Conference Paper

DTN routing optimised by human routines: The HURRy protocol

Authors:
  • Basque Center for Applied Mathematics
To read the full-text of this research, you can request a copy directly from the authors.

Abstract

This paper proposes the HURRy (HUman Routines used for Routing) protocol, which infers and benefits from the social behaviour of nodes in disruptive networking environments. HURRy incorporates the contact duration to the information retrieved from historical encounters among neighbours, so that smarter routing decisions can be made. The specification of HURRy is based on the outcomes of a thorough experiment, which highlighted the importance of distinguishing between short and long contacts and deriving mathematical relations in order to optimally prioritize the available routes to a destination. HURRy introduces a novel and more meaningful rating system to evaluate the quality of each contact and overcome the limitations of other routing approaches in social environments.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

... More importantly, it is compatible with antecedent DTN standards, which means modifications on the basic framework can be minimized and existing works in DTN still have their values. Even though BPQ is often mentioned in past papers [55][56][57][58], it is not fully exploited in research work. As far as we know, only two papers put BPQ into practice: in [59], BPQ is adopted to mingle the protocol stack of DTN and named data networking (NDN) [60]. ...
Article
Full-text available
Geospatial information is gaining immense interest and importance as we enter the era of highly developed transportation and communication. Despite the proliferation of cellular network and WiFi, on some occasions, users still face barriers to accessing geospatial data. In this paper, we design and implement a distributed prototype system with a delay/disruption tolerant network (DTN), named Geo-DMP, for cooperatively and opportunistically sharing and exchanging named geospatial contents in a device-to-device fashion. First of all, we construct a lightweight “content agent” module to bridge the gap between the application layer and the underlying DTN protocol stack. Afterwards, to profile the mobility history of users in practical geospatial environments, we present a map segmentation scheme based on road network and administrative subdivision information. Subsequently, we associate the regional movement history information with the content retrieval process to devise a hierarchical and region-oriented DTN routing scheme for both requests and responses. Finally, we conduct extensive experiments with real-world trajectories and complete implementations on the emulation platform composed of virtual machines. The experiments corroborate that Geo-DMP has the capability of successfully retrieving geospatial contents for users for most of the time under mobile circumstances with episodic connectivity. Moreover, en-route caches can be efficiently exploited to provision contents from multiple sources with less network resource consumption and shorter user-perceived latencies.
... In these works, the authors explain the relationship between factors such as speed, mobility model, node density, and places. In [42], the authors introduce a new forwarding protocol, HURRy (HUman Routines used for Routing), where the routing decision is based on probabilistic routing techniques like PRoPHET (Probabilistic Routing Protocol using History of Encounters and Transitivity), although it incorporates the contact duration of encounters (unlike previous approaches) to estimate the rating probabilities of all possible paths to a certain destination. ...
Article
Full-text available
Regular citizens equipped with smart devices are being increasingly used as “sensors” by Smart Cities applications. Using contacts among users, data in the form of messages is obtained and shared. Contact-based messaging applications are based on establishing a short-range communication directly between mobile devices, and on storing the messages in these devices for subsequent delivery to cloud-based services. An effective way to increase the number of messages that can be shared is to increase the contact duration. We thus introduce the Friendly-Sharing diffusion approach, where, during a contact, the users are aware of the time needed to interchange the messages stored in their buffers, and they can thus decide to wait more time in order to increase the message sharing probability. The performance of this approach is anyway closely related to the size of the buffer in the device. We therefore compare various policies either for the message selection at forwarding times and for message dropping when the buffer is full. We evaluate our proposal with a modified version of the Opportunistic Networking Environment (ONE) simulator and using real human mobility traces.
Article
Full-text available
Despite recent advances in uncovering the quantitative features of stationary human activity patterns, many applications, from pandemic prediction to emergency response, require an understanding of how these patterns change when the population encounters unfamiliar conditions. To explore societal response to external perturbations we identified real-time changes in communication and mobility patterns in the vicinity of eight emergencies, such as bomb attacks and earthquakes, comparing these with eight non-emergencies, like concerts and sporting events. We find that communication spikes accompanying emergencies are both spatially and temporally localized, but information about emergencies spreads globally, resulting in communication avalanches that engage in a significant manner the social network of eyewitnesses. These results offer a quantitative view of behavioral changes in human activity under extreme conditions, with potential long-term impact on emergency detection and response.
Article
Full-text available
While the fat tailed jump size and the waiting time distributions characterizing individual human trajectories strongly suggest the relevance of the continuous time random walk (CTRW) models of human mobility, no one seriously believes that human traces are truly random. Given the importance of human mobility, from epidemic modeling to traffic prediction and urban planning, we need quantitative models that can account for the statistical characteristics of individual human trajectories. Here we use empirical data on human mobility, captured by mobile phone traces, to show that the predictions of the CTRW models are in systematic conflict with the empirical results. We introduce two principles that govern human trajectories, allowing us to build a statistically self-consistent microscopic model for individual human mobility. The model not only accounts for the empirically observed scaling laws but also allows us to analytically predict most of the pertinent scaling exponents.
