Puneet Varma (Editor)

Opportunistic mobile social network

Updated on
Edit
Like
Comment
Share on FacebookTweet on TwitterShare on LinkedInShare on Reddit

Opportunistic mobile social networks are a form of mobile ad hoc networks that exploit the human social characteristics, such as similarities, daily routines, mobility patterns, and interests to perform the message routing and data sharing. In such networks, the users with mobile devices are able to form on-the-fly social networks to communicate with each other and share data objects.

Contents

Definition

In recent years, opportunistic mobile social networks emerged as a new mechanism of communications in wireless networks. Unlike mobile ad hoc networks (MANETs) that require end-to-end communication paths for message exchange, the communication in opportunistic mobile social networks takes place on the establishment of opportunistic contacts among mobile nodes, without availability of end-to-end message routing paths. As the mobile devices can make contact only when humans come into contact, such networks are tightly coupled with human social networks. Therefore, the opportunistic mobile social networks exploit the human behaviors and social relationships to build more efficient and trustworthy message dissemination schemes.

Opportunism in social networks

It is reported that the estimated number of mobile phone users are 3.3 billion worldwide, which is more than half of the world's population. Most of the mobile phones in the current era are equipped with Wi-Fi, Bluetooth, cameras, sensors, and numerous other components. Moreover, most of the modern vehicles are also installed with communication interfaces and sensory equipment. Such a widespread use and availability of mobile communication devices create a huge number of contact opportunities among humans, and are key to the establishment of opportunistic mobile social networks. The human mobility is the key factor in opportunistic communications, and there could be delays in message transfers as long as the humans carrying mobile devices do not come into each other’s transmission range. Therefore, several research projects are conducted in various parts of the world to analyze the human mobility and social interaction patterns, and on the basis of that to build efficient message routing models that incur minimum message delays.

Social metrics

The most common social metrics that are widely utilized to build message communications by exploiting social networks are betweenness centrality, degree centrality, and closeness centrality. The betweenness centrality measures the extent a node appears on the shortest communication paths (taken by messages) among the other mobile devices. In specific terms, betweenness centrality quantifies the extent of information flow through the current node on the behalf of other nodes. In contrast, degree centrality gives a measurement of the direct interactions of a node with other nodes in an opportunistic mobile social network. The closeness centrality is regarded as a measure of information spread time from a given node to the other nodes in the network. Bubble Rap is a famous message routing scheme developed for opportunistic mobile social networks that exploits the aforementioned metrics to establish communications.

Challenges

Opportunistic mobile social networks face numerous challenges due to the frequent disruptions and delays, and intermittent connectivity environment. One of the major challenges is the insecure communication in such networks, as due to the distributed nature, it is not possible to utilize mature security mechanisms, such as cryptography that requires centralized trusted authorities. Moreover, it is also difficult to maintain trust among the peer nodes due to the disconnected and decentralized environments.

Applications

There are numerous applications of opportunistic mobile social networks, and more applications are evolving as the smart phone technology is advancing.

Opportunistic computing

Opportunistic computing utilize the shared resources, content, services, applications, and computing resources, by the devices connected in an opportunistic mobile social network, to provide a platform for the execution of distributed computing tasks. However, opportunistic computing requires middleware services to cope with the intermittent connectivity and delay of the opportunistic communication environments.

Recommender systems

A novel application area of opportunistic mobile social networks is the recommender systems. Such systems track the user activities, mobility patterns, and utilize the user’s contextual information to provide recommendations on variety of items.

Mobile data offloading

An active area of research in the applications of opportunistic mobile social networks is the mobile data offloading. With large number of ever increasing smart phone users, most of the 3G networks are overloaded. Several research works are performed to utilize opportunistic mobile social networks in offloading of mobile data traffic to reduce the load on 3G networks.

Simulators

There are numerous simulators available that are used to analyze and replay human mobility patterns extracted from the real traces collected through various experiments. Some simulators are capable of generating synthetic human mobility patterns, as well as can simulate real traces; a few examples are given below:

ONE

ONE is a Java-based simulator, and supports the simulation of realistic and synthetic mobility patterns. ONE simulator has many rich features for simulating opportunistic mobile social networks.

References

Opportunistic mobile social network Wikipedia