Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Effective Data Transmission and Control Based on Social Communication in Social Opportunistic Complex Networks

Published: 01 January 2020 Publication History

Abstract

In opportunistic complex networks, information transmission between nodes is inevitable through broadcast. The purpose of broadcasting is to distribute data from source nodes to all nodes in the network. In opportunistic complex networks, it is mainly used for routing discovery and releasing important notifications. However, when a large number of nodes in the opportunistic complex networks are transmitting information at the same time, signal interference will inevitably occur. Therefore, we propose a low-latency broadcast algorithm for opportunistic complex networks based on successive interference cancellation techniques to improve propagation delay. With this kind of algorithm, when the social network is broadcasting, this algorithm analyzes whether the conditions for successive interference cancellation are satisfied between the broadcast links on the assigned transmission time slice. If the conditions are met, they are scheduled at the same time slice, and interference avoidance scheduling is performed when conditions are not met. Through comparison experiments with other classic algorithms of opportunistic complex networks, this method has outstanding performance in reducing energy consumption and improving information transmission efficiency.

References

[1]
J. Wu, Z. Chen, and M. Zhao, “Information cache management and data transmission algorithm in opportunistic social networks,” Wireless Networks, vol. 25, no. 6, pp. 2977–2988, 2019.
[2]
Y. Wang and J. Wu, “Social-tie-based information dissemination in mobile opportunistic social networks,” in Proceedings of the 2013 IEEE 14th International Symposium on “A World of Wireless, Mobile and Multimedia Networks”, Madrid, Spain, June 2013.
[3]
C. Jiang, Y. Chen, and K. J. R. Liu, “Evolutionary dynamics of information diffusion over social networks,” IEEE Transactions on Signal Processing, vol. 62, no. 17, pp. 4573–4586, 2014.
[4]
J. Luo, J. Wu, and Y. Wu, “Advanced data delivery strategy based on multiperceived community with IoT in social complex networks,” Complexity, vol. 2020, 15 pages, 2020.
[5]
Q. Xu, Z. Su, K. Zhang, P. Ren, and X. S. Shen, “Epidemic information dissemination in mobile social networks with opportunistic links,” IEEE Transactions on Emerging Topics in Computing, vol. 3, no. 3, pp. 399–409, 2015.
[6]
Z. Li, F. Xiong, X. Wang, Z. Guan, and H. Chen, “Mining heterogeneous influence and indirect trust for recommendation,” Access IEEE, vol. 8, pp. 21282–21290, 2020.
[7]
J. Wu, Z. Chen, and M. Zhao, “Effective information transmission based on socialization nodes in opportunistic networks,” Computer networks, vol. 129, pp. 297–305, 2017.
[8]
K. Zhu, W. Li, X. Fu, and L. Zhang, “Data routing strategies in opportunistic mobile social networks: taxonomy and open challenges,” Computer Networks, vol. 93, pp. 183–198, 2015.
[9]
A. Socievole, E. Yoneki, F. De Rango, and J. Crowcroft, “ML-SOR: message routing using multi-layer social networks in opportunistic communications,” Computer Networks, vol. 81, pp. 201–219, 2015.
[10]
J. Wu, Z. Chen, and M. Zhao, “Community recombination and duplication node traverse algorithm in opportunistic social networks,” Peer-To-Peer Networking and Applications, vol. 13, no. 3, pp. 940–947, 2020.
[11]
C. Jiang, Y. Chen, and K. J. R. Liu, “Graphical evolutionary game for information diffusion over social networks,” IEEE Journal of Selected Topics in Signal Processing, vol. 8, no. 4, pp. 524–536, 2014.
[12]
Z. Li, F. Xiong, X. Wang, H. Chen, and X. Xiong, “Topological influence-aware recommendation on social networks,” Complexity, vol. 2019, 12 pages, 2019.
[13]
M. R. Schurgot, C. Comaniciu, and K. Jaffres-Runser, “Beyond traditional DTN routing: social networks for opportunistic communication,” IEEE Communications Magazine, vol. 50, no. 7, pp. 155–162, 2012.
[14]
D. Zhang, Z. Wang, B. Guo, X. Zhou, and V. Raychoudhury, “A dynamic community creation mechanism in opportunistic mobile social networks,” in Proceedings of the 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing, IEEE, Boston, MA, USA, October 2011.
[15]
J. Wu, Z. Chen, and M. Zhao, “An efficient data packet iteration and transmission algorithm in opportunistic social networks,” Journal of Ambient Intelligence and Humanized Computing, pp. 1–17, 2019.
[16]
R. Gandhi, A. Mishra, and S. Parthasarathy, “Minimizing broadcast latency and redundancy in ad hoc networks,” IEEE/ACM Transactions On Networking, vol. 16, no. 4, pp. 840–851, 2008.
[17]
S. C.-H. Huang, H.-C. Wu, and S. S. Iyengar, “Multisource broadcast in wireless networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 10, pp. 1908–1914, 2012.
[18]
C. S. Vaze and M. K. Varanasi., “The degree-of-freedom regions of MIMO broadcast, interference, and cognitive radio channels with no CSIT,” IEEE Transactions on Information Theory, vol. 58, no. 8, pp. 5354–5374, 2012.
[19]
D. Zhao, K.-W. Chin, and R. Raad, “Approximation algorithms for broadcasting in duty cycled wireless sensor networks,” Wireless Networks, vol. 20, no. 8, pp. 2219–2236, 2014.
[20]
F. Xiong, Y. Liu, L. Wang, and X. Wang, “Analysis and application of opinion model with multiple topic interactions,” Chaos: An Interdisciplinary Journal of Nonlinear Science, vol. 27, no. 8, 2017.
[21]
F. Xiong and Z.-Y. Li, “Effective methods of restraining diffusion in terms of epidemic dynamics,” Scientific Reports, vol. 7, no. 1, pp. 1–14, 2017.
[22]
F. Xiong, Y. Liu, and J. Cheng, “Modeling and predicting opinion formation with trust propagation in online social networks,” Communications in Nonlinear Science and Numerical Simulation, vol. 44, pp. 513–524, 2017.
