A Hypercube Social Feature Extraction and Multipath Routing in Delay Tolerant Networks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 33122
A Hypercube Social Feature Extraction and Multipath Routing in Delay Tolerant Networks

Authors: S. Balaji, M. Rajaram, Y. Harold Robinson, E. Golden Julie

Abstract:

Delay Tolerant Networks (DTN) which have sufficient state information include trajectory and contact information, to protect routing efficiency. However, state information is dynamic and hard to obtain without a global and/or long-term collection process. To deal with these problems, the internal social features of each node are introduced in the network to perform the routing process. This type of application is motivated from several human contact networks where people contact each other more frequently if they have more social features in common. Two unique processes were developed for this process; social feature extraction and multipath routing. The routing method then becomes a hypercube–based feature matching process. Furthermore, the effectiveness of multipath routing is evaluated and compared to that of single-path routing.

Keywords: Delay tolerant networks, entropy, human contact networks, hyper cubes, multipath Routing, social features.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1127527

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1310

References:


[1] A. Pentland, R. Fletcher, and A. Hasson, “DakNet: Rethinking Connectivity in Developing Nations,” Computer, vol. 37, no. 1, pp. 78-83, Jan 2004.
[2] Harold Robinson, Y., & Rajaram, M. (2015). “Trustworthy link failure recovery algorithm for highly dynamic mobile adhoc networks”, World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering, vol.9, no.2, 233–236.
[3] J. Burgess, B. Gallagher, D. Jensen, and B.N. Levine, “MaxProp: Routing for Vehicle-Based Disruption-Tolerant Networks,” Proc. IEEE INFOCOM, 2006.
[4] J. Scott, J. Crowcroft, P. Hui, and C. Diot, “Haggle: A Networking Architecture Designed around Mobile Users,” Proc. Third Ann. Conf. Wireless On-Demand Network Systems and Services (WONS ’06), 2006.
[5] V. Erramilli, M. Crovella, A. Chaintreau, and C. Diot, “Delegation Forwarding,” Proc. ACM MobiHoc, 2008.
[6] M.C. Gonzalez, C.A. Hidalgo, and A.-L. Barabasi, “Understanding Individual Human Mobility Patterns,” Nature, vol. 453, no. 7196, pp. 779-782, 2008.
[7] P. Hui, J. Crowcroft, and E. Yoneki, “Bubble Rap: Social-Based Forwarding in Delay Tolerant Networks,” Proc. ACM MobiHoc, pp. 241-250, 2008.
[8] Harold Robinson, Y., & Rajaram, M. (2016), “A memory aided broadcast mechanism with fuzzy classification on a device-to-device mobile Ad Hoc network”, Wireless Personal Communications, 1–23, doi:10.1007/s11277-016-3213-0.
[9] K.E. Defrawy, J. Solis, and G. Tsudik, “Leveraging Social Contacts for Message Confidentiality in Delay Tolerant Networks,” Proc. IEEE 33rd Ann. Int’l Computer Software and Applications Conf. (COMPSAC ’09), pp. 271-279.
[10] M. Girvan and M.E.J. Newman, “Community Structure in Social and Biological Networks,” Proc. Nat’l Academy of Sciences USA, vol. 99, no. 12, pp. 7821-7826, 2002.
[11] Harold Robinson, Y., & Rajaram, M. (2015), “Energy-aware multipath routing scheme based on particle swarm optimization in mobile ad hoc networks”, The Scientific World Journal, 1–9. doi:10.1155/2015/284276.
[12] Harold Robinson, Y., & Rajaram, M. (2015), “Establishing pairwise keys using key Predistribution schemes for sensor networks”, World Academy of Science, Engineering and Technology International Journal of Computer, Electrical, Automation, Control and Information Engineering, 9(2), 608–612.
[13] Le C, Chan S (2004) Onboard FPGA-based SAR processing for future spaceborne systems. In: Proceedings of the IEEE radar conference, pp 15–20.
