scispace - formally typeset
Search or ask a question

Showing papers on "Mobility model published in 2011"


Proceedings ArticleDOI
21 Aug 2011
TL;DR: A model of human mobility that combines periodic short range movements with travel due to the social network structure is developed and it is shown that this model reliably predicts the locations and dynamics of future human movement and gives an order of magnitude better performance.
Abstract: Even though human movement and mobility patterns have a high degree of freedom and variation, they also exhibit structural patterns due to geographic and social constraints. Using cell phone location data, as well as data from two online location-based social networks, we aim to understand what basic laws govern human motion and dynamics. We find that humans experience a combination of periodic movement that is geographically limited and seemingly random jumps correlated with their social networks. Short-ranged travel is periodic both spatially and temporally and not effected by the social network structure, while long-distance travel is more influenced by social network ties. We show that social relationships can explain about 10% to 30% of all human movement, while periodic behavior explains 50% to 70%. Based on our findings, we develop a model of human mobility that combines periodic short range movements with travel due to the social network structure. We show that our model reliably predicts the locations and dynamics of future human movement and gives an order of magnitude better performance than present models of human mobility.

2,922 citations


Journal ArticleDOI
TL;DR: The hybrid simulation framework Veins (Vehicles in Network Simulation), composed of the network simulator OMNeT++ and the road traffic simulator SUMO, is developed and can advance the state-of-the-art in performance evaluation of IVC and provide means to evaluate developed protocols more accurately.
Abstract: Recently, many efforts have been made to develop more efficient Inter-Vehicle Communication (IVC) protocols for on-demand route planning according to observed traffic congestion or incidents, as well as for safety applications. Because practical experiments are often not feasible, simulation of network protocol behavior in Vehicular Ad Hoc Network (VANET) scenarios is strongly demanded for evaluating the applicability of developed network protocols. In this work, we discuss the need for bidirectional coupling of network simulation and road traffic microsimulation for evaluating IVC protocols. As the selection of a mobility model influences the outcome of simulations to a great extent, the use of a representative model is necessary for producing meaningful evaluation results. Based on these observations, we developed the hybrid simulation framework Veins (Vehicles in Network Simulation), composed of the network simulator OMNeT++ and the road traffic simulator SUMO. In a proof-of-concept study, we demonstrate its advantages and the need for bidirectionally coupled simulation based on the evaluation of two protocols for incident warning over VANETs. With our developed methodology, we can advance the state-of-the-art in performance evaluation of IVC and provide means to evaluate developed protocols more accurately.

1,356 citations


Journal ArticleDOI
TL;DR: A simple truncated Levy walk mobility (TLW) model is constructed that emulates the statistical features observed in the analysis and under which the performance of routing protocols in delay-tolerant networks (DTNs) and mobile ad hoc networks (MANETs) is measured.
Abstract: We report that human walk patterns contain statistically similar features observed in Levy walks. These features include heavy-tail flight and pause-time distributions and the super-diffusive nature of mobility. Human walks are not random walks, but it is surprising that the patterns of human walks and Levy walks contain some statistical similarity. Our study is based on 226 daily GPS traces collected from 101 volunteers in five different outdoor sites. The heavy-tail flight distribution of human mobility induces the super-diffusivity of travel, but up to 30 min to 1 h due to the boundary effect of people's daily movement, which is caused by the tendency of people to move within a predefined (also confined) area of daily activities. These tendencies are not captured in common mobility models such as random way point (RWP). To evaluate the impact of these tendencies on the performance of mobile networks, we construct a simple truncated Levy walk mobility (TLW) model that emulates the statistical features observed in our analysis and under which we measure the performance of routing protocols in delay-tolerant networks (DTNs) and mobile ad hoc networks (MANETs). The results indicate the following. Higher diffusivity induces shorter intercontact times in DTN and shorter path durations with higher success probability in MANET. The diffusivity of TLW is in between those of RWP and Brownian motion (BM). Therefore, the routing performance under RWP as commonly used in mobile network studies and tends to be overestimated for DTNs and underestimated for MANETs compared to the performance under TLW.

