[ieee 2011 seventh international conference on mobile ad-hoc and sensor networks (msn) - beijing,...

7
On Exploiting Few Strangers for Data Forwarding in Delay Tolerant Networks Peiyan Yuan, Huadong Ma, Pengrui Duan Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia Beijing University of Posts and Telecommunications Beijing, China [email protected], [email protected], [email protected] Abstract—Routing is one of the challenging tasks in Delay Tolerant Networks (DTNs), due to the lack of global knowledge and sporadic contacts between nodes. Most existing works take greedy mechanism to forward messages, i.e., only nodes which have higher quality metrics than current carriers can be selected as relays to final destinations. In this work, we explore the influence of strangers on routing performance under a more challenging scenario of pure darkness. We first present a method to identify the relationship between nodes (i.e., stranger or friend). Second, we explore the optimized number of strangers we can employ. Third, we propose a novel routing scheme which are called STRON in this paper by taking both the STRangers and their Optimized Number into account. We finally compare our routing scheme with the greedy mechanism through synthetical and trace-driven simulations, the results show that our routing strategy achieves a better performance, especially in terms of combined overhead/packet delivery ratio and the average number of hops per message. Index Terms—Stranger; Forwarding mechanism; Routing pro- tocol; Delay Tolerant Networks I. I NTRODUCTION One of the most characteristics of Delay Tolerant Networks is that an end-to-end path between source and destination is rarely (if ever) existed at any moment, which makes routing very challenging in DTNs [1]. In this work, we focus on the influence of strangers on routing performance within a pure darkness environment, where the mobility of nodes can not acquire in advance and each node depends only on itself to locally estimate the forwarding metric to destination. Obviously, epidemic scheme [2] is a potential solution to deliver messages under the above scenario as it tries to send each message over all possible paths (i.e., multiple copies) in the network. Thus, the message will be successfully received so long as one of the copies reaches the destination. Whereas, the immoderate spraying will incur a high price of system resources, resulting in the splurge on energy and buffer space, the rapid consumption of available bandwidth, and in turn, the chance to impair the routing metrics such as the packet delivery ratio and the average number of hops per message. These deficiencies of epidemic have motivated researchers to design other novel routing algorithms, most of which make a better tradeoff between packet delivery ratio and cost by making use of different contexts (e.g., [3] [4] [5] [6] [7] [8]). For these schemes, the data forwarding performance depends heavily on the contexts they exploited to evaluate the potential relays to the final destination. Furthermore, most existing schemes take a greedy mechanism to deliver messages, i.e., only such which have higher quality metrics than current carriers can be selected as relays to the final destinations, hence, the strangers have no chance to help others to communicate in the network. Whereas, routing performance can be improved if permitting few strangers to participate in the forwarding process of messages as that the strangers have different spatiotemporal distributions from the current carriers. Therefore, we need to address the problem of how to integrate stranger into data forwarding algorithms in DTNs. It is a critical while challenging question especially in a pure darkness environment. Recently, there is few work that explicitly takes stranger into account (e.g., [9]). Whereas, the work of [9] needs to know the mobility of each node and the global topology information. For instance, the authors of [9] exploited the community- detection mechanisms presented in [10] to classify nodes and took low number of contacts and short duration as a baseline to identify strangers, on the one hand, which requires the detailed traces of each node (obviously, it may not be practical when considering the problems such as privacy protection and selfishness of nodes [11]), on the other hand, the distributed community-detection mechanisms result in high cost due to the information exchange and calculations, and the complexity of adjusting several threshold parameters [12] [13]. Moreover, we argue that how to ascertain the optimized values of several key parameters such as contact frequency, short duration and low number of contacts. Taking all above issues into account, in this paper, we investigate stranger from the following two aspects within a pure darkness environment. (i) Identifying stranger: The strangers are likely to be more useful for bringing messages to different parts of the deployed region, which potentially increases the probability to meet up destinations. Thus, we focus on how to differentiate strangers from a large amount of nodes. (ii) The number of strangers we can exploit, which has a big influence on the routing performance. Making it too few results in little improvement of routing performance, making it too much results in deteriorating the performance of data forwarding algorithm. As such, we have to ascertain the optimized number of strangers before integrating them into routing metric. 2011 Seventh International Conference on Mobile Ad-hoc and Sensor Networks 978-0-7695-4610-0/11 $26.00 © 2011 IEEE DOI 10.1109/MSN.2011.51 283 2011 Seventh International Conference on Mobile Ad-hoc and Sensor Networks 978-0-7695-4610-0/11 $26.00 © 2011 IEEE DOI 10.1109/MSN.2011.51 282 2011 Seventh International Conference on Mobile Ad-hoc and Sensor Networks 978-0-7695-4610-0/11 $26.00 © 2011 IEEE DOI 10.1109/MSN.2011.51 282

Upload: pengrui

Post on 13-Dec-2016

212 views

Category:

Documents


0 download

TRANSCRIPT

On Exploiting Few Strangers for Data Forwardingin Delay Tolerant Networks

Peiyan Yuan, Huadong Ma, Pengrui DuanBeijing Key Laboratory of Intelligent Telecommunications Software and Multimedia

Beijing University of Posts and Telecommunications

Beijing, China

[email protected], [email protected], [email protected]

Abstract—Routing is one of the challenging tasks in DelayTolerant Networks (DTNs), due to the lack of global knowledgeand sporadic contacts between nodes. Most existing works takegreedy mechanism to forward messages, i.e., only nodes whichhave higher quality metrics than current carriers can be selectedas relays to final destinations. In this work, we explore theinfluence of strangers on routing performance under a morechallenging scenario of pure darkness. We first present a methodto identify the relationship between nodes (i.e., stranger orfriend). Second, we explore the optimized number of strangers wecan employ. Third, we propose a novel routing scheme which arecalled STRON in this paper by taking both the STRangers andtheir Optimized Number into account. We finally compare ourrouting scheme with the greedy mechanism through syntheticaland trace-driven simulations, the results show that our routingstrategy achieves a better performance, especially in terms ofcombined overhead/packet delivery ratio and the average numberof hops per message.

Index Terms—Stranger; Forwarding mechanism; Routing pro-tocol; Delay Tolerant Networks

I. INTRODUCTION

One of the most characteristics of Delay Tolerant Networks

is that an end-to-end path between source and destination is

rarely (if ever) existed at any moment, which makes routing

very challenging in DTNs [1]. In this work, we focus on the

influence of strangers on routing performance within a pure

darkness environment, where the mobility of nodes can not

acquire in advance and each node depends only on itself to

locally estimate the forwarding metric to destination.

Obviously, epidemic scheme [2] is a potential solution to

deliver messages under the above scenario as it tries to send

each message over all possible paths (i.e., multiple copies) in

the network. Thus, the message will be successfully received

so long as one of the copies reaches the destination. Whereas,

the immoderate spraying will incur a high price of system

resources, resulting in the splurge on energy and buffer space,

the rapid consumption of available bandwidth, and in turn,

the chance to impair the routing metrics such as the packet

delivery ratio and the average number of hops per message.

These deficiencies of epidemic have motivated researchers

to design other novel routing algorithms, most of which make

a better tradeoff between packet delivery ratio and cost by

making use of different contexts (e.g., [3] [4] [5] [6] [7]

[8]). For these schemes, the data forwarding performance

depends heavily on the contexts they exploited to evaluate

the potential relays to the final destination. Furthermore,

most existing schemes take a greedy mechanism to deliver

messages, i.e., only such which have higher quality metrics

than current carriers can be selected as relays to the final

destinations, hence, the strangers have no chance to help others

to communicate in the network. Whereas, routing performance

can be improved if permitting few strangers to participate

in the forwarding process of messages as that the strangers

have different spatiotemporal distributions from the current

carriers. Therefore, we need to address the problem of how

to integrate stranger into data forwarding algorithms in DTNs.

It is a critical while challenging question especially in a pure

darkness environment.

Recently, there is few work that explicitly takes stranger into

account (e.g., [9]). Whereas, the work of [9] needs to know

the mobility of each node and the global topology information.

For instance, the authors of [9] exploited the community-

detection mechanisms presented in [10] to classify nodes and

took low number of contacts and short duration as a baseline

to identify strangers, on the one hand, which requires the

detailed traces of each node (obviously, it may not be practical

when considering the problems such as privacy protection and

selfishness of nodes [11]), on the other hand, the distributed

community-detection mechanisms result in high cost due to

the information exchange and calculations, and the complexity

of adjusting several threshold parameters [12] [13]. Moreover,

we argue that how to ascertain the optimized values of several

key parameters such as contact frequency, short duration and

low number of contacts.

Taking all above issues into account, in this paper, we

investigate stranger from the following two aspects within

a pure darkness environment. (i) Identifying stranger: The

strangers are likely to be more useful for bringing messages

to different parts of the deployed region, which potentially

increases the probability to meet up destinations. Thus, we

focus on how to differentiate strangers from a large amount

of nodes. (ii) The number of strangers we can exploit, which

has a big influence on the routing performance. Making it

too few results in little improvement of routing performance,

making it too much results in deteriorating the performance

of data forwarding algorithm. As such, we have to ascertain

the optimized number of strangers before integrating them into

routing metric.

2011 Seventh International Conference on Mobile Ad-hoc and Sensor Networks

978-0-7695-4610-0/11 $26.00 © 2011 IEEE

DOI 10.1109/MSN.2011.51

283

2011 Seventh International Conference on Mobile Ad-hoc and Sensor Networks

978-0-7695-4610-0/11 $26.00 © 2011 IEEE

DOI 10.1109/MSN.2011.51

282

2011 Seventh International Conference on Mobile Ad-hoc and Sensor Networks

978-0-7695-4610-0/11 $26.00 © 2011 IEEE

DOI 10.1109/MSN.2011.51

282

In this paper, we propose an adaptive solution to address

these challenges. First, we utilize local observations of each

node to estimate the similarity between them (i.e., each node

only records contact duration between itself and others). We

average these contact durations and use this mean as a baseline

to identify strangers. Furthermore, each time a new contact

was observed, the sum of the contact durations should be

updated. Thus, the change rate of similarity between nodes

can be reflected dynamically. Second, we count the number

of strangers which act as relays for other nodes on all shortest

paths and use the mean ratio (i.e., the number of these

strangers over that of all relays ) to explore the optimized

number of strangers we can employ. Finally, we design our

routing metric by taking both strangers and their number

into account. Our main contributions can be summarized as

follows:

∙ We study DTNs routing in a more challenging scenario

and consider the influence of strangers.

