Next Article in Journal
Design and Evaluation of Schemes for Replacing Multiple Member Vehicles in Vehicular Clouds
Next Article in Special Issue
Human Mobility Prediction with Calibration for Noisy Trajectories
Previous Article in Journal
Human-Centered Efficient Explanation on Intrusion Detection Prediction
Previous Article in Special Issue
Computational Simulation of an Agricultural Robotic Rover for Weed Control and Fallen Fruit Collection—Algorithms for Image Detection and Recognition and Systems Control, Regulation, and Command
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Improving Delivery Probability in Mobile Opportunistic Networks with Social-Based Routing

by
Manuel Jesús-Azabal
1,*,
José García-Alonso
1,
Vasco N. G. J. Soares
2,3 and
Jaime Galán-Jiménez
1
1
Department of Computing and Telematics Systems, University of Extremadura, Avda. de la Universidad S/N, 10003 Cáceres, Spain
2
Polytechnic Institute of Castelo Branco, 6000-084 Castelo Branco, Portugal
3
Instituto de Telecomunicações, 6201-001 Covilhã, Portugal
*
Author to whom correspondence should be addressed.
Electronics 2022, 11(13), 2084; https://doi.org/10.3390/electronics11132084
Submission received: 30 May 2022 / Revised: 29 June 2022 / Accepted: 29 June 2022 / Published: 2 July 2022
(This article belongs to the Special Issue Emerging Trends, Issues and Challenges in Smart Cities)

Abstract

:
There are contexts where TCP/IP is not suitable for performing data transmission due to long delays, timeouts, network partitioning, and interruptions. In these scenarios, mobile opportunistic networks (MONs) are a valid option, providing asynchronous transmissions in dynamic topologies. These architectures exploit physical encounters and persistent storage to communicate nodes that lack a continuous end-to-end path. In recent years, many routing algorithms have been based on social interactions. Smartphones and wearables are in vogue, applying social information to optimize paths between nodes. This work proposes Refine Social Broadcast (RSB), a social routing algorithm. RSB uses social behavior and node interests to refine the message broadcast in the network, improving the delivery probability while reducing redundant data duplication. The proposal combines the identification of the most influential nodes to carry the information toward the destination with interest-based routing. To evaluate the performance, RSB is applied to a simulated case of use based on a realistic loneliness detection methodology in elderly adults. The obtained delivery probability, latency, overhead, and hops are compared with the most popular social-based routers, namely, EpSoc, SimBet, and BubbleRap. RSB manifests a successful delivery probability, exceeding the second-best result (SimBet) by 17% and reducing the highest overhead (EpSoc) by 97%.

1. Introduction

The large spread of the Internet manifests how the TCP/IP network architecture [1] has become a reliable and successful communication mechanism for worldwide transmissions. The virtues of these networks are recognized, as well as their flexibility and adaptability; however, there are contexts where TCP/IP is not applicable. This is the case of networks where nodes are not able to keep a stable and continuous connection. These scenarios lead to dynamic topologies where nodes relapse on timeouts and interruptions [2,3]. Possible examples of these contexts are remote rural areas, interplanetary communications, or places devastated by natural disasters. Fortunately, the advances in mobile devices enable the appliance of mobile opportunistic networks (MONs) for these scenarios [4].
MONs [4,5] are a variant of delay tolerant networks (DTNs) [5] focused on providing communication in networks with an unstable dynamic topology shaped by mobile devices. The emerging works in computation have substantiated this discipline [6] and have enabled the viability of new disruptive applications for smartphones and wearables [7,8]. Moreover, these devices have been strongly sustained by the strides in energy consumption [9]. In this field, progresses, such as flexible solar cells as potential wearable electronics [10,11], enhance the possibilities that mobile devices can be used to face the challenges of MONs.
MONs can be used to face challenging conditions to communication devices. The unstable topology leads to a significant network partition with sparse deployment [12]. Continuous end-to-end paths may never exist, since nodes that form the network do not keep in touch continuously. Thus, communication opportunities are short and separated by long intervals of time; therefore, physical proximity and encounters become important to transmitting data. In an attempt to solve this issue, nodes perform the store–carry–forward strategy [13]: they receive the information through physical proximity, store the messages persistently, and forward the data to the next available hop to reach the destination. Since encounters become a relevant requirement for transmissions, MONs define routing algorithms that implement the way in which the information is sent [14].
Routing protocols specify the policies and requirements to forward the information from the sender entity to the destination [15]. Depending on the nature of the network, routing may pursue objectives, such as notifying all nodes or transmitting data from a specific node to a gateway node; therefore, routing algorithms can apply multiple factors to perform traffic control, such as contextual information or node data [15]. In recent years, many routing solutions have been focused on the social dimension of the nodes, applying data obtained from the node habits to choose hops and carriers [6,16].
Social-based routing [17] has motivated multiple works that incorporate interpreted social information about the nodes to optimize the traffic in opportunistic scenarios [18]. Aspects such as the social and contacts graph [19], the community concept [20], the centrality degree [21], and the common interests have become relevant for these algorithms [22]. Thus, this multi-hop routing seeks to benefit from real-world relations to achieve a better performance in the network [14].
In this article, Refined Social Broadcast (RSB) is introduced. This social-based routing algorithm seeks to improve data delivery benefiting from social behavior [14] using the social influence and the private interests of individuals. For this, the routing scheme makes use of context recognition to quantify encounters and identify the most potentially influential nodes. This concept refers to those network components that register a high number of encounters with other nodes. Transferring data to influential nodes then increases the probability of delivering a message to a destination and reaching more elements in the network. Furthermore, interests are considered using a virtual profile, an individual data store that enables the specification of data topics that the node is interested in carrying. With these main functions, the algorithm performs the selection of the most relevant nodes, maximizing the traffic sent to nodes that manifest the biggest influence while limiting content only to those interested in the data. This way, RSB aims to achieve a significant delivery probability while attempting to keep the overhead low—the metrics that become two of the most relevant in MONs [23].
The rest of the paper is organized as follows: Section 2 details the state of the art of social-based routing. Section 3 describes the proposed algorithm and its implementation. In Section 4, a performance evaluation of the proposed solution and comparison is provided against other state-of-the-art solutions. Finally, Section 5 draws conclusions and presents future work.