1,054 citations


Proceedings ArticleDOI
21 Aug 2011
TL;DR: It is shown that mobility measures alone yield surprising predictive power, comparable to traditional network-based measures, and the prediction accuracy can be significantly improved by learning a supervised classifier based on combined mobility and network measures.
Abstract: Our understanding of how individual mobility patterns shape and impact the social network is limited, but is essential for a deeper understanding of network dynamics and evolution. This question is largely unexplored, partly due to the difficulty in obtaining large-scale society-wide data that simultaneously capture the dynamical information on individual movements and social interactions. Here we address this challenge for the first time by tracking the trajectories and communication records of 6 Million mobile phone users. We find that the similarity between two individuals' movements strongly correlates with their proximity in the social network. We further investigate how the predictive power hidden in such correlations can be exploited to address a challenging problem: which new links will develop in a social network. We show that mobility measures alone yield surprising predictive power, comparable to traditional network-based measures. Furthermore, the prediction accuracy can be significantly improved by learning a supervised classifier based on combined mobility and network measures. We believe our findings on the interplay of mobility patterns and social ties offer new perspectives on not only link prediction but also network dynamics.

725 citations


Journal ArticleDOI
01 Oct 2011
TL;DR: This work presents the results of a large-scale experiment, based on the detailed trajectories of tens of thousands private cars with on-board GPS receivers, tracked during weeks of ordinary mobile activity, showing the striking analytical power of massive collections of trajectory data in unveiling the complexity of human mobility.
Abstract: The technologies of mobile communications pervade our society and wireless networks sense the movement of people, generating large volumes of mobility data, such as mobile phone call records and Global Positioning System (GPS) tracks. In this work, we illustrate the striking analytical power of massive collections of trajectory data in unveiling the complexity of human mobility. We present the results of a large-scale experiment, based on the detailed trajectories of tens of thousands private cars with on-board GPS receivers, tracked during weeks of ordinary mobile activity. We illustrate the knowledge discovery process that, based on these data, addresses some fundamental questions of mobility analysts: what are the frequent patterns of people's travels? How big attractors and extraordinary events influence mobility? How to predict areas of dense traffic in the near future? How to characterize traffic jams and congestions? We also describe M-Atlas, the querying and mining language and system that makes this analytical process possible, providing the mechanisms to master the complexity of transforming raw GPS tracks into mobility knowledge. M-Atlas is centered onto the concept of a trajectory, and the mobility knowledge discovery process can be specified by M-Atlas queries that realize data transformations, data-driven estimation of the parameters of the mining methods, the quality assessment of the obtained results, the quantitative and visual exploration of the discovered behavioral patterns and models, the composition of mined patterns, models and data with further analyses and mining, and the incremental mining strategies to address scalability.

310 citations


Journal ArticleDOI
TL;DR: The state of the art in the field of human mobility analysis is reviewed and existing approaches to mobility modeling are fit into a taxonomy that provides the basis for a discussion on open problems and further directions for research on modeling human mobility.
Abstract: Mobile ad hoc networks enable communications between clouds of mobile devices without the need for a preexisting infrastructure. One of their most interesting evolutions are opportunistic networks, whose goal is to also enable communication in disconnected environments, where the general absence of an end-to-end path between the sender and the receiver impairs communication when legacy MANET networking protocols are used. The key idea of OppNets is that the mobility of nodes helps the delivery of messages, because it may connect, asynchronously in time, otherwise disconnected subnetworks. This is especially true for networks whose nodes are mobile devices (e.g., smartphones and tablets) carried by human users, which is the typical OppNets scenario. In such a network where the movements of the communicating devices mirror those of their owners, finding a route between two disconnected devices implies uncovering habits in human movements and patterns in their connectivity (frequencies of meetings, average duration of a contact, etc.), and exploiting them to predict future encounters. Therefore, there is a challenge in studying human mobility, specifically in its application to OppNets research. In this article we review the state of the art in the field of human mobility analysis and present a survey of mobility models. We start by reviewing the most considerable findings regarding the nature of human movements, which we classify along the spatial, temporal, and social dimensions of mobility. We discuss the shortcomings of the existing knowledge about human movements and extend it with the notion of predictability and patterns. We then survey existing approaches to mobility modeling and fit them into a taxonomy that provides the basis for a discussion on open problems and further directions for research on modeling human mobility.

