Mobility
Modeling, Analysis, and Applications in Challenged Networks
Summary: We
describe our main research topics on social activity based mobility modeling,
encounter based mobility analysis and mobility-assisted networking
applications.
1 Social activity driven mobility modeling
Among most existing
mobility models, a largely missed issue is human's social roles in making
movement decisions, which if modeled properly, would make a more realistic
network scenario. To tackle the problem, we developed an Agenda Driven Mobility
Model. The model is a framework that
takes a person's social activities in his or her agenda (when, where and what)
and generates mobility in geographic movements. We use a constructive approach
to define functional components of the model for building specific real world
scenarios and generating motion steps, which translating agendas into a mobile
world. Various sources of real data can be used to populate these components,
including GIS, consensus on human travel and wireless trace data. Thus far, we are able to create urban mobile
environment through using National Household Travel Survey (NHTS) data in our
model. Through extensive study our model allows us to observe the uneven
distributions of node geographic concentrations, as a demonstration of nodes'
social roles and activities. Our results further show high dynamics about node
concentration, connectivity and partition in both spatial and time domains. We
found that the incorporation of social roles and agenda activities into
mobility modeling has significant impact on routing protocol performance. The model has added significant capability
and flexibility to the current mobility modeling research area through
capturing key properties of a real mobile node’s social roles and collectively
making them to represent a mobile network environment.
Qunwei Zheng*, Xiaoyan Hong, Jun Liu*, Wan Huang, David
Cordes, "Agenda Driven Mobility
Modeling", International
Journal of Ad Hoc and Ubiquitous Computing, accepted, 2008.
Qunwei Zheng*, Xiaoyan Hong, Jun Liu*, “An agenda based mobility
model,” 39th Annual Simulation Symposium,
Huntsville, AL., April, 2006.
Qunwei Zheng*, Xiaoyan Hong, Sibu Ray,
``Recent Advances in Mobility Modeling for Mobile Ad Hoc Network Research’’, Proc. 42nd Annual ACM Southeast Conference,
Huntsville, Alabama, USA, April 2-3, 2004, pp 70-75.
2 Encounter analysis and delay management for DTN
In delay tolerant networks
(DTN), nodes with a message to transmit rely on encountering other nodes during
movements and exchanging the message with each other. A series of encounters of
different nodes will spread the message among many nodes and eventually deliver
it to the designated destination. The quality of the message delivery heavily
depends on the probability of two nodes meeting each other (encounter
probability), which indicate delivery success rate; and the time it takes for
two nodes to meet (encounter delay).
Some critical factors influence these properties greatly, including the
way a node picks its next location (mobility patterns) and the features of the
dwell time. We have made unique
contributions by analyzing these properties as functions of time using
discrete and continuous time Markov
Chain models. Our analysis consider many constraints
including random, or semi-random (agenda-based) location selection, constant
and time-variant dwelling time. We also
analyzed a constraint on the number of locations a message carrier will visit. The results help generating the desired
delivery curves and selecting proper
time-to-live thresholds for a desired delivery probability. The methodology we use can extend to other
possibly more complicated scenarios and mobility patterns.
Further, we have exploited
location visit properties in an efficient routing scheme for DTN called
SMART. The SMART uses a combination of
large fan out and focused message forwarding in order to limit message overhead and to improve the delivery ratio. The encounter probability and latency
analysis helps a node to learn and to select the nodes that frequently meet the
destination to achieve the design goals. Our analysis and simulation results
show that SMART has a higher delivery ratio and a smaller delivery latency than
the controlled opportunistically-forwarding schemes and has a significantly
smaller routing overhead than the pure flooding schemes.
Qunwei Zheng*, Xiaoyan Hong, Pu Wang, Lei
Tang*, Jun Liu*, “Delay Management in Delay
Tolerant Network,” Special Issue of
International Journal of Network Management on Mathematical Methods in Network
Management, accepted, 2008.
Qunwei Zheng* (May 2007), dissertation: “Mobility in Mobile Ad Hoc Networks: Models,
Analysis, and Applications.” University
of Alabama.
Lei Tang*,
Qunwei Zheng*,
Jun Liu*, Xiaoyan Hong, “Selective Message
Forwarding in Delay Tolerant Networks,” Mobile
Networks and Applications, Special Issue on Broadband Communications, Networks,
and Systems, accepted, 2008.
Lei Tang*, Xiaoyan
Hong, Qunwei
Zheng*, Jun
Liu*, “SMART: A Selective Controlled-Flooding Routing for Delay Tolerant
Networks”, International Conference on
Broadband Communications, Networks, and Systems (Broadnets 2007), Raleigh,
NC, Sept 2007.
3 Mobility
applications: security for delay tolerant applications
We further explored
mobility to disseminate message securely
in mobile ad hoc networks. The multipath
approach, i.e, sending many secret shares of the original message through
multiple different paths, has been used
to deal with the challenge of
establishing strict security mechanisms in the self-organizing
mobile networks. One major limitations
of the spatial multi-path scheme come from the scenarios when a network is
sparse or deployed in a geographically constrained area, where not enough
node-disjoint multiple paths can be found. To tackle the issue, we developed a
novel protocol that explores multiple routing paths in time domain for
applications that can tolerate delay. In
our scheme, the source sends shares at different times. Due to node
mobility, the shares will be routed
through different intermediate nodes. Using analysis and worse-case simulation,
we proofed that it is high unlikely that a particular intermediate node (an
eavesdropper) is able to be on many of these routes and to collect enough
shares to reconstruct the original message.
Of course, the sender can control its sending intervals to achieve a
high security.
Qunwei Zheng*, Xiaoyan Hong, Jun Liu*, lei Tang*, “Secure Data Transmission
Scheme for Mobile Ad Hoc Networks”, in
the Proceedings of IEEE Global Telecommunications Conference (Globecom),
Washington, D.C., USA, Nov 26-30, 2007.