2. Related Work

Routing in challenging scenarios has attracted interest over time due to the key role it plays in opportunistic communication, including MONs [24,25]. Algorithms may implement different methods of communication, traditionally classified into two main categories [26]: (i) flooding strategies and (ii) forwarding strategies. The first one refers to solutions that aim to replicate data to the maximum number of nodes to improve the delivery probability of messages [27]. In the case of forwarding strategies, they apply techniques to optimize the hops and the copies, trying to define the most adequate path to the destination [26]; however, as far as we know, it is difficult to classify solutions into these two groups, since many current applications apply both philosophies [14]. This is the case of algorithms based on social information.
The use of social information for routing in MONs has motivated a large collection of works [6,14,28]. These solutions are mainly based on a set of properties and behaviors relevant for MONs. Some of the most significant characteristics used in social routing are the community concept [29], reflected in works such as [30,31], the spacial centrality [32], with popular contributions such as EpSoc [33], SimBet [21], and Bubble Rap [16,34], interest-based communication [35] and contact graphs of nodes [36], and even abstract notions such as friendship or affinity [22,37,38]. Among these different approaches, those based on degree centrality have achieved great recognition in the literature. This concept refers to the metric that indicates the popularity of a node in the network based on the number of encounters with the other elements. In this way, EpSoc, SimBet, and BubbleRap protocols apply these concepts in their approaches. Next, these proposals are detailed.
EpSoc [33] is a routing algorithm that aims to provide communication with an enhanced flooding philosophy that limits replication and overhead. For this, the solution proposes a hybrid protocol that makes use of an epidemic routing strategy [24] to forward information while applying degree centrality. This feature is used to dynamically adapt the time-to-live (TTL) of the messages, decreasing the value in the case that the next hop defines a higher centrality. If a message reaches a TTL of zero, incoming replicates of the message are refused. This solution has already demonstrated great performance in multiple contexts, contributing to the reduction in latency and overhead.
SimBet [21,39] presents an approach based on the concept of local influence. Using centrality and betweenness metrics, nodes are identified locally as bridges to forward information. The nodes identified as the most locally influential elements perform epidemic flooding, improved with the centrality characteristics. As a result, overhead is limited, and latency is enhanced even in contexts with a limited connectivity range.
BubbleRap was originally conceived in [30], but it has consolidated a solid work line with multiple contributions over time [16]. This solution applies the concepts of centrality and community to understand networks as a collection of individual groups with independent characteristics where the integration of the community members is irregular. As a consequence, in terms of connectivity, some people become more interesting than others. Considering this, the algorithm pretends to identify those nodes in OPPNets that provide a larger range of connections. Thus, BubbleRap has manifested good performance in multiple scenarios, becoming one of the most relevant solutions.
Considering these solutions, social metrics are features that have been explored in the literature; however, as far as we know, these mechanisms have not been combined with deeper parameters such as the node interests reflected with topics, with the purpose of enhancing delivery probability. The individual interests of the elements in OPPNets may become a relevant feature to consider at communications, becoming a resource to limit broadcasts to only specific sets of nodes. In the present work, interest-based routing is combined with an influence-based metric that values the presence of nodes through the number of encounters it has. Thus, every node is able to detect and store a set of potential influential nodes in the network. As a result, traffic flow is limited to those elements that provide more guarantees of delivery [29], disrupting the way data are forwarded. In the next section, the functioning of the algorithm is studied, analyzing the considered metrics and the interest-based routing.
Considering how these solutions work, they represent proposals that are close to that presented in this paper. However, our approach, RSB, combines the ideas of the social graph with the specification and matching of topic interests. These features have become a potential framework for multipurpose MONs. The objective is to maximize the delivery probability while overhead is also limited. This is especially relevant for contexts that may experience a high density of nodes, requiring limiting flooding to avoid buffer overflow and congestion. In this way, the proposal raises a solution to benefit from social interactions while optimizing the data flood when the node density is high. In the next section, the complete communication process of the proposal is detailed.