239 citations


Journal ArticleDOI
TL;DR: Preliminary experiments with GEPETO are reported on for comparing different clustering algorithms and heuristics that can be used as inference attacks, and evaluate their efficiency for the identification of point of interests, as well as their resilience to sanitization mechanisms such as sampling and perturbation.
Abstract: Due to the emergence of geolocated applications, more and more mobility traces are generated on a daily basis and collected in the form of geolocated datasets. If an unauthorized entity can access this data, it can use it to infer personal information about the individuals whose movements are contained within these datasets, such as learning their home and place of work or even their social network, thus causing a privacy breach. In order to protect the privacy of individuals, a sanitization process, which adds uncertainty to the data and removes some sensitive information, has to be performed. The global objective of GEPETO (for GEoPrivacy Enhancing TOolkit) is to provide researchers concerned with geo-privacy with means to evaluate various sanitization techniques and inference attacks on geolocated data. We describe our experiments conducted with GEPETO for comparing different inference attacks, and evaluating their efficiency for the identification of point of interests, as well as their resilience to sanitization mechanisms such as sampling and perturbation. We also introduce a mobility model that we coin as mobility Markov Chain, which can represent in a compact yet precise way the mobility behaviour of an individual. Finally, we describe an algorithm for learning such a structure from the mobility traces of an individual and we report on experimentations performed with real mobility data.

205 citations


Proceedings ArticleDOI
01 Nov 2011
TL;DR: This paper introduces SmartDC, a mobility prediction-based adaptive duty cycling scheme to provide contextual information about a user's mobility: time-resolved places and paths to maximize the accuracy of monitoring meaningful places with a given energy constraint.
Abstract: Monitoring a user's mobility during daily life is an essential requirement in providing advanced mobile services. While extensive attempts have been made to monitor user mobility, previous work has rarely addressed issues with battery lifetime in real deployment. In this paper, we introduce SmartDC, a mobility prediction-based adaptive duty cycling scheme to provide contextual information about a user's mobility: time-resolved places and paths. Unlike previous approaches that focused on minimizing energy consumption for tracking raw coordinates, we propose efficient techniques to maximize the accuracy of monitoring meaningful places with a given energy constraint. SmartDC comprises unsupervised mobility learner, mobility predictor, and Markov decision process-based adaptive duty cycling. SmartDC estimates the regularity of individual mobility and predicts residence time at places to determine efficient sensing schedules. Our experiment results show that SmartDC consumes 81% less energy than the periodic sensing schemes, and 87% less energy than a scheme employing context-aware sensing, yet it still correctly monitors 80% of a user's location changes within a 160-second delay.

154 citations


Journal ArticleDOI
01 Apr 2011
TL;DR: The requirements of mobility management for vehicular networks are identified, and the existing mobility management schemes are reviewed based on two communication scenarios in Vehicular networks, namely, vehicle-to-vehicle (V2V) and vehicle- to-infrastructure (V1I) communications.
Abstract: Mobility management is one of the most challenging research issues for vehicular networks to support a variety of intelligent transportation system (ITS) applications. The traditional mobility management schemes for Internet and mobile ad hoc network (MANET) cannot meet the requirements of vehicular networks, and the performance degrades severely due to the unique characteristics of vehicular networks (e.g., high mobility). Therefore, mobility management solutions developed specifically for vehicular networks would be required. This paper presents a comprehensive survey on mobility management for vehicular networks. First, the requirements of mobility management for vehicular networks are identified. Then, classified based on two communication scenarios in vehicular networks, namely, vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications, the existing mobility management schemes are reviewed. The differences between host-based and network-based mobility management are discussed. To this end, several open research issues in mobility management for vehicular networks are outlined. Copyright © 2009 John Wiley & Sons, Ltd.

148 citations


Journal ArticleDOI
TL;DR: This paper is the first to investigate how the selfish behaviors of nodes affect the performance of DTN multicast, and model the message delivery process under selfish behaviors by a 3-D continuous time Markov chain.
Abstract: Due to the uncertainty of transmission opportunities between mobile nodes, delay tolerant networks (DTNs) exploit the opportunistic forwarding mechanism. This mechanism requires nodes to forward messages in a cooperative and selfish way. However, in the real word, most of the nodes exhibit selfish behaviors, such as individual and social selfishness. In this paper, we are the first to investigate how the selfish behaviors of nodes affect the performance of DTN multicast. We consider two typical multicast relaying schemes, namely, two-hop relaying and epidemic relaying, and study their performance in terms of average message transmission delay and transmission cost. Specifically, we model the message delivery process under selfish behaviors by a 3-D continuous time Markov chain; under this model, we derive closed-form formulas for the message transmission delay and cost. Then, we evaluate the accuracy of the proposed Markov chain model by comparing the theoretical results with the simulation results obtained by simulating the message dissemination under both two-hop and epidemic relaying with different network sizes and mobility models. Our study shows that different selfish behaviors may have different impacts on different performance metrics. In addition, selfish behaviors influence epidemic relaying more than two-hop relaying. Furthermore, our results show that the performance of multicast with selfish nodes depends on the multicast group size.

