Research Article  Open Access
Location PredictionBased Data Dissemination Using Swarm Intelligence in Opportunistic Cognitive Networks
Abstract
Swarm intelligence is widely used in the application of communication networks. In this paper we adopt a biologically inspired strategy to investigate the data dissemination problem in the opportunistic cognitive networks (OCNs). We model the system as a centralized and distributed hybrid system including a location prediction server and a pervasive environment deploying the largescale humancentric devices. To exploit such environment, data gathering and dissemination are fundamentally based on the contact opportunities. To tackle the lack of contemporaneous endtoend connectivity in opportunistic networks, we apply ant colony optimization as a cognitive heuristic technology to formulate a selfadaptive disseminationbased routing scheme in opportunistic cognitive networks. This routing strategy has attempted to find the most appropriate nodes conveying messages to the destination node based on the location prediction information and intimacy between nodes, which uses the online unsupervised learning on geographical locations and the biologically inspired algorithm on the relationship of nodes to estimate the delivery probability. Extensive simulation is carried out on the realworld traces to evaluate the accuracy of the location prediction and the proposed scheme in terms of transmission cost, delivery ratio, average hops, and delivery latency, which achieves better routing performances compared to the typical routing schemes in OCNs.
1. Introduction
Cognitive networks [1] have already been prototyped for many commercial and civilian applications. Combined with the social intelligence, cognitive networks promise to support services like citizen journalism, mobile social networking, environmental monitoring, and traffic monitoring by integrating ubiquitous sensing, largescale data collection, and cloud computing. Opportunistic network [2] provides an ideal solution for promoting the evolution of communication among human beings and machines. Cognitive network technology can be applied to the communication system of opportunistic networks to provide heuristic schemes on the algorithm design and system implementation. Smart handheld devices (e.g., smart phone or PDA) carried by a large number of participants contribute to opportunistic cognitive networks with their sensing and communication parts [3, 4].
Moreover, by including people in the loop, it is now possible to design applications that can dramatically improve daily lives of individuals and communities. The inherent mobility of participants provides unprecedented spatiotemporal coverage and also makes it possible to observe various events. CarTel [5] is a mobile sensor computing system designed to collect, process, deliver, and visualize data from sensors located on mobile units such as automobiles. PEIR [6] is an application that uses location data sampled from everyday mobile phones to calculate personalized estimates of environmental impact and exposure.
The opportunistic cognitive network is a kind of delay tolerant networks (DTNs), and it utilizes communication opportunities obtained from node movement to relay packets. Mobile nodes are enabled to communicate with each other even if a route connecting them never exists. The basic routing strategy of opportunistic networks is “storecarryforward.” Messages are routed between the sender and the destination(s), and any possible node can be used as a relay, provided that it is likely to bring the message closer to the final destination. Message transmission is mainly dependent on intermediate relays, so relay node selection is critical for efficient data dissemination in opportunistic cognitive networks.
Since human mobility is mostly unpredictable, conventional routing algorithms for mobile ad hoc networks (MANETs) no longer perform well in the opportunistic cognitive networks. Therefore, new algorithms are required to overcome intermittent connectivity in the opportunistic networks.
Stochastic routing protocols, such as Epidemic [7], First Contact (FC) [8], and Direct Delivery (DD) [9], broadcast messages to any encountered node in order to increase the delivery ratio. Epidemic routing diffuses messages similar to the way viruses or bacteria spread in biology. Whenever encountering another node, a node replicates and transfers messages. After receiving messages, a node will move to other places and continuously replicate and deliver the messages to other encountered ones. First Contact sends messages to the first encountered node without copying the messages to other nodes. Direct Delivery comprises the tradeoff between Epidemic and First Contact by finding an optimal number of message copies.
Creating more copies of a message increases the message delivery but decreases the network lifetime. These stochastic routing approaches usually consider the destinations of messages as nodes rather than locations.
Different from stochastic routing, current contactbased routing chooses the most appropriate nodes relaying messages to the destinations based on historical contact information, such as contact times, contact duration, and contact cycle.
Probabilistic Routing Protocol using History of Encounters and Transitivity (PRoPHET) [10] is a contextbased routing protocol based on the history of encounters. PRoPHET estimates the delivery predictability for each known destination at each node before passing a message. The estimation is based on the history of encounters between nodes. SimBet [11] uses historical contacts to calculate two metrics, similarity, and betweenness. The similarity is calculated by how frequently a node and its destination have met. The betweenness is calculated by how many nodes which a node has met. However, if the utility metrics are equal, SimBet will prevent its forwarding behavior. To improve this flaw, BUBBLE [12] adds the knowledge of community structure to ensure message dissemination. In addition, the betweenness may be useless if the message is near its destination. SimBetAge [13], an improved version of SimBet, was proposed to address these shortcomings. Spray and Wait [14], that uses only a handful of copies per message, can achieve comparable delays to an oraclebased optimal scheme that minimizes delay while using the lowest possible number of transmissions.