3. Refined Social Broadcast

RSB is a routing algorithm based on the social nature of the nodes in MONs to determine the best path between a pair of nodes. The solution is substantiated on the election of intermediate hops that manifest socially skilled behavior in the network and define interests on the transmitting information subject. These features are performed through the integration of two main elements in the network: (1) the historical encounters of the node and (2) the individual virtual profile of the node. Before detailing the working of the solution, these parameters are defined.
  • Historical encounters of the node. From a networking point of view, the socialization and collective influence of a specific node can be measured with the number of contacts it has encountered; therefore, this metric can used to identify, among a set of potential intermediate hops, a suitable candidate that can forward the information toward the destination. The consideration of historical encounters enables the social-based application to identify a set of the most influential nodes for forwarding the message.
  • Individual virtual profile of the node. This element is an individual dataset kept in every node in the network. This profile enables the storage and the definition of multiple pieces of information about the individual, including the set of interests of the node. This is suitable for marking the messages in the network with its topic, limiting its broadcasting to the set of nodes interested in that topic. As a result, information is restricted to those entities interested in the topic of the message. This functionality becomes interesting since it provides an abstract social dimension for routing with the consideration of the individual focus of nodes.
The historical encounters and individual interests are applied in the proposed routing algorithm to forward messages from a sender to a destination in MONs, using intermediate entities. The combination of these two metrics is disruptive, since the abstraction of individual interests is combined with the contrasted relevance of social influence; therefore, three main stages are involved in the complete transmission functioning of RSB. Figure 1, Figure 2 and Figure 3 show the communication process and the way data are transferred among a specific set of nodes. Next, these stages are detailed.
Figure 1 depicts the initial scenario. There are four nodes, N = { N 1 , N 2 , N 3 , N 4 } , each one with an individual virtual profile that stores the number of historical encounters, the set of topics that it is interested in, the message buffer with the stored messages, and the set of nodes identified as influential. Messages stored in the buffer are also defined with numeric identification and with the message’s topic. Regarding each node in the scenario, the virtual profile of N 1 describes a set of encounters N 1 e = 0 , a set of topics N 1 topics = { a , b } , the buffer with two messages B 1 = { m 1 , m 2 } , and its empty set of nodes identified as influential I 1 = . The two messages stored in the buffer describe different topics m 1 topic = a and m 2 topic = b . In the node N 2 , the number of encounters is N 2 e = 7 , the topic is N 2 topics = { a } , the message buffer is empty B 2 = , and the influential set is empty I 2 = . In the case of N 3 , the number of previous contacts is N 3 e = 0 , the topics are N 3 topics = { a , b } , the message buffer is empty B 3 = , and the influential set is empty I 3 = . At last, the virtual profile of N 4 stores a number of encounters N 4 e = 5 , a set of topics N 4 topics = { b } , an empty message buffer B 4 = , and the influential set empty I 4 = . As a result, in the moment described in Figure 1, nodes are not in contact with each other but may encounter each other later due to their movements in Figure 2.
Figure 2 shows the encounter in the trajectory of the nodes detailed in Figure 1. This event increases the number of encounters of each node. Considering N 1 stores in its buffer two messages B 1 = { m 1 , m 2 } , this encounter produces a potential message interchange. For this, the proposed routing applies its metrics to broadcast the data to the most appropriate intermediate node in terms of interest matching and influence; therefore, N 1 performs two steps to achieve this: (i) identifying the nodes interested in the topic of the stored messages and (ii) selecting a candidate that keeps a higher number of encounters.
In the first step, N 1 identifies the nodes interested in the topics of the stored messages m 1 topic = { a } and m 2 topic = { b } . Next, the process to transmit both messages is detailed. Beginning with m 1 , N 1 aims to identify nodes interested in m 1 topic . For this, all nodes in contact send their virtual profile to N 1 , enabling the sender to recognize the surrounding entities. In this case, N 1 checks first that, for message m 1 topic = { a } , Nodes N 2 and N 3 are compatible, since N 2 topics = { a } and N 3 topics = { a } , respectively. As a result, both nodes are considered potential candidates for N 1 . A node is considered a candidate because it is interested in the same topics of the messages stored by the sender. N 2 and N 3 are then added to the candidate set of N 1 , C 1 = { N 2 , N 3 } . To perform this formally, Equation (1),
C n = ( N itopics m ntopics ) N i N , m n M n
is used to match topics, where N itopics is the set of topics in which N i is interested, and m ntopics is the topic of the message m n , stored by Node n. In the case of N i , it belongs to the set of nodes N that are encountered by Node n. Meanwhile, m n belongs to the message buffer of the sender M n . If the intersection between both interest declarations is not null, the encountered node becomes a candidate for node n C n . As a result, nodes in C n are considered for the second phase.
Considering the values in Figure 2, N 1 performs the second phase of the algorithm considering N 2 and N 3 as candidates. This stage aims to identify the node that will receive the message and will be saved as influential by the sender. This is achieved using the number of encounters. For this, the node that counts with a higher number of contacts among the candidates will receive the message from the sender. In this case, the number of encounters for N 2 is N 2 e = 9 and for N 3 , the other candidate in C 1 , is N 3 e = 3 . Hence, N 2 is selected as the receiver of the message m 1 , and it is recognized as influential by the sender I 1 = { N 2 } . Formally, this process is specified in Equation (2),
I n = max ( N ie ) N i C n
where the identification of the most influential node in the candidates C n of Node n is detailed. The highest N ie receives the message and becomes part of the influential set of the sender, I n in this case.
Considering the processing for m 1 , the functions to transmit m 2 are the same but have a different topic, m 2 topic = { b } . Thus, in the first stage, N 1 erases C 1 and identifies N 3 and N 4 as candidates C 1 = { N 2 , N 3 } . In the second stage, when N 1 compares its encounters, N 4 becomes the most suitable and a new influential node I 1 = { N 2 , N 4 } .
Figure 3 depicts the following situation for Figure 2. Previously, the most suitable node intermediates have been identified for each message. Thus, the messages are transferred: m 1 from N 1 to N 2 ; m 2 from N 2 to N 4 . As a result, now N 1 stores both entities as influential. This means that the next time it encounters them, they will not be considered in the evaluation process again and will receive the stored messages that match their interests.
Considering the explained process, RSB applies individual properties in nodes to identify the optimal path in a network for achieving a high delivery probability. The raised approach enables the broadcast of information among a set of nodes that shares specific data topics. In order to do this, virtual profiles become useful entities in the routing that store the interests of the node; however, the topic idea can be applied as a contextual variable for node characteristics. For example, if the battery level in a specific node is low, the virtual profile subscribes the node to a topic that identifies it as a low energy relay; therefore, traffic will be restricted to it. In the same way, topics can be applied to dynamically identify nodes that lack the space needed to store more messages. Hence, a virtual profile and topic-based routing have become a potential framework to evolve MONs into interoperability, introducing changing behavior in the nodes and raising the network context as a tool to improve delivery.
With the objective of assessing the proposed algorithm, the next section proposes a realistic case of use that evaluates the performance of the proposal and compares it to state-of-the-art alternatives.

4. Experimental Results

In this section, RSB is evaluated in a realistic simulated scenario implemented with the ONE Simulator [40]. The simulation setup represents the case of use of the loneliness detection methodology proposed in [41]. This work applies technology to quantify loneliness in rural areas; therefore, a rural village is defined with sender, intermediate, and destination nodes.