145 citations


Proceedings ArticleDOI
31 Oct 2011
TL;DR: A novel multi-hop clustering scheme is presented to establish stable vehicle groups and a new mobility metric is introduced to represent relative mobility between vehicles inMulti-hop distance.
Abstract: Vast applications introduced by Vehicular Ad-Hoc Networks (VANETs), such as intelligent transportation, roadside advertisement, make VANETs become an important component of metropolitan area networks. In VANETs, mobile nodes are vehicles which are equipped with wireless antennas; and they can communicate with each others by wireless communication on ad-hoc mode or infrastructure mode. Compared with Mobile Ad-Hoc Networks, VANETs have some inherent characteristic, such as high speed, sufficient energy, etc. According to previous research, clustering vehicles into different groups can introduce many advantages for VANETs. However, because a VANET is a high dynamic scenario, it is hard to find a solution to divide vehicles into stable clusters. In this paper, a novel multi-hop clustering scheme is presented to establish stable vehicle groups. To construct multi-hop clusters, a new mobility metric is introduced to represent relative mobility between vehicles in multi-hop distance. Extensive simulation experiments are run using ns2 to demonstrate the performance of our clustering scheme. To test the clustering scheme under different scenarios, both the Manhattan mobility model and the freeway mobility model are used to generate the movement paths for vehicles.

Journal ArticleDOI
TL;DR: Existing mobility management solutions in mobile Internet are surveyed, the limitations of a centralized mobility management approach are explained, and potential approaches of distributing mobility management functions are discussed.
Abstract: Cellular networks have been hierarchical so that mobility management have primarily been deployed in a centralized architecture. More flattened network architecture for the mobile Internet is anticipated to meet the needs of rapidly increasing traffic from the mobile users and to reduce cost in the core network. Distributing the mobility management functions as opposed to centralizing them at the root of the network hierarchy is more compatible with a flat network architecture. Mobility management may be distributed at different levels: core level, access router level, access level, and host level. It may also be partially distributed or fully distributed. A distributed mobility management architecture avoids unnecessarily long routes, is more scalable with the increasing number of mobile users, and is a convenient platform for dynamic mobility management which means providing mobility support to mobile users only when they need the support. Dynamic mobility management can avoid waste of resources and also reduce signaling overhead and network cost. The desired distributed and dynamic mobility management needs to solve existing problems, meet the needs of changes in traffic and network architecture, and be simple and inexpensive to deploy. This paper surveys existing mobility management solutions in mobile Internet, explains the limitations of a centralized mobility management approach, and discusses potential approaches of distributing mobility management functions. The issues and challenges in the design of distributed and dynamic mobility management are also described.

Proceedings ArticleDOI
01 Dec 2011
TL;DR: LTE4V2X is presented, a novel framework for a centralized vehicular network organization using LTE that takes advantage of a centralized architecture around the eNodeB in order to optimize the clusters management and provide better performances.
Abstract: Vehicular networks face a number of new challenges, particularly due to the extremely dynamic network topology and the large variable number of mobile nodes. To overcome these problems, an effective solution is to organize the network in a way which will facilitate the management tasks and permit to deploy a wide panoply of applications such as urban sensing applications. This paper presents LTE4V2X, a novel framework for a centralized vehicular network organization using LTE. It takes advantage of a centralized architecture around the eNodeB in order to optimize the clusters management and provide better performances. We studied its performances against a decentralized organization protocol for a well known urban sensing application, FCD application. We analyze the performances of LTE4V2X using NS-3 simulation environment and a realistic urban mobility model. We show that it permits performance improvement by lowering the overhead induced by control messages, reducing the FCD packet losses, as well as enhancing the goodput.

Journal ArticleDOI
TL;DR: A geographical routing algorithm called location-aware routing for delay-tolerant networks (LAROD), enhanced with a location service, location dissemination service (LoDiS), which together are shown to suit an intermittently connected MANET (IC-MANET).
Abstract: Combining mobile platforms such as manned or unmanned vehicles and peer-assisted wireless communication is an enabler for a vast number of applications. A key enabler for the applications is the routing protocol that directs the packets in the network. Routing packets in fully connected mobile ad hoc networks (MANETs) has been studied to a great extent, but the assumption on full connectivity is generally not valid in a real system. This case means that a practical routing protocol must handle intermittent connectivity and the absence of end-to-end connections. In this paper, we propose a geographical routing algorithm called location-aware routing for delay-tolerant networks (LAROD), enhanced with a location service, location dissemination service (LoDiS), which together are shown to suit an intermittently connected MANET (IC-MANET). Because location dissemination takes time in IC-MANETs, LAROD is designed to route packets with only partial knowledge of geographic position. To achieve low overhead, LAROD uses a beaconless strategy combined with a position-based resolution of bids when forwarding packets. LoDiS maintains a local database of node locations, which is updated using broadcast gossip combined with routing overhearing. The algorithms are evaluated under a realistic application, i.e., unmanned aerial vehicles deployed in a reconnaissance scenario, using the low-level packet simulator ns-2. The novelty of this paper is the illustration of sound design choices in a realistic application, with holistic choices in routing, location management, and the mobility model. This holistic approach justifies that the choice of maintaining a local database of node locations is both essential and feasible. The LAROD-LoDiS scheme is compared with a leading delay-tolerant routing algorithm (spray and wait) and is shown to have a competitive edge, both in terms of delivery ratio and overhead. For spray and wait, this case involved a new packet-level implementation in ns-2 as opposed to the original connection-level custom simulator.

Journal ArticleDOI
TL;DR: A comprehensive and up-to-date survey of available movement traces, modeling/analyses of these traces, and synthetic mobility models that include position information is provided.

Proceedings ArticleDOI
10 Apr 2011
TL;DR: By means of analytical models, it is shown that an opportunistic content sharing system, without any supporting infrastructure, can be a viable and surprisingly reliable option for content sharing as long as a certain criterion, referred to as the criticality condition, is met.
Abstract: We consider an opportunistic content sharing system designed to store and distribute local spatio-temporal “floating” information in uncoordinated P2P fashion relying solely on the mobile nodes passing through the area of interest, referred to as the anchor zone. Nodes within the anchor zone exchange the information in opportunistic manner, i.e., whenever two nodes come within each others' transmission range. Outside the anchor zone, the nodes are free to delete the information, since it is deemed relevant only for the nodes residing inside the anchor zone. Due to the random nature of the operation, there are no guarantees, e.g., for the information availability. By means of analytical models, we show that such a system, without any supporting infrastructure, can be a viable and surprisingly reliable option for content sharing as long as a certain criterion, referred to as the criticality condition, is met. The important quantity is the average number of encounters a randomly chosen node experiences during its sojourn time in the anchor zone, which again depends on the communication range and the mobility pattern. The theoretical studies are complemented with simulation experiments with various mobility models showing good agreement with the analytical results.

Journal ArticleDOI
TL;DR: By analyzing a simplified mobility model that captures the effect of hot areas in the city, it is rigorously proved that common traffic influxes play a major role in generating the exponential tail of the intercontact time.
Abstract: Intercontact time between moving vehicles is one of the key metrics in vehicular ad hoc networks (VANETs) and central to forwarding algorithms and the end-to-end delay. Due to prohibitive costs, little work has conducted experimental study on intercontact time in urban vehicular environments. In this paper, we carry out an extensive experiment involving thousands of operational taxies in Shanghai city. Studying the taxi trace data on the frequency and duration of transfer opportunities between taxies, we observe that the tail distribution of the intercontact time, that is, the time gap separating two contacts of the same pair of taxies, exhibits an exponential decay, over a large range of timescale. This observation is in sharp contrast to recent empirical data studies based on human mobility, in which the distribution of the intercontact time obeys a power law. By analyzing a simplified mobility model that captures the effect of hot areas in the city, we rigorously prove that common traffic influxes, where large volume of traffic converges, play a major role in generating the exponential tail of the intercontact time. Our results thus provide fundamental guidelines on design of new vehicular mobility models in urban scenarios, new data forwarding protocols and their performance analysis.

Journal ArticleDOI
TL;DR: This article presents and compares two possible approaches to IP flow mobility offloading that are currently being considered by the IETF and is based on extending existing client-based IP mobility solutions to allow flow mobility where the user terminal is fully involved in the mobility process.
Abstract: The recent proliferation of smartphone-based mobile Internet services has created an extraordinary growth in data traffic over cellular networks This growth has fostered interest in exploring alternatives to alleviate data congestion while delivering a positive user experience It is known that a very small number of users and applications cause a big percentage of the traffic load Hence, adopting smarter traffic management mechanisms is one of the considered alternatives These mechanisms allow telecom operators to move selected IP data traffic, for instance, between the cellular infrastructure and the WLAN infrastructure, which is considered a key feature in the latest 3GPP and IETF specifications This article presents and compares two possible approaches to IP flow mobility offloading that are currently being considered by the IETF The first one is based on extending existing client-based IP mobility solutions to allow flow mobility where the user terminal is fully involved in the mobility process, and the second one is based on extending current network- based IP mobility solutions where the user terminal is not aware of the mobility

Proceedings ArticleDOI
17 May 2011
TL;DR: A Hypergraph is proposed to model time-synchronized meetings of nodes from different communities as a social overlay and it is shown that it reproduces correct bridging behavior while keeping other features of the original models intact.
Abstract: Realistic mobility models are crucial for the simulation of Delay Tolerant and Opportunistic Networks. The long standing benchmark of reproducing realistic pairwise statistics (e.g., contact and inter-contact time distributions) is today mastered by state-of-the-art models. However, mobility models should also reflect the macroscopic community structure of who meets whom. While some existing models reproduce realistic community structure - reflecting groups of nodes who work or live together - they fail in correctly capturing what happens between such communities: they are often connected by few bridging links between nodes who socialize outside of the context and location of their home communities. In a first step, we analyze the bridging behavior in mobility traces and show how it differs to that of mobility models. By analyzing the context and location of contacts, we then show that it is the social nature of bridges which makes them differ from intra-community links. Based on these insights, we propose a Hypergraph to model time-synchronized meetings of nodes from different communities as a social overlay. Applying this as an extension to two existing mobility models we show that it reproduces correct bridging behavior while keeping other features of the original models intact.

Proceedings ArticleDOI
01 Dec 2011
TL;DR: A mobility prediction clustering algorithm (MPCA) relying on the attributes of UAV is proposed, the dictionary Trie structure prediction algorithm and link expiration time mobility model are applied in this clustering algorithms to solve the difficulty of high mobility of Uav.
Abstract: In recent years, with the increasingly widespread application of unmanned aerial vehicle (UAV), the network technology of UAV has also caused for concern. In this paper, according to the background of related technologies of UAV, a mobility prediction clustering algorithm (MPCA) relying on the attributes of UAV is proposed. The dictionary Trie structure prediction algorithm and link expiration time mobility model are applied in this clustering algorithm to solve the difficulty of high mobility of UAV. The simulation shows that the reasonable clusterhead electing algorithm and on-demand cluster maintenance mechanism guarantee the stability of the cluster structure and the performance of the network.

Journal ArticleDOI
TL;DR: This paper derives probability density of the received power for mobile networks with random mobility models by considering the power received at an access point from a particular mobile node using Random Direction and Random way-point models.
Abstract: Probability density of the received power is well analyzed for wireless networks with static nodes. However, most of the present days networks are mobile and not much exploration has been done on statistical analysis of the received power for mobile networks in particular, for the network with random moving patterns. In this paper, we derive probability density of the received power for mobile networks with random mobility models. We consider the power received at an access point from a particular mobile node. Two mobility models are considered: Random Direction (RD) model and Random way-point (RWP) model. Wireless channel is assumed to have a small scale fading of Rayleigh distribution and path loss exponent of 4. 3D, 2D and 1D deployment of nodes are considered. Our findings show that the probability density of the received power for RD mobility models for all the three deployment topologies are weighted confluent hypergeometric functions. In case of RWP mobility models, the received power probability density for all the three deployment topologies are linear combinations of confluent hypergeometric functions. The analytical results are validated through NS2 simulations and a reasonably good match is found between analytical and simulation results.

Journal ArticleDOI
TL;DR: It is discovered that correlated node movements have a huge impact on asymptotic throughput and delay and can sometimes lead to better performance than the one achievable under independent nodes movements.
Abstract: We extend the analysis of the scaling laws of wireless ad hoc networks to the case of correlated nodes movements, which are commonly found in real mobility processes. We consider a simple version of the Reference Point Group Mobility model, in which nodes belonging to the same group are constrained to lie in a disc area, whose center moves uniformly across the network according to the i.i.d. model. We assume fast mobility conditions and take as a primary goal the maximization of per-node throughput. We discover that correlated node movements have a huge impact on asymptotic throughput and delay and can sometimes lead to better performance than the one achievable under independent nodes movements.