The work in [15] does routing by simply calculating the delivery probability for a node to be at a location in MobySpace, which is a highdimensional Euclidean space based on the preknown mobility model. However, the required assumption of that each node has the knowledge about mobility patterns of other nodes in the network makes this work unpractical in realistic scenarios.
For the concerns of optimality, robustness, and flexibility, some routing protocols are developed by inspiration from biology [16–21]. Such routing schemes are also well applied in the transportation domain [22–26], which are based on prediction mechanism to improve the performance of transportation systems.
BeeHive is developed with inspiration of the foraging principles of honeybees [27]. Communication between real bees is modeled by designing intelligent bee agents, which are able to make routing decisions in large and complex topologies. The simulation results conclude that bee agents occupy smaller bandwidth and require less processor time. Artificial Bee Colony algorithm [17] is developed with scanning strategy for periodic vehicle routing problem. The work in [28] presents a biologically inspired discreteevent modeling approach for simulating alternative computer network protocols. Adaptation and probabilistic specifications are introduced into honeybee (BEE) and Routing Information Protocol (RIP) routing algorithms.
The ant colony optimization (ACO) methods have been inspired by operating principles of ants [29], which empower a colony of ants to perform complex tasks such as nest building and foraging [30].
Schoonderwoerd [31] first developed ACObased approach for routing in telecommunication networks. The basic principle in the approach is about the use of stigmergy in multiagents interaction. Randomized ants traverse the network nodes probabilistically and select the highest probability path. The approach is shown to be sufficiently adaptive and demonstrates robustness across difficult network conditions. Yao et al. [19, 20] improved ACO for delivery routing problem and PROMETShop scheduling problems.
The aforementioned routing algorithms show good performance on message delivery. However geographic coordinates of nodes have little or no correlation with their contact times, so the algorithms do not perform well when each device frequently appears at different regions, as most people daily do.
In this paper, we propose the locationprediction and swarmintelligencebased data dissemination (LOPSI) algorithm for opportunistic cognitive networks. The LOPSI algorithm is a probabilistic routing protocol combining location prediction and the ant colony optimization. It firstly predicts possible locations of relay nodes and destination(s) in successive time series. The mobile nodes calculate intimacy (contact frequency) with potential relay nodes using ACO and then make a forwarding decision based on node intimacy and probabilities of node mobility.
The remainder of this paper is organized as follows. The system model is illustrated in Section 2. Section 3 specifies the data dissemination algorithm. Extensive simulations have been done for performance evaluation in Section 4. Section 5 concludes the paper.
2. Network Model
As mentioned in Section 1, the locationprediction and swarmintelligencebased data dissemination (LOPSI) algorithm is a probabilistic routing protocol using location and intimacy information of potential relay nodes and destination nodes. The network is a mixture of an opportunistic network and a centralized infrastructure as shown in Figure 1. The centralized infrastructure consists of a number of wireless access points (APs) and a backbone connecting the APs.
Mobile nodes (carrying smart devices) can only access to the network when they are walking into the transmission range of any AP. Each AP periodically uploads connection records of mobile nodes to the location prediction server (LPS) which will eventually maintain a mobility database of all nodes.
The data exchanged in this scenario is assumed to be of high magnitude, and data transmission can only occurs between peer counterparts as in normal opportunistic networks. The LPS is merely responsible for storing node mobility records and predicting node location upon receiving query from mobile nodes via one of the APs. The accuracy of the localization prediction algorithm can increase the delivery ratio of the proposed approach.
In the proposed system, there exist two major entities: the mobile nodes and the LPS. The mobile nodes work in a decentralized manner, while the LPS is a powerful central unit which collects the trajectories of mobile users and performs complex computation tasks to provide location prediction service to the request mobile users.
The mobile nodes only store the encountering information of the contact nodes in the local buffer. Based on the encountering information, each mobile node obtains the intimacy between the contact nodes and the destination node and then refines the forwarding probability to the destination node. The mobile nodes can forward the data message to the next hop by the optimal wireless channel according to its own system state. The mobile nodes can solve the data dissemination locally without the need of coordination with a central server or the other clients. Thus the data dissemination process is decentralized.
The LPS is applied to track the movement trajectories of all mobile nodes; thus it needs to collect global movement information predicting the encounter opportunities. Specifically, it uses the longterm trajectory information to construct the Markov chain of a mobile user and to determine the probable mobility trajectory based on partial encountering history. The computations in the server side and in the client side are independent, and their optimization results will not affect each other. Therefore, we have designed three data dissemination algorithms to adapt different infrastructure of the network environment. If the mobile nodes can connect to the LPS, it can obtain the location prediction information to optimize the accuracy of forwarding node selection, whereas the mobile nodes can use the local information, that is, intimacy, to estimate the delivery probability of the contact nodes.
The APs are deemed as living and working locations in the system. Nodes can communicate with each other through shortrange communication media, for instance, ZigBee, Bluetooth, NFC, or WiFi Direct. Each node migrates from one location to another according to its own mobility model. When encountering other nodes, the mobile node dynamically calculates intimacy with them using ACO. The intimacy truly reflects historical contact information. It accumulates upon each contact and on the other hand decays over time.