[14] Jain S, Shan RC (2006) Exploiting mobility for energy efficient data collection in wireless sensor networks. Mobile Netw Appl 11(3):27–39.
[15] Balaji, S., Harold Robinson, Y. and Rajaram, M. (2016) SCSBE: Secured Cluster and Sleep Based Energy-Efficient Sensory Data Collection with Mobile Sinks. Circuits and Systems, 7, 1992-2001. http://dx.doi.org/10.4236/cs.2016.78173
[16] Ledoux C (1997) An urban traffic flow model integrating network. Transp Res 5(5):287–300
[17] Kulik, J., Rabiner, W., Balakrishnan, H., 1999. Adaptive protocols for information dissemination in wireless sensor networks. The 5th Annual ACM/IEEE International Conference on Mobile Computing and Networking (MobiCom’ 99), Seattle, Washington, August 15-20, 174–185.
[18] Robinson, Y.H., Balaji, S. and Rajaram, M. (2016) “ECBK: Enhanced Cluster Based Key Management Scheme for Achieving Quality of Service”, Circuits and Systems, 7, 2014-2024. http://dx.doi.org/10.4236/cs.2016.78175.
[19] Intanagonwiwat, C., Govindan, R., Estrin, D., 2000. Directed diffusion: A scalable and robust communication paradigm for sensor networks. The 6th Annual International Conference on Mobile Computing and Networking (MobiCom ’00), Boston, Massachusetts, August 6-11, 56–67.
[20] Ye, F., Chen, A., Lu, S., Zhang, L., 2001. A scalable solution to minimum cost forwarding in large sensor networks. The 10th International Conference on Computer Communications and Networks, Scottsdale, Arizona, USA, October 15-17, 304–309.
[21] Harold Robinson, Y., Rajaram, M., Golden Julie, E. and Balaji, S. (2016) Dominating Set Algorithm and Trust Evaluation Scheme for Secured Cluster Formation and Data Transferring. World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering, 10, 388-393.
[22] Henderson, W. D., Tron, S., 2006. Verification of the minimum cost forwarding protocol for wireless sensor networks. 11th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), Prague, Czech Republic, September 20-22, 194–201.
[23] A. Jayasumana, H. Qi, T. Illangasekare, Virtual sensor networks - a resource efficient approach for concurrent applications, in: Proc. 4th International Conference on Information Technology (ITNG’07), Las Vegas, 2007, pp. 111–115.
[24] Harold Robinson, Y., Rajaram, M., Golden Julie, E. and Balaji, S. (2016), “Tree Based Data Fusion Clustering Routing Algorithm for Illimitable Network Administration in Wireless Sensor Network”, World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering Vol:10, No:6, pp. 1123 – 1130.
[25] M. M. Islam, E.-N. Huh, Virtualization in wireless sensor network: Challenges and opportunities, Journal of Networks 7 (3) (2012) 412 – 418.
[26] T. Luo, H.-P. Tan, T. Quek, Sensor openflow: Enabling software-defined wireless sensor networks, Communications Letters, IEEE 16 (11) (2012) 1896–1899. doi:10.1109/LCOMM.2012.092812.121712.
[27] Harold Robinson, Y., Rajaram, M., Golden Julie, E. and Balaji, S. (2016), “TBOR: Tree Based Opportunistic Routing for Mobile Ad Hoc Networks”, World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering Vol:10, No:6, pp. 1115 – 1122.
[28] L. Sarakis, T. Zahariadis, H.-C. Leligou, M. Dohler, A framework for service provisioning in virtual sensor networks, EURASIP Journal on Wireless Communications and Networking.
[29] A. Merentitis, F. Zeiger, M. Huber, N. Frangiadakis, K. Mathioudakis, K. Sasloglo, G. Mazarakis, V. Gazis, Z. Boufidis, Wsn trends: Sensor infrastructure virtualization as a driver towards the evolution of the internet of things, in: Proc. Seventh International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies UBICOMM 2013, 2013, pp. 113–118.
[30] Ramalakshmi, S., & Robinson, Y. H. (2014). “ATMPH: Attaining optimal throughput capacity of MANET with power control in heterogeneous network”, Programmable Device Circuits and Systems, 6(4), 111–115.
[31] I. Leontiadis, C. Efstratiou, C. Mascolo, J. Crowcroft, Senshare: Transforming sensor networks into multi-application sensing infrastructures, in: Proceedings of the 9th European Conference onWireless Sensor Networks, EWSN’12, 2012, pp.65–81.
[32] S. Bhattacharya, A. Saifullah, C. Lu, G. Roman, Multi-application deployment in shared sensor networks based on quality of monitoring, in: Real-Time and Embedded Technology and Applications Symposium (RTAS), 2010 16th IEEE,2010, pp. 259–268. doi:10.1109/RTAS.2010.20.
[33] Robinson, Y. H., & Rajeswari, S. R. (2011). “Energy-based dynamic encryption for wireless sensor networks. Wireless Communication”, vol.3, no.9, pp. 661–663.
[34] C.-L. Fok, C. Julien, G.-C. Roman, C. Lu, Challenges of satisfying multiple stakeholders: Quality of service in the internet of things, in: Proceedings of the 2Nd Workshop on Software Engineering for Sensor Network Applications, SESENA’11, ACM, New York, NY, USA, 2011, pp. 55–60. doi:10.1145/1988051.1988062. URL http://doi.acm.org/10.1145/1988051.1988062
[35] W. Li, F. C. Delicato, P. F. Pires, Y. C. Lee, A. Y. Zomaya, C. Miceli, L. Pirmez, Efficient allocation of resources in multiple heterogeneous wireless sensor networks, Journal of Parallel and Distributed Computing 74 (1) (2014) 1775 – 1788. URL http://www.sciencedirect.com/ science/article/pii/ S0743731513002104.
[36] Harold Robinson, Y., & Rajaram, M. (2014). “A novel approach to allocate channels dynamically in wireless mesh networks”, World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering, vol. 8, no.10, pp. 1865–1868.
[37] R. Huang, X. Chu, J. Zhang, Y. H. Hu, Energy-efficient monitoring in software defined wireless sensor networks using reinforcement learning: A prototype, International Journal of Distributed Sensor Networks 2015. doi:10.1155/2015/360428.
[38] Y. Xu, A. Saifullah, Y. Chen, C. Lu, S. Bhattacharya, Near optimal multiapplication allocation in shared sensor networks, in: Proceedings of the Eleventh ACM International Symposium on Mobile Ad Hoc Networking and Computing, MobiHoc ’10, ACM, New York, NY, USA, 2010, pp. 181–190. doi:10.1145/1860093.1860118. URL http://doi.acm.org/10.1145/ 1860093. 1860118.
[39] Golden Julie, E., Tamil Selvi, S., & Harold Robinson, Y. (2014). “Opportunistic routing with secure coded wireless multicast using MAS approach”, World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering, vol. 8, no.7, pp. 1247–1250.
[40] C. Wu, Y. Xu, Y. Chen, C. Lu, Submodular game for distributed application allocation in shared sensor networks, in: INFOCOM, 2012 Proceedings IEEE, 2012, pp. 127–135. doi:10.1109/INFCOM.2012.6195490.
[41] C. de Farias, L. Pirmez, F. Delicato, W. Li, A. Zomaya, J. De Souza, A scheduling algorithm for shared sensor and actuator networks, in: Information Networking (ICOIN), 2013 International Conference on, 2013, pp. 648–653. doi:765 10.1109/ICOIN.2013.6496703.
[42] Golden Julie, E., Tamil Selvi, S., & Harold Robinson, Y. (2016). “Performance Analysis of Energy Efficient Virtual Back Bone Path Based Cluster Routing Protocol for WSN”, Wireless Personal Communications, Springer, 1–19, DOI 10.1007/s11277-016-3520-5.
[43] D. Zeng, P. Li, S. Guo, T. Miyazaki, J. Hu, Y. Xiang, Energy minimization in multi-task software-defined sensor networks, Computers, IEEE Transactions on 64 (11) (2015) 3128–3139. doi:10.1109/TC.2015.2389802.
[44] N. Edalat, W. Xiao, M. Motani, N. Roy, S. K. Das, Auction-based task allocation with trust management for shared sensor networks, Security and Communication Networks 5 (11) (2012) 1223–1234.
[45] Harold Robinson, Y., Rajaram, M., Golden Julie, E. and Balaji, S. (2016), “Detection of Black Holes in MANET Using Collaborative Watchdog with Fuzzy Logic”, World Academy of Science, Engineering and Technology, International Journal of Computer, Electrical, Automation, Control and Information Engineering Vol:10, No:3, pp. 575 – 581.
[46] C. Delgado, J. R. G´allego, M. Canales, J. Ort´ın, S. Bousnina, M. Cesana, An optimization framework for resource allocation in virtual sensor networks, in: Proceedings of IEEE Global Communications Conference, Globecom ’15, IEEE, 2015.
[47] W. Ren, Q. Zhao, and A. Swami, “Connectivity of heterogeneous wireless networks,” IEEE Transactions on Information Theory, vol. 57, no. 7, pp.4315–4332, Jul. 2011.
[48] Golden Julie, E., & Tamil Selvi, S. (2016), “Development of energy efficient clustering protocol in wireless sensor network using neuro-fuzzy approach” The Scientific World Journal, Article ID 5063261, 1–8.
[49] O. Al-Tameemi and M. Chatterjee, “Percolation in multi-channel secondary cognitive radio networks under the SINR model,” in Proceedings of the IEEE DYSPAN, McLean, VA, USA, Apr. 2014.
[50] Ayyasamy, A., and K. Venkatachalapathy. "Context aware adaptive fuzzy based QoS routing scheme for streaming services over MANETs." Wireless Networks 21.2 (2015): 421-430.
[51] E. Golden Julie, E. Sahaya Rose Vigita, S. Tamil Selvi (2014), “Distributed Self-Healing Protocol for Unattended Wireless Sensor Network”, World Academy of Science, Engineering and Technology, International Journal of Computer, Information, Systems and Control Engineering Vol:8 No:10, pp. 1680 – 1683.
[52] D. Liu, E. Liu, Y. Ren, Z. Zhang, R. Wang, and F. Liu, “Bounds on secondary user connectivity in cognitive radio networks,” IEEE Communications Letters, vol. 19, no. 4, pp. 617–620, Apr. 2015.
[53] X. Wang, M. Sheng, D. Zhai, J. Li, G. Mao, and Y. Zhang, “Achieving bichannel-connectivity with topology control in cognitive radio networks,” IEEE Journal on Selected Areas in Communications, vol. 32, no. 11, pp. 2163–2176, Nov. 2014.
[54] S. Balaji, M. Rajaram (2014), “EUDIS-An Encryption Scheme for User-Data Security in Public Networks”, World Academy of Science, Engineering and Technology, International Journal of Computer, Information, Systems and Control Engineering Vol:8 No:11, pp. 1825 – 1830.
[55] L. Sun, W. Wang, “Understanding blackholes in large-scale cognitive radio networks under generic failures,” in Proceedings of the IEEE INFOCOM, Turin, Italy, Apr. 2013, pp. 728–736.
[56] W. Ao, S. Cheng, and K. Chen, “Connectivity of multiple cooperative cognitive radio ad hoc networks,” IEEE Journal on Selected Areas in Communications, vol. 30, no. 2, pp. 263–270, Feb. 2012.
[57] G.Arun SamPaul Thomas, R.Karthik Ganesh, A.Kandasamy, S.Balaji, Y.Harold Robinson, (2011) “An Advanced Controlled-Flooding Routing with Group Organization for Delay Tolerant Networks using A-SMART”, Emerging Trends in Electrical and Computer Technology (ICETECT), 978-1-4244-7926-9/11, IEEE.
[58] Ayyasamy, A., and K. Venkatachalapathy. "Increased Throughput for Load based Channel Aware Routing in MANETs with Reusable Paths." International Journal of Computer Applications 40.2 (2012): 20-23.
[59] Z. Wen-bo, X. Ye, Design and implementation of management cluster commu- nication primitive for satellite network, Comput. Eng. 36 (2010) 23–26.
[60] S. Balaji, M. Rajaram (2016), “SIPTAN: Securing Inimitable and Plundering Track for Ad Hoc Network”, Wireless Personal Communications, Springer, 1-21, DOI 10.1007/s11277-016-3187-y
[61] Abouelfadl, A. A., El-Bendary, M. A. M., & Shawki, F. (2014). Enhancing transmission over wirelessimage sensor networks based on ZigBee network. Life Science Journal, 11(8), 342–354.
[62] El-Bendary M. A. M.,, Kasban, H., & El-Tokhy, M. A. R. (2014). Interleaved reed-solomon codes with code rate switching over wireless communications channels. In: International Journal of Information Technology and Computer Science (IJITCS) (http://www.ijitcs.com) on, 16(1).
[63] Harold Robinson, Y, Golden Julie E, Balaji S, Ayyasamy A, (2016), Energy Aware Clustering Scheme in Wireless Sensor Network Using Neuro-Fuzzy Approach , Wireless Personal Communications, Springer, 1-19, Doi: 10.1007/s11277-016-3793-8