∙ We discuss the effect of the number of strangers on the

routing performance and propose a method to explore the

optimized number of strangers we can exploit.

∙ We conduct extensive simulations to compare our rout-

ing metric with greedy mechanism based on synthet-

ical mobility model and real DTNs traces, simulation

results show that our algorithm largely outperforms the

greedy mechanism, especially in terms of combined over-

head/packet delivery ratio and the average number of

hops per message.

The remainder of this paper is organized as follows. Section

II reviews the related work. In Section III, we discuss how to

integrate strangers into STRON. We first introduce the greedy

mechanism which has been applied into many DTNs routing

metrics in Section III.A. In Section III.B and Section III.C, we

explore how to identify strangers and ascertain the optimized

number of strangers we can employ, respectively. We present

our routing metric in Section III.D and have a discussion

in Section III.E. In Section IV, we make a performance

evaluation. Finally, we conclude our paper and discuss some

future research areas in Section V.

II. RELATED WORK

Routing messages through intermittently connected network

is challenging. In the past few years, researchers have proposed

several strategies to solve this issue. According to the contexts

they exploited, these solutions can be classified into the

following two categories.

A. Routing without stranger

Routing with extra nodes: Several projects try to deliver

messages by the help of extra nodes which are called data

MULEs or message ferries [14] [15] [16] [17] [18].

The authors of [14] first utilized mobile MULEs to collect

data for sparse sensor networks. The MULEs have large

storage capacities and renewable power, which make them

have the ability to buffer data for a relatively long time and

thus can be used in a delay tolerant environment. The data

MULEs scheme provides opportunistic forwarding between

static sensor nodes and the mobile MULEs, whereas, they

neglect the influence of the mobility of MULEs on routing per-

formance. On the contrary, the message ferries scheme (e.g.,

[15] [16] [17]) goes further in exploiting special mobile nodes

which are called ferries to deliver message by assuming control

or influence over ferries movements. For example, the authors

of [15] proposed the idea of exploiting controlled mobility of

extra nodes to facilitate message transmission in disconnected

Mobile Ad hoc Networks. W. Zhao, M. Ammar and E. Zegura

[16] designed two kinds of no-random movements to forward

data in DTNs. The first is node initiated mobility, where ferries

move around the deployed region according to conventional

routes. The second is ferry initiated mobility, where a ferry

will adjust its trajectory to meet up the node when receiving

a request from that node. They also evaluated the tradeoff

between the incurred cost of extra ferries and the improved

performance in [17]. Besides, the authors of [18] further

relaxed the assumptions used in [16] [17] and depended only

on partial observations and statistical information of nodes

mobility to enable ferries navigate themselves intelligently.

Routing with periodic mobility of nodes: In some other sce-

narios (e.g., bus transportation system [19] and interplanetary

internet [20]), the mobility patters of nodes have periodicity,

which motivates researchers to design periodic information

based routing scheme [21] [22] [23]. Most of them took a

modified Dijkstra algorithm to compute shortest paths between

sources and destinations and designed routing table based on

intermediate nodes along those paths. That is, each node has

a global view on network structures. For instance, S. Merugu

et al. [21] delivered messages over a space-time routing table

which was derived from the mobility of nodes and carried

by each node. S. Jain et al. [22] computed the shortest path

between transceivers by utilizing the periodicity of nodes

movements. Besides, the authors of [23] proposed a source

routing in DTNs, they exploited the expected minimum delay

(EMD) as forwarding metric and applied the Markov decision

process to derive the EMD of messages at particular times.

Routing with partial observations: Sometimes, it is difficult

or impractical to acquire global information of the network,

this is mainly because of the problems such as time-varying

topology, privacy protection or selfishness of nodes etc. In

these scenarios, different local contexts can be exploited to

improve routing performance. For example, by exploiting past

traces of buses to predict future behavior, MaxProp [3] shows

better performance than protocols that have proactive knowl-

edge. The authors of [4] presented SimBet, which exploited

neighbor’s adjacency matrix to compute the centrality and

similarity of nodes and then utilized these social attributes to

predict the best relay to the final destination. The adjacency

matrixes should be swapped and updated each time two nodes

have a contact. Different from the solutions of [3] and [4], the

authors of [5] proposed PER, a prediction and relay algorithm

for DTNs, which considered the time of a contact. A. Lindgren

et al. [6] presented PROPHET, in which the transitive property

and an aging constant were both considered to try to accurately

284283283

predict the probability of future encounters. Similar to [6],

CAR (context aware routing) was proposed in [7], which

exploited the context information such as the changing rate of

neighbors of a node and its current energy level to estimate the

delivery probability. In addition, J. Leguay et al. [8] presented

MobySpace, a high-dimensional Euclidean space constructed

by the past motion patters of nodes.

B. Routing with stranger

Note that most aforementioned schemes do not take stranger

into account, i.e., most existing schemes take a greedy mecha-

nism to deliver messages, thus, only such which have a higher

quality metric than current carriers can be selected as relays

to the final destinations. Whereas, routing performance can be

improved if permitting few strangers to participate in routing

process as the strangers are likely to be more useful for bring

messages to different parts of the deployed region, which

potentially increases the probability to meet up destinations.