Once a mobile node would like to send data to a destination node, it firstly consults a nearest AP for its neighbors’ trend of movement. The LPS performs location prediction using Markov process inference and returns back to the query node an ordered list indicating probabilities of the neighbor nodes meeting the destination node in successive time series (usually more than one time slot).
The mobile node will compute forwarding probability of its neighbors by considering their intimacy with the destination node and then make a forwarding decision.
The mixture network model enhances traditional opportunistic networks with the centralized infrastructure which takes good advantage of existing AP assets but not burdens current network. The data forwarding is a probabilistic scheme guided by location prediction rather than stochastic or trivially probabilistic.
By this means, data will be delivered to the destination with higher probability and hence the network efficiency is improved.
3. Algorithm Design
In this section, we formulate a data dissemination problem in the network environment lacking contemporaneous endtoend connectivity. To tackle the problem, we propose a contactbased probability routing algorithm, LOPSI, which implements the data dissemination by calculating the forwarding probability based on location prediction scheme and a swarm intelligence heuristic method. Therefore, LOPSI is fundamentally based on two routing schemes that are Location PredictionBased Data Dissemination (LOPDAD) and Ant Colony Optimization (ACO) Based Data Dissemination (ACODAD). LOPDAD uses location prediction information to calculate the maximum probability of the location where the forwarding nodes and the destination node encounter, which is suitable for the opportunistic environment deploying a centralized infrastructure. ACODAD uses the swarm intelligence mechanism, ACO, to select the forwarding nodes according to the intimacy between the forwarding nodes and the destination node, which is suitable for the fully distributed data dissemination in opportunistic networks. LOPSI combines the merits of the two aforementioned algorithms. Depending on the requirements of applications, researchers can select the suitable algorithm to apply.
3.1. Location PredictionBased Data Dissemination (LOPDAD)
Studies on human mobility patterns have shown that people daily activities exist in a high degree of repeatability. People usually visit several fixed places regularly in each day and do activities in a relatively fixed period. According to mobile trajectories and regular behavior pattern of mobile nodes, it can be used to model the scene based on the location of mobile nodes and use relevant algorithms to predict the probability of the node arriving at a certain position and to estimate the location of the mobile node.
Markov chain algorithm is currently the most widely used in location prediction algorithm with high accuracy. Here we use the secondorder Markov chain model to predict the location of the mobile node, which has higher accuracy than the firstorder Markov chain model according to the simulation.
It can use Markov model to describe the application scenario such as Campus, where it is assumed that there are locations. Location is the th status of Markov process, and the state space is . Thus scene mobility model is defined as , and is time series.
For each application scenario, Markov chain model can be used to predict the future location state of each mobile node. Specific modeling and forecasting process is as follows.
3.1.1. Preparation Process
Preparation before prediction process includes the following steps.
(1) Determination of State Set. According to the collection of mobile nodes trajectories from the system server, the location elements in the collecting data are counted, which is denoted as set . As set contains a number of location elements, the locations of higher visiting frequency are chosen as state space of the system, denoted as set , .
(2) Discretization of Data Set. Statistical data of all users related to state set is made. Then the dataset of each user is processed to be discrete set of the fixed time period, so the set after discretization is denoted as follows:
3.1.2. Location Prediction Algorithm Based on O2MM
Order1 Markov chain model (O1MM) uses the state transition matrix and the initial distribution to predict, which is simple and intuitive [16]. However, as the indeterminacy of the state transition probabilities is unscientific division of the initial state of the system, the prediction result of this method tends to produce larger errors.
Unlike the first order, a Markov chain of higher order is a Markov model with memory, that is, a Markov chain that depends on not only the current state, but also on states before, where is the order and is finite [17]. The chain is dependent on where it is right now and also where it was in the last occasion. Order2 Markov chain model (O2MM) is used to improve the accuracy of prediction method. Compared with the prediction based on order1 Markov chain, order2 Markov chain model can be more complete and rational use of information and effectively integrated with correlation analysis, so as to improve prediction accuracy. O2MM depends on the current state and also the just visited state.
The finite state space of O2MM is and if the conditional probability is the transition probability of the node located at at time slice under the condition that the node is located at at time slice and at time slice is Formula (4) approximately equals the frequency that the node visits the location when the state space tends to infinity [18]: where is the number of times that the observation node visits location by records statistics, is the total number of times that the node visits all the locations in , and then the probability of the node to visit location and the location state of the node at current time slice and also the just visited state is, respectively, and .
If there are location states in state space set, onestep transition probability matrix is a matrix: The description of the location prediction algorithm based on O2MM is as shown in Algorithm 1.

According to Algorithm 1, given the initial probability distribution of the node at time slice , , we can recurrence the probability distribution at time slice by O2MM. The state set , , the initial state is , and the initial probability distribution is
The transition matrix for Markov chain of order two is Here the first two numbers of the index representing the current state and the last number represent the next state. And the probability distribution at time slice is
The location state is obtained by the location prediction server at time slice is
In our system the location prediction server gathers the location data of the mobile nodes by the APs. The server executes Algorithm 1 to predict the trajectory of each node according to the discrete time slice.