Proceedings ArticleDOI
10 Apr 2011
TL;DR: This paper uses higher order Markov chains to characterize urban vehicular mobility patterns, which adapt as ICTs between vehicles continuously get updated, and develops a message forwarding strategy that can dramatically increase delivery ratio and reduce end-to-end delay while generating similar network traffic.
Abstract: Inter-contact times (ICTs) between moving vehicles are one of the key metrics in vehicular networks, and they are also central to forwarding algorithms and the end-to-end delay. Recent study on the tail distribution of ICTs based on theoretical mobility models and empirical trace data shows that the delay between two consecutive contact opportunities drops exponentially. While theoretical results facilitate problem analysis, how to design practical opportunistic forwarding protocols in vehicular networks, where messages are delivered in carry-and-forward fashion, is still unclear. In this paper, we study three large sets of Global Positioning System (GPS) traces of more than ten thousand public vehicles, collected from Shanghai and Shenzhen, two metropolises in China. By mining the temporal correlation and the evolution of ICTs between each pair of vehicles, we use higher order Markov chains to characterize urban vehicular mobility patterns, which adapt as ICTs between vehicles continuously get updated. Then, the next hop for message forwarding is determined based on the previous ICTs. With our message forwarding strategy, it can dramatically increase delivery ratio (up to 80%) and reduce end-to-end delay (up to 50%) while generating similar network traffic comparing to current strategies based on the delivery probability or the expected delay.

Book ChapterDOI
09 May 2011
TL;DR: A framework for analyzing epidemic spreading processes on mobile ad hoc networks is presented, the first to derive the epidemic threshold for any mobility model under the SIS model is derived, and it is shown that the node velocity in mobility models does not affect the epidemic thresholds.
Abstract: Short-range, point-to-point communications for mobile users enjoy increasing popularity, particularly with the rise in Bluetooth -equippedmobile devices.Unfortunately, virus writers have begun exploiting lax security in many mobile devices and subsequently developed malware exploiting proximity-based propagation mechanisms (e.g. Cabir or CommWarrior). So, if given an ad-hoc network of such mobile users, will a proximity-spreading virus survive or die out; that is, can we determine the "tipping point" between survival and die out? What effect does the average user velocity have on such spread? We answer the initial questions and more. Our contributions in this paper are: (a) we present a framework for analyzing epidemic spreading processes on mobile ad hoc networks, (b) using our framework, we are the first to derive the epidemic threshold for any mobility model under the SIS model, and (c) we show that the node velocity in mobility models does not affect the epidemic threshold. Additionally, we introduce a periodic mobility model and provide evaluation via our framework. We validate our theoretical predictions using a combination of simulated and synthetic mobility data, showing ultimately, our predictions accurately estimate the epidemic threshold of such systems.

Journal ArticleDOI
01 Feb 2011-Sensors
TL;DR: This paper proposes a network based mobility supported IP-WSN protocol called Sensor Proxy Mobile IPv6 (SPMIPv6), presents its architecture, message formats and also evaluates its performance considering signaling cost, mobility cost and energy consumption.
Abstract: IP based Wireless Sensor Networks (IP-WSNs) are gaining importance for their broad range of applications in health-care, home automation, environmental monitoring, industrial control, vehicle telematics and agricultural monitoring. In all these applications, mobility in the sensor network with special attention to energy efficiency is a major issue to be addressed. Host-based mobility management protocols are not suitable for IP-WSNs because of their energy inefficiency, so network based mobility management protocols can be an alternative for the mobility supported IP-WSNs. In this paper we propose a network based mobility supported IP-WSN protocol called Sensor Proxy Mobile IPv6 (SPMIPv6). We present its architecture, message formats and also evaluate its performance considering signaling cost, mobility cost and energy consumption. Our analysis shows that with respect to the number of IP-WSN nodes, the proposed scheme reduces the signaling cost by 60% and 56%, as well as the mobility cost by 62% and 57%, compared to MIPv6 and PMIPv6, respectively. The simulation results also show that in terms of the number of hops, SPMIPv6 decreases the signaling cost by 56% and 53% as well as mobility cost by 60% and 67% as compared to MIPv6 and PMIPv6 respectively. It also indicates that proposed scheme reduces the level of energy consumption significantly.

Proceedings ArticleDOI
21 Mar 2011
TL;DR: This paper presents a comprehensive configurable mobility model MoBAN for evaluating intra-and extra-WBAN communication and implements different postures as well as individual node mobility within a particular posture.
Abstract: A good mobility model is an essential prerequisite for performance evaluation of protocols for wireless networks with node mobility. Sensor nodes in a Wireless Body Area Network (WBAN) exhibit high mobility. The WBAN topology may completely change because of posture changes and movement even within a certain type of posture. The WBAN also moves as a whole in an ambient network. Therefore, an appropriate mobility model is of great importance for performance evaluation. This paper presents a comprehensive configurable mobility model MoBAN for evaluating intra-and extra-WBAN communication. It implements different postures as well as individual node mobility within a particular posture. The model can be adapted to a broad range of applications for WBANs. The model is made available through http://www.es.ele.tue.nl/nes/, as an add-on to the mobility framework of the OMNeT++ simulator. Two case studies illustrate the use of the mobility model for performance evaluation of network protocols.