Recently, there is few work that tries to explore the influence

of stranger on routing performance. For example, the authors

of [9] took low number of contacts and short duration as a

baseline to identify strangers and integrate the strangers into

their routing metric by assuming that the mobility of each

node/person can be acquired in advance. We argue that it

may not be practical since people always are reluctant to

expose their daily routines. On the other hand, the distributed

community-detection mechanisms used in [9] result in high

cost due to the information exchange and calculations, and

the complexity of adjusting several threshold parameters [12]

[13]. Moreover, we wonder that how to ascertain the optimized

values of several key parameters such as contact frequency,

short duration and low number of contacts.

Note that the obvious difference between our work and

the aforementioned works [9] comes from the fact that we

address a more challenging scenarios, where each node only

depends on itself to locally estimate the forwarding metric

to destination. Furthermore, we explore the influence of the

number of strangers on routing performance, rather than pure

strangers.

III. IMPLEMENTING STRANGER INTO STRON

In this section, we discuss how to integrate strangers into

STRON. We first introduce the greedy mechanism which has

been applied into many DTNs routing metrics in Section III.A.

In Section III.B and Section III.C, we explore how to identify

strangers and ascertain the optimized number of strangers we

can employ, respectively. In Section III.D, we present our

routing metric. Finally, we have a discussion in Section III.E.

A. Greedy mechanism

In the past few years, researchers have proposed a large

number of routing metrics in DTNs. Although they exploited

different kinds of contexts (e.g., similarity [4], intra-contact

time [6], energy level [7] and virtual community [24] etc.),

most of them took a greedy forwarding mechanism. That is,

when two nodes have a contact, a node with a lower quality

metric to the destination will forward messages to the node

with higher quality. For ease of presentation, in this paper, we

take intra-contact time as an example to illustrate the main

difference between the greedy mechanism and the STRON.

Let random variable 𝑋𝑖 denote the intra-contact time be-

tween node 𝑖 and other nodes, let 𝑥𝑖(𝑑) denote the intra-

contact time between node 𝑖 and any node 𝑑. Let 𝑁 denote

the set of nodes in the network. The notations used in this

paper are listed in Table I.

TABLE INOTATION SUMMARY

NOTATION Explanation

𝑁 The set of nodes∥𝑁∥ The number of nodes in the network𝑖, 𝑗 Two randomly chosen nodes𝑥𝑖(𝑗) Intra-contact time between node 𝑖 and node 𝑗𝑚𝑑 The destination of message 𝑚

𝐷𝑠(𝑖, 𝑗) The degree of strangeness between two nodes𝑃𝑖𝑗 Shortest path from 𝑖 to 𝑗𝑆𝑖𝑗 The number of strangers in 𝑃𝑖𝑗

𝑅𝑖𝑗 The number of relays in 𝑃𝑖𝑗

𝑅𝑠 The mean of 𝑆𝑖𝑗/𝑅𝑖𝑗

𝐼𝑠 The number of strangers which carry 𝑚𝑇𝑠 The threshold of 𝐼𝑠𝑓𝑝 Forwarding probability

We outline the greedy mechanism in Algorithm 1, which

summarizes the communication process between two ran-

domly chosen nodes 𝑖 and 𝑗. Take node 𝑖 as an example.

When meeting up node 𝑗, for any message 𝑚 that 𝑖 carries, if

its destination 𝑚𝑑 is node 𝑗, node 𝑖 delivers it to node 𝑗 and

removes it from 𝑖’s buffer. Otherwise, if node 𝑗 does not hold

this message, the two nodes swap their own quality metric. If

𝑥𝑖(𝑚𝑑) is smaller than 𝑥𝑗(𝑚𝑑), node 𝑖 forwards 𝑚 to node

𝑗, where nodes 𝑖, 𝑗 and 𝑚𝑑 ∈ 𝑁 .

Algorithm 1 Greedy mechanism, pseudo-code of node 𝑖

1: upon meeting up node 𝑗 do

2: for any message 𝑚 in 𝑖’s buffer do3: if 𝑚𝑑 == 𝑗 then4: 𝑑𝑒𝑙𝑖𝑣𝑒𝑟𝑀𝑠𝑔(𝑚)5: 𝑟𝑒𝑚𝑜𝑣𝑒(𝑚)6: else if 𝑚 /∈ 𝑗 then7: 𝑖← 𝑥𝑗(𝑚𝑑)8: if 𝑥𝑖(𝑚𝑑) < 𝑥𝑗(𝑚𝑑) then9: 𝑓𝑜𝑟𝑤𝑎𝑟𝑑𝑖𝑛𝑔𝑀𝑠𝑔(𝑚)

10: end if11: end if12: end for

B. Identifying strangers

We use the mean of intra-contact time as threshold to

identify strangers. Let 𝐸(𝑋𝑖) denote the mean of 𝑋𝑖, we have

𝐸(𝑋𝑖) =

∑𝑖,𝑘∈𝑁,𝑖 ∕=𝑘

𝑥𝑖(𝑘)

∥𝑁∥ (1)

