skip to main content
research-article

Human-centric Data Dissemination in the IoP: Large-scale Modeling and Evaluation

Published:10 February 2020Publication History
Skip Abstract Section

Abstract

Data management using Device-to-Device (D2D) communications and opportunistic networks (ONs) is one of the main focuses of human-centric pervasive Internet services. In the recently proposed “Internet of People” paradigm, accessing relevant data dynamically generated in the environment nearby is one of the key services. Moreover, personal mobile devices become proxies of their human users while exchanging data in the cyber world and, thus, largely use ONs and D2D communications for exchanging data directly. Recently, researchers have successfully demonstrated the viability of embedding human cognitive schemes in data dissemination algorithms for ONs. In this article, we consider one such scheme based on the recognition heuristic, a human decision-making scheme used to efficiently assess the relevance of data. While initial evidence about its effectiveness is available, the evaluation of its behaviour in large-scale settings is still unsatisfactory. To overcome these limitations, we have developed a novel hybrid modeling methodology that combines an analytical model of data dissemination within small-scale communities of mobile users, with detailed simulations of interactions between different communities. This methodology allows us to evaluate the algorithm in large-scale city- and countrywide scenarios. Results confirm the effectiveness of cognitive data dissemination schemes, even when content popularity is very heterogenous.

References

  1. [n.d.]. 5G Road Map Whitepaper. Retrieved from https://5g-ppp.eu/wp-content/uploads/2017/03/5GPPP-brochure-final-web-MWC.pdf.Google ScholarGoogle Scholar
  2. [n.d.]. Cisco VNI Mobile Forecast White Paper (2016--2021), Feb. 2017. Retrieved from http://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/complete-white-paper-c11-481360.html.Google ScholarGoogle Scholar
  3. Anastasia Anagnostou, Athar Nouman, and Simon J. E. Taylor. 2013. Distributed hybrid agent-based discrete event emergency medical services simulation. In Proceedings of the 2013 Winter Simulation Conference (WSC). IEEE, 1625--1636.Google ScholarGoogle Scholar
  4. P. Bellavista, S. Chessa, L. Foschini, L. Gioia, and M. Girolami. 2018. Human-enabled edge computing: Exploiting the crowd as a dynamic extension of mobile edge computing. IEEE Commun. Mag. 56, 1 (Jan. 2018), 145--155. DOI:https://doi.org/10.1109/MCOM.2017.1700385Google ScholarGoogle ScholarCross RefCross Ref
  5. Chiara Boldrini, Marco Conti, and Andrea Passarella. [n.d.]. Design and performance evaluation of ContentPlace, a social-aware data dissemination system for opportunistic networks. Comput. Netw. 54, 4 ([n.d.]), 589--604.Google ScholarGoogle Scholar
  6. Chiara Boldrini and Andrea Passarella. 2010. HCMM: Modelling spatial and temporal properties of human mobility driven by users’ social relationships. Comput. Commun. 33, 9 (2010), 1056--1074.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Eleonora Borgia. 2014. The Internet of Things vision: Key features, applications and open issues. Comp. Comm. 54 (2014), 1--31.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Raffaele Bruno, Marco Conti, Matteo Mordacchini, and Andrea Passarella. 2012. An analytical model for content dissemination in opportunistic networks using cognitive heuristics. In Proceedings of the 15th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM’12). ACM, 61--68.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. M. Conti and R. Mirandola. 1998. Hierarchical performance modeling of computer communication systems. In Network Performance Modeling and Simulation, J. Walrand, K. Bagchi, and G. G. Zobrist (Eds.). Gordon 8 Breach Science Publishers, Chapter 8, 197--218.Google ScholarGoogle Scholar
  10. Marco Conti, Matteo Mordacchini, and Andrea Passarella. 2013. Design and performance evaluation of data dissemination systems for opportunistic networks based on cognitive heuristics. ACM Trans. Auton. Adapt. Syst. 8, 3 (2013), 12:1--12:32.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Marco Conti, Matteo Mordacchini, Andrea Passarella, and Liudmila Rozanova. 2013. A semantic-based algorithm for data dissemination in opportunistic networks. In Proceedings of the 7th International Workshop on Self-organizing Systems (IWSOS’13). Springer, 14--26.Google ScholarGoogle Scholar