4.1. Simulation Setup

The simulation setup was built following the directives of the proposal described in [41]. This paper, framed in the anthropology field, details a novel methodology to detect loneliness among aging people in rural areas. Thus, field work and semi-structured interviews are combined with a technological architecture based on the detection of encounters. Hence, the work of [41] proposes equipping aging people with smart bracelets that register the physical encounters they have along the day, using Bluetooth to detect the encounters with other bracelets or smartphones. It is then possible to track the companion patterns of aging people with neighbors, aiming to detect potential candidates that suffer from loneliness; therefore, the contacts data are stored in the bracelets and transmitted to beacons installed in representative popular places, such as medical centers, the town hall, or libraries. This information is processed to create a graph about the encounters, representing aging people as nodes and relations as links. This process is graphically represented in Figure 4, included in the original work, which shows an example of an encounter between an aging person and a neighbor and its later data transmission to a beacon. As can be seen, this communication process perfectly fits with the behavior of MONs. It can thus be successfully implemented with the proposed routing protocol.
To align the simulation setup with the loneliness detection proposal, it is required to provide a realistic context where nodes autonomously interact in a specific local area. For this, values were extracted from the Spanish Research Council (CSIC)’s annual reports about aging [42]. These studies manifest the rural depopulation and the current trends in the age distribution of population in small villages. Thus, for areas with less than 500 inhabitants, older adults have become almost the half of the population [42].
Following the directives of the study, a surface s = 10 , 000 × 10 , 000 m 2 is considered, along with a total node number of N = 110 . The simulation time is T = 30 , 000 s, aiming to recreate eight hours of a day. A distribution of 54.54% of aging people in the number of participants is defined. For this, three groups of nodes are described: (1) aging people in the scenario, N e , (2) collaborative neighbors, N i , and (3) a destination for the information, N d . Next, each node group is detailed.
  • Aging people ( N e ). These nodes represent the aging people equipped with smart bracelets in the village. They act as the information source and thus become senders in the MON. They then collect their encounters with other devices and forward this information among the network nodes, aiming to transmit it to destination. Following the functioning of RSB, the proposed router, they provide the information attached to the message topic, m topic , “Elder’s encounters”. Thus, data are broadcast among the nodes interested in the information, N i . The mobility of N e represents the behavior of aging people in their living village. The mobility model, M, based on clusters then becomes a suitable choice to recreate the behavior of the aging population. This mechanism, integrated on the simulator [40], makes nodes move randomly around defined points, setting a maximum range of distance, M r , and a center, M c , with coordinates x and y. Thus, it is possible to simulate walks around points such as the main square, a district, the church, or leisure places. This feature is graphically detailed in Figure 5.
    Figure 5. Cluster movement model integrated in the ONE Simulator.
    Figure 5. Cluster movement model integrated in the ONE Simulator.
    Electronics 11 02084 g005
  • Collaborative neighbors ( N i ). The information generated by N e finds the destination in N d , which acts as a data sink; however, the physical distance between senders and the destination requires intermediate elements that serve as a mule for the information. For this, the smartphones of the neighbors in the village can act as intermediate nodes in the MON. Following the cluster movement model, these elements can provide communication in the scenario toward the data sink. Hence, they define as an interest the message topic m topic = “Elder’s encounters”, serving as a mule in the proposed routing system.
  • Destination ( N d ). The destination node is the ultimate element in the network to which messages are forwarded. This entity is able to receive, process, and transmit to the Internet the incoming data about encounters. Because of this, it becomes a priority to communicate the data source with this element. Considering that the destination plays a passive role in the MON, it does not follow any movement model.
To perform communication between the devices in the MON, all of the nodes are simulated with the same interface, I, based on Bluetooth Low Energy (BLE) [43]. This technology can reach a range of several tens of meters [44]; therefore, a range of I range = 30 m is considered. A transmission speed of I s = 1 Mbps is also defined [44]. Furthermore, messages in the scenario are established with a size of m s = 300 kb, which is an estimation of the size required to transmit a data relation between a specific anonymous elderly individual and their encounters. Meanwhile, considering the potential constraints of storage in previous research work in the literature [45,46], a buffer size of N buffer = 5 Mb is included. A TTL of m ttl = 1800 s is considered, reflecting the time lapsed before a message is discarded by the message carrier node. This selected value aims to avoid deprecated messages in the network. In addition, there are more elements that take part in the communication process.
The number of messages generated during simulation and the applied routing protocol are critical aspects in the success of communications in MONs. Both parameters are varied to study the impact in the results of the simulations. Firstly, in the case of the messages generated in the network, the parameter ω is defined with the message generation interval. This variable indicates the time lapsed between new messages sent in the network. To assess it, the values ω = { 1800 , 3600 , 7200 } are considered. Apart from RSB, three protocols are considered in the simulations: EpSoc [33], SimBet [21], and BubbleRap [16], all of which have been presented in the Related Work section.
Figure 6 depicts the node movement in the simulation. Six different clusters are considered in the scenario, aiming to distribute the nodes along the surface following a varied behavior. For this, three clusters are assigned to aging people, M e 1 , M e 2 , and M e 3 . Meanwhile, the other three clusters are for collaborative neighbors, M i 1 , M i 2 , and M i 3 . In the case of the first group, the distribution aims to require explicitly intermediate entities to connect the nodes of these clusters with destination. Except for M e 1 , nodes in M e 2 and M e 3 never contact directly with the destination. As a consequence, intermediate nodes are highly required. Hence, the clusters that define the movements of the collaborative neighbors enclose the paths of older adults. This is the case of cluster M i 1 , which encloses a large distance. Meanwhile, M i 2 and M i 3 serve as connection points between the different senders.
As a summary for all the assets and configurations included in the simulation, Table 1 resumes the values assigned to every variable in the scenario, including the node distribution, the mobility model, the cluster’s range and center configuration, and the routing details. The performance analysis is explained in the next subsection.

