Computer Science ›› 2019, Vol. 46 ›› Issue (2): 81-87.doi: 10.11896/j.issn.1002-137X.2019.02.013

• Network & Cornmunication • Previous Articles     Next Articles

Data Forwarding Algorithm Based on Multidimensional Context Matching in Mobile Social Networks

XU Fang1,2, DENG Min1, XIONG Zeng-gang1, YE Cong-huan1, XU Ning2   

  1. School of Computer and Information Science,Hubei Engineering University,Xiaogan,Hubei 432000,China1
    School of Computer Science,Wuhan University,Wuhan 430072,China2
  • Received:2018-01-07 Online:2019-02-25 Published:2019-02-25

Abstract: Through studying the effect of a variety of context information on the mobility patterns in mobile social networks,this paper proposed a multidimensional context matching forwarding (MCMF) algorithm.In this novel algorithm,three dimension contexts,which are physical adjacency,social similarity and social interactivity,are used to make routing decisions dynamically.Firstly,message carrier obtains its neighbor node sets by using physical adjacency matching at the present moment.Then social similarity matching is used to search relay candidate subset of neighbor node sets,and the discrete-time semi-Markov prediction model is used to determine the best relay node.At last,the efficient data forwarding algorithm is designed.Simulation experiments based on real traces show that the proposed MCMF algorithm is more efficient in terms of maximizing the delivery ratio and minimizing the overhead ratio than other three state-of-the-art algorithms.

Key words: Context matching, Forwarding algorithm, Mobile social networks, Multi dimensional, Prediction model

CLC Number: 