3.1.3. Transmission Probability of LOPDAD
The data dissemination mechanism can use the result of the location prediction algorithm using O2MM. At a certain time slice, the data forwarding probability equals the probability of the forwarding node visiting the location where a destination node is, which is given by where is the location state of destination node at time slice , and is the probability that node visits the location at time slice .
Algorithm 2 describes the process of the locationbased data dissemination algorithm, which obtained the forwarding probability of to the destination node .
3.1.4. The Execution of Location Prediction
The LPS predicts the locations where the destination node and the forwarding nodes will encounter at the future time slices. The threshold of time slices is . At time slice, , when the LPS receives the service request information REQ which includes the destination node and the encounter nodes set , from the data carrier node , the LPS calculates the location state set of in the time slice :
And the LPS also calculates the forwarding probability F. P of each node in the set . The forwarding nodes set F.N in which the node will visit the location where the destination node locates at the same time slice, and the encounter time slice is recorded in F.T. Finally, the server sends the service information SEI to the node . The execution process is described in Algorithm 3.

3.1.5. The Selection Mechanism of the Forwarding Nodes Set
When the data carrier receives the SEI from the predictive server, considering the cache management and the load of the network, the number of copies of the forwarding data is a fixed value, COPY, which is decided by the average buffer size of each node and the current load of the network. If finds that the location of is the same as during the threshold time slice, it only transmits to the nodes which can encounter at earlier time slice than . Otherwise, if the number of nodes in the forwarding nodes set is less than COPY, transmits the data to the nodes in the forwarding nodes set and delete the data in its own buffer. If the number of nodes in the forwarding nodes set is more than COPY, transmits the data only to the nodes having maximum probability no more than COPY, according to the following: where is the forwarding probability which is equal to the probability that encounters at time slice , where is the number of time slice intervals when meets . The larger the number of time slice intervals is, the lower the probability of forwarding node is. And the forwarding nodes set which is selected by :
3.2. Swarm Intelligence Heuristic Data Dissemination (ACODAD)
The inspiring source of ACO is the pheromone trail laying and following behavior of real ants which use pheromones as a communication medium. Artificial ants used in ACO are stochastic solution construction procedures that probabilistically build a solution by iteratively adding solution components to partial solutions by taking into account (i) heuristic information on the problem instance being solved, if available, and (ii) (artificial) pheromone trails which change dynamically at runtime to reflect the agents’ acquired search experience [19]. In our algorithm, ACO is improved to be applied in data dissemination in opportunistic cognitive networks.
3.2.1. Ant Colony Optimization (ACO) Based Data Dissemination in OCN (ACODAD)
The pheromone in ACODAD is the intimacy between two nodes. The more frequency and continuous the contact between two nodes is, the higher the value of intimacy is. It means that the higher the pheromone is. The data carrier node tends to choose the node which has high intimacy value with the destination nodes to forward the data. It means that the data forwarding probability of the node having high intimacy with the destination node is high. The comparison of the characteristics between ACODAD and ACO is shown in Table 1.

3.2.2. Intimacy between Two Nodes in OCN
Each node in opportunistic cognitive networks maintains a relationship table with other nodes using the value of intimacy.
For example, at time slice , the data carrier node arrives at location and senses all the other nodes within the communication range via the communication channels (such as ZigBee, Bluetooth, NFC, and other shortrange communication protocols). Those nodes are added in encounter nodes set of and are recorded in the relationship table with the calculation results of intimacy.
The intimacy between two nodes and depends on the frequency of two nodes in connection based on contact times , lasting time of one connection , and the encounter intervals between two contacts . The mathematical description of intimacy is as follows, where is the intimacy of and at time slice : where is the evaporation rate, is the threshold of encounter time intervals of two nodes, and is the times when the time intervals is more than .
Although the intimacy is defined in consideration of encounter time intervals, if the two nodes are not in connection for a long time (more than a certain time threshold value ), it enables the intimacy evaporation mechanism to ensure the most frequently contact nodes with a high degree of intimacy. If the encounter time intervals are beyond the system running time , the value of intimacy is zero.
When two nodes encounter, they, respectively, compute the intimacy based on records of encounter time and the departure time at the contact times . Each node records the time according to its own time clock. When , equals the encounter time of the first contact. The algorithm of intimacy is as shown in Algorithm 4.

Algorithm 4 captures the essence of (15). The intimacy between two nodes is used to compute the forwarding probability in ACODAD.
The intimacy updates during the time duration ; the variation of the intimacy is given by
3.2.3. Transmission Probability of ACODAD
When the data carrier node encounters the nodes in set and chooses the forwarding nodes from to the destination based on the intimacy between the node in and , the forwarding probability is defined as the following equation: where is given by where is the node set including those nodes which have already carried the transmission data copy and also the node had the copy before. Such nodes will not be selected as the forwarding nodes.
The parameters and control the relative importance of the pheromone versus the heuristic information, , which is given by where is the time slice intervals that and will encounter which is an estimation value given by the records in the contact vector.