4.2. Performance Evaluation

In this section, the proposed algorithm is executed in the defined scenario, and the average obtained results are presented and discussed. For this purpose, 10 executions were run to determine the performance average of each solution. The performance is assessed accordingly to four considered variables: delivery probability, d prob (%), which is the percentage of messages that successfully reached the destination node, latency, τ (s), which is the average time needed to receive a message, overhead, θ , which is the relation between duplicated messages and received ones, and hops average, σ , which represents the average number of nodes needed to reach the destination. In our case, the focus is on d prob , since it is the main goal of the paper.
Figure 7 shows the delivery probability, d prob , as a function of the message generation interval, ω . Generally, increasing the message generation interval, ω , leads to an improvement in the delivery probability, since the time elapsed without creating new messages is higher. In this case, a slight increase in d prob is noticeable. However, there is not a significant difference between the different values, manifesting the considerable robustness of RSB even when the number of messages in the network increases. This fact becomes evidence of the potential of combining the historical encounters with the topics. Considering the node distribution defined for the simulation, reaching this volume of delivered data shows how the election of intermediate nodes has also been successful. It also implies that even the sender nodes that moved far from the destination were able to communicate. For this, the communication mechanism applied in the intermediate nodes appears to be effective. Regarding the comparison, the highest d prob is reached with RSB at every value of ω . At ω = 3600 s, RSB finds the best result of all simulations with d prob = 97.03 % of success at transmissions, over 17% more successful than SimBet, the second-best result.
Figure 8 shows the latency average of each solution ( τ ) as a function of the message generation interval ( ω ). Latency is one of the most affected parameters when the load in the network is varied. In this case, there is a clear inverse relation between the message generation interval and the average latency of the routing protocols. One of the main features in the solution to mitigate latency is saving the influential nodes when a new one is identified; however, this function is not very effective when there is a large number of messages. Moreover, the technique manifests a slightly improvement for ω = { 3600 , 7200 } . Compared with the other solutions, RSB manifests results that are close to the alternatives, requiring a reasonable time to deliver information to the destination.
Figure 9 shows the overhead, θ , as a function of ω . This metric reflects the relation between the number of message copies in the network and the number of received unique messages. This parameter is interesting because it measures the effectiveness of duplicity and copies introduced by the routing algorithm. In this case, RSB achieves very low values for ω = 3600 s and ω = 7200 s, manifesting the effectiveness at reducing the traffic flood among the nodes. Thus, the election of intermediate nodes can be interpreted as effective. Hence, the saving of nodes as influential and the interest-based constraints contribute to the reduction in message copies sent in the network. In the case of SimBet, considering that positioning and centrality play a significant role in the algorithm, we can deduce how cluster movement influences positively in the message replication.
Finally, in the case of Figure 10, the average number of hops required to reach the destination ( σ ) is shown as a function of ω . RSB registered similar values to EpSoc and SimBet, showing how a path of nodes between the source and the gateway is required. Thus, we can deduce how transmission becomes a success, especially if these values are considered with delivery probability. There is then a satisfactory relation between the nodes involved in the communication and the number of messages successfully delivered.
An additional dimension to be considered in the result analysis is the energetic cost of the algorithm. In the case of use that illustrates the experimental results, the network architecture relies on autonomous independent devices for communication: smartphones and wearables. It is then crucial for a successful delivery to count with operative nodes. For this reason, energy consumption must be technically assumable by devices that may have to perform multiple tasks while satisfying the communication requirements of the network. Considering this, and based on the network load that reflects the overhead values, θ , the energetic cost of the routing solutions can be compared.
The energy consumption of the devices depends actively on the tasks that they perform in the network. The operations of sending, copying, and delivering messages then impact the battery lifetime. Considering that the executions have been performed under the same conditions for the four routing algorithms, the creation events are the same; therefore, only the metrics related to the overhead of the network, θ , are considered in the energetic cost comparison, since this value reflects the relation between delivered messages and copied messages. As a result, based on the overhead results, the sum of the energetic cost is estimated for each routing algorithm. For this, consumption metrics are obtained from [47], enabling the cost estimation for communications. In that work, the energy consumption of communication using BLE was measured, determining an estimation in milliamperes ( m A ) for each operation: sleeping, scanning, sending, and receiving. In our case, we simplify the assessment, assuming the estimation for sending and receiving messages with the values of overhead. In this way, the number of copies transmitted in the network is related using Equation (3):
E g = i = 1 N ( m isent × c sent ) + ( m ireceived × c received )
obtaining a global consumption estimation ( E g ) from the sum of the total number of messages sent by each node ( m sent ) multiplied by the associated energy consumption ( c sent ) and the total number of received messages ( m received ) multiplied by the associated energy consumption ( c received ).
As a result, Figure 11 shows the sum of energy consumption for each algorithm in the execution, manifesting how the consumption requirements of RSB are eminently lower than those of alternatives, in the case of the EpSoc and SimBet router, which reaches a higher value of overhead and, consequently, of energy cost. It is interesting to highlight that BubbleRap achieves lower values of energy consumption due to its low overhead; however, it is important to consider that, despite this, the delivery probability of BubbleRap is still lower than RSB.
After analyzing the four considered variables and the energetic cost for evaluating the proposed routing solution, the results obtained by RSB are promising. The solution behaves properly for the four dimensions, including d prob . The obtained values show how RSB provides the best delivery probability, refining the outcomes obtained with alternative solutions. Considering that the focus of the algorithm achieves a high delivery probability, the implementation of the solution is proven to be effective; therefore, the combination of historical encounters and the interest-based routing enhances the delivery probability, compared with other popular routing alternatives.

5. Conclusions and Future Work

There are contexts where communication deals with long delays, timeouts, network partitioning, and connection interruptions, becoming a challenge for a traditional architecture. As a response to these challenging environments, mobile opportunistic networks (MONs) are a valid option for data delivery, providing decentralized asynchronous transmissions in dynamic topologies. These networks may exploit physical proximity and encounters to transmit data while storing the information during disconnected periods. Using intermediate nodes, an end-to-end path is then possible. To perform this, routing strategies are required, applying multiple variables to elect the best intermediate nodes.
In this paper, we introduced a novel social routing algorithm called Refine Social Broadcast (RSB). This algorithm applies the definition of individual interests and the relevance of social interactions to enhance the performance of MONs. The solution thus refines the traffic flooding among the nodes, aiming to improve delivery probability while reducing unnecessary data replication. RSB performs routing in two phases. First, it provides nodes with the possibility of subscribing to a specific information topic. Thus, intermediate nodes choose a topic, which is the subject of the information that they are interested in carrying. As a result, the algorithm filters the data replication of messages, considering only the nodes interested in the data topic. Then, in a second phase, RSB draws on social influence to choose the most suitable node to forward the information. For this, using contact registration, this approach identifies the most influential encounter and replicates the information to it. As a result, influential nodes are registered. Hence, the next time influential nodes are encountered, they are prioritized to receive data.
The proposal has been implemented, executed, and evaluated in a simulated scenario. This scenario represents the case of use of a methodology to detect loneliness among the elderly population in rural areas. The proposal applies technological devices to keep track of encounters that older people have in a day, aiming to detect those who lack contacts. For this, smart bracelets are used. Considering the challenges of many rural areas in the deployment of traditional transmission architectures, a MON is proposed. Hence, smart bracelets work as senders, transmitting its information about encounters. Collaborative neighbors then act as intermediate nodes, and a destination beacon acts as a receiver of the messages. This entity processes and transmits to the Internet the incoming data about the encounters, creating a relationship graph that enables the identification of potential candidates that suffer from loneliness in the population.
Considering the implementation in the simulation, the performance of the proposal was evaluated and compared with alternative routing strategies such as EpSoc, SimBet, and BubbleRap. The obtained results showed that RSB reached the highest delivery probability, exceeding the second best result (SimBet) by 17%. It also reduced the highest overhead value (EpSoc) by 97%. Nevertheless, latency values are improvable. For this, future work aims to improve the current version of the algorithm by reducing the time required to deliver information; therefore, the proposal will be extended following three main lines: (i) improving social-awareness routing with the consideration of additional metrics, (ii) calculating internal scores from the parameters of the virtual profile, and (iii) defining topics as affinity metrics inferred from the node’s social characteristics. Thus, future work may further improve the performance of the routing algorithm solution.