  • TN915
[1]LU Z,WEN Y,ZHANG W,et al.Towards information diffusion in mobile social networks[J].IEEE Transactions on Mobile Computing,2016,15(5):1292-1304.
[2]ZHANG Y,SONG L,JIANG C,et al.A Social-Aware Frame- work for Efficient Information Dissemination in Wireless Ad Hoc Networks[J].IEEE Communications Magazine,2017,55(1):174-179.
[3]LEE H J,NAM J C,SEO W K,et al.Enhanced PRoPHET routing protocol that considers contact duration in DTNs[C]∥2015 International Conference on Information Networking (ICOIN).IEEE,2015:523-524.
[4]MUSOLESI M,MASCOLO C.CAR:Context-aware adaptive routing for delay-tolerant mobile networks[J].IEEE Transactions on Mobile Computing,2009,8(2):246-260.
[5]HUI P,CROWCROFT J.How small labels create big improvements[C]∥Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops.IEEE,2007:65-70.
[6]ABDELKADER T,NAIK K,NAYAK A,et al.SGBR:A rou- ting protocol for delay tolerant networks using social grouping[J].IEEE Transactions on Parallel and Distributed Systems,2013,24(12):2472-2481.
[7]XIAO M,WU J,HUANG L.Community-aware opportunistic routing in mobile social networks[J].IEEE Transactions on Computers,2014,63(7):1682-1695.
[8]LI F,WU J.LocalCom:a community-based epidemic forwarding scheme in disruption-tolerant networks[C]∥6th Annual IEEE Communications Society Conference on Sensor,Mesh and Ad Hoc Communications and Networks.IEEE,2009:1-9.
[9]BULUT E,SZYMANSKI B K.Friendship based routing in delay tolerant mobile social networks[C]∥Global Telecommunications Conference (GLOBECOM 2010).IEEE,2010:1-5.
[10]BOLDRINI C,CONTI M,JACOPINI J,et al.Hibop:a history based routing protocol for opportunistic networks[C]∥IEEE International Symposium on World of Wireless,Mobile and Multimedia Networks.IEEE,2007:1-12.
[11]HUI P,CROWCROFT J,YONEKI E.Bubble rap:Social-based forwarding in delay-tolerant networks[J].IEEE Transactions on Mobile Computing,2011,10(11):1576-1589.
[12]MOREIRA W,MENDES P,SARGENTO S.Opportunistic routing based on daily routines[C]∥2012 IEEE International Symposium on World of Wireless,Mobile and Multimedia Networks (WoWMoM).IEEE,2012:1-6.
[13]XU F,ZHANG H,DENG M,et al.Social-aware data forwarding in smartphone-based Delay-Tolerant Networks[C]∥2016 IEEE International Conference on Computational Electromagnetics (ICCEM).IEEE,2016:84-86.
[14]LIU G,LI Y.Social-aware data dissemination service in mobile social network with controlled overhead[J].Pervasive and Mobile Computing,2016,33:127-139.
[15]HOM J,GOOD L,YANG S.A survey of social-based routing protocols in Delay Tolerant Networks[C]∥2017 International Conference on Computing,Networking and Communications (ICNC).IEEE,2017:788-792.
[16]TIAN D,ZHOU J,WANG Y,et al.An adaptive vehicular epidemic routing method based on attractor selection model[J].Ad Hoc Networks,2016,36(P2):465-481.
[17]KERÄNEN A,JÖRG O,TEEMU K,et al.The ONE simulator for DTN protocol evaluation[C]∥Proceedings of the 2nd International Conference on Simulation Tools and Techniques.Brussels,Belgium,2009:81-91.
[18]EAGLE N,PENTLAND A.Reality mining:sensing complex social systems[J].Personal and Ubiquitous Computing,2009,10(4):255-268.
[1] YAN Rui, LIANG Zhi-yong, LI Jin-tao, REN Fei. Predicting Tumor-related Indicators Based on Deep Learning and H&E Stained Pathological Images:A Survey [J]. Computer Science, 2022, 49(2): 69-82.
[2] CHEN Hui-qin, GUO Guan-cheng, QIN Chao-xuan, LI Zhao-bi. Research on Elderly Population Prediction Based on GM-LSTM Model in Nanjing City [J]. Computer Science, 2021, 48(6A): 231-234.
[3] WANG Bo-yu, WANG Zhong-qing, ZHOU Guo-dong. Dialogue Act Prediction Based on Response Generation [J]. Computer Science, 2021, 48(2): 212-216.
[4] LI Yin, LI Bi-xin. Memory Leak Test Acceleration Based on Script Prediction and Reconstruction [J]. Computer Science, 2020, 47(9): 31-39.
[5] ZHOU Jie, LUO Yun-fang, LEI Yao-jian, LI Wen-jing, FENG Yu. Multi-scale Convolutional Neural Network Air Quality Prediction Model Based on Spatio-Temporal Optimization [J]. Computer Science, 2020, 47(11A): 535-540.
[6] WU Fa-you, WANG Lin-feng, WENG Qi-neng. Application of Grey Prediction Model in Prediction of Stability of Wedge-shaped Body of Tunnel [J]. Computer Science, 2019, 46(5): 327-330.
[7] WANG Li-jun, ZHI Zhi-ying, JIA Lu, LI Wei. Study on Optimized Method for Predicting Paraffin Deposition of Pumping Wells Based on SCRF [J]. Computer Science, 2019, 46(11A): 599-603.
[8] HOU Lin-qing, CAI Ying, FAN Yan-fang, XIA Hong-ke. Interest Community Based Message Transmission Scheme in Mobile Social Networks [J]. Computer Science, 2018, 45(6): 105-110.
[9] SHI Xiao-wan, MA Yu-tao. Software Bug Triaging Method Based on Text Classification and Developer Rating [J]. Computer Science, 2018, 45(11): 193-198.
[10] WEN Run and TAN Li. Short-term Power Forecasting for Photovoltaic Generation Based on HS-ESN [J]. Computer Science, 2017, 44(6): 226-231.
[11] YANG Dong-ju and DENG Chong-bin. Dynamic Scheduling Method of Virtual Resources Based on ARIMA Model [J]. Computer Science, 2017, 44(10): 14-18.
[12] WEN Guan-qi, WANG Zhong, GONG Zheng-zheng, ZHANG Shao-lei and WANG Jing. Two-hop ACK Message Based Routing Algorithm with Alternative Copy in DTN [J]. Computer Science, 2016, 43(Z11): 275-277.
[13] MENG Zhi-qing, MA Ke and ZHENG Ying. Forecasting Method for Fashion Clothing Demand Based on Kernel Functions Technology [J]. Computer Science, 2016, 43(Z11): 455-460.
[14] LI Kun, CHAI Yu-mei, ZHAO Hong-ling, ZHAO Yue-shu and NAN Xiao-fei. Estimation of Fetal Weight Based on Deep Neural Network [J]. Computer Science, 2016, 43(Z11): 73-76.
[15] ZHOU Wen-jie, YANG Lu and YAN Jian-feng. Big Data-driven Complaint Prediction Model [J]. Computer Science, 2016, 43(7): 217-223.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!