285284284

0 10 20 30 400

0.2

0.4

0.6

0.8

1

Contact times

Degr

ee o

f stra

ngen

ess

(a) CMM (NodeID=11)

1 2 3 4 5 6 70

0.2

0.4

0.6

0.8

1

Contact times

Degr

ee o

f stra

ngen

ess

(b) KAIST (NodeID=21)

Fig. 1. Degree of strangeness vs Contact times

Hence, whenever node 𝑖 meets up node 𝑗, if 𝑥𝑖(𝑗) is smaller

than 𝐸(𝑋𝑖), we call that node 𝑗 is a stranger to node 𝑖.Let 𝐷𝑠(𝑖, 𝑗) denote the degree of strangeness between node 𝑖and node 𝑗, let function 𝑓 denote the mapping from 𝑥𝑖(𝑗) to

𝐷𝑠(𝑖, 𝑗), we have

𝑓 : 𝑥𝑖(𝑗)→ 𝐷𝑠(𝑖, 𝑗) (2)

Obviously, 𝑓 is a decreasing function, that is, the bigger the

value of 𝑥𝑖(𝑗) is, the smaller the value of 𝐷𝑠(𝑖, 𝑗) should be. It

is difficult and impractical to obtain an optimized 𝑓 , due to the

intermittent connectivity in DTNs. Whereas, it is possible to

gain some qualitative insights on roles of different functions,

we experimented the following three types: convex, linear and

concave in this paper.

𝐷𝑠(𝑖, 𝑗) =√

1− (𝑥𝑖(𝑗)/𝐸(𝑋𝑖))2 (3)

𝐷𝑠(𝑖, 𝑗) = 1− 𝑥𝑖(𝑗)

𝐸(𝑋𝑖)(4)

𝐷𝑠(𝑖, 𝑗) = 1−√

1− (1− 𝑥𝑖(𝑗)/𝐸(𝑋𝑖))2

(5)

To make the above equations hardness, we set 𝑥𝑖(𝑗) =𝐸(𝑋𝑖) if 𝑥𝑖(𝑗) > 𝐸(𝑋𝑖). Fig.1 portrays the behavior of

𝐷𝑠(𝑖, 𝑗) at different contact times when using Equation (4),

where the ID of node 𝑖 is set to 0 and two other nodes are

randomly chosen as partners, besides, CMM [27] denotes the

community mobility model and KAIST [25] presents a real

DTN trace (please refer to Section IV). Obviously, it shows

a close match to the Equation (4) (i.e., a linearly decreased

trend).

C. The optimized number of strangers we can employ

In this paper, we first count the number of strangers which

act as relays for other nodes on all shortest paths and then use

the mean ratio 𝑅𝑠 (i.e., the number of these strangers over that

of all relays ) to explore the optimized number of strangers

we can employ in STRON. Let 𝑃𝑖𝑗 denote the shortest path

from node 𝑖 to node 𝑗, let 𝑆𝑖𝑗 denote the number of strangers

which participate in 𝑃𝑖𝑗 and 𝑅𝑖𝑗 denote that of total relays,

we have

𝑅𝑠 =∑∀𝑖∈𝑁

∑∀𝑗∈𝑁,𝑗 ∕=𝑖

𝑆𝑖𝑗

R𝑖𝑗(6)

According to Equation (6), we get the values of 𝑅𝑠 are

0.7044 and 0.0435 in community mobility model and KAIST,

respectively. Interestingly, we discover that the value of 𝑅𝑠 in

synthetical mobility model is much bigger than that in real

DTNs trace. It is reasonable since that nodes in the latter

show bursty dispersion [25], instead of randomly selecting one

community and going ahead as in the former. Furthermore, the

authors of [26] indicated that the “Spray and Wait” scheme

can retain good performance under CMM by only assigning

a limited number of copies (about 5%∼10%) for each mes-

sage. Considering this fact, the threshold of the number of

strangers (𝑇𝑠) used in this paper is ∥𝑁∥ × 10%× 70.44% =∥𝑁∥× 7.044% under CMM and ∥𝑁∥× 4.35% under KAIST,

respectively.

D. STRON

In this subsection, we discuss how to integrate the strangers

and their number into STRON. We also take two nodes 𝑖 and 𝑗as samples. When node 𝑖 meets up node 𝑗, for any message 𝑚in 𝑖’s buffer, if its destination 𝑚𝑑 is node 𝑗, node 𝑖 delivers it to

node 𝑗 and removes the message from its buffer. Otherwise,

if node 𝑗 does not hold this message, node 𝑖 will make a

forwarding decision based on the following two situations:

∙ If 𝑥𝑖(𝑚𝑑) is bigger than 𝑥𝑗(𝑚𝑑) and node 𝑗 is a

stranger to node 𝑖 and the number of strangers that

have received the message is smaller than 𝑇𝑠, the node

𝑖 forwards 𝑚 to node 𝑗 with a probability 𝑓𝑝 =𝐷𝑠(𝑖, 𝑗) (𝑥𝑗(𝑚𝑑)/(𝑥𝑖(𝑚𝑑) + 𝑥𝑗(𝑚𝑑))).

