Conference Paper

An obstacle-aware human mobility model for ad hoc networks

Dept. of Electr. & Comput. Eng., Univ. of Patras, Patras, Greece
DOI: 10.1109/MASCOT.2009.5366135 Conference: Modeling, Analysis & Simulation of Computer and Telecommunication Systems, 2009. MASCOTS '09. IEEE International Symposium on
Source: IEEE Xplore

ABSTRACT In this work we present an obstacle-aware human mobility model for ad hoc networks. Typical examples where the nodes of mobile ad hoc networks are human-operated are natural or man-made disasters, military activities or healthcare services. In these scenarios, obstacles are an integral part of the areas where such networks are deployed in order to facilitate communication among the firemen, policemen, medics, soldiers, etc. In the proposed mobility model, the nodes of the network move around the obstacles in a natural and realistic way. A recursive procedure is followed by each node according to which every time an obstacle is encountered between the node's current position and the final destination point, the node moves to the obstacle's vertex that is closest to the destination. This process is repeated until the destination is reached. The obstacles are also taken into account in modeling the signal propagation. When a packet is transmitted through an obstacle, the power at which it is received is attenuated by a certain value representing the physical layer phenomena suffered by the signal. The model is implemented as an add-on module in Network Simulator NS-2. A thorough simulation study conducted highlights the differences of the proposed model with other mobility models, by investigating the properties of the resulting network topologies and their impact on network performance.

Download full-text

Full-text

Available from: Konstantinos Birkos, Nov 10, 2014
0 Followers
 · 
167 Views
  • Source
    • "UPM node movement diagram make their next move. This movement is similar to HUMO movements [6] [16] and its improved variant, Obstacle Avoidance Mobility (OAM) [6]. AVM is also Pathway model because nodes move according to previously established pathways on an adjacency matrix [19]. "
    [Show abstract] [Hide abstract]
    ABSTRACT: n disaster situations, where ad hoc mobile networks are normally used, the location and quantity of existing obstacles is random. Most existing mobility models have not been developed with consideration of the obstacles that exist in a disaster environment. This paper proposes two methods of mobility that realistically represent movement in an environment with obstacles. Unmarked Point Model (UPM) uses a high granularity strategy and Adjacency Vertex Model (AVM) uses a method that selects the shortest pathway. UPM consumes more resources than AVM to generate node mobility patterns in an ad hoc network, on a real map area of an urban area, where obstacles have been placed to simulate an emergency and rescue scenario. In addition, a comparative analysis of both models in its routing performance is done using AODV.
    Ad Hoc & Sensor Wireless Networks 10/2014; 23(3-4):211-233. · 0.48 Impact Factor
  • Source
    • "The results obtained show that the proposed model yields a distinct behavior with respect to similar models that is directly reflected on network performance. Earlier versions of this work have appeared in [29] [30]. "
    [Show abstract] [Hide abstract]
    ABSTRACT: In this paper we present a mobility model for ad hoc networks consisting of human-operated nodes that are deployed in obstacle-constrained environments. According to this model, the network nodes move around the obstacles in a way that resembles how humans bypass physical obstructions. A recursive procedure is executed by each node at its current position to determine the next intermediate destination point until the final destination point is reached. The proposed mobility model is validated using real-life trace data and studied using both mathematical analysis and simulations. Furthermore, the model is extended to incorporate several operational aspects of ad hoc networks in mission critical scenarios, where it is best applicable. These extensions include hierarchical node organization, distinct modes of node activity, event-based destination selection and impact of the physical obstacles on signal propagation. The model is implemented as an add-on module in Network Simulator (ns-2).
    Ad Hoc Networks 05/2012; 10(3):421-434. DOI:10.1016/j.adhoc.2011.07.012 · 1.94 Impact Factor
  • Source
    • "Consequently, the space overhead in the case of SCML 6 is (24+10) = 34 bytes. In order to simulate the case of an eMANET we use the Mission Critical Mobility (MCM) model developed for the purposes of the PEACE project and published in [19]. MCM implements the two-way ground propagation model and the Random Waypoint mobility model considering obstacles. "
    [Show abstract] [Hide abstract]
    ABSTRACT: The nature of Mobile Ad hoc NETworks (MANETs) makes them suitable to be utilized in the context of anextreme emergency for all involved rescue teams. We use the term emergency MANETs (eMANETs) inorder to describe next generation IP-based networks, which are deployed in emergency cases such asforest fires and terrorist attacks. The main goal within the realm of eMANETs is to provide emergencyworkers with intelligent devices such as smart phones and PDAs. This technology allows communication”islets” to be established between the members of the same or different emergency teams (policemen,firemen, paramedics). In this article, we discuss an adaptive and secure routing protocol developed forthe purposes of eMANETs. We evaluate the performance of the protocol by comparing it with otherwidely used routing protocols for MANETs. We finally show that the overhead introduced due to securityconsiderations is affordable to support secure ad-hoc communications among lightweight devices.
    05/2010; DOI:10.5121/ijwmn.2010.2205
Show more