  12. Marco Conti and Andrea Passarella. 2018. The Internet of People: A human and data-centric paradigm for the Next Generation Internet. Comput. Commun. 131 (2018), 51--65.Google ScholarGoogle ScholarCross RefCross Ref
  13. Marco Conti, Andrea Passarella, and Sajal K Das. 2017. The Internet of People (IoP): A new wave in pervasive mobile computing. Perv. Mob. Comput. 41 (2017), 1--27.Google ScholarGoogle ScholarCross RefCross Ref
  14. Paolo Costa, Cecilia Mascolo, Mirco Musolesi, and Gian Pietro Picco. 2008. Socially-aware routing for publish-subscribe in delay-tolerant mobile ad hoc networks. IEEE J. Select. Areas Commun. 26, 5 (2008), 748--760.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Gabriele D’Angelo, Stefano Ferretti, and Vittorio Ghini. 2018. Distributed hybrid simulation of the Internet of Things and smart territories. Concurr. Comput.: Pract. Exper. 30, 9 (2018), e4370.Google ScholarGoogle ScholarCross RefCross Ref
  16. H. Ebbinghaus. 1913. Memory: A Contribution to Experimental Psychology. Über das Gedchtnis.Google ScholarGoogle ScholarCross RefCross Ref
  17. T. Eldabi, M. Balaban, S. Brailsford, N. Mustafee, R. E. Nance, B. S. Onggo, and R. G. Sargent. 2016. Hybrid simulation: Historical lessons, present challenges and futures. In Proceedings of the 2016 Winter Simulation Conference (WSC’16). IEEE, 1388--1403.Google ScholarGoogle Scholar
  18. G. Gigerenzer. 2004. Fast and frugal heuristics: The tools of bounded rationality. Blackwell Handbook of Judgment and Decision Making (2004), 62--88.Google ScholarGoogle Scholar
  19. G. Gigerenzer and D. G. Goldstein. 2011. The recognition heuristic: A decade of research. Judg. Decis. Making 6, 1 (2011), 100--121.Google ScholarGoogle Scholar
  20. Gerd Gigerenzer and Daniel G. Goldstein. 2002. Models of ecological rationality: The recognition heuristic. Psych. Rev. 109, 1 (2002), 75--90.Google ScholarGoogle ScholarCross RefCross Ref
  21. Gerd Gigerenzer and Peter M. Todd. 1999. Fast and frugal heuristics: The adaptive toolbox. In Simple Heuristics that Make Us Smart. Oxford University Press, 3--34.Google ScholarGoogle Scholar
  22. Daniel G. Goldstein and Gerd Gigerenzer. 1996. Reasoning the fast and frugal way: Models of bounded rationality. Psych. Rev. 103, 4 (1996), 650--669.Google ScholarGoogle ScholarCross RefCross Ref
  23. Daniel G. Goldstein and Gerd Gigerenzer. 1999. The recognition heuristic: How ignorance makes us smart. In Simple Heuristics That Make Us Smart. Oxford University Press, 37--58.Google ScholarGoogle Scholar
  24. Pan Hui, Jon Crowcroft, and Eiko Yoneki. 2011. Bubble rap: Social-based forwarding in delay-tolerant networks. IEEE Trans. Mobile Comput 10, 11 (2011), 1576--1589.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Thomas R. Kiehl, Robert M. Mattheyses, and Melvin K. Simmons. 2004. Hybrid simulation of cellular behaviour. Bioinformatics 20, 3 (2004), 316--322.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Vincent Lenders, Martin May, Gunnar Karlsson, and Clemens Wacha. 2008. Wireless ad hoc podcasting. ACM Mob. Comp. Comm. Rev. 12, 1 (2008), 65--67.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. K. C.-J. Lin, Chun-Wei Chen, and Cheng-Fu Chou. 2012. Preference-aware content dissemination in opportunistic mobile social networks. In Proceedings of the IEEE International Conference on Computer Communications (INFOCOM’12). 1960--1968.Google ScholarGoogle Scholar
  28. Lauri Lättilä, Per Hilletofth, and Bishan Lin. 2010. Hybrid simulation models—When, why, how? Expert Syst. Appl. 37, 12 (2010), 7969--7975.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Álvaro Monares, Sergio F. Ochoa, Rodrigo Santos, Javier Orozco, and Roc Meseguer. 2014. Modeling IoT-based solutions using human-centric wireless sensor networks. Sensors 14, 9 (2014), 15687--15713.Google ScholarGoogle ScholarCross RefCross Ref
  30. Matteo Mordacchini, Andrea Passarella, and Marco Conti. 2017. A social cognitive heuristic for adaptive data dissemination in mobile Opportunistic Networks. Perv. Mob. Comp. 42 (2017), 371--392.Google ScholarGoogle ScholarCross RefCross Ref
