Ubiquitous Systems towards Green, Sustainable, and Secured Smart EnvironmentView this Special Issue
Research Article | Open Access
Chan-Myung Kim, Youn-Hee Han, Joo-Sang Youn, Young-Sik Jeong, "A Socially Aware Routing Based on Local Contact Information in Delay-Tolerant Networks", The Scientific World Journal, vol. 2014, Article ID 408676, 7 pages, 2014. https://doi.org/10.1155/2014/408676
A Socially Aware Routing Based on Local Contact Information in Delay-Tolerant Networks
In delay-tolerant networks, network topology changes dynamically and there is no guarantee of continuous connectivity between any two nodes. These features make DTN routing one of important research issues, and the application of social network metrics has led to the design of recent DTN routing schemes. In this paper, we propose an efficient routing scheme by using a node’s local contact history and social network metrics. Each node first chooses a proper relay node based on the closeness to the destination node. A locally computed betweenness centrality is additionally utilized to enhance the routing efficiency. Through intensive simulation, we finally demonstrate that our algorithm performs efficiently compared to the existing epidemic or friendship routing scheme.
A delay-tolerant network (DTN) [1, 2] has promised to enable communication between challenged networks, which includes deep space networks, sensor networks, and mobile ad hoc networks. In DTNs, network topology changes dynamically, and the lack of end-to-end connectivity poses a number of challenges in routing in DTNs. To enable communication in DTNs, messages may have to be buffered for a long time by intermediate nodes, and the mobility of those nodes must be exploited to bring messages closer to their destination by exchanging messages between nodes as they meet. So the message delivery probability is unpredictable. Designing efficient routing protocols in DTNs can tackle various issues arising due to lack of continuous network connectivity.
DTN message routing schemes have been generally made by adopting various heuristics [3–9]. They have tried to balance the overhead caused by redundant message copies with successful delivery and minimal delay of message delivery. Utilizing social network characteristic  has been recently studied in designing efficient routing protocols. Many studies have shown that nodes tend to have mobility patterns influenced by their social relationships and/or social behavior [1, 11]. By examining the social network of the DTN nodes, it may be possible to optimize data routing by forwarding data to nodes that are much socially related.
In DTNs, nodes encounter other nodes and store contact information (e.g., when they met and when they are separated) to their buffers. Thus, many studies have examined contact information when they analyze social relationships of DTN nodes. Bulut and Szymanski  introduced a new metric, called social pressures metric (SPM), to detect the quality of friendships of each node accurately. They calculated the edge weight based on contact information and used it when constructing the friendship community where the set of nodes have close friendship between each other. They also presented a new sociality-based routing scheme, called friendship routing, which utilizes the edge weight to make the forwarding decisions of messages.
If a sender node could know which node is important to utilize as a relay node, it would forward messages to such node to increase overall routing efficiency. Node centrality analysis is about identifying the most important nodes in a network. The betweenness centrality examines the extent to which a node is between all other nodes within the network [13–15]. Because a node with high betweenness has the capacity to facilitate interactions between nodes, it has been frequently used to design efficient data forwarding and dissemination schemes in DTNs.
On the other hand, there have been some efforts [14, 17–20] to provide an approximation of the real betweenness by using a node’s local topology information. The ego network is the network consisting of a single node together with its immediate neighbors and all the links among those nodes. The ego betweenness is simply the centered node’s betweenness in the ego network. It can be calculated locally by each node in a distributed manner without the complete knowledge of entire network. In our previous study , we examined the relationship between the ego betweenness and the globally computed traditional betweenness. We generated Bernoulli networks and calculated each node’s ego betweenness and traditional betweenness on them and revealed that the relative ranks ordered by the two betweenness values have high positive correlation. It means that two nodes can compare their own locally calculated ego betweenness and the relatively higher betweenness node can be determined without the calculation of high complexity.
In this paper, we propose an efficient DTN routing scheme where each node chooses a proper relay node based on its local contact history. In order to enhance the routing efficiency, the expanded ego-network betweenness centrality  is utilized. In this paper, we propose how each node gets the information to calculate the expanded ego-network betweenness and identifies a proper relay node within the network. We have demonstrated that our scheme performs efficiently compared to the existing epidemic or friendship routing scheme.
The rest of this paper is organized as follows. Section 2 provides related works dealing with socially aware routing scheme. Section 3 explains how to construct a social network in each node and how to get the expanded ego betweenness centrality, and Section 4 presents the proposed routing scheme. Section 5 shows a simulation analysis, and Section 6 finally concludes this paper.
2. Related Work
Due to the lack of global knowledge of the network topology and unstable end-to-end path in DTNs, the message routing schemes are generally made by adopting various heuristics, such as forwarding a number of message copies epidemically , controlled forwarding (or spraying) , utility-based forwarding (or estimating the likelihood of forwarding messages) , utilizing the contact locations , and focusing on the contact frequencies . Such schemes were adapted over time to address different performance measures, delivery ratio, message latency, and overhead. They have tried to balance the overhead caused by redundant copies with successful delivery and minimal delay. Accordingly, multiobjective optimization is needed to solve the trade-off problems.
Recently, many researches have shown that users tend to have mobility patterns influenced by their social relationships and/or by their attraction to physical places that have special meaning with respect to their social behavior . The social relations achieved by the complex network analysis may capture the inherent characteristics of the network topology and are less volatile than the transmission links (or physical contacts) between nodes. Accordingly, the application of social network analysis to DTNs has led to the design of a new class of DTN routing schemes. Hui et al.  proposed the BUBBLE Rap scheme where each node was assumed to have two rankings, global and local. While the former denotes the centrality of the node in the entire society, the latter denotes its centrality within its own community. Messages are forwarded to nodes having higher global ranking until a node in the destination’s community is found. Then, the messages are forwarded to nodes having higher local ranking within destination’s community. Daly and Haahr  proposed the SimBetTS scheme where the betweenness centrality metric as well as the similarity metric is used to increase the performance of routing. In each contact of two nodes, the utility function containing these two metrics is calculated for each destination; then the node having higher utility value for a destination is given the messages.
Finally, Bulut and Szymanski  introduced a method of detecting the quality of friendship by calculating the social pressure metric (SPM) from contact graphs. By recording contacts seen in the past, a contact graph can be generated where each vertex denotes a DTN node and each edge represents one or more past contacts between two nodes. An edge in this contact graph indicates the information that two nodes encountered each other in the past. Thus, the existence of an edge intends to have predictive capacity for future contacts. Bulut and Szymanski calculated the edge weight based on contact graph and used it to construct the friendship community of which nodes have close friendship between each other. They also presented a new sociality-based routing scheme, called friendship routing, which utilizes the edge weight to make the forwarding decisions of messages.
3. Local Information-Based Social Network Construction
In this paper, we consider a network constituted by nodes with mobility, so the network topology changes dynamically. In a DTN node, the time is discretely slotted from the start time until the end time (i.e., each time slot is denoted as ). Each node maintains its own clock time but shares the same length of time slot. Time synchronization is not required strictly, but a sophisticated synchronization scheme may help construct more precise ego or x-ego network. A DTN node also sends Hello broadcast message periodically with interval of time slots. In this paper, we assume that each Hello message contains the following information: (1) its own identifier and (2) a set of identifiers of social neighbor nodes, the latter of which will be explained later.
Let us assume that is a transmission range of a node. We assume that when a node sends a message to any node within a distance without any failure. A node can start to contact with (or encounter) another node when comes close to and receives a first hello message broadcasted by . Assuming that each contact lasts one time slot (i.e., each contact starts and ends during the same time slot), a contact between two nodes and at time is defined as a 3-tuple . If stays within the transmission range of , it can hear a periodic hello message from . When does not hear a predefined number of ’s hello messages continuously, it considers that it leaves . When meets at a time and leaves at a time , we define as ’s contact duration for .
3.1. Social Network Construction
Each DTN node records its contact duration information per node which it has encountered. Each node allocates contact window in its buffer. Its size is called contact window size () which is predetermined by a node. When time goes by, the time window slides by time slots (i.e., is also called as step size). Let denote the ordered sequence of time windows maintained by a node and let the th time window be defined as follows: where .
For a time window , a node maintains the contact duration time for each node which the node makes a contact with during . By the definition of contact, is set to the number of contacts (i.e., the number of 3-tuples where ) accumulated in and it is used to determine its social network , which is valid after the last time slot of . In , each vertex corresponds to nodes which the node has encountered frequently and each edge corresponds to the relation between the node and the frequently encountered nodes. We use the same edge weight as the one proposed by . That is, between the nodes and , the following weight is allocated: where returns the remaining time to the first encounter of the node after time . For example, let us assume that the contact window size is 10. If the node is in contact with the node in the first 5 seconds, then separated away for 3 seconds and contacting the node for 2 seconds again, the weight of the two nodes is .