A heuristic value , respectively, represents a priori information about the problem instance definition or runtime information provided by a source different from the ants. In many cases is the cost, or an estimate of the cost, of extending the current state. These values are used by the ants’ heuristic rule to make probabilistic decisions on how to move on the graph [32].
In our algorithm, the heuristic value is defined as the distance between and . As the location state of nodes is discretized by the time slice. And the delay of data forwarding between the two nodes is not decided by the absolute path length or the distance between the two nodes but by calculating the number of time slice intervals between forwarding node and the destination node to meet with each other.
The data carrier node chooses the forwarding nodes from set according to the forwarding probability based on intimacy. Considering the cache management, our algorithms set the maximum copy quantity of a unique data message. If the data forwarding operation is executed, will transmit the data to the nodes in set , which is given by (20), and the quantity of nodes, denoted by , is no more than COPY. Finally, will delete the data stored in its buffer:
3.3. Location Prediction Based Data Dissemination Using Swarm Intelligence (LOPSI)
The data dissemination algorithm LOPSI considers not only the intimacy between the forwarding node and the destination node, but also the location where the two nodes may encounter. According to the location prediction algorithm, the set of forwarding nodes, , which visit the location where the destination node will be during the threshold time slices, can be obtained. And the data carrier node only sends message to nodes in and compares the intimacy between and . Combined with the prediction results from LOPDAD and ACODAD, the transmission probability from node to the forwarding node is calculated by the weight formula where is the forwarding probability obtained from ACODAD, is the forwarding probability obtained from LOPDAD, and parameters and are the weights of the two probabilities.
In our campus environment the mobile node can communicate to the location prediction server anywhere and anytime. The prediction server provides only location prediction service and no other services. Algorithm 5 describes the whole execution process of LOPSI. LOSI_Sec is part of Algorithm 5, which is a function that the data message transfers from the current node to the forwarding node set. When the source node wants to send the data message to the destination node , will choose the potential nodes by location prediction schemes and then obtain the intimacy between the potential nodes and the destination node. Thus the forwarding node set will be determined. The execution process of LOPSI is described in Algorithm 5.

For any node carrying data message, LOPSI_Sec() will determine the forwarding node set. The description of LOPSI_Sec() is given as shown in Algorithm 6.

Algorithm 5 describes the essence of LOPSI. Each data has a TTL, which indicates how long the data can live in the network. It is set by the provider at the time of data generation. In Algorithm 5 the length of time slices equals TTL. The data carried by each node within TTL duration cannot be forwarded and then be automatically discarded.
4. Performance Evaluation
In this section, we present the simulation results to demonstrate the performance of proposed data dissemination algorithms. Note that the recent work studying the nature of human mobility has proved that suitable movement models can sufficiently present the behavior of human mobility [33]. The model of mobility pattern deployed in our platform is SPMBM model [34], which is a mobility model that integrates temporal and spatial relationships and selects the shortest path for the node randomly walking in the map area.
4.1. Simulation Settings
The data sets to evaluate the location prediction algorithm based on O2MM are obtained from wireless topology discovery (WTD) [35], which are employed in our simulation. The accuracy of the location prediction algorithms based on O1MM and O2MM can be obtained from our previous work [36], which is given in Table 2.

The simulation is based on a realistic campus scenario shown in Figure 2. There are 40 locations and each one installed a WiFi access point, which can cover the campus area. The mobile nodes can be cars and pedestrians with smart phones. The location prediction server can communicate with mobile nodes via WiFi and only provide location prediction service and no other services. The only way to exchange and obtain data is through the contact of two nodes. If the communication range increases and is out of the range of APs, the mobile devices can exchange data by the ACODAD without using location prediction scheme by different wireless communication techniques including WiFi Direct, Bluetooth, and ZigBee. In order to evaluate the performance of the proposed data dissemination algorithms, we conduct a series of experiments under the parameters in Table 3. The First In First Out is applied on buffer management. In order to avoid the heavy traffic load and cache load, each data is set a TTL, and the maximum copies of each data is a fixed constant in the system.

With the above settings, the three data dissemination algorithms proposed in our work LOPDAD, ACODAD, and LOPSI are evaluated and compared with wellknown opportunistic routing protocols: PRoPHET and Spray and Wait.
4.2. Evaluation Metrics
Four metrics are used to evaluate the performance requirements of the aforementioned data dissemination algorithms: average hops, delivery ratio, average latency, and transmission cost.
Average Hop . This hopcount metric is to assess the delivery cost in time and in cache. denotes the total number of forwarding nodes of every transmission of data including both successful and failure delivery. is the total number of created unique data messages. is given by
Delivery Ratio . This metric is to evaluate the effectiveness and utility of the algorithm. is the total number of successfully delivered unique data messages. is given by
Average Latency [35]. The average latency of a unique message is calculated by the following equation: where is the moment that a unique data message is originated, and is the time when the first replicate of unique message arrives at the destination. The replicate is a copy of a unique message. The number of replicates depends on the methodology of the routing algorithm, single or multiple copies [35].
Transmission Cost . It is a key metric to characterize the resource consumption and evaluate the data dissemination algorithms in OCNs. The total number of copies of unique data messages to deliver in the system, denoted by , is divided by the number of copies of successfully delivered messages, denoted by :
4.3. Influence on Performance with the Variation of Total Number of Nodes
Average Hops. As shown in Figure 3(a), with the increasing of numbers of nodes, due to the hop limitation of Spray and Wait, the average hops are relatively small; PRoPHET has no restrictions in this respect; the frequency of nodes encountering increases, resulting in an increase in the average hops. Our algorithms are proposed to consider the management of cache space and limit the maximum number of copies of the nodes in the network, which constrains the hops of data messages transmission. LOPDAD and LOPSI especially set a time threshold on executing location prediction, which guaranteed the data message delivery to the destination node within the time threshold. The location state is discrete by the time slices, so threshold of time slices corresponds to the number of hops. Therefore, the average hops of our algorithms are relatively small.
(a)
(b)
(c)
(d)
Delivery Ratio. As shown in Figure 3(b), whether for Spray and Wait, PRoPHET, and our data distribution algorithms, the delivery ratio significantly increases with the increase of the nodes. LOPDAD, ACODAD, LOPSI, and Spray and Wait have constrained the number of copies of the data messages transmitted in the network. Even if the number of nodes and the amount of data messages increases, the storage space and the network overhead maintain a good status, avoiding data transmission failure by the heavy load of cache and network resources depletion. Therefore, delivery ratio is better than the PRoPHET transmission. LOPDAD selects forwarding nodes which are most likely to complete the task based on location prediction. ACODAD selects the best forwarding nodes by high intimacy. LOPSI tends to make more “assertive” options to select the forwarding nodes based on the two aforementioned factors, so the delivery ratio has been significantly improved.
Average Latency. As shown in Figure 3(c), the average latency is reduced with the increase of the nodes, indicating that our data distribution algorithms are assertive to select the forwarding nodes which are more likely to contact with the destination node. The data transfer of LOPDAD occurs at the location that can connect with AP points, not at any other encounter places, so the average delay is longer than that of ACODAD and LOPSI. The forwarding nodes selection mechanism of LOPSI is better than that of ACODAD, which has less transmission operation but high delivery ratio, so the average latency is lower than that of ACODAD.
Transmission Cost. Figure 3(d) shows the transmission cost of our proposed algorithm and some existing algorithms. LOPSI has the lowest transmission cost since it only transfers messages to the nodes with the highest forwarding probability to the destination and the quantity of copies of the message is a constant which equals the hops estimated by the location prediction algorithm. With the increase of number of nodes, the opportunity of forwarding messages to the potential nodes increases, which leads to increase of the delivery ratio, and also the average hops decrease (as shown in Figure 3(a)). PRoPHET has the highest transmission cost since it has no consideration in the cache management. The transmission cost is at the value of more than 1100, much more than the transmission cost of the other four algorithms. Thus the curve of transmission cost of PRoPHET cannot be drawn in the scale of the graph. The transmission costs of the other three algorithms are lower than that of PRoPHET since they constrained the quantity of copies, but not better than LOPSI because the selection schemes of potential forwarding nodes are no better than that of LOPSI.
4.4. Influence on Performance with the Variation of TTL
In this scenario, in order to illustrate the influence on performance by the variation of TTL, the simulation parameter of the number of nodes is set to be 200.
Average Hops. As shown in Figure 4(a), with the increase of TTL, the data messages live long in the network, which will increase the load of cache and the network. However, LOPDAD and LOPSI have little change in the average hops since the most data messages are successfully delivered to the destination in the time threshold according to the accuracy of O2MM being 80%. During the TTL, if the data dissemination is failure in the first time threshold period, then start the second time threshold to deliver the data message; the average hops may be doubled; however, the probability of that condition is less than 20%. The average hops of ACODAD are more than LOPDAD and LOPIS, as it has no consideration of location where the destination node will be, only by random encounter of two nodes. With the increase of the network load, the average hops will increase.
(a)
(b)
(c)
(d)
Delivery Ratio. As shown in Figure 4(b), with the increase of TTL, the delivery ratio of LOPDAD changes little. According to the characteristic of Markov chain prediction, the future status of longtime prediction tends to be stabilized, which means that the prediction accuracy is reduced. If the time threshold is set too big, then delivery ratio will decrease. The delivery ratio of ACODAD and LOPIS increase since the copy of data message in the network is not changed but the opportunistic of encounter is increased.
Average Latency. As shown in Figure 4(c), with the increase of TTL, the average latency of those five algorithms will increase since the network load is heavy and the total number of data messages increases, which makes the buffer overcrowded. Since the algorithms except PRoPHET constrain the copies of messages to avoid the traffic loads, the latency is lower than that of PRoPHET which transfers the message to any potential nodes without copies constraint.
Transmission Cost. As shown in Figure 4(d), with the increase of TTL, the transmission cost of LOPSI and LOPDAD decreases since the delivery ratio is higher (as shown in Figure 4(b)) and the number of copies of a unique message is slightly changed. It results in that LOPSI and LOPDAD estimate the optimal path and then determine the number of copies of a unique message. Spray and Wait and ACODAD constrain the number of copies, so the variation of transmission cost is slight. As regards PRoPHET, since it does not constrain the copies of a unique message, the transmission cost is much higher than the transmission cost of the other four algorithms and at a more than thousand value. Thus the curve of transmission cost of PRoPHET cannot be drawn in the scale of the graph.