Book
15 Feb 2011
TL;DR: Wireless sensor networks are about to be part of everyday life and homes and workplaces capable of self-controlling and adapting air-conditioning for different temperature and humidity levels...
Abstract: Wireless sensor networks are about to be part of everyday life. Homes and workplaces capable of self-controlling and adapting air-conditioning for different temperature and humidity levels, sleepless forests ready to detect and react in case of a fire, vehicles able to avoid sudden obstacles or possibly able to self-organize routes to avoid congestion, and so on, will probably be commonplace in the very near future. Mobility plays a central role in such systems and so does passive mobility, that is, mobility of the network stemming from the environment itself. The population protocol model was an intellectual invention aiming to describe such systems in a minimalistic and analysis-friendly way. Having as a starting-point the inherent limitations but also the fundamental establishments of the population protocol model, we try in this monograph to present some realistic and practical enhancements that give birth to some new and surprisingly powerful (for these kind of systems) computational models....

Proceedings ArticleDOI
31 Oct 2011
TL;DR: This work presents SMOOTH, a new mobility model that is realistic, based on several known features of human movement, and simple to use and compares it with other mobility models developed based on these mobility traces.
Abstract: In addition to being realistic, a mobility model should be easy to understand and use. Unfortunately, most of the simple mobility models proposed thus far are not realistic and most of the realistic mobility models proposed thus far are not simple to use. The main contribution of this work is to present SMOOTH, a new mobility model that is realistic (e.g., SMOOTH is based on several known features of human movement) and is simple to use (e.g., SMOOTH does not have any complex input parameters). We first present SMOOTH. We then validate that SMOOTH imitates human movement patterns present in real mobility traces collected from a range of diverse scenarios. In addition, we compare SMOOTH with the other mobility models developed based on these mobility traces. Thus, with SMOOTH, we provide researchers with a tool that allows them to leverage the statistical features present in real human movement in a simple and easy to understand manner.

Book ChapterDOI
09 May 2011
TL;DR: A novel mobility prediction based hello protocol, named ARH (Autoregressive Hello protocol), each node predicts its own position by an ever-updated autoregression-based mobility model, and neighboring nodes predict its position by the same model.
Abstract: Hello protocol is the basic technique for neighborhood discovery in wireless ad hoc networks. It requires nodes to claim their existence/ aliveness by periodic 'hello' messages. Central to a hello protocol is the determination of 'hello' message transmission rate. No fixed optimal rate exists in the presence of node mobility. The rate should in fact adapt to it, high for high mobility and low for low mobility. In this paper, we propose a novel mobility prediction based hello protocol, named ARH (Autoregressive Hello protocol). Each node predicts its own position by an ever-updated autoregression-based mobility model, and neighboring nodes predict its position by the same model. The node transmits 'hello' message (for location update) only when the predicted location is too different from the true location (causing topology distortion), triggering mobility model correction on both itself and each of its neighbors. ARH evolves along with network dynamics, and seamlessly tunes itself to the optimal configuration on the fly using local knowledge only. Through simulation, we demonstrate the effectiveness and efficiency of ARH, in comparison with the only competitive protocol TAP (Turnover based Adaptive hello Protocol) [9]. With a small model order, ARH achieves the same high neighborhood discovery performance as TAP, with dramatically reduced message overhead (about 50% lower 'hello' rate).

Proceedings ArticleDOI
01 Nov 2011
TL;DR: A 3-dimensional Gauss-Markov mobility model in ns-3 is implemented that appears to be more realistic than memoryless models such as random waypoint and random walk and is able to simulate the airborne networking environment with greater realism than was previously possible.
Abstract: Emerging airborne networks require domainspecific routing protocols to cope with the challenges faced by the highly-dynamic aeronautical environment. We present an ns-3 based performance comparison of the AeroRP protocol with conventional MANET routing protocols. To simulate a highly-dynamic airborne network, accurate mobility models are needed for the physical movement of nodes. The fundamental problem with many synthetic mobility models is their random, memoryless behavior. Airborne ad hoc networks require a flexible memory-based 3-dimensional mobility model. Therefore, we have implemented a 3-dimensional Gauss-Markov mobility model in ns-3 that appears to be more realistic than memoryless models such as random waypoint and random walk. Using this model, we are able to simulate the airborne networking environment with greater realism than was previously possible and show that AeroRP has several advantages over other MANET routing protocols.