Skip to content

Research at St Andrews

Exploiting self-reported social networks for routing in ubiquitous computing environments

Research output: Chapter in Book/Report/Conference proceedingConference contribution

DOI

Author(s)

Greg Bigwood, Devan Rehunathan, Martin Bateman, Tristan Henderson, Saleem Bhatti

School/Research organisations

Abstract

Mobile, delay-tolerant, ad hoc and pocket-switched networks may form an important part of future ubiquitous computing environments. Understanding how to efficiently and effectively route information through such networks is an important research challenge, and much recent work has looked at detecting communities and cliques to determine forwarding paths.

Such detected communities, however, may miss important aspects. For instance, a user may have strong social ties to another user that they seldom encounter; a detected social network may omit this tie and so produce sub-optimal forwarding paths. Moreover, the delay in detecting communities may slow the bootstrapping of a new delay-tolerant network.

This paper explores the use of self-reported social networks for routing in mobile networks in comparison with detected social networks discovered through encounters. Using encounter records from a group of participants carrying sensor motes, we generate detected social networks from these records. We use these networks for routing, and compare these to the social networks which the users have self-reported on a popular social networking website.

Using techniques from social network analysis, we find that the two social networks are different. These differences, however, do not lead to a significant impact on delivery ratio, while the self-reported social network leads to a significantly lower cost.

Close

Details

Original languageEnglish
Title of host publication4TH IEEE IInternational Conference on Wireless and Mobile Computing, Networking and Communication (WiMob 2008)
Place of PublicationNew York
PublisherIEEE
Pages484-489
Number of pages6
ISBN (Print)978-0-7695-3393-3
DOIs
Publication statusPublished - Oct 2008
Event4th Annual IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WIMOB)/SecPriWiMob/SAUCEWiMob/HWN-RMQWiMob/STWiMob - Avignon
Duration: 12 Oct 200814 Oct 2008

Conference

Conference4th Annual IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WIMOB)/SecPriWiMob/SAUCEWiMob/HWN-RMQWiMob/STWiMob
CityAvignon
Period12/10/0814/10/08

Discover related content
Find related publications, people, projects and more using interactive charts.

View graph of relations

Related by author

  1. Data protection for the common good: developing a framework for a data protection-focused data commons

    Wong, J., Henderson, T. & Ball, K., 17 Jan 2022, In: Data & Policy. 4, 31 p., e3.

    Research output: Contribution to journalArticlepeer-review

  2. End-to-end privacy for identity & location with IP

    Bhatti, S., Haywood, G. T. & Yanagida, R., 2 Nov 2021, 29th IEEE International Conference on Network Protocols. IEEE, 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  3. Data portability as a tool for audit

    Zwiebelmann, Z. & Henderson, T., 21 Sep 2021, UbiComp '21: Adjunct Proceedings of the 2021 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2021 ACM International Symposium on Wearable Computers. ACM, p. 276–280 5 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  4. Data protection for the common good: developing a framework for a data protection-focused data commons

    Wong, J., Henderson, T. & Ball, K., 15 Sep 2020, Data for Policy Conference 2020. Data for Policy, 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

ID: 6055517

Top