5. Conclusion and Future Work
In this paper we consider the efficient data dissemination mechanism in opportunistic cognitive networks. We propose a swarm intelligence heuristic data dissemination algorithm based on location prediction. The algorithm can select the efficient forwarding nodes with the maximum probability to encounter the destination node at the location where they most likely to encounter and a high value of intimacy with the destination node. Moreover the algorithm considers the cache management and has good performances in the transmission cost and delivery ratio and simultaneously decreases the average hops and delivery delay. The algorithm has good scalability, which can consider credibility, incentives, energy control, and buffer management mechanism in the future work. Furthermore, the swarm intelligence scheme can also be used in group construction of the mobile nodes, which can promote the application performance in opportunistic cognitive networks.
Conflict of Interests
The authors declare that there is no conflict of interests regarding the publication of this paper.
Acknowledgment
The authors would like to thank all the editors of this paper. They read the manuscript very carefully and provided valuable feedbacks, which are helpful to improve the quality of the draft.
References
 Q. H. Mahmoud, Cognitive Networks: Towards SelfAware Networks, John Wiley & Sons, London, UK, 2007.
 L. Pelusi, A. Passarella, and M. Conti, “Opportunistic networking: data forwarding in disconnected mobile ad hoc networks,” IEEE Communications Magazine, vol. 44, no. 11, pp. 134–141, 2006. View at: Publisher Site  Google Scholar
 R. Yu, P. Wang, and Z. Zhao, “NDI: nodedependencebased dynamic gaming Incentive algorithm in opportunistic networks,” in Proceedings of the 23rd International Conference on Computer Communications and Networks ( ICCCN '14), pp. 581–588, Shanghai, China, 2014. View at: Google Scholar
 R. Yu, R. Liu, X. Wang, and J. Cao, “Improving data quality with an accumulated reputation model in participatory sensing systems,” Sensors, vol. 3, pp. 5573–5594, 2014. View at: Google Scholar
 B. Hull, V. Bychkovsky, K. Chen et al., “CarTel: a distributed mobile sensor computing system,” in Proceedings of the 4th ACM International Conference on Embedded Networked Sensor Systems, pp. 125–138, November 2006. View at: Google Scholar
 M. Mun, S. Reddy, K. Shilton et al., “PEIR, the personal environmental impact report, as a platform for participatory sensing systems research,” in Proceedings of the 7th ACM International Conference on Mobile Systems, Applications, and Services (MobiSys '09), pp. 55–68, June 2009. View at: Publisher Site  Google Scholar
 A. Vahdat and D. Becker, “Epidemic routing for partially connected ad hoc networks,” Tech. Rep., Department of Computer Science, Duke Univeristy, Durham, NC, USA, 2000. View at: Google Scholar
 S. Jain, K. Fall, and R. Patra, “Routing in a delay tolerant network,” in Proceeing of the Conference on Computer Communications (ACM SIGCOMM ’04), pp. 145–158, New York, NY, USA, September 2004. View at: Publisher Site  Google Scholar
 T. Spyropoulos, K. Psounis, and C. S. Raghavendra, “Singlecopy routing in intermittently connected mobile networks,” in Proceedings of the 1st Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks (SECON ’04), pp. 235–244, October 2004. View at: Google Scholar
 A. Lindgren and A. Droia, “Probabilistic routing protocol for intermittently connected networks,” Internet Draft draftlindgrendtnrgprophet02, Work in Progress, 2006. View at: Google Scholar
 E. M. Daly and M. Haahr, “Social network analysis for routing in disconnected delaytolerant manets,” in Proceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc ’07), pp. 32–40, ACM, New York, NY, USA, 2007. View at: Google Scholar
 P. Hui, J. Crowcroft, and E. Yoneki, “BUBBLE rap: socialbased forwarding in delay tolerant networks,” in Proceedings of the 9th ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc '08), pp. 241–250, May 2008. View at: Publisher Site  Google Scholar
 J. Á. B. Link, N. Viol, A. Goliath, and K. Wehrle, “SimBetAge: utilizing temporal changes in social networks for pocket switched networks,” in Proceedings of the 1st ACM Workshop on UserProvided Networking: Challenges and Opportunities (UNET '09), pp. 13–18, ACM, New York, NY, USA, December 2009. View at: Publisher Site  Google Scholar
 T. Spyropoulos, K. Psounis, and C. S. Raghavendra, “Spray and wait: an efficient routing scheme for intermittently connected mobile networks,” in Proceedings of the ACM SIGCOMM Workshops: Conference on Computer Communications, pp. 252–259, August 2005. View at: Google Scholar