Only if the weight is larger than the predefined threshold , an edge between the nodes and is created between the two nodes in the node ’s social network . Usually, is empirically determined depending on the contact window size as well as the scenario of network operation. For a time window , we will denote a node ’s social neighbor nodes by .
It is noted that a DTN node’s social network is constructed by using the information about a neighbor’s neighbor nodes as well as just neighbor nodes. In order to support such a social network, a DTN node should piggyback determined at every end of into the Hello messages sent during . Since the social neighbor nodes are determined during the previous time window, its information will be more fresh if the step size of time window and the Hello message interval are small. At every end of time window , a node creates its expanded ego network by its neighbor node ’s neighbor nodes where represents the index of the time window maintained by the node .
Algorithm 1 represents the social network construction procedure for a node where and mean the sets of nodes and edges in . Note that the algorithm is performed every end of contact window.
3.2. Expanded Ego Betweenness Centrality
The betweenness centrality has been used as important measure to examine the extent to which a node is between all other nodes within the network . When the message is forwarded to nodes with high betweenness centrality, that message can be disseminated to entire network in fast way. In this paper, we will use the betweenness centrality to increase overall routing efficiency. In a DTN, however, obtaining the betweenness of each node is in general impractically expensive since it requires DTN nodes, which usually have limited memory and energy, to collect information about their whole social links through wireless communications. In this paper, therefore, we consider the situations where each node computes its betweenness using its local expanded ego network and then uses the result as an estimate of its true betweenness on the entire network.
For an arbitrary node , the equation of betweenness centrality is defined as follows: where is the set of nodes in the network and is the total number of nodes, the number of shortest paths between the two nodes and , and is the number of those shortest paths that pass through the node . As mentioned previously, the betweenness centrality requires the entire network information but a node cannot know it due to lack of the whole network-wide end-to-end connectivity.
As we saw in previous section, a node constructs its social network with its friends and friends of friends information. Hence, we use the expanded ego betweenness proposed by , which is calculated only with its local contact information.
Figure 1 illustrates an expanded ego network of a node . The network is constituted by the ego (the node ), its 1-hop neighbors, and its 2-hop neighbors. While the solid links present the ego network introduced in literature [18, 21], the solid and dashed links represent the expanded ego network which is constructed by Algorithm 1. In short, the expanded ego betweenness centrality of the node is equal to the betweenness centrality of the node within its expanded ego network. In our previous work, we verified that the expanded ego betweenness centrality is highly correlated with the betweenness centrality in the complete network. For the details of the expanded ego betweenness centrality, refer to .
4. Routing Strategy
In our algorithm, a node (1) calculates the weight based on the contact history recorded for other nodes it has encountered, (2) constructs its own social network, and (3) calculates the expanded ego betweenness centrality. With these pieces of information, a node makes a decision on a relay node when it tries to send a message to the destination node.
4.1. Edge Weight Based Strategy
Figure 2 depicts a situation where a node tries to send a message to the remote destination node and it just contacts a node . The node tries to make a decision that it should forward (i.e., copy) the message to the node . Basically, at this time, the node considers the two edge weight values and . A high edge weight between a pair of two nodes represents how close they are and it indicates that the future contact opportunity comes high. In our scheme, the node forwards the message to the node if the following condition is met: This strategy is similar to the one proposed by .
4.2. Centrality Based Strategy
On the other hand, we use the expanded ego betweenness centrality to increase message delivery efficiency. In DTNs, some nodes hardly meet other nodes and they have very low edge weights for the previous encounters. If one of these isolated nodes is set to be the destination node, source node might not find a proper relay node to deliver a message, when it would forward the message only by using the edge weight based strategy. In such situation, the message destined to the isolated node could be removed from the sender’s buffer by TTL (time-to-live) expiration before delivered to the destination.
To prevent this situation, a node also forwards a message to a node if is larger than even though Condition 1 is not met. That is, the second condition for the message forwarding is as follows: A high expanded ego betweenness centrality of a node represents that the node is much socially related with many other nodes. Hence, the message forwarding to such a node makes the opportunity high that the message will reach the destination node, and thus such forwarding strategy can increase the overall efficiency of message delivery.
4.3. Message Delivery Cost Reduction
In this section, we propose a message management scheme in a node’s buffer to decrease the overall delivery cost. If a node has a message in its buffer destined to the node and encounters a node which satisfies (Condition I), the node will forward the message to the node . In this case, if the edge weight is the largest among the edge weights between other nodes in and the node , the node deletes the message from its buffer after forwarding the message to the node to prevent further dissemination. That is, the node , the node ’s best friend, will take on the role of the message delivery to the node , instead of the node . This strategy will reduce the number of message deliveries and enhance the efficiency of the proposed scheme. Algorithm 2 represents our overall message routing strategy.
5. Performance Evaluation
In this chapter, we demonstrate our simulation results and compare the proposed scheme with the epidemic  and the friendship  routing schemes. We use the following three metrics to evaluate our scheme: (1) message delivery ratio, (2) message delivery cost, and (3) message delivery efficiency. The delivery ratio is the proportion of messages delivered to their destinations among the total messages generated. The delivery cost is the average number of forwards done during the simulation. Finally, delivery efficiency is defined as the ratio of delivery ratio to the delivery cost.
To evaluate our scheme, we used real trace-driven simulations based on predefined node mobility data. From the mobility data, we generated the contact trace data logged during the simulation time. The trace data were converted into discrete sequential contact events per unit time per each node pair, and we fed them into each DTN node implemented in our evaluation program. In the evaluation program, each node created a series of sets of contacts where each set corresponds to each contact window. Every end of contact window, each node computed the cumulative contact duration for each of contact nodes and determined its social neighbors of which cumulative contact duration larger than the given threshold (i.e., ), constructed its expanded ego network and finally computed its expanded ego betweenness on the expanded ego network.
As the first contact window time passed, all nodes started to generate 1000 messages totally. Each message was destined from a random source node to a random destination node. Each message had a certain TTL value and was removed after the TTL expiration. The simulation ended when the 1000 messages are delivered to the destination or expired. All results were averaged over 10 runs. Table 1 summarizes the simulation parameters.
Figure 3 shows the delivery ratio achieved by each schemes. As the TTL increases, all schemes deliver more messages to the destinations. As expected, the epidemic routing scheme has the highest packet delivery ratio. It is noted that the delivery ration of proposed scheme is almost similar to the one of friendship routing scheme. Figure 4 shows the message delivery cost of each scheme. We can observe that the epidemic scheme has the worst performance in terms of the delivery cost because it uses the flooding strategy basically. It is worth noting that the proposed scheme is more cost effective than the friendship scheme, not to mention the epidemic scheme. It is because our routing scheme uses the centrality based routing strategy as well as the edge weight based strategy, and it also removes the message from a node’s buffer to prevent imprudent dissemination.
Finally, Figure 5 shows the message delivery efficiency achieved by each scheme. As can be seen by the figure, the routing efficiency achieved by the proposed scheme is higher than the one of other schemes. It means that our scheme has the benefit of cost effective routing with a little performance degradation of delivery ratio.
In this paper, we introduced a cost effective routing scheme that uses its local contact history. Each node constructs its social network based on the local contact history and calculates the expanded ego betweenness centrality on the social network. Each node performs the local routing scheme based on two metrics, edge weight and betweenness centrality. It also tries to reduce message delivery cost by clearing out the message from its buffer after it delivered it to the destination node’s best friend. We simulated our scheme and compared its performance with the existing epidemic and friendship scheme’s ones. We have shown that our scheme achieves higher delivery efficiency than the existing schemes. Since most of nodes in DTNs are energy constrained, we plan to further examine energy-efficient routing based on social network in DTNs.
A preliminary version of this paper was presented at the 8th International Conference on Ubiquitous Information Technologies and Applications (CUTE2013), December 2013 .
Conflict of Interests
The authors declare that there is no conflict of interests regarding the publication of this paper.
This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF), funded by the Ministry of Education (2013R1A1A2010050), and also financially supported by the Ministry of Knowledge Economy (MKE) and Korea Institute for Advancement of Technology (KIAT) through the Workforce Development Program in Strategic Technology.
- F. Warthman, Delay-Tolerant Networks: A Tutorial, 2003.
- V. Cerf, S. Burleigh, A. Hooke et al., “Delay-tolerant networking architecture,” IETF RFC 4838, 2007.
- A. Vahdat and D. Becker, “Epidemic routing for partially connected Ad Hoc networks,” Technical Report CS-200006, Duke University, 2000.
- T. Spyropoulos, K. Psounis, and C. S. Raghavendra, “Spray and wait: an efficient routing scheme for intermittently connected mobile networks,” in Proceedings of the workshop on Delay-Tolerant Networking (WDTN ’05), pp. 252–259, August 2005.
- A. D. A. Lindgren and O. Schelen, “Probabilistic routing in intermittently connected networks,” SIGMOBILE Mobile Computing and Communication Review, vol. 7, pp. 19–120, 2003.
- J. Leguay, T. Friedman, and V. Conan, “Evaluating mobility pattern space routing for DTNs,” in Proceedings of the 25th IEEE International Conference on Computer Communications (INFOCOM '06), pp. 1–10, April 2006.
- V. Erramilli, A. Chaintreau, M. Crovella, and C. Diot, “Diversity of forwarding paths in pocket switched networks,” in Proceedings of the 7th ACM SIGCOMM Internet Measurement Conference (IMC '07), pp. 161–174, October 2007.
- M. Yoon, J.-K. Kim, and J.-W. Chang, “An energy-efficient routing protocol using message success rate in wireless sensor networks,” Journal of Convergence, vol. 4, no. 1, 2013.
- A. Sinha and D. K. Lobiyal, “Performance evaluation of data aggregation for cluster-based wireless sensor network,” Human-Centric Computing and Information Sciences, vol. 3, no. 1, 2013.
- B. J. Oommen, A. Yazidi, and O. C. Granmo, “An adaptive approach to learning the preferences of users in a social network using weak estimators,” Journal of Information Processing Systems, vol. 8, no. 2, pp. 191–212, 2012.
- M. R. Schurgot, C. Comaniciu, and K. Jaffres-Runser, “Beyond traditional DTN routing: social networks for opportunistic communication,” IEEE Communications Magazine, vol. 50, no. 7, pp. 155–162, 2012.
- E. Bulut and B. K. Szymanski, “Friendship based routing in delay tolerant mobile social networks,” in Proceedings of the 53rd IEEE Global Communications Conference (GLOBECOM '10), pp. 1–5, December 2010.
- P. Hui, J. Crowcroft, and E. Yoneki, “BUBBLE Rap: social-based forwarding in delay-tolerant networks,” IEEE Transactions on Mobile Computing, vol. 10, no. 11, pp. 1576–1589, 2011.
- E. M. Daly and M. Haahr, “Social network analysis for information flow in disconnected delay-tolerant MANETs,” IEEE Transactions on Mobile Computing, vol. 8, no. 5, pp. 606–621, 2009.
- L. C. Freeman, “Centrality in social networks conceptual clarification,” Social Networks, vol. 1, no. 3, pp. 215–239, 1978.
- Y. H. Kim, C. M. Kim, Y. H. Han, Y. S. Jeong, and D. S. Park, “Betweenness of expanded Ego networks in sociality-aware delay tolerant networks,” in Ubiquitous Information Technologies and Applications, vol. 214 of Lecture Notes in Electrical Engineering, pp. 499–505, Springer, Amsterdam, The Netherlands, 2013.
- P. V. Marsden, “Egocentric and sociocentric measures of network centrality,” Social Networks, vol. 24, no. 4, pp. 407–422, 2002.
- M. Everett and S. P. Borgatti, “Ego network betweenness,” Social Networks, vol. 27, no. 1, pp. 31–38, 2005.
- S. Nanda and D. Kotz, “Localized bridging centrality for distributed network analysis,” in Proceedings of the 17th International Conference on Computer Communications and Networks (ICCCN '08), pp. 62–67, August 2008.
- P. Pantazopoulos, M. Karaliopoulos, and I. Stavrakakis, “On the local approximations of node centrality in internet router-level topologies,” in Proceedings of the 7th International Workshop on Self-Organizing Systems (IFIP IWSOS’13), Palma de Mallorca, Spain, March 2013.
- F. Odella, “Using Ego-networks in surveys: methodological and research issues,” in Proceedings of the International Conference on Network Science, May 2006.
- C. M. Kim, I. S. Kang, Y. H. Han, and Y. S. Jeong, “An efficient routing scheme based on social relations in delay-tolerant networks,” in Ubiquitous Information Technologies and Applications, vol. 280 of Lecture Notes in Electrical Engineering, pp. 533–540, Springer, Berlin, Germany, 2014.
Copyright © 2014 Chan-Myung Kim et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.