∙ If 𝑥𝑖(𝑚𝑑) is smaller than 𝑥𝑗(𝑚𝑑) and node 𝑗 is

not a stranger to node 𝑖, the forwarding probability

is (𝐸(𝑋𝑖)/𝑥𝑖(𝑗)) (𝑥𝑗(𝑚𝑑)/(𝑥𝑖(𝑚𝑑) + 𝑥𝑗(𝑚𝑑))), other-

wise, if the number of strangers that have received the

message is smaller than 𝑇𝑠, the forwarding probability is

set to 1.

We list the above communication process in Algorithm 2,

where 𝐼𝑠 denotes the number of infected strangers.

E. Possible limits and issues

In this paper, we discuss the influences of the strangers and

their number on routing performance in DTNs. We do not

focus on the correlations among strangers, that is, we only

choose 𝑘 strangers out of ∥𝑁∥ nodes in the network (𝑘 < 𝑇𝑠),

we do not ascertain which 𝑘 strangers should be selected. We

think it deserves separate study and leave it for future work.

In addition, researchers have proposed lots of metrics to

weigh the importance of nodes, we think all of them should

be esteemed, whereas, since we mainly focus on the strangers

and their optimized number, we here only take intra-contact

time as an sample and will evaluate other metrics in future

work.

IV. PERFORMANCE EVALUATION AND ANALYSIS

A. Mobility model, DTNs trace and system parameters

In this paper, we use a synthetical mobility model which

are called community mobility model (CMM) [27] and a real

DTNs trace called KAIST [25] to evaluate the performance of

greedy mechanism and STRON.

286285285

Algorithm 2 STRON mechanism, pseudo-code of node 𝑖

1: upon meeting up node 𝑗 do

2: for any message 𝑚 in 𝑖’s buffer do3: if 𝑚𝑑 == 𝑗 then4: 𝑑𝑒𝑙𝑖𝑣𝑒𝑟𝑀𝑠𝑔(𝑚)5: 𝑟𝑒𝑚𝑜𝑣𝑒(𝑚)6: else if 𝑚 /∈ 𝑗 then7: 𝑖← 𝑥𝑗(𝑚𝑑)8: if 𝑥𝑖(𝑚𝑑) > 𝑥𝑗(𝑚𝑑)

⋀𝑥𝑖(𝑗) < 𝐸(𝑋𝑖)

⋀𝐼𝑠 < 𝑇𝑠

then9: 𝑚→ 𝑗 with a forwarding probability 𝑓𝑝

10: if 𝑓𝑜𝑟𝑤𝑎𝑟𝑑𝑒𝑑 then11: 𝐼𝑠 ← 𝐼𝑠 + 112: end if13: end if14: if 𝑥𝑖(𝑚𝑑) < 𝑥𝑗(𝑚𝑑) then15: if 𝑥𝑖(𝑗) > 𝐸(𝑋𝑖) then16: 𝑚 → 𝑗 with a forwarding probability

(𝐸(𝑋𝑖)/𝑥𝑖(𝑗)) (𝑥𝑗(𝑚𝑑)/(𝑥𝑖(𝑚𝑑) + 𝑥𝑗(𝑚𝑑)))17: else if 𝑥𝑖(𝑗) < 𝐸(𝑋𝑖)

⋀𝐼𝑠 < 𝑇𝑠 then

18: 𝑚→ 𝑗 with a forwarding probability 1

19: 𝐼𝑠 ← 𝐼𝑠 + 120: end if21: end if22: end if23: end for

The system parameters used in CMM are listed below. The

simulation area is 600𝑚 × 600𝑚 and is divided into 9 sub-

communities. We randomly place 60 mobile nodes at the area.

Each node randomly selects one community as its hometown

that it is more likely to visit than other communities. The

mobility of a node is that it randomly selects a point of a

community as its potential destination, moves there, pauses

there for a while and selects a new destination. If it is at

hometown, it still stays in hometown with a high probability

𝑝 and visits other communities with a probability 1− 𝑝. If it

is away from hometown, it will return hometown with a high

probability 𝑞 and other communities with a probability 1− 𝑞.

The values of 𝑝 and 𝑞 are set to 0.8 and 0.9, respectively,

two default values also adopted in [6]. The mobility speed

is between 10m/s and 30m/s. The pause time is 1s and the

communication range is 30m.

In KAIST, 34 volunteers carried the GPS devices (GPS

60CSx) from 2006-09-26 to 2007-10-03 and altogether 92

daily traces were gathered. Each individual trace consists

of a sequence of three-tuples (Timestamp, X-coordinate, Y-

coordinate), which denotes a stay point recorded every 30

seconds. The communication range of nodes in KAIST is set

to 250m, a typical value of WiFi.

For the two scenarios, each source sends one message to a

randomly chosen destination and altogether 1200 messages are

generated. Besides, since each relay needs to buffer packets

for a long period of time in order to cope with the intermittent

connections, we compare the two routing strategies in a buffer

space constrained system to better understand and observe

their performance. The simulation results are the average

over 20 runs. The evaluation metrics are packet delivery ratio

(PDR), average cost and average number of hops per message.

Notice that we here use a correlative factor (average cost)

to further illustrate the performance of two strategies, which

means a message needs to be forwarded how many times

before it is received by the destination node, hence, we have

average cost =forwarded messages

received messages

Obviously, the bigger the value is, the lower the efficiency of

a protocol should be.

B. Performance evaluation

In the following figures, we use terms “Convex”, “Linear”

and “Concave” to denote the three kinds of decreased function

used in STRON respectively. Fig.2 and Fig.3 illustrate the

performance of packet delivery ratio when increasing the

size of buffer space. It’s obvious to see that the buffer size

has a heavy effect on the PDR metric. When buffer size

is relatively small, STRON shows better performance than

greedy mechanism. Compared to the greedy mechanism, it

achieves up to a 70-150% improvement in PDR under CMM

and 20-800% under KAIST when the size of buffer space

is smaller than 400. This is mainly because that STRON

consumes fewer resources, thus, the impact of buffer size

on it’s performance is very slight. For example, when the

buffer size exceeds 700 and 500 under the two scenarios

respectively, the PDR performance dominated by STRON is

almost freedom from the buffer size. In addition, we notice

that the greedy mechanism slightly outperforms STRON when

the buffer size is bigger than 600 under KAIST scenario. This

outlier is, we conjecture, mainly because the connectivity of

KAIST is poorer than that of CMM used in this paper, hence,

the forwarding probability will play a critical role in PDR

performance when the buffer size is relatively big.

0 200 400 600 800 1000 12000

0.2

0.4

0.6

0.8

1

Buffer space

PDR

ConvexLinearConcaveGreedy

Fig. 2. Packet delivery ratio (CMM)

Fig.4 and Fig.5 portray the performance of routing cost.

It’s interesting to note that increasing the buffer size results

in different influences on cost metric. Generally speaking,

287286286

0 200 400 600 800 1000 12000

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

Buffer space

PDR

ConvexLinearConcaveGreedy

Fig. 3. Packet delivery ratio (KAIST)

STRON first shows an increasing trend and then reaches

stable state. Compared with greedy mechanism, it at least

reduces the communication cost by 25-67% under CMM and

almost 30% under KAIST when both reach stable state. From

Algorithm 2, we know that STRON considers the strangers

and their numbers. On the one hand, the several strangers

can bring messages into different subareas of the network,

which increases the probability to meet up destinations. On

the other hand, it delivers messages with different forwarding

probabilities according to the degree of strangeness between

nodes and the limited number of strangers, which reduces the

number of redundant copies, thus, alleviating the overhead of

the network.

0 200 400 600 800 1000 120010

20

30

40

50

60

Buffer space

Cos

t

ConvexLinearConcaveGreedy

Fig. 4. Cost (CMM)

Fig.6 and Fig.7 demonstrate the average number of hops per

message. It seems like increasing the buffer size also increases

the average hops. The reason behind this is that more messages

are delivered. These extra delivered messages are those which

could be dropped at smaller buffer spaces, but now are able to

stay in the buffer space long enough to be delivered to their

destinations, which results in a longer hops for those messages.

Compared with greedy mechanism, STRON still exhibits a

good behavior. It almost reduces half of the average hops

caused by the former. For instance, at KAIST, when both reach

0 200 400 600 800 1000 12000

20

40

60

80

100

Buffer space

Cos

t

ConvexLinearConcaveGreedy

Fig. 5. Cost (KAIST)

stable state (i.e, when the buffer size is bigger than or equal

to 800), the average number of hops per message achieved

by STRON is near to 3.2 (“Concave”), whereas the greedy

mechanism leads to longer routing paths almost resulting in

an average hop value of 5.

Looking more closely at the variants of STRON. When

integrating all of the above three metrics, we see that concave

scheme is most the best of the STRON strategy due to the

more refined forwarding probability it used.

0 200 400 600 800 1000 12002

2.5

3

3.5

4

Buffer space

Ave

rage

Hop

s per

Mes

sage

ConvexLinearConcaveGreedy

Fig. 6. Average number of hops per message (CMM)

V. CONCLUSION

In this paper, we study DTNs routing within a more

challenging scenario. We explore the influence of strangers

and their number on routing performance. We present an

adaptive solution to identify strangers and propose a statistical

method to estimate the optimized number of strangers we can

employ. Based on this heuristic number, we integrate strangers

into DTNs routing. That is, when two nodes meet up, we

take different forwarding probability based on the degree of

strangeness between them and the current number of infected

strangers. We finally compare STRON with the greedy mech-

anism through synthetical and trace-driven simulations, the

results show that our routing strategy has a better performance,

288287287

0 200 400 600 800 1000 12001.5

2

2.5

3

3.5

4

4.5

5

Buffer space

Ave

rage

Hop

s per

Mes

sage

ConvexLinearConcaveGreedy

Fig. 7. Average number of hops per message (KAIST)

especially in terms of combined overhead/packet delivery ratio

and the average number of hops per message.

One significant topic for future work is to study the influ-

ence of different 𝑘 strangers on the STRON performance.

ACKNOWLEDGMENT

We acknowledge the support of the National 973 Project

of China under Grant No.2011CB302701, the National Sci-

ence Fund for Distinguished Young Scholars under Grant

No.60925010, the National Natural Science Foundation of

China under Grant No.60833009, the 111 Project under Grant

No. B08004 and the Fundamental Research Funds for the

Central Universities (2011RC0205). We also wish to thank the

reviewers for their valuable comments and the CRAWDAD

archive project for making the DTNs traces available to

research community.

REFERENCES

[1] Kevin Fall, Stephen Farrell. DTN: An Architectural Retrospective. IEEEJournal on Selected Areas IN Communications, 2008,26(5):828-836.

[2] Vahdat A, Becker D. Epidemic routing for partially connected ad hocnetworks, CS2200006. Durham, North Carolina : Duke University, 2000.

[3] J. Burgess, B. Gallagher, D. Jensen et al. MaxProp: Routing for Vehicle-Based Disruption-Tolerant Networks. In Proceedings of Infocom 2006,IEEE, pp. 1-11.

[4] E. Daly, M. Haahr. Social Network Analysis for Routing in DisconnectedDelay-Tolerant MANETs. In Proceedings of MobiHoc 2007, ACM,pp.32-40.

[5] Quan Yuan, Ionut Cardei, Jie Wu. Predict and Relay: An EfficientRouting in Disruption-Tolerant Networks. In Proceedings of MobiHoc2009, ACM, pp.95-104.

[6] A. Lindgren, A. Doria, O. Schelen. Probabilistic Routing in Inter-mittently Connected Networks. Lecture Notes in Computer Science,2004,3126:239-254.

[7] M. Musolesi, S. Hailes, C. Mascolo. Adaptive Routing for IntermittentlyConnected Mobile Ad Hoc Networks. In Proceedings of WoWMoM 2005,IEEE, pp.183-189.

[8] J. Leguay, T. Friedman, V. Conan. Evaluating Mobility Pattern SpaceRouting for DTNs. In Proceedings of INFOCOM 2006, IEEE, pp.1-10.

[9] S. Gaito, E. Pagani, G. P. Rossi. Strangers help friends to communicatein opportunistic networks. Computer Networks, 2011, 55(2):374-385.

[10] P. Hui. People are the network: experimental design and evaluationof soocial-based forwarding algorithms. Computer Laboratory TechnicalReport UCAM-CL-TR-713, University of Cambridge, March 2008.

[11] Qinghua Li, Sencun Zhu, Guohong Cao. Routing in Socially SelfishDelay Tolerant Networks. In Proceedings of INFOCOM 2010, IEEE,pp.1-9.

[12] M. E. J. Newman. Analysis of weighted networks. Physical Review E,2004, 70:056131.

[13] G. Palla, I. Derenyi, et al. Uncovering the overlapping communitystructure of complex networks in nature and society. Nature, 2005,435(7043):814-818.

[14] R. C. Shah, S. Roy, Sushant Jain, et al. Data MULEs: modeling andanalysis of a three-tier architecture for sparse sensor networks. Ad HocNetworks, 2003,1(2∼3):215-233.

[15] Q. Li, D. Rus. Sending messages to mobile users in disconnected ad-hocwireless networks. In Proceedings of MobiCom 2000 , ACM, pp. 44-55.

[16] W. Zhao, M. Ammar, E. Zegura. A message ferrying approach for datadelivery in sparse mobile ad hoc networks. In Proceedings of MobiHoc2004, ACM, pp.187-198.

[17] W. Zhao, M. Ammar, E. Zegura. Controlling the mobility of multipledata transport ferries in a delay tolerant network. In Proceedings ofInfocom 2005, IEEE pp. 1407-1418.

[18] Ting He, Kang-Won Lee, A. Swami. Flying in the Dark: ControllingAutonomous Data Ferries with Partial Observations. In Proceedings ofMobiHoc 2010, ACM, pp. 141-150.

[19] Rua Qin, Zi Li, Yanfei Wang, et al. An Integrated Network of RoadsideSensors and Vehicles for Driving Safety: Concept, Design and Experi-ments. In Proceedings of Percom 2010, IEEE, pp.79-87.

[20] W. Ivancic, W. M. Eddy, D. Stewart, et al. Experience with delay-tolerantnetworking from orbit. In Proceedings of ASMS 2008, IEEE, pp.173-178.

[21] S. Merugu, M. Ammar, E. Zegura. Routing in Space and Time inNetworks with Predictable Mobility. Technical Report GIT-CC-04-7,Georgia Institute of Technology.

[22] S. Jain, K. Fall, S. Patra. Routing in a delay tolerant network. InProceedings of SIGCOMM 2004, ACM, pp. 145-158.

[23] Cong Liu, Jie Wu. Routing in a Cyclic MobiSpace. In Proceedings ofMobiHoc 2008, ACM, pp. 351-360.

[24] Pan Hui, J. Crowcroft, E. Yoneki. BUBBLE Rap: Social-based Forward-ing in Delay Tolerant Networks. In Proceedings of MobiHoc 2008, ACM,pp.241-250.

[25] K. Lee, S. Hong, S. J. Kim. Demystifying Levy Walk Patterns in HumanWalks. Technical Report, CSC, NCSU, 2008.

[26] T. Spyropoulos, K. Psounis, C.S. Raghavendra. Efficient Routing inIntermittently Connected Mobile Networks: The Multiple-Copy Case.IEEE/ACM Transactions on Networking, 2008, 16(1):77-90.

[27] T. Spyropoulos, K. Psounis, C.S. Raghavendra. Performance Analysisof Mobility-Assisted Routing. Proc. In Proceedings of MobiHoc 2006,ACM, pp. 49-60.

289288288