[23]
J. Wu, G. Yu, and P. Guan, “Interest characteristic probability predicted method in social opportunistic networks,” IEEE ACCESS, vol. 7, no. 1, pp. 59002–59012, 2019.
[24]
D. Yu, Q.-S. Hua, Y. Wang, J. Yu, and F. C. M. Lau, “Efficient distributed multiple-message broadcasting in unstructured wireless networks,” in Proceedings of the 2013 Proceedings IEEE INFOCOM, IEEE, Turin, Italy, April 2013.
[25]
J. Wu, X. Tian, and Y. Tan, “Hospital evaluation mechanism based on mobile health for IoT system in social networks,” Computers in Biology and Medicine, vol. 109, pp. 138–147, 2019.
[26]
S. Pan, R. Hu, S.-F. Fung, G. Long, J. Jiang, and C. Zhang, “Learning graph embedding with adversarial training methods,” IEEE Transactions on Cybernetics, vol. 50, no. 6, pp. 2475–2487, 2019.
[27]
S. Pan, R. Hu, G. Long, J. Jiang, L. Yao, and C. Zhang, “Adversarially regularized graph autoencoder for graph embedding,” 2018, http://arxiv.org/abs/1802.04407.
[28]
L. Wang, Z. Yu, F. Xiong, D. Yang, S. Pan, and Z. Yan, “Influence spread in geo-social networks: a multiobjective optimization perspective,” IEEE Transactions on Cybernetics, pp. 1–13, 2019.
[29]
L. Wang, Z. Yu, D. Yang, T. Ku, B. Guo, and H. Ma, “Collaborative mobile crowdsensing in opportunistic D2D networks,” ACM Transactions on Sensor Networks, vol. 15, no. 3, pp. 1–30, 2019.
[30]
H. Liang and T. Baldwin, “A probabilistic rating auto-encoder for personalized recommender systems,” in Proceedings of the 24th ACM International on Conference on Information and Knowledge Management, Melbourne, Australia, 2015.
[31]
H. Chen, X. Wang, S. Pan, and F. Xiong, “Identify topic relations in scientific literature using topic modeling,” IEEE Transactions on Engineering Management, pp. 1–13, 2019.
[32]
A. Vahdat and D. Becker, “Epidemic routing for partially connected Ad Hoc networks,” Duke University, Durham, NC, USA, 2000, Technical Report CS-2000-06.
[33]
H. Lenando and M. Alrfaay, “EpSoc: social-based epidemic-based routing protocol in opportunistic mobile social network,” Mobile Information Systems, vol. 2018, 8 pages, 2018.
[34]
P. Mundur, M. Seligman, and G. Lee, “Epidemic routing with immunity in delay tolerant networks,” in Proceedings of the MILCOM 2008-2008 IEEE Military Communications Conference, IEEE, San Diego, CA, USA, November 2008.
[35]
F. D. Rango, S. Amelio, and P. Fazio, “Enhancements of epidemic routing in delay tolerant networks from an energy perspective,” in Proceedings of the International Wireless Communications & Mobile Computing Conference, Sardinia, Italy, July 2013.
[36]
T. Spyropoulos, K. Psounis, and C. S. Raghavendra, “Spray and wait: an efficient routing scheme for intermittently connected mobile networks,” in Proceedings of the 2005 ACM SIGCOMM Workshop on Delay-Tolerant Networking, Philadelphia, PA, USA, 2005.
[37]
J. Xue, X. Fan, Y. Cao, J. Fang, and J. Li, “Spray and wait routing based on average delivery probability in delay tolerant network,” in Proceedings of the 2009 International Conference on Networks Security, Wireless Communications and Trusted Computing, vol. 2, IEEE, Prague, Czech Republic, April 2009.
[38]
W. Huang, S. Zhang, and W. Zhou, “Spray and wait routing based on position prediction in Opportunistic Complex Networks,” in Proceedings of the 2011 3rd International Conference on Computer Research and Development, vol. 2, IEEE, Shanghai, China, March 2011.
[39]
S. Jain, M. Chawla, V. N. G. J. Soares, and J. J. Rodrigues, “Enhanced fuzzy logic-based spray and wait routing protocol for delay tolerant networks,” International Journal of Communication Systems, vol. 29, no. 12, pp. 1820–1843, 2016.
[40]
S. K. Dhurandher, D. K. Sharma, I. Woungang, and S. Bhati, “HBPR: history based prediction for routing in infrastructure-less Opportunistic Complex Networks,” in Proceedings of the 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA), IEEE, Barcelona, Spain, March 2013.
[41]
C. Yu, Z. Tu, D. Yao, F. Lu, and H. Jin, “Probabilistic routing algorithm based on contact duration and message redundancy in delay tolerant network,” International Journal of Communication Systems, vol. 29, no. 16, pp. 2416–2426, 2016.
[42]
G. Yu, Z. Chen, and J. Wu, “Quantitative social relations based on trust routing algorithm in opportunistic social network,” EURASIP Journal on Wireless Communications and Networking, vol. 2019, no. 1, 2019.
[43]
F. Xu, Q. Xu, Z. Xiong et al., “Intelligent distributed routing scheme based on social similarity for mobile social networks,” Future Generation Computer Systems, vol. 96, pp. 472–480, 2019.
[44]
X. Tian, J. Yu, L. Ma, G. Li, and X. Cheng, “Distributed deterministic broadcasting algorithms under the sinr model,” in Proceedings of the IEEE INFOCOM 2016-The 35th Annual IEEE International Conference on Computer Communications, IEEE, San Francisco, CA, USA, April 2016.
[45]
N. I. Miridakis and D. D. Vergados, “A survey on the successive interference cancellation performance for single-antenna and multiple-antenna OFDM systems,” IEEE Communications Surveys & Tutorials, vol. 15, pp. 312–335, 2012.
[46]
T. Liu, J. Tong, Q. Guo, J. Xi, Y. Yu, and Z. Xiao, “Energy efficiency of uplink massive MIMO systems with successive interference cancellation,” IEEE Communications Letters, vol. 21, no. 3, pp. 668–671, 2016.
[47]
J. Wu, Z. Chen, and M. Zhao, “SECM: status estimation and cache management algorithm in opportunistic networks,” The Journal of Supercomputing, vol. 75, no. 5, pp. 2629–2647, 2019.
[48]
J. Wu and Z. Chen, “Data decision and transmission based on mobile data health records on sensor devices in wireless networks,” Wireless Personal Communications, vol. 90, no. 4, pp. 2073–2087, 2016.

Cited By

View all
  • (2022)Rethinking U-Net from an Attention Perspective with Transformers for Osteosarcoma MRI Image SegmentationComputational Intelligence and Neuroscience10.1155/2022/79734042022Online publication date: 1-Jan-2022
  • (2022)Modified Data Delivery Strategy Based on Stochastic Block Model and Community Detection in Opportunistic Social NetworksWireless Communications & Mobile Computing10.1155/2022/50678492022Online publication date: 1-Jan-2022
  • (2022)Deep Active Learning Framework for Lymph Node Metastasis Prediction in Medical Support SystemComputational Intelligence and Neuroscience10.1155/2022/46016962022Online publication date: 1-Jan-2022
  • Show More Cited By

Index Terms

  1. Effective Data Transmission and Control Based on Social Communication in Social Opportunistic Complex Networks
        Index terms have been assigned to the content through auto-classification.

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image Complexity
        Complexity  Volume 2020, Issue
        2020
        17147 pages
        This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

        Publisher

        John Wiley & Sons, Inc.

        United States

        Publication History

        Published: 01 January 2020

        Qualifiers

        • Research-article

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)0
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 06 Oct 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2022)Rethinking U-Net from an Attention Perspective with Transformers for Osteosarcoma MRI Image SegmentationComputational Intelligence and Neuroscience10.1155/2022/79734042022Online publication date: 1-Jan-2022
        • (2022)Modified Data Delivery Strategy Based on Stochastic Block Model and Community Detection in Opportunistic Social NetworksWireless Communications & Mobile Computing10.1155/2022/50678492022Online publication date: 1-Jan-2022
        • (2022)Deep Active Learning Framework for Lymph Node Metastasis Prediction in Medical Support SystemComputational Intelligence and Neuroscience10.1155/2022/46016962022Online publication date: 1-Jan-2022
        • (2021)Effective communication data transmission based on community clustering in opportunistic social networks in IoT systemJournal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology10.3233/JIFS-21080741:1(2129-2144)Online publication date: 1-Jan-2021
        • (2021)A Reputation Value-Based Task-Sharing Strategy in Opportunistic Complex Social NetworksComplexity10.1155/2021/85543512021Online publication date: 26-Nov-2021
        • (2020)Adaptive Variable Neighborhood Search-Based Supply Network Reconfiguration for Robustness EnhancementComplexity10.1155/2020/12929382020Online publication date: 8-Dec-2020

        View Options

        View options

        Get Access

        Login options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media