Skip to main content

Validating Contact Times Extracted from Mobility Traces

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCCN,volume 10517))

Abstract

Use of mobility models to model user movement in mobile networks is a key aspect when developing and evaluating networking protocols in simulators. A trace obtained from an actual user movement is considered as being more realistic than using synthetic mobility models in simulators. Though realistic, usually, these traces lack information about the actual wireless contact durations between users. Most simulators use Unit Disk Graph (UDG) model to determine contact durations. However, due to the nature of radio propagations, a simplistic connectivity model (with UDG) may result in simulating unrealistic connectivity patterns. In this work, we have used an Android Smartphone application to collect GPS traces of moving users and their corresponding Bluetooth Low Energy (BLE) contact times to compare the viability of using UDG to determine contact durations. The results show that trace based model with UDG based wireless connectivity is an effective method to determine contact durations.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    BluetoothContacts: https://play.google.com/store/apps/details?id=de.uni_bremen.comnets.BluetoothContacts, developed by Jens Dede and Sarmad Ghafoor.

References

  1. CRAWDAD: A community resource for archiving wireless data at dartmouth. http://crawdad.org/. Accessed 4 Apr. 2010

  2. Kim, M., Kotz, D., Kim, S.: Extracting a mobility model from real user traces. In: Proceedings of INFOCOM 2006, 25th IEEE International Conference on Computer Communications, pp. 1–13. IEEE (2006)

    Google Scholar 

  3. Herrera-Tapia, J., Hernández-Orallo, E., Tomás, A., Calafate, C.T., Cano, J.C., Zennaro, M., Manzoni, P.: Evaluating the use of sub-gigahertz wireless technologies to improve message delivery in opportunistic networks (2017)

    Google Scholar 

  4. Papanikos, N., Akestoridis, D.G., Papapetrou, E.: Adyton: a network simulator for opportunistic networks (2015). https://github.com/npapanik/Adyton

  5. Khadar, F., Simplot-Ryl, D.: Connectivity and topology control in wireless ad hoc networks with realistic physical layer. In: Third International Conference on Wireless and Mobile Communications, ICWMC 2007, p. 49. IEEE (2007)

    Google Scholar 

  6. Stojmenovic, I.: Simulations in wireless sensor and ad hoc networks: matching and advancing models, metrics, and solutions. IEEE Commun. Mag. 46(12), 102–107 (2008)

    Article  Google Scholar 

  7. Stojmenovic, I., Nayak, A., Kuruvila, J.: Design guidelines for routing protocols in ad hoc and sensor networks with a realistic physical layer. IEEE Commun. Mag. 43(3), 101–106 (2005)

    Article  Google Scholar 

  8. Zignani, M., Gaito, S., Rossi, G.: Extracting human mobility and social behavior from location-aware traces. Wirel. Commun. Mobile Comput. 13(3), 313–327 (2013)

    Article  Google Scholar 

  9. Yadav, V., Mishra, M.K., Sngh, A., Gore, M.: Localization scheme for three dimensional wireless sensor networks using gps enabled mobile sensor nodes. Int. J. Next-Gener. Netw. (IJNGN) 1(1), 60–72 (2009)

    Google Scholar 

  10. Akestoridis, D.G.: CRAWDAD dataset uoi/haggle (v. 2016–08-28): derived from cambridge/haggle (v. 2009–05-29). http://crawdad.org/uoi/haggle/20160828

  11. Chaintreau, A., Hui, P., Crowcroft, J., Diot, C., Gass, R., Scott, J.: Impact of human mobility on opportunistic forwarding algorithms. IEEE Trans. Mobile Comput. 6(6), 606–620 (2007)

    Article  Google Scholar 

  12. Cabero, J.M., Urteaga, I., Molina, V., Liberal, F., Martín, J.L.: Reliability of bluetooth-based connectivity traces for the characterization of human interaction. Ad Hoc Netw. 24, 135–146 (2015)

    Article  Google Scholar 

  13. Chery, P., Li, J., Burge III, L.L.: Characterizing the association between mobile users using wireless network traces. In: The Fifth Richard Tapia Celebration of Diversity in Computing Conference: Intellect, Initiatives, Insight, and Innovations, pp. 70–74. ACM (2009)

    Google Scholar 

  14. Keränen, A., Ott, J., Kärkkäinen, T.: The ONE simulator for DTN protocol evaluation. In: Proceedings of the 2nd International Conference on Simulation Tools and Techniques, ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), p. 55 (2009)

    Google Scholar 

  15. Deakin, R., Hunter, M., Karney, C.: The gauss-krüger projection. In: Proceedings of the 23rd Victorian regional survey conference (2010)

    Google Scholar 

  16. Varga, A.: Omnet++. Modeling and Tools for Network Simulation, pp. 35–59 (2010)

    Google Scholar 

Download references

Acknowledgements

This work was partly supported by the National Natural Science Foundation of China (61371188). Ju Liu is the contact author of this paper. Liu Sang was supported by the China Scholarship Council for a year of study at the Sustainable Communication Networks, University of Bremen, Germany.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ju Liu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Sang, L., Kuppusamy, V., Förster, A., Udugama, A., Liu, J. (2017). Validating Contact Times Extracted from Mobility Traces. In: Puliafito, A., Bruneo, D., Distefano, S., Longo, F. (eds) Ad-hoc, Mobile, and Wireless Networks. ADHOC-NOW 2017. Lecture Notes in Computer Science(), vol 10517. Springer, Cham. https://doi.org/10.1007/978-3-319-67910-5_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-67910-5_20

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-67909-9

  • Online ISBN: 978-3-319-67910-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics