SlideShare a Scribd company logo
1 of 5
Community-Aware Opportunistic Routing in Mobile
Social Networks
ABSTRACT
Mobile social networks (MSNs) are a kind of delay tolerant network that consists of lots of mobile nodes with
social characteristics. Recently, many social-aware algorithms have been proposed to address routing
problems in MSNs. However, these algorithms tend to forward messages to the nodes with locally optimal
social characteristics, and thus cannot achieve the optimal performance. In this paper, we propose a
distributed optimal Community-Aware Opportunistic Routing (CAOR) algorithm. Our main contributions are
that we propose a home-aware community model, whereby we turn an MSN into a network that only includes
community homes. We prove that, in the network of community homes, we still can compute the minimum
expected delivery delays of nodes through a reverse Dijkstra algorithm and achieve the optimal opportunistic
routing performance. Since the number of communities is far less than the number of nodes in magnitude, the
computational cost and maintenance cost of contact information are greatly reduced. We demonstrate how our
algorithm significantly outperforms the previous ones through extensive simulations, based on a real MSN
trace and a synthetic MSN trace.
EXISTING SYSTEM:
In existing Social-aware algorithms assume that each node has some social characteristics (such as community,
centrality, and similarity, etc.) and then exploits the knowledge to direct the routing decision, so as to improve
the delivery ratio. Unlike existing community models, each community home in our model is assumed to have
a throwbox to store and transmit messages. Compared with the CAOR algorithm, these algorithms just exploit
GLOBALSOFT TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
the social characteristics of nodes to improve the probability of meeting the destination for each message.
However, this is still unpredictable, and thus cannot achieve the optimal result.
PROPOSED SYSTEM:
In this paper, we focus on the single-copy routing problem in MSNs. In many real MSNs, mobile users that
have a common interest generally will visit some (real or virtual) location that is related to this interest. For
instance students with a common study interest will visit the same classrooms to take part in the same courses;
customers with the same shopping interests often visit the same shops; friends generally share some resources
through facebook, and so on. Based on this basic social characteristic, we propose a home-aware community
model. Mobile users with the common interest autonomously form a community, in which the frequently
visited location is their common “home”. Moreover, like we assume that each home supports a real or virtual
throw box a local device that can temporarily store and transmit messages. Under the home-aware community
model, we propose a distributed optimal Community-Aware Opportunistic Routing algorithm (CAOR). We
first turn the routing between lots of nodes to the routing between a few community homes. Then, we adopt
the optimal opportunistic routing scheme by maintaining an optimal relay set for each home. Each home only
forwards its message to the node in its optimal relay set and ignores other relays. Since this scheme solves the
problem of whether a home should select a visited node as the relay of message delivery or ignore this visited
node to wait for those better relays, it can achieve the optimal performance.
MODULE DESCRIPTION:
Number of Modules
After careful analysis the system has been identified to have the following modules:
1. Mobile Social Network Module.
2. Building Home Aware Community Module.
3. Delay Tolerant Network Module.
4. Opportunistic Routing Module.
1. Mobile Social Network Module:
Mobile social networks (MSNs) are a special kind of delay tolerant network (DTN), in which mobile users
move around and communicate with each other via their carried short-distance wireless communication
devices. Recently, some social-aware routing algorithms that are based on social network analysis have been
proposed. Two key concepts in social network analysis are: (i) community, which is a group of people with
social relations; (ii) centrality, which indicates the social relations between a node and other nodes in a
community. Based on the two concepts, these algorithms detect the communities and compute the centrality
value for each node. Messages are delivered via the nodes with good centralities.
2. Building Home Aware Community Module:
A home-aware community is a community of nodes that frequently visit a given home. The frequently visited
home is the common home of the community members, i.e., the community home. Moreover, if a node visits
several homes frequently, it can belong to multiple communities and have multiple homes. The whole network
is composed of some overlapped star-topology communities, as community can easily be detected. Each
community exactly contains a group of nodes that have the common interest to the community home.
3.Delay Tolerant Network Module:
A Delay-Tolerant Network (DTN) is a general-purpose over- lay network that operates on top of varying
regional net- works, including the Internet. DTNs allow regional net- works with varying delay characteristics
to interoperate by providing mechanisms to translate between their respective network parameters. Therefore,
the underlying protocols and technologies for these regional networks may differ con- siderably, but the
flexibility of the DTN architecture allow s them to be connected to each other.
4. Opportunistic Routing Module:
We adopt the optimal opportunistic routing scheme by maintaining an optimal relay set for each home. Each
home only forwards its message to the node in its optimal relay set and ignores other relays. Since this scheme
solves the problem of whether a home should select a visited node as the relay of message delivery or ignore
this visited node to wait for those better relays, it can achieve the optimal performance. The optimal
opportunistic routing scheme means that each message sender delivers messages via its optimal relay set (i.e.,
delivers messages via the first encountered relay in this set). The key problem is to determine whether a relay
belongs to the optimal relay set for each message sender.
SOFTWARE REQUIREMENTS:
Operating System : Windows
Technology : Java and J2EE
Web Technologies : Html, JavaScript, CSS
IDE : My Eclipse
Web Server : Tomcat
Tool kit : Android Phone
Database : My SQL
Java Version : J2SDK1.5
HARDWARE REQUIREMENTS:
Hardware : Pentium
Speed : 1.1 GHz
RAM : 1GB
Hard Disk : 20 GB
Floppy Drive : 1.44 MB
Key Board : Standard Windows Keyboard
Mouse : Two or Three Button Mouse
Monitor : SVGA
Flow Diagram:

More Related Content

What's hot

Community detection in social networks[1]
Community detection in social networks[1]Community detection in social networks[1]
Community detection in social networks[1]sdnumaygmailcom
 
Clique-based Network Clustering
Clique-based Network ClusteringClique-based Network Clustering
Clique-based Network ClusteringGuang Ouyang
 
Community Detection
Community Detection Community Detection
Community Detection Kanika Kanwal
 
Community detection algorithms
Community detection algorithmsCommunity detection algorithms
Community detection algorithmsAlireza Andalib
 
CoCoWa A Collaborative Contact-Based
CoCoWa  A Collaborative Contact-BasedCoCoWa  A Collaborative Contact-Based
CoCoWa A Collaborative Contact-BasedBen Paul
 
Community detection in social networks an overview
Community detection in social networks an overviewCommunity detection in social networks an overview
Community detection in social networks an overvieweSAT Publishing House
 
Social network analysis basics
Social network analysis basicsSocial network analysis basics
Social network analysis basicsPradeep Kumar
 
Tacconi PhD final exam
Tacconi PhD final examTacconi PhD final exam
Tacconi PhD final examCoRehab
 
Exploratory social network analysis with pajek
Exploratory social network analysis with pajekExploratory social network analysis with pajek
Exploratory social network analysis with pajekTHomas Plotkowiak
 
Effect of multipath routing in autonomous mobile mesh networks
Effect of multipath routing in autonomous mobile mesh networksEffect of multipath routing in autonomous mobile mesh networks
Effect of multipath routing in autonomous mobile mesh networkseSAT Journals
 
1 s2.0-s1570870514001255-main
1 s2.0-s1570870514001255-main1 s2.0-s1570870514001255-main
1 s2.0-s1570870514001255-mainRizky Andawasatya
 
Credit risk value based detection of multiple selfish node attacks in cogniti...
Credit risk value based detection of multiple selfish node attacks in cogniti...Credit risk value based detection of multiple selfish node attacks in cogniti...
Credit risk value based detection of multiple selfish node attacks in cogniti...eSAT Publishing House
 

What's hot (15)

Community detection in social networks[1]
Community detection in social networks[1]Community detection in social networks[1]
Community detection in social networks[1]
 
Clique-based Network Clustering
Clique-based Network ClusteringClique-based Network Clustering
Clique-based Network Clustering
 
D1802032026
D1802032026D1802032026
D1802032026
 
Community Detection
Community Detection Community Detection
Community Detection
 
Community detection algorithms
Community detection algorithmsCommunity detection algorithms
Community detection algorithms
 
L 1000 423
L 1000 423L 1000 423
L 1000 423
 
CoCoWa A Collaborative Contact-Based
CoCoWa  A Collaborative Contact-BasedCoCoWa  A Collaborative Contact-Based
CoCoWa A Collaborative Contact-Based
 
Community detection in social networks an overview
Community detection in social networks an overviewCommunity detection in social networks an overview
Community detection in social networks an overview
 
Social network analysis basics
Social network analysis basicsSocial network analysis basics
Social network analysis basics
 
Tacconi PhD final exam
Tacconi PhD final examTacconi PhD final exam
Tacconi PhD final exam
 
1 7
1 71 7
1 7
 
Exploratory social network analysis with pajek
Exploratory social network analysis with pajekExploratory social network analysis with pajek
Exploratory social network analysis with pajek
 
Effect of multipath routing in autonomous mobile mesh networks
Effect of multipath routing in autonomous mobile mesh networksEffect of multipath routing in autonomous mobile mesh networks
Effect of multipath routing in autonomous mobile mesh networks
 
1 s2.0-s1570870514001255-main
1 s2.0-s1570870514001255-main1 s2.0-s1570870514001255-main
1 s2.0-s1570870514001255-main
 
Credit risk value based detection of multiple selfish node attacks in cogniti...
Credit risk value based detection of multiple selfish node attacks in cogniti...Credit risk value based detection of multiple selfish node attacks in cogniti...
Credit risk value based detection of multiple selfish node attacks in cogniti...
 

Similar to Community aware opportunistic routing in mobile social network

COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...ijasuc
 
Community Detection Using Inter Contact Time and Social Characteristics Based...
Community Detection Using Inter Contact Time and Social Characteristics Based...Community Detection Using Inter Contact Time and Social Characteristics Based...
Community Detection Using Inter Contact Time and Social Characteristics Based...jake henry
 
Content Sharing over Smartphone-Based Delay-Tolerant Networks
Content Sharing over Smartphone-Based Delay-Tolerant NetworksContent Sharing over Smartphone-Based Delay-Tolerant Networks
Content Sharing over Smartphone-Based Delay-Tolerant NetworksIJERA Editor
 
Securing Mobile Ad Hoc Networks
Securing Mobile Ad Hoc NetworksSecuring Mobile Ad Hoc Networks
Securing Mobile Ad Hoc NetworksOlga Bautista
 
Geo community-based broadcasting for data dissemination in mobile social netw...
Geo community-based broadcasting for data dissemination in mobile social netw...Geo community-based broadcasting for data dissemination in mobile social netw...
Geo community-based broadcasting for data dissemination in mobile social netw...IEEEFINALYEARPROJECTS
 
AN GROUP BEHAVIOR MOBILITY MODEL FOR OPPORTUNISTIC NETWORKS
AN GROUP BEHAVIOR MOBILITY MODEL FOR OPPORTUNISTIC NETWORKS AN GROUP BEHAVIOR MOBILITY MODEL FOR OPPORTUNISTIC NETWORKS
AN GROUP BEHAVIOR MOBILITY MODEL FOR OPPORTUNISTIC NETWORKS csandit
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...IEEEGLOBALSOFTTECHNOLOGIES
 
Wireless sensor network
Wireless sensor network  Wireless sensor network
Wireless sensor network Sandeep Kumar
 
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone based ...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone based ...JAVA 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone based ...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone based ...IEEEGLOBALSOFTTECHNOLOGIES
 
Content sharing over smartphone based delay-tolerant networks
Content sharing over smartphone based delay-tolerant networksContent sharing over smartphone based delay-tolerant networks
Content sharing over smartphone based delay-tolerant networksIEEEFINALYEARPROJECTS
 
Selfish Node Detection in Replica Allocation over MANETs
Selfish Node Detection in Replica Allocation over MANETsSelfish Node Detection in Replica Allocation over MANETs
Selfish Node Detection in Replica Allocation over MANETsIOSR Journals
 
On the role of mobility for multi message gossip
On the role of mobility for multi message gossipOn the role of mobility for multi message gossip
On the role of mobility for multi message gossipIEEEFINALYEARPROJECTS
 
1. Overview of Distributed Systems
1. Overview of Distributed Systems1. Overview of Distributed Systems
1. Overview of Distributed SystemsDaminda Herath
 
Develop a mobility model for MANETs networks based on fuzzy Logic
Develop a mobility model for MANETs networks based on fuzzy LogicDevelop a mobility model for MANETs networks based on fuzzy Logic
Develop a mobility model for MANETs networks based on fuzzy Logiciosrjce
 
containing byzantine failures with control zones
containing  byzantine failures with control zonescontaining  byzantine failures with control zones
containing byzantine failures with control zonesvishnuRajan20
 
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...Natasha Barnett
 
SCALABLE LOCAL COMMUNITY DETECTION WITH MAPREDUCE FOR LARGE NETWORKS
SCALABLE LOCAL COMMUNITY DETECTION WITH MAPREDUCE FOR LARGE NETWORKSSCALABLE LOCAL COMMUNITY DETECTION WITH MAPREDUCE FOR LARGE NETWORKS
SCALABLE LOCAL COMMUNITY DETECTION WITH MAPREDUCE FOR LARGE NETWORKSIJDKP
 

Similar to Community aware opportunistic routing in mobile social network (20)

COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
COMMUNITY DETECTION USING INTER CONTACT TIME AND SOCIAL CHARACTERISTICS BASED...
 
Community Detection Using Inter Contact Time and Social Characteristics Based...
Community Detection Using Inter Contact Time and Social Characteristics Based...Community Detection Using Inter Contact Time and Social Characteristics Based...
Community Detection Using Inter Contact Time and Social Characteristics Based...
 
Content Sharing over Smartphone-Based Delay-Tolerant Networks
Content Sharing over Smartphone-Based Delay-Tolerant NetworksContent Sharing over Smartphone-Based Delay-Tolerant Networks
Content Sharing over Smartphone-Based Delay-Tolerant Networks
 
Opportunistic Routing in Delay Tolerant Network with Different Routing Algorithm
Opportunistic Routing in Delay Tolerant Network with Different Routing AlgorithmOpportunistic Routing in Delay Tolerant Network with Different Routing Algorithm
Opportunistic Routing in Delay Tolerant Network with Different Routing Algorithm
 
Securing Mobile Ad Hoc Networks
Securing Mobile Ad Hoc NetworksSecuring Mobile Ad Hoc Networks
Securing Mobile Ad Hoc Networks
 
Geo community-based broadcasting for data dissemination in mobile social netw...
Geo community-based broadcasting for data dissemination in mobile social netw...Geo community-based broadcasting for data dissemination in mobile social netw...
Geo community-based broadcasting for data dissemination in mobile social netw...
 
AN GROUP BEHAVIOR MOBILITY MODEL FOR OPPORTUNISTIC NETWORKS
AN GROUP BEHAVIOR MOBILITY MODEL FOR OPPORTUNISTIC NETWORKS AN GROUP BEHAVIOR MOBILITY MODEL FOR OPPORTUNISTIC NETWORKS
AN GROUP BEHAVIOR MOBILITY MODEL FOR OPPORTUNISTIC NETWORKS
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...
 
Wireless sensor network
Wireless sensor network  Wireless sensor network
Wireless sensor network
 
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone based ...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone based ...JAVA 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone based ...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone based ...
 
Content sharing over smartphone based delay-tolerant networks
Content sharing over smartphone based delay-tolerant networksContent sharing over smartphone based delay-tolerant networks
Content sharing over smartphone based delay-tolerant networks
 
Selfish Node Detection in Replica Allocation over MANETs
Selfish Node Detection in Replica Allocation over MANETsSelfish Node Detection in Replica Allocation over MANETs
Selfish Node Detection in Replica Allocation over MANETs
 
On the role of mobility for multi message gossip
On the role of mobility for multi message gossipOn the role of mobility for multi message gossip
On the role of mobility for multi message gossip
 
1. Overview of Distributed Systems
1. Overview of Distributed Systems1. Overview of Distributed Systems
1. Overview of Distributed Systems
 
A017610111
A017610111A017610111
A017610111
 
Develop a mobility model for MANETs networks based on fuzzy Logic
Develop a mobility model for MANETs networks based on fuzzy LogicDevelop a mobility model for MANETs networks based on fuzzy Logic
Develop a mobility model for MANETs networks based on fuzzy Logic
 
containing byzantine failures with control zones
containing  byzantine failures with control zonescontaining  byzantine failures with control zones
containing byzantine failures with control zones
 
Byzantine
ByzantineByzantine
Byzantine
 
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
Mobile Ad Hoc On Demand Distance Vector Routing Protocol...
 
SCALABLE LOCAL COMMUNITY DETECTION WITH MAPREDUCE FOR LARGE NETWORKS
SCALABLE LOCAL COMMUNITY DETECTION WITH MAPREDUCE FOR LARGE NETWORKSSCALABLE LOCAL COMMUNITY DETECTION WITH MAPREDUCE FOR LARGE NETWORKS
SCALABLE LOCAL COMMUNITY DETECTION WITH MAPREDUCE FOR LARGE NETWORKS
 

More from IEEEFINALYEARPROJECTS

Scalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewordsScalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewordsIEEEFINALYEARPROJECTS
 
Scalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewordsScalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewordsIEEEFINALYEARPROJECTS
 
Reversible watermarking based on invariant image classification and dynamic h...
Reversible watermarking based on invariant image classification and dynamic h...Reversible watermarking based on invariant image classification and dynamic h...
Reversible watermarking based on invariant image classification and dynamic h...IEEEFINALYEARPROJECTS
 
Reversible data hiding with optimal value transfer
Reversible data hiding with optimal value transferReversible data hiding with optimal value transfer
Reversible data hiding with optimal value transferIEEEFINALYEARPROJECTS
 
Query adaptive image search with hash codes
Query adaptive image search with hash codesQuery adaptive image search with hash codes
Query adaptive image search with hash codesIEEEFINALYEARPROJECTS
 
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
Noise reduction based on partial reference, dual-tree complex wavelet transfo...Noise reduction based on partial reference, dual-tree complex wavelet transfo...
Noise reduction based on partial reference, dual-tree complex wavelet transfo...IEEEFINALYEARPROJECTS
 
Local directional number pattern for face analysis face and expression recogn...
Local directional number pattern for face analysis face and expression recogn...Local directional number pattern for face analysis face and expression recogn...
Local directional number pattern for face analysis face and expression recogn...IEEEFINALYEARPROJECTS
 
An access point based fec mechanism for video transmission over wireless la ns
An access point based fec mechanism for video transmission over wireless la nsAn access point based fec mechanism for video transmission over wireless la ns
An access point based fec mechanism for video transmission over wireless la nsIEEEFINALYEARPROJECTS
 
Towards differential query services in cost efficient clouds
Towards differential query services in cost efficient cloudsTowards differential query services in cost efficient clouds
Towards differential query services in cost efficient cloudsIEEEFINALYEARPROJECTS
 
Spoc a secure and privacy preserving opportunistic computing framework for mo...
Spoc a secure and privacy preserving opportunistic computing framework for mo...Spoc a secure and privacy preserving opportunistic computing framework for mo...
Spoc a secure and privacy preserving opportunistic computing framework for mo...IEEEFINALYEARPROJECTS
 
Secure and efficient data transmission for cluster based wireless sensor netw...
Secure and efficient data transmission for cluster based wireless sensor netw...Secure and efficient data transmission for cluster based wireless sensor netw...
Secure and efficient data transmission for cluster based wireless sensor netw...IEEEFINALYEARPROJECTS
 
Privacy preserving back propagation neural network learning over arbitrarily ...
Privacy preserving back propagation neural network learning over arbitrarily ...Privacy preserving back propagation neural network learning over arbitrarily ...
Privacy preserving back propagation neural network learning over arbitrarily ...IEEEFINALYEARPROJECTS
 
Harnessing the cloud for securely outsourcing large
Harnessing the cloud for securely outsourcing largeHarnessing the cloud for securely outsourcing large
Harnessing the cloud for securely outsourcing largeIEEEFINALYEARPROJECTS
 
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...IEEEFINALYEARPROJECTS
 
Dynamic resource allocation using virtual machines for cloud computing enviro...
Dynamic resource allocation using virtual machines for cloud computing enviro...Dynamic resource allocation using virtual machines for cloud computing enviro...
Dynamic resource allocation using virtual machines for cloud computing enviro...IEEEFINALYEARPROJECTS
 
A secure protocol for spontaneous wireless ad hoc networks creation
A secure protocol for spontaneous wireless ad hoc networks creationA secure protocol for spontaneous wireless ad hoc networks creation
A secure protocol for spontaneous wireless ad hoc networks creationIEEEFINALYEARPROJECTS
 
Utility privacy tradeoff in databases an information-theoretic approach
Utility privacy tradeoff in databases an information-theoretic approachUtility privacy tradeoff in databases an information-theoretic approach
Utility privacy tradeoff in databases an information-theoretic approachIEEEFINALYEARPROJECTS
 
Two tales of privacy in online social networks
Two tales of privacy in online social networksTwo tales of privacy in online social networks
Two tales of privacy in online social networksIEEEFINALYEARPROJECTS
 

More from IEEEFINALYEARPROJECTS (20)

Scalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewordsScalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewords
 
Scalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewordsScalable face image retrieval using attribute enhanced sparse codewords
Scalable face image retrieval using attribute enhanced sparse codewords
 
Reversible watermarking based on invariant image classification and dynamic h...
Reversible watermarking based on invariant image classification and dynamic h...Reversible watermarking based on invariant image classification and dynamic h...
Reversible watermarking based on invariant image classification and dynamic h...
 
Reversible data hiding with optimal value transfer
Reversible data hiding with optimal value transferReversible data hiding with optimal value transfer
Reversible data hiding with optimal value transfer
 
Query adaptive image search with hash codes
Query adaptive image search with hash codesQuery adaptive image search with hash codes
Query adaptive image search with hash codes
 
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
Noise reduction based on partial reference, dual-tree complex wavelet transfo...Noise reduction based on partial reference, dual-tree complex wavelet transfo...
Noise reduction based on partial reference, dual-tree complex wavelet transfo...
 
Local directional number pattern for face analysis face and expression recogn...
Local directional number pattern for face analysis face and expression recogn...Local directional number pattern for face analysis face and expression recogn...
Local directional number pattern for face analysis face and expression recogn...
 
An access point based fec mechanism for video transmission over wireless la ns
An access point based fec mechanism for video transmission over wireless la nsAn access point based fec mechanism for video transmission over wireless la ns
An access point based fec mechanism for video transmission over wireless la ns
 
Towards differential query services in cost efficient clouds
Towards differential query services in cost efficient cloudsTowards differential query services in cost efficient clouds
Towards differential query services in cost efficient clouds
 
Spoc a secure and privacy preserving opportunistic computing framework for mo...
Spoc a secure and privacy preserving opportunistic computing framework for mo...Spoc a secure and privacy preserving opportunistic computing framework for mo...
Spoc a secure and privacy preserving opportunistic computing framework for mo...
 
Secure and efficient data transmission for cluster based wireless sensor netw...
Secure and efficient data transmission for cluster based wireless sensor netw...Secure and efficient data transmission for cluster based wireless sensor netw...
Secure and efficient data transmission for cluster based wireless sensor netw...
 
Privacy preserving back propagation neural network learning over arbitrarily ...
Privacy preserving back propagation neural network learning over arbitrarily ...Privacy preserving back propagation neural network learning over arbitrarily ...
Privacy preserving back propagation neural network learning over arbitrarily ...
 
Non cooperative location privacy
Non cooperative location privacyNon cooperative location privacy
Non cooperative location privacy
 
Harnessing the cloud for securely outsourcing large
Harnessing the cloud for securely outsourcing largeHarnessing the cloud for securely outsourcing large
Harnessing the cloud for securely outsourcing large
 
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...Enabling data dynamic and indirect mutual trust for cloud computing storage s...
Enabling data dynamic and indirect mutual trust for cloud computing storage s...
 
Dynamic resource allocation using virtual machines for cloud computing enviro...
Dynamic resource allocation using virtual machines for cloud computing enviro...Dynamic resource allocation using virtual machines for cloud computing enviro...
Dynamic resource allocation using virtual machines for cloud computing enviro...
 
A secure protocol for spontaneous wireless ad hoc networks creation
A secure protocol for spontaneous wireless ad hoc networks creationA secure protocol for spontaneous wireless ad hoc networks creation
A secure protocol for spontaneous wireless ad hoc networks creation
 
Utility privacy tradeoff in databases an information-theoretic approach
Utility privacy tradeoff in databases an information-theoretic approachUtility privacy tradeoff in databases an information-theoretic approach
Utility privacy tradeoff in databases an information-theoretic approach
 
Two tales of privacy in online social networks
Two tales of privacy in online social networksTwo tales of privacy in online social networks
Two tales of privacy in online social networks
 
Spatial approximate string search
Spatial approximate string searchSpatial approximate string search
Spatial approximate string search
 

Recently uploaded

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 

Recently uploaded (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 

Community aware opportunistic routing in mobile social network

  • 1. Community-Aware Opportunistic Routing in Mobile Social Networks ABSTRACT Mobile social networks (MSNs) are a kind of delay tolerant network that consists of lots of mobile nodes with social characteristics. Recently, many social-aware algorithms have been proposed to address routing problems in MSNs. However, these algorithms tend to forward messages to the nodes with locally optimal social characteristics, and thus cannot achieve the optimal performance. In this paper, we propose a distributed optimal Community-Aware Opportunistic Routing (CAOR) algorithm. Our main contributions are that we propose a home-aware community model, whereby we turn an MSN into a network that only includes community homes. We prove that, in the network of community homes, we still can compute the minimum expected delivery delays of nodes through a reverse Dijkstra algorithm and achieve the optimal opportunistic routing performance. Since the number of communities is far less than the number of nodes in magnitude, the computational cost and maintenance cost of contact information are greatly reduced. We demonstrate how our algorithm significantly outperforms the previous ones through extensive simulations, based on a real MSN trace and a synthetic MSN trace. EXISTING SYSTEM: In existing Social-aware algorithms assume that each node has some social characteristics (such as community, centrality, and similarity, etc.) and then exploits the knowledge to direct the routing decision, so as to improve the delivery ratio. Unlike existing community models, each community home in our model is assumed to have a throwbox to store and transmit messages. Compared with the CAOR algorithm, these algorithms just exploit GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
  • 2. the social characteristics of nodes to improve the probability of meeting the destination for each message. However, this is still unpredictable, and thus cannot achieve the optimal result. PROPOSED SYSTEM: In this paper, we focus on the single-copy routing problem in MSNs. In many real MSNs, mobile users that have a common interest generally will visit some (real or virtual) location that is related to this interest. For instance students with a common study interest will visit the same classrooms to take part in the same courses; customers with the same shopping interests often visit the same shops; friends generally share some resources through facebook, and so on. Based on this basic social characteristic, we propose a home-aware community model. Mobile users with the common interest autonomously form a community, in which the frequently visited location is their common “home”. Moreover, like we assume that each home supports a real or virtual throw box a local device that can temporarily store and transmit messages. Under the home-aware community model, we propose a distributed optimal Community-Aware Opportunistic Routing algorithm (CAOR). We first turn the routing between lots of nodes to the routing between a few community homes. Then, we adopt the optimal opportunistic routing scheme by maintaining an optimal relay set for each home. Each home only forwards its message to the node in its optimal relay set and ignores other relays. Since this scheme solves the problem of whether a home should select a visited node as the relay of message delivery or ignore this visited node to wait for those better relays, it can achieve the optimal performance. MODULE DESCRIPTION: Number of Modules After careful analysis the system has been identified to have the following modules: 1. Mobile Social Network Module. 2. Building Home Aware Community Module. 3. Delay Tolerant Network Module. 4. Opportunistic Routing Module. 1. Mobile Social Network Module: Mobile social networks (MSNs) are a special kind of delay tolerant network (DTN), in which mobile users move around and communicate with each other via their carried short-distance wireless communication devices. Recently, some social-aware routing algorithms that are based on social network analysis have been
  • 3. proposed. Two key concepts in social network analysis are: (i) community, which is a group of people with social relations; (ii) centrality, which indicates the social relations between a node and other nodes in a community. Based on the two concepts, these algorithms detect the communities and compute the centrality value for each node. Messages are delivered via the nodes with good centralities. 2. Building Home Aware Community Module: A home-aware community is a community of nodes that frequently visit a given home. The frequently visited home is the common home of the community members, i.e., the community home. Moreover, if a node visits several homes frequently, it can belong to multiple communities and have multiple