Article
Full-text available
A range of applications, from predicting the spread of human and electronic viruses to city planning and resource management in mobile communications, depend on our ability to foresee the whereabouts and mobility of individuals, raising a fundamental question: To what degree is human behavior predictable? Here we explore the limits of predictability in human dynamics by studying the mobility patterns of anonymized mobile phone users. By measuring the entropy of each individual’s trajectory, we find a 93% potential predictability in user mobility across the whole user base. Despite the significant differences in the travel patterns, we find a remarkable lack of variability in predictability, which is largely independent of the distance users cover on a regular basis.
Article
Full-text available
The dynamic spatial redistribution of individuals is a key driving force of various spatiotemporal phenomena on geographical scales. It can synchronize populations of interacting species, stabilize them, and diversify gene pools. Human travel, for example, is responsible for the geographical spread of human infectious disease. In the light of increasing international trade, intensified human mobility and the imminent threat of an influenza A epidemic, the knowledge of dynamical and statistical properties of human travel is of fundamental importance. Despite its crucial role, a quantitative assessment of these properties on geographical scales remains elusive, and the assumption that humans disperse diffusively still prevails in models. Here we report on a solid and quantitative assessment of human travelling statistics by analysing the circulation of bank notes in the United States. Using a comprehensive data set of over a million individual displacements, we find that dispersal is anomalous in two ways. First, the distribution of travelling distances decays as a power law, indicating that trajectories of bank notes are reminiscent of scale-free random walks known as Lévy flights. Second, the probability of remaining in a small, spatially confined region for a time T is dominated by algebraically long tails that attenuate the superdiffusive spread. We show that human travelling behaviour can be described mathematically on many spatiotemporal scales by a two-parameter continuous-time random walk model to a surprising accuracy, and conclude that human travel on geographical scales is an ambivalent and effectively superdiffusive process.
Article
Full-text available
The rich set of interactions between individuals in society results in complex community structure, capturing highly connected circles of friends, families or professional cliques in a social network. Thanks to frequent changes in the activity and communication patterns of individuals, the associated social and communication network is subject to constant evolution. Our knowledge of the mechanisms governing the underlying community dynamics is limited, but is essential for a deeper understanding of the development and self-optimization of society as a whole. We have developed an algorithm based on clique percolation that allows us to investigate the time dependence of overlapping communities on a large scale, and thus uncover basic relationships characterizing community evolution. Our focus is on networks capturing the collaboration between scientists and the calls between mobile phone users. We find that large groups persist for longer if they are capable of dynamically altering their membership, suggesting that an ability to change the group composition results in better adaptability. The behaviour of small groups displays the opposite tendency-the condition for stability is that their composition remains unchanged. We also show that knowledge of the time commitment of members to a given community can be used for estimating the community's lifetime. These findings offer insight into the fundamental differences between the dynamics of small groups and large institutions.
Article
Full-text available
In this paper, we address the problem of routing in intermittently connected networks. In such networks there is no guarantee that a fully connected path between source and destination exists at any time, rendering traditional routing protocols unable to deliver messages between hosts. There does, however, exist a number of scenarios where connectivity is intermittent, but where the possibility of communication still is desirable. Thus, there is a need for a way to route through networks with these properties. We propose PRoPHET, a probabilistic routing protocol for intermittently connected networks and compare it to the earlier presented Epidemic Routing protocol through simulations. We show that PRoPHET is able to deliver more messages than Epidemic Routing with a lower communication overhead.
Article
The characterization of human interaction at different levels has been a matter of interest in many disciplines. So far, social networking through the Internet has been the main source to infer human beings’ relations. Nevertheless, due to the irruption of wearable devices with wireless communication capabilities, initiatives that use them to measure physical proximity are increasingly popular. Built-in wireless communication technologies allow these devices to detect each other and to infer their owners’ interaction, based on their proximity measurements. This approach, which is followed by most proximity initiatives in the research community, poses three main challenges that usually limit the quality of collected data and consequently, the reliability of human behavior characterization: the person-device uncertainty, the sample period and the bias caused by the particularities of the underlying wireless technology. The work presented here analyzes empirically the impact of these three limitations when Bluetooth is the communication technology used to detect proximity. It also presents the expansion of the results when additional mechanisms to counteract the impediments are applied, and it states their necessity for the reliability of the results. They show relevant differences with previous initiatives that open a discussion on the proper use of wireless wearable devices as a tool for the characterization of human interactions.
Article
This paper highlights the challenges to be taken into consideration when Bluetooth is used as a radio technology to capture proximity traces between people. Our study analyzes the limitations of Bluetooth-based trace acquisition initiatives carried out until now in terms of granularity and reliability. We then propose an optimal configuration for the acquisition of proximity traces and movement information using a fine-tuned Bluetooth system based on custom hardware. With this system and based on such a configuration, we have carried out an intensive human trace acquisition experiment resulting in a proximity and mobility database of more than 5 million traces with a minimum granularity of 5 s.
