take this factor into account as well. Motivated by these observations, we propose DAG, a decayed aggregation graph for modeling OSNs at a fine-grained level. By implementing DAG in different real scenarios, we show that DAG is efficient in characterizing the relationship between nodes and in improving the performance of mobile applications. We simultaneously prove that DAG achieves approximate space complexity as the binary graph.

[1]  Edith Cohen,et al.  Maintaining time-decaying stream aggregates , 2003, J. Algorithms.

[2]  Graham Cormode,et al.  Time-decayed correlated aggregates over data streams , 2009 .

[3]  Shaojie Tang,et al.  Community-based immunization in opportunistic social networks , 2014, Physica A: Statistical Mechanics and its Applications.

[4]  Robert L. Smith,et al.  Fastest Paths in Time-dependent Networks for Intelligent Vehicle-Highway Systems Application , 1993, J. Intell. Transp. Syst..

[5]  Yin Zhang,et al.  Exploiting temporal stability and low-rank structure for localization in mobile networks , 2010, MobiCom.

[6]  Pasquale De Meo,et al.  A Novel Measure of Edge Centrality in Social Networks , 2012, Knowl. Based Syst..

[7]  Nam P. Nguyen,et al.  Overlapping communities in dynamic networks: their detection and mobile applications , 2011, MobiCom.

[8]  Huadong Ma,et al.  Opportunistic forwarding with hotspot entropy , 2013, 2013 IEEE 14th International Symposium on "A World of Wireless, Mobile and Multimedia Networks" (WoWMoM).

[9]  Mads Haahr,et al.  Social Network Analysis for Information Flow in Disconnected Delay-Tolerant MANETs , 2009, IEEE Transactions on Mobile Computing.

[10]  Christophe Diot,et al.  Dissemination in opportunistic social networks: the role of temporal communities , 2012, MobiHoc '12.

[11]  Leonard M. Freeman,et al.  A set of measures of centrality based upon betweenness , 1977 .

[12]  Cecilia Mascolo,et al.  Characterising temporal distance and reachability in mobile and online social networks , 2010, CCRV.

[13]  Thrasyvoulos Spyropoulos,et al.  Know Thy Neighbor: Towards Optimal Mapping of Contacts to Social Graphs for DTN Routing , 2010, 2010 Proceedings IEEE INFOCOM.

[14]  Martin Skutella,et al.  Time-Expanded Graphs for Flow-Dependent Transit Times , 2002, ESA.

[15]  Jie Tang,et al.  Inferring social ties across heterogenous networks , 2012, WSDM '12.

[16]  Pan Hui,et al.  BUBBLE Rap: Social-Based Forwarding in Delay-Tolerant Networks , 2011 .

[17]  L. Freeman Centrality in social networks conceptual clarification , 1978 .

[18]  Peiyan Yuan,et al.  Impact of Strangers on Opportunistic Routing Performance , 2013, Journal of Computer Science and Technology.

[19]  Pan Hui,et al.  BUBBLE Rap: Social-Based Forwarding in Delay-Tolerant Networks , 2008, IEEE Transactions on Mobile Computing.

[20]  Shashi Shekhar,et al.  Time-Aggregated Graphs for Modeling Spatio-temporal Networks , 2006, J. Data Semant..

[21]  Jean-Yves Le Boudec,et al.  Power Law and Exponential Decay of Intercontact Times between Mobile Devices , 2007, IEEE Transactions on Mobile Computing.

[22]  Anders Lindgren,et al.  Probabilistic Routing in Intermittently Connected Networks , 2004, SAPIR.

[23]  Sencun Zhu,et al.  A Social Network Based Patching Scheme for Worm Containment in Cellular Networks , 2009, IEEE INFOCOM 2009.

[24]  Kyunghan Lee,et al.  On the Levy-Walk Nature of Human Mobility , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[25]  Graham Cormode,et al.  Time‐decayed correlated aggregates over data streams , 2009, Stat. Anal. Data Min..

[26]  Huadong Ma,et al.  Hug: Human gathering point based routing for opportunistic networks , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).

[27]  Hiroshi Esaki,et al.  Independent DTNs message deletion mechanism for multi-copy routing scheme , 2010, AINTEC.

[28]  Stephen Farrell,et al.  DTN: an architectural retrospective , 2008, IEEE Journal on Selected Areas in Communications.

[29]  Nam P. Nguyen,et al.  A novel method for worm containment on dynamic social networks , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.