 J. Leguay, T. Friedman, and V. Conan, “DTN routing in a mobility pattern space,” in Proceedings of the ACM SIGCOMM Workshops: Conference on Computer Communications, pp. 276–283, August 2005. View at: Google Scholar
 B. Z. Yao, P. Hu, X. H. Lu, J. J. Gao, and M. H. Zhang, “Transit network design based on travel time reliability,” Transportation Research C, vol. 43, pp. 233–248, 2014. View at: Google Scholar
 B. Yao, P. Hu, M. Zhang, and S. Wang, “Artificial bee colony algorithm with scanning strategy for the periodic vehicle routing problem,” Simulation, vol. 89, no. 6, pp. 762–770, 2013. View at: Publisher Site  Google Scholar
 B.Z. Yao, C.Y. Yang, and J.B. Yao, “Tunnel surrounding rock displacement prediction using support vector machine,” International Journal of Computational Intelligence Systems, vol. 3, no. 6, pp. 843–852, 2010. View at: Google Scholar
 B. Yao, P. Hu, M. Zhang, and X. Tian, “Improved ant colony optimization for seafood product delivery routing problem,” PROMET—Traffic&Transportation, vol. 26, no. 1, pp. 1–10, 2014. View at: Google Scholar
 B. Yao, C. Yang, J. Hu, J. Yao, and J. Sun, “An improved ant colony optimization for flexible job shop scheduling problems,” Advanced Science Letters, vol. 4, no. 67, pp. 2127–2131, 2011. View at: Publisher Site  Google Scholar
 B. Z. Yao, J. B. Yao, and M. H. Zhang, “Improved support vector machine regression in multistepahead prediction for rock displacement surrounding a tunnel,” Scientia Iranica. In press. View at: Google Scholar
 B. Yu, Z. Z. Yang, and K. Chen, “Hybrid model for prediction of bus arrival times at next station,” Journal of Advanced Transportation, vol. 44, no. 3, pp. 193–204, 2010. View at: Publisher Site  Google Scholar
 Y. Bin, Y. Zhongzhen, and Y. Baozhen, “Bus arrival time prediction using support vector machines,” Journal of Intelligent Transportation Systems, vol. 10, no. 4, pp. 151–158, 2006. View at: Publisher Site  Google Scholar
 B. Yu, Z. Z. Yang, and B. Z. Yao, “A hybrid algorithm for vehicle routing problem with time windows,” Expert Systems with Applications, vol. 38, no. 1, pp. 435–441, 2011. View at: Publisher Site  Google Scholar
 B. Yu, H. B. Zhu, W. J. Cai, N. Ma, and B. Z. Yao, “Twophase optimization approach to transit Hub location—the case of Dalian,” Journal of Transport Geography, vol. 33, pp. 62–71, 2013. View at: Google Scholar
 B. Yu, Z. Yang, and J. Yao, “Genetic algorithm for bus frequency optimization,” Journal of Transportation Engineering, vol. 136, no. 6, pp. 576–583, 2010. View at: Publisher Site  Google Scholar
 M. Farooq, BeeInspired Protocol Engineering: From Nature to Networks, Springer, New York, NY, USA, 2009.
 A. Zengin, H. Sarjoughian, and H. Ekiz, “Discrete event modeling of swarm intelligence based routing in network systems,” Information Sciences, vol. 222, pp. 81–98, 2013. View at: Publisher Site  Google Scholar
 E. Bonabeau, M. Dorigo, and G. Theraulaz, Swarm Intelligence: From Natural to Artificial Systems, Oxford University Press, 1999.
 M. Dorigo, V. Maniezzo, and A. Colorni, “Ant system: optimization by a colony of cooperating agents,” IEEE Transactions on Systems, Man, and Cybernetics B, vol. 26, no. 1, pp. 29–41, 1996. View at: Publisher Site  Google Scholar
 R. Schoonderwoerd, Collective intelligence for network control [M.S. thesis], Faculty of Technical Informatics, Delft University of Technology, 1996.
 M. Dorigo and T. Stutzle, “The ant colony optimization metaheuristic: algorithms, applications, and advances,” in Handbook of Metaheuristics, pp. 251–285, Springer, 2002. View at: Google Scholar
 V. D. Le, H. Scholten, P. J. M. Havinga, and H. Ngo, “Locationbased data dissemination with human mobility using online density estimation,” in Proceedings of the 11th Annual IEEE Consumer Communications & Networking Conference, pp. 747–754, Las Vegas, Nev, USA, November 2014. View at: Google Scholar
 A. Ahmed and K. Abu Bakar, “A simulation based study of well known routing protocols for delay tolerant network,” World Applied Sciences Journal, vol. 28, no. 3, pp. 353–360, 2013. View at: Google Scholar
 M. McNett and G. M. Voelker, UCSD Wireless Topology Discovery Project [EB/OL], 2013, http://www.sysnet.ucsd.edu/wtd/wtd.html.
 J. Li, X. Xing, R. Yu, X. Wang, and Y. Zhou, “Social relationshipbased mobile node location prediction algorithm in opportunistic cognitive networks,” WIT Transactions on Information and Communication Technologies, vol. 59, pp. 113–119, 2014. View at: Google Scholar
Copyright
Copyright © 2014 Jie Li et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.