Article
— Current mobile computing applications are infrastructure-centric, due to the IP-based API that these applications are written around. This causes many frustrations for end users, whose needs might be easily met with local connectivity resources but whose applications do not support this (e.g. emailing someone sitting next to you when there is no wireless access point). We identify the general scenario faced by the user of Pocket Switched Networking (PSN), and discuss why the IP-based status quo does not cope well in this environment. We present a set of architectural principles for PSN, and the high-level design of Haggle, our asynchronous, data-centric network architecture which addresses this environment by “raising ” the API so that applications can provide the network with application-layer data units (ADUs) with high-level metadata concerning ADU identification, security and delivery to user-named endpoints. I.
Article
Complex networks as the World Wide Web, the web of human sexual contacts or criminal networks often do not have an engineered architecture but instead are self-organized by the actions of a large number of individuals. From these local interactions non-trivial global phenomena can emerge as small-world properties or scale-free degree distributions. A simple model for the evolution of acquaintance networks highlights the essential dynamical ingredients necessary to obtain such complex network structures. The model generates highly clustered networks with small average path lengths and scale-free as well as exponential degree distributions. It compares well with experimental data of social networks, as for example coauthorship networks in high energy physics.
Conference Paper
This paper introduces the Bluetooth Medallion (BTM), a device especially designed to work in Human Mobile Ad-Hoc NETworks (MANETs). Its main areas of application are: the collection of high granularity connectivity data through time (detection of nearby nodes) and testbed to evaluate and refine MANET routing protocols. We present an ongoing long term experiment carried out in an office scenario where a Bluetooth Human MANET has been set up to collect proximity information of people vs people and people vs anchors during a long period of time. At the end of this experiment a publicly available dataset with the connectivity data will be set up. Dynamic Weighted MultiDimensional Scaling with Binary Filter (DWMDS-BF), our connectivity based tracking system, will obtain people real tracking traces based on the connectivity data. Compared to previous works, the Bluetooth Medallion is a device that grants more reliability and a higher sample rate looking for nearby nodes (high granularity) than the devices used so far.
Article
We introduce a system for sensing complex social systems with data collected from 100 mobile phones over the course of 9 months. We demonstrate the ability to use standard Bluetooth-enabled mobile telephones to measure information access and use in different contexts, recognize social patterns in daily user activity, infer relationships, identify socially significant locations, and model organizational rhythms.
Article
Despite their importance for urban planning, traffic forecasting and the spread of biological and mobile viruses, our understanding of the basic laws governing human motion remains limited owing to the lack of tools to monitor the time-resolved location of individuals. Here we study the trajectory of 100,000 anonymized mobile phone users whose position is tracked for a six-month period. We find that, in contrast with the random trajectories predicted by the prevailing Lévy flight and random walk models, human trajectories show a high degree of temporal and spatial regularity, each individual being characterized by a time-independent characteristic travel distance and a significant probability to return to a few highly frequented locations. After correcting for differences in travel distances and the inherent anisotropy of each trajectory, the individual travel patterns collapse into a single spatial probability distribution, indicating that, despite the diversity of their travel history, humans follow simple reproducible patterns. This inherent similarity in travel patterns could impact all phenomena driven by human mobility, from epidemic prevention to emergency response, urban planning and agent-based modelling.
Article
Mobile ad hoc routing protocols allow nodes with wireless adaptors to communicate with one another without any pre-existing network infrastructure. Existing ad hoc routing protocols, while robust to rapidly changing network topology, assume the presence of a connected path from source to destination. Given power limitations, the advent of short-range wireless networks, and the wide physical conditions over which ad hoc networks must be deployed, in some scenarios it is likely that this assumption is invalid. In this work, we develop techniques to deliver messages in the case where there is never a connected path from source to destination or when a network partition exists at the time a message is originated. To this end, we introduce Epidemic Routing, where random pair-wise exchanges of messages among mobile hosts ensure eventual message delivery. The goals of Epidemic Routing are to: i) maximize message delivery rate, ii) minimize message latency, and iii) minimize the total...
Article
While there is ample evidence that social and communication networks play a key role during the spread of new ideas, products, or services, network effects are expected to have diminished influence in the stationary state, when all users are aware of the innovation, and its usage pattern is determined mainly by its utility to the user. Here we study four mobile phone-based services available to over six million subscribers, allowing us to simultaneously monitor the communication network between individuals and the time-resolved service usage patterns. We find that usage highly correlates with the structure of the communication network, and demonstrate the coexistence on the same social network of two distinct usage classes, network effects being responsible for the quantifiable differences between them. To test the predictive power of our theory, we demonstrate that traditional marketing techniques are ineffective in permanently boosting service adoption, and propose a hub-based incentive mechanism that has the potential to enhance usage for one of the two service classes.
Bundle protocol query extension block
  • S Farrell
  • A Lynch
  • D Kutcher
  • A Lindgren
HURRywalla project. Implementation of HURRy protocol within the DTN stack of Bytewalla3 project for Android phones
  • S Pérez-Sánchez
  • N Errondosoro
Eigenbehaviours: identifying structure in routine
  • N Eagle
  • A Pentland