[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ Skip to main content

Advertisement

Log in

Analysis of human mobility patterns for opportunistic forwarding in shopping mall environments

  • Original Article
  • Published:
Social Network Analysis and Mining Aims and scope Submit manuscript

Abstract

Mobility plays a key role in the forwarding of data in delay-tolerant mobile ad hoc networks, as it is mobility that gives rise to local connection opportunities. Different patterns of mobility may give rise to different opportunity for communication, and different protocols may be more effective in particular situations. It is thus becoming increasingly important to understand user mobility patterns. In this paper, we seek to improve understanding of human mobility patterns in environments having definite and highly organized structure, such as shopping malls. We analyze contact traces between devices carried by people in a medium-scale shopping mall to characterize human mobility in such an environment. This will allow us to design suitable routing algorithms for delay-tolerant network applications for such scenarios as well as to develop and validate a novel mobility model which can be used by the research community to simulate mobile networks in such settings. We show that people’s motion is different according to their relationship to the environment in which they are and present a method to identify individuals expressing different mobility patterns based on delay-tolerant network metrics. From the contact traces, we identify two main groups with different mobility patterns that we name customers and sellers. For these two groups, we observe and quantify mobility characteristics, and present real-world measurement results. Finally, to understand better the role of groups of message carriers expressing different mobility patterns, we perform simulations of a derivative of the Epidemic protocol with real-world mobility traces, which distinguishes between two groups of carriers and entrusts messages through either one or the other. We discuss the implications of our results and make recommendations to guide the design of ad hoc forwarding algorithms for delay-tolerant mobile ad hoc networks in shopping mall environments and to help model realistic simulation scenarios.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (United Kingdom)

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16

Similar content being viewed by others

References

  • Aschenbruck N, Munjal A, Camp T (2011) Trace-based mobility modeling for multi-hop wireless networks. Elsevier Comput Commun 34(6):704–714

    Article  Google Scholar 

  • Benbadis F, Leguay J, Borrel V, Amorim M, Friedman T (2006) Experimental evaluation and characterization., Millipede: a rollerblade positioning system, ACM MobiCom 2006: workshop on wireless network testbedsWiNTECH, Los Angeles

    Google Scholar 

  • Bluetooth contact traces in shopping mall environments. CRAWDAD: community resource for archiving wireless data at Dartmouth, (online). http://crawdad.org/nottingham/mall

  • Camp T, Boleng J, Davies V (2002) A survey of mobility models for ad hoc network research. Wireless communication and mobile computing special issue on mobile ad hoc networking. Res Trends Appl 2(5):483–502

    Google Scholar 

  • Chaintreau A, Hui P, Crowcroft J, Diot C, Gass R, Scott J (2007) Impact of human mobility on the design of opportunistic forwarding algorithms. IEEE Trans Mobile Comput, pp 606–620

  • Chaintreau A, Hui P, Crowcroft J, Diot C, Gass R, Scott J (2005) Pocket switched networks: real-world mobility and its consequences for opportunistic forwarding, Technical Report UCAM-CL-TR-617. Computer Laboratory, University of Cambridge

  • Eagle N, Pentland A (2006) Reality mining: sensing complex social systems. Pers Ubiquit Comput 10:255–268

    Article  Google Scholar 

  • Galati A, Greenhalgh C (2010) Human mobility in shopping mall environments, In: Proceedings of the second international workshop on mobile opportunistic networking, ACM MobiOpp ’10, Pisa, Italy, pp 1–7

  • Galati A, Djemame K, Greenhalgh C (2013) Opportunistic forwarding throughout customers or sellers in shopping mall environments. In: Proceedings of the IFIP wireless days 2013 conference, Nov 21–23, Dublin, Ireland

  • Ghosh J, Beal MJ, Ngo HQ, Qiao C (2005) On profiling mobility and predicting locations of campus-wide wireless users, in REALMAN ’06. In: Proceedings of the second international workshop on Multi-hop ad hoc networks: from theory to reality (MobiHoc), Florence, Italy, pp 187–201

  • Gonzalez MC, Hidalgo CA, Barabasi A-L (2008) Understanding individual human mobility patterns. Nature 453(7196):779–82

    Article  Google Scholar 

  • Grossglauser M, Tse DNC (2002) Mobility increases the capacity of ad hoc wireless networks. IEEE ACM Trans Netw 10(2):477–486

    Article  Google Scholar 

  • Henderson T, Kotz D, Abyzov I (2004) The changing usage of a mature campus-wide wireless network. In: Proceedings of the 10th annual international conference on mobile computing and networking (MobiCom), Philadelphia, PA, USA, pp 187–201

  • Hui P, Crowcroft J (2008) Human mobility models and opportunistic communication system design. Philosophical transactions of the royal society A, Math Phys Eng Sci 366:2005–2016

  • Hui P, Chaintreau A, Scott J, Gass R, Crowcroft J, Diot C (2005) Pocket switched networks and human mobility in conference environments. In: Proceedings of the ACM SIGCOMM workshop on delay-tolerant networking, pp 244–251

  • Karamshuk D, Boldrini C, Conti M, Passarella A (2011) Human mobility models for opportunistic networks. IEEE Commun Mag 49(12):157–65

    Article  Google Scholar 

  • Lenders V, Wagner J, May M (2006) Analyzing the impact of mobility in ad hoc networks. In: Proceedings of the ACM SIGMOBILE international workshop on multihop ad hoc networks: from theory to reality (REALMAN), Florence, Italy

  • McNett M, Voelker GM (2004) Access and mobility of sireless PDA users. Technical report, computer science and engineering, UC, San Diego

  • Minder D, Marrón PJ, Lachenmann A, Rothermel K (2005) Experimental construction of a meeting model for smart office environments. In: Proceedimgs of the first workshop on real-world wireless sensor networks (REALWSN 2005). SICS Technical Report T2005:09

  • Kim M, Kotz D, Kim S (2006) Extracting a mobility model from real user traces. In: Proceedings of the 25th annual joint conference of the IEEE computer and communications societies (INFOCOM)

  • Musolesi M, Mascolo C (2006) A community based mobility model for ad hoc network research. In: Proceedings of the 2nd international workshop on Multi-hop ad hoc networks: from theory to reality, REALMAN ’06, 2006, Florence, Italy, pp 31–38, 8

  • Musolesi M, Hailes S, Mascolo C (2004) An ad hoc mobility model founded on social network theory. In: Proceedings of 7th ACM international symposium on modeling, analysis and simulation of wireless and mobile systems, Venice, Italy, pp 20–24

  • Okasha S (2005) Altruism, group selection and correlated interaction. Br J Philos Sci 56(4):703–725

    Article  Google Scholar 

  • Ou S, Pan H, Li F (2012) Heterogeneous wireless access technology and its impact on forming and maintaining friendship through mobile social networks. Int J Commun Syst 25:1300–1312. doi:10.1002/dac.1314

    Article  Google Scholar 

  • Palazzi CE, Bujari A (2012) Social-aware delay tolerant networking for mobile-to-mobile file sharing. Int J Commun Syst 25:1281–1299. doi:10.1002/dac.1324

    Article  Google Scholar 

  • Pirozmand P, Wu G, Jedari B, Xia F (2014) Human mobility in opportunistic networks: characteristics, models and prediction methods. J Netw Comput Appl (Accepted for publication)

  • Venkateswaran P, Ghosh R, Das A, Sanyal SK, Nandi R (2006) An obstacle based realistic ad-hoc mobility model for social networks. J Netw Finl 1(2):37–44

  • Vukadinovic V, Dreier F, Mangold S (2011) A simple framework to simulate the mobility and activity of theme park visitors. In: Proceedings of the winter simulation conference (WSC)

  • Vukadinovic V, Mangold S (2011) Opportunistic wireless communication in theme parks: a study of visitors mobility. In: Proceedings of the 6th ACM workshop on challenged networks, CHANTS ’11, pp 3–8

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Adriano Galati.

Additional information

This work was done when Adriano Galati was at the Univeristy of Nottingham and the University of Leeds.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Galati, A., Djemame, K. & Greenhalgh, C. Analysis of human mobility patterns for opportunistic forwarding in shopping mall environments. Soc. Netw. Anal. Min. 5, 12 (2015). https://doi.org/10.1007/s13278-015-0251-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s13278-015-0251-7

Keywords

Navigation