Author Contributions

Conceptualization, J.G.-A., V.N.G.J.S. and J.G.-J.; Funding acquisition, J.G.-A.; Investigation, M.J.-A.; Methodology, J.G.-J.; Software, M.J.-A.; Validation, V.N.G.J.S.; Writing—original draft, M.J.-A.; Writing—review & editing, J.G.-A., V.N.G.J.S. and J.G.-J. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the Diputación de Cáceres (AV–7), the 4IE+ Project (0499-4IE-PLUS-4-E) funded by the Interreg V-A España-Portugal (POCTEP) 2014-2020 program, the project RTI2018-094591-B-I00 (MCI/AEI/FEDER, UE) funded by the Department of Economy, Science and Digital Agenda of the Government of Extremadura (GR21133, IB18030), and the European Regional Development Fund.

Data Availability Statement

Data are available upon request.

Conflicts of Interest

The authors declare that there is no conflict of interest.

References

  1. Comer, D.E.; Stevens, D.L.; Kourchenko Barrena, S.; Gutiérrez, J.L. Interconectividad de Redes con TCP/IP: Diseño e Implementación; Pearson Education: Mexico City, Mexico, 2000. [Google Scholar]
  2. Perumal, S.; Raman, V.; Samy, G.N.; Shanmugam, B.; Kisenasamy, K.; Ponnan, S. Comprehensive literature review on delay tolerant network (DTN) framework for improving the efficiency of internet connection in rural regions of Malaysia. Int. J. Syst. Assur. Eng. Manag. 2022, 13, 764–777. [Google Scholar] [CrossRef]
  3. Li, Y.; Bartos, R. A survey of protocols for intermittently connected delay-tolerant wireless sensor networks. J. Netw. Comput. Appl. 2014, 41, 411–423. [Google Scholar] [CrossRef] [Green Version]
  4. Zhou, H.; Chen, X.; He, S.; Zhu, C.; Leung, V.C. Freshness-aware seed selection for offloading cellular traffic through opportunistic mobile networks. IEEE Trans. Wirel. Commun. 2020, 19, 2658–2669. [Google Scholar] [CrossRef]
  5. Denko, M.K. Mobile Opportunistic Networks: Architectures, Protocols and Applications; CRC Press: Boca Raton, FL, USA, 2016. [Google Scholar]
  6. Zhang, J.; Huang, H.; Min, G.; Miao, W.; Wu, D. Social-Aware Routing in Mobile Opportunistic Networks. IEEE Wirel. Commun. 2021, 28, 152–158. [Google Scholar] [CrossRef]
  7. Yates, D.; Islam, M.Z. Data Mining on Smartphones: An Introduction and Survey. ACM Comput. Surv. (CSUR) 2022, 54, 1–36. [Google Scholar] [CrossRef]
  8. Angurala, M. Latest Advancements in Wearable Devices: A Review. Future Des. Intell. Comput. Tech. Neurosci. Neuroeng. 2022, 1, 58–64. [Google Scholar] [CrossRef]
  9. Gao, Y.; Shen, Z.; Tan, F.; Yue, G.; Liu, R.; Wang, Z.; Qu, S.; Wang, Z.; Zhang, W. Novel benzo [1, 2-b: 4, 5-b’] difuran-based copolymer enables efficient polymer solar cells with small energy loss and high VOC. Nano Energy 2020, 76, 104964. [Google Scholar] [CrossRef]
  10. Huang, J.; He, S.; Zhang, W.; Saparbaev, A.; Wang, Y.; Gao, Y.; Shang, L.; Dong, G.; Nurumbetova, L.; Yue, G.; et al. Efficient and Stable All-Inorganic CsPbIBr2 Perovskite Solar Cells Enabled by Dynamic Vacuum-Assisted Low-Temperature Engineering. Solar RRL 2022, 6, 2100839. [Google Scholar] [CrossRef]
  11. Gao, Y.; Cui, M.; Qu, S.; Zhao, H.; Shen, Z.; Tan, F.; Dong, Y.; Qin, C.; Wang, Z.; Zhang, W.; et al. Efficient Organic Solar Cells Enabled by Simple Non-Fused Electron Donors with Low Synthetic Complexity. Small 2022, 18, 2104623. [Google Scholar] [CrossRef]
  12. Verma, A.; Verma, P.; Dhurandher, S.K.; Woungang, I. Opportunistic Networks: Fundamentals, Applications and Emerging Trends; CRC Press: Boca Raton, FL, USA, 2021. [Google Scholar]
  13. Dalal, R.; Khari, M.; Anzola, J.P.; García-Díaz, V. Proliferation of Opportunistic Routing: A Systematic Review. IEEE Access 2021, 10, 5855–5883. [Google Scholar] [CrossRef]
  14. Jain, S.; Soares, V.N. A Comprehensive Survey of Social Based Routing for Delay Tolerant Networks. Preprints 2021, 2021050633. [Google Scholar] [CrossRef]
  15. Verma, A.; Kumar, S. Routing protocols in delay tolerant networks: Comparative and empirical analysis. Wirel. Pers. Commun. 2021, 118, 551–574. [Google Scholar] [CrossRef]
  16. Jain, S.; Chauhan, N.; Choudhari, P. Adaptive Approximate Community Detection Algorithm for Bubble Rap Routing Protocol. In Advances in Communication and Computational Technology; Springer: New York, NY, USA, 2021; pp. 865–878. [Google Scholar]
  17. Sachdeva, R.; Dev, A. Review of opportunistic network: Assessing past, present, and future. Int. J. Commun. Syst. 2021, 34, e4860. [Google Scholar] [CrossRef]
  18. Sonkar, N.; Pandey, S.; Kumar, S. Friendship and location-based routing in delay tolerant networks. In Evolutionary Computing and Mobile Sustainable Networks; Springer: New York, NY, USA, 2021; pp. 781–789. [Google Scholar]