  31. Matteo Mordacchini, Andrea Passarella, Marco Conti, Stuart M. Allen, Martin J. Chorley, Gualtiero B. Colombo, Vlad Tanasescu, and Roger M. Whitaker. 2015. Crowdsourcing through cognitive opportunistic networks. ACM Trans. Auton. Adapt. Syst. 10, 2 (2015), 13:1,13:30.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Matteo Mordacchini, Lorenzo Valerio, Marco Conti, and Andrea Passarella. 2016. Design and evaluation of a cognitive approach for disseminating semantic knowledge and content in opportunistic networks. Comp. Comm. 81 (2016), 12--30.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Sergio F. Ochoa and Rodrigo Santos. 2015. Human-centric wireless sensor networks to improve information availability during urban search and rescue activities. Inf. Fus. 22 (2015), 71--84.Google ScholarGoogle ScholarCross RefCross Ref
  34. J. Powell and N. Mustafee. 2014. Soft OR approaches in problem formulation stage of a hybrid M8S study. In Proceedings of the Winter Simulation Conference. IEEE, 1664--1675.Google ScholarGoogle Scholar
  35. Joshua Reich and Augustin Chaintreau. 2009. The age of impatience: Optimal replication schemes for opportunistic networks. In Proceedings of the ACM Conference on Emerging Networking EXperiments and Technologies (CoNEXT’09). ACM, New York, NY, 85--96.Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. P. K. Reichl. 2013. It’s the ecosystem, stupid: Lessons from an anti-copernican revolution of user-centric service quality in telecommunications. In Proceedings of the 2013 6th International Conference on Developments in eSystems Engineering. 163--168.Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. D. Rosário, M. Seruffo, E. Cerqueira, C. Both, T. Braun, and M. Gerla. 2016. Trends in human-centric multimedia networking scenarios. In Proceedings of the 2016 Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net’16). 1--5. DOI:https://doi.org/10.1109/MedHocNet.2016.7528428Google ScholarGoogle ScholarCross RefCross Ref
  38. L. J. Schooler and R. Hertwig. 2005. How forgetting aids heuristic inference. Psych. Rev. 112, 3 (2005), 610.Google ScholarGoogle ScholarCross RefCross Ref
  39. H. D. Schwetman. 1978. Hybrid simulation models of computer systems. Commun. ACM 21, 9 (1978), 718--723.Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. J. G. Shanthikumar and R. G. Sargent. 1983. A unifying view of hybrid simulation/analytic models and modeling. Operat. Res. 31, 6 (1983), 1030--1052.Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. Mani Srivastava, Tarek Abdelzaher, and Boleslaw Szymanski. 2012. Human-centric sensing. Philos. Trans. Roy. Soc. A: Math. Phys. Eng. Sci. 370, 1958 (2012), 176--197.Google ScholarGoogle ScholarCross RefCross Ref
  42. Lorenzo Valerio, Andrea Passarella, Marco Conti, and Elena Pagani. 2015. Scalable data dissemination in opportunistic networks through cognitive methods. Perv. Mob. Comp. 16 (2015), 115--135.Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Alberto Sangiovanni Vincentelli. 2015. Let’s get physical: Adding physical dimensions to cyber systems. In Proceedings of the IEEE/ACM International Symposium on Low Power Electronics and Design (ISLPED’15). IEEE, 1--2.Google ScholarGoogle ScholarCross RefCross Ref
  44. Jiangtao Wang, Junfeng Zhao, Yong Zhang, Xin Peng, Ying Li, and Yun Xie. 2018. Enabling human-centric smart cities: Crowdsourcing-based practice in China. Computer 51, 12 (2018), 42--49.Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. John T. Wixted and Ebbe B. Ebbesen. 1991. On the form of forgetting. Psychol. Sci. 2, 6 (1991), 409--415.Google ScholarGoogle ScholarCross RefCross Ref
  46. Eiko Yoneki, Pan Hui, ShuYan Chan, and Jon Crowcroft. 2007. A socio-aware overlay for publish/subscribe communication in delay tolerant networks. In Proceedings of the ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM’07). 225--234.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Human-centric Data Dissemination in the IoP: Large-scale Modeling and Evaluation

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        HTML Format

        View this article in HTML Format .

        View HTML Format
        About Cookies On This Site

        We use cookies to ensure that we give you the best experience on our website.

        Learn more

        Got it!