Skip to content

Research at St Andrews

Facebook or Fakebook? The effects of simulated mobile applications on simulated mobile networks

Research output: Contribution to journalArticle

Author(s)

Iain Siraj Parris, Fehmi Ben Abdesslem, Tristan Henderson

School/Research organisations

Abstract

The credibility of mobile ad hoc network simulations depends on accurate characterisations of user behaviour, e.g., mobility and application usage. If simulated nodes communicate at different rates to real nodes, or move in an unrealistic fashion, this may have a large impact on the network protocols being simulated and tested.
Many future mobile network protocols, however, may also depend on future mobile applications. Different applications may be used at different rates or in
different manners. But how can we determine realistic user behaviour for such applications that do not yet exist? One common solution is again simulation, but
this time simulation of these future applications.
This paper examines differences in user behaviour between a real and simulated
mobile social networking application through a user study (n=80). We show that there are distinct differences in privacy behaviour between the real and simulated
groups. We then simulate a mobile opportunistic network application using two real-world traces to demonstrate the impact of using real and simulated applications. We find large differences between using real and synthetic models of privacy behaviour, but smaller differences between models derived from the real and simulated applications.
Close

Details

Original languageEnglish
Number of pages15
JournalAd Hoc Networks
Early online date1 Jun 2012
DOIs
Publication statusPublished - 2012

    Research areas

  • Simulation, Social networks, Opportunistic networks, Privacy, Social-network routing

Discover related content
Find related publications, people, projects and more using interactive charts.

View graph of relations

Related by author

  1. Co-Creating Autonomy: Group data protection and individual self-determination within a data commons

    Wong, J. & Henderson, T., 2 Feb 2020, (Accepted/In press) Proceedings of the 15th International Digital Curation Conference.

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  2. Data Protection, certification and the fourth industrial revolution

    Henderson, T. & Schafer, B., Sep 2019, Regulating Industrial Internet through IPR, Data Protection and Competition Law. Ballardini, R. M., Pitkänen, O. & Kuommamäki, P. (eds.). Alphen aan den Rijn, The Netherlands: Kluwer Law International

    Research output: Chapter in Book/Report/Conference proceedingChapter

  3. Teaching data ethics: "We're going to ethics the heck out of this"

    Henderson, T., 9 Jan 2019, Proceedings of the 3rd Conference on Computing Education Practice (CEP'19). New York: ACM, 4 p. 4

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

Related by journal

  1. Localised alpha-shape computations for boundary recognition in sensor networks

    Fayed, M. & Mouftah, H. T., 2009, In : Ad Hoc Networks. 7, 6, p. 1259-1269 11 p.

    Research output: Contribution to journalArticle

ID: 17241443

Top