  19. De Jonckère, O. Efficient contact graph routing algorithms for unicast and multicast bundles. In Proceedings of the 2019 IEEE International Conference on Space Mission Challenges for Information Technology (SMC-IT), Pasadena, CA, USA, 30 July–1 August 2019; pp. 87–94. [Google Scholar]
  20. Wu, L.; Cao, S.; Chen, Y.; Cui, J.; Chang, Y. An adaptive multiple spray-and-wait routing algorithm based on social circles in delay tolerant networks. Comput. Netw. 2021, 189, 107901. [Google Scholar] [CrossRef]
  21. Ullah, S.; Qayyum, A. Socially-Aware Adaptive Delay Tolerant Network (DTN) routing protocol. PLoS ONE 2022, 17, e0262565. [Google Scholar] [CrossRef]
  22. Jesús-Azabal, M.; Herrera, J.L.; Laso, S.; Galán-Jiménez, J. OPPNets and Rural Areas: An Opportunistic Solution for Remote Communications. Wirel. Commun. Mob. Comput. 2021, 2021, 8883501. [Google Scholar] [CrossRef]
  23. Parsa, A.; Moghim, N. QoS-aware routing and traffic management in multi-flow opportunistic routing. Comput. Electr. Eng. 2021, 94, 107330. [Google Scholar] [CrossRef]
  24. Vahdat, A.; Becker, D. Epidemic Routing for Partially Connected Ad Hoc Networks. Available online: http://issg.cs.duke.edu/epidemic/epidemic.pdf (accessed on 1 April 2022).
  25. Liang, H.; Shang, Y.; Wang, S. Study on DTN Routing Protocol of Vehicle Ad Hoc Network Based on Machine Learning. Wirel. Commun. Mob. Comput. 2021, 2021, 7965093. [Google Scholar] [CrossRef]
  26. Ma, H.D.; Yuan, P.Y.; Zhao, D. Research progress on routing problem in mobile opportunistic networks. J. Softw. 2015, 26, 600–616. [Google Scholar]
  27. Pelusi, L.; Passarella, A.; Conti, M. Opportunistic networking: Data forwarding in disconnected mobile ad hoc networks. IEEE Commun. Mag. 2006, 44, 134–141. [Google Scholar] [CrossRef]
  28. Moreira, W.; Mendes, P. Impact of human behavior on social opportunistic forwarding. Ad Hoc Netw. 2015, 25, 293–302. [Google Scholar] [CrossRef] [Green Version]
  29. Freeman, L.C. A set of measures of centrality based on betweenness. Sociometry 1977, 40, 35–41. [Google Scholar] [CrossRef]
  30. Nguyen, N.P.; Dinh, T.N.; Tokala, S.; Thai, M.T. Overlapping communities in dynamic networks: Their detection and mobile applications. In Proceedings of the 17th Annual International Conference on Mobile Computing and Networking, Las Vegas, NV, USA, 19–23 September 2011; pp. 85–96. [Google Scholar]
  31. Hui, P.; Yoneki, E.; Chan, S.Y.; Crowcroft, J. Distributed community detection in delay tolerant networks. In Proceedings of the 2nd ACM/IEEE International Workshop on Mobility in the Evolving Internet Architecture, Kyoto, Japan, 27–30 August 2007; pp. 1–8. [Google Scholar]
  32. Islam, M.A.; Iqbal, M.A.; Aleem, M.; Halim, Z.; Srivastava, G.; Lin, J.C.W. Evaluation of Congestion Aware Social Metrics for Centrality-Based Routing. Wirel. Commun. Mob. Comput. 2021, 2021, 5581259. [Google Scholar] [CrossRef]
  33. Lenando, H.; Alrfaay, M. Epsoc: Social-based epidemic-based routing protocol in opportunistic mobile social network. Mob. Inf. Syst. 2018, 2018, 6462826. [Google Scholar] [CrossRef] [Green Version]
  34. Hui, P.; Crowcroft, J.; Yoneki, E. Bubble rap: Social-based forwarding in delay-tolerant networks. IEEE Trans. Mob. Comput. 2010, 10, 1576–1589. [Google Scholar] [CrossRef] [Green Version]
  35. Naeem, F.; Mahmud, S.A.; Zafar, M.H. Social interest-based routing in Delay tolerant networks. In Proceedings of the 2015 International Conference on Emerging Technologies (ICET), Peshawar, Pakistan, 19–20 December 2015; pp. 1–5. [Google Scholar]
  36. Kumiawan, Z.H.; Yovita, L.V.; Wibowo, T.A. Performance analysis of dLife routing in a delay tolerant networks. In Proceedings of the 2016 International Conference on Control, Electronics, Renewable Energy and Communications (ICCEREC), Bandung, Indonesia, 13–15 September 2016; pp. 41–46. [Google Scholar]
  37. Galán-Jiménez, J.; Berrocal, J.; Garcia-Alonso, J.; Azabal, M.J. A novel routing scheme for creating opportunistic context-virtual networks in IoT scenarios. Sensors 2019, 19, 1875. [Google Scholar] [CrossRef] [Green Version]
  38. Liu, K.; Chen, Z.; Wu, J.; Wang, L. FCNS: A fuzzy routing-forwarding algorithm exploiting comprehensive node similarity in opportunistic social networks. Symmetry 2018, 10, 338. [Google Scholar] [CrossRef] [Green Version]
  39. Daly, E.M.; Haahr, M. Social network analysis for routing in disconnected delay-tolerant manets. In Proceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing, Montreal, QC, Canada, 9–14 September 2007; pp. 32–40. [Google Scholar]
  40. Keränen, A.; Ott, J.; Kärkkäinen, T. The ONE simulator for DTN protocol evaluation. In Proceedings of the 2nd International Conference on Simulation Tools and Techniques, Rome, Italy, 2–5 March 2009; pp. 1–10. [Google Scholar]
  41. Rivero Jiménez, B.; Conde-Caballero, D.; Juárez, L.M. Loneliness Among the Elderly in Rural Contexts: A Mixed-Method Study Protocol. Int. J. Qual. Methods 2021, 20, 1609406921996861. [Google Scholar] [CrossRef]
  42. Pérez Díaz, J.; Abellán García, A.; Aceituno Nieto, P.; Ramiro Fariñas, D. Un perfil de las personas mayores en España, 2020. Indicadores Estadísticos Básicos 2020, 1, 23–28. [Google Scholar]
  43. Heydon, R.; Hunn, N. Bluetooth Low Energy. CSR Presentation, Bluetooth SIG. 2012. Available online: https://www.bluetooth.org/DocMan/handlers/DownloadDoc.ashx (accessed on 27 May 2022).
  44. Gomez, C.; Oller, J.; Paradells, J. Overview and evaluation of bluetooth low energy: An emerging low-power wireless technology. Sensors 2012, 12, 11734–11753. [Google Scholar] [CrossRef]
  45. Ishita, F.F.; Le, P.; Novak-Louie, A.; Quansah, G.; Whitmore, S. Smart Band. Available online: http://www2.ensc.sfu.ca/~whitmore/courses/ensc305/projects/2016/13func.pdf (accessed on 27 May 2022).
  46. Rahman, M.J.; Morshed, B.I.; Harmon, B.; Rahman, M. A pilot study towards a smart-health framework to collect and analyze biomarkers with low-cost and flexible wearables. Smart Health 2022, 23, 100249. [Google Scholar] [CrossRef]
  47. Kamath, S.; Lindh, J. Measuring Bluetooth Low Energy Power Consumption; Application Note AN092; Texas Instruments: Dallas, TX, USA, 2010; pp. 1–24. [Google Scholar]
Figure 1. Scenario before the sender node transmits data.
Figure 1. Scenario before the sender node transmits data.
Electronics 11 02084 g001
Figure 2. Encounter between nodes.
Figure 2. Encounter between nodes.
Electronics 11 02084 g002
Figure 3. Broadcast based on interests and influence.
Figure 3. Broadcast based on interests and influence.
Electronics 11 02084 g003
Figure 4. A technological solution proposed to detect loneliness [41].
Figure 4. A technological solution proposed to detect loneliness [41].
Electronics 11 02084 g004
Figure 6. Mobility patterns (M) based on clusters in the simulated scenario.
Figure 6. Mobility patterns (M) based on clusters in the simulated scenario.
Electronics 11 02084 g006
Figure 7. Delivery probability ( d prob ) as a function of the message generation interval ( ω ).
Figure 7. Delivery probability ( d prob ) as a function of the message generation interval ( ω ).
Electronics 11 02084 g007
Figure 8. Latency average ( τ ) as a function of the message generation interval ( ω ).
Figure 8. Latency average ( τ ) as a function of the message generation interval ( ω ).
Electronics 11 02084 g008
Figure 9. Overhead ( θ ) as a function of the message generation interval ( ω ).
Figure 9. Overhead ( θ ) as a function of the message generation interval ( ω ).
Electronics 11 02084 g009
Figure 10. Hops average ( σ ) as a function of the message generation interval ( ω ).
Figure 10. Hops average ( σ ) as a function of the message generation interval ( ω ).
Electronics 11 02084 g010
Figure 11. Energy cost ( E g ) as a function of the message generation interval ( ω ).
Figure 11. Energy cost ( E g ) as a function of the message generation interval ( ω ).
Electronics 11 02084 g011
Table 1. Variables and distribution in the simulated scenario.
Table 1. Variables and distribution in the simulated scenario.
ParameterValue
s 10,000 × 10,000 [m 2 ]
T30,000 [s]
ω 1800, 3600, 7200 [s]
N110
N buffer 5 Mb
N e 60 (54.54%)
N i 50 (45.45%)
N d 1
MClusterMovement
M e 1 r 1700 m
M e 1 c (x, y) = (3900, 2700)
M e 2 r 1600 m
M e 2 c (x, y) = (5000, 2700)
M e 3 r 1600 m
M e 3 c (x, y) = (5000, 2500)
M i 1 r 2200 m
M i 1 c (x, y) = (4100, 2700)
M i 2 r 900 m
M i 2 c (x, y) = (5400, 2700)
M i 3 r 1600 m
M i 3 c (x, y) = (5000, 2500)
m topic Elder’s encounters
m size 300 kb
m ttl 1800 [s]
IBLE
I range 30 m
I s 1 Mbps
AlgorithmRSB, EpSoc, SimBet, BubbleRap
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Jesús-Azabal, M.; García-Alonso, J.; Soares, V.N.G.J.; Galán-Jiménez, J. Improving Delivery Probability in Mobile Opportunistic Networks with Social-Based Routing. Electronics 2022, 11, 2084. https://doi.org/10.3390/electronics11132084

AMA Style

Jesús-Azabal M, García-Alonso J, Soares VNGJ, Galán-Jiménez J. Improving Delivery Probability in Mobile Opportunistic Networks with Social-Based Routing. Electronics. 2022; 11(13):2084. https://doi.org/10.3390/electronics11132084

Chicago/Turabian Style

Jesús-Azabal, Manuel, José García-Alonso, Vasco N. G. J. Soares, and Jaime Galán-Jiménez. 2022. "Improving Delivery Probability in Mobile Opportunistic Networks with Social-Based Routing" Electronics 11, no. 13: 2084. https://doi.org/10.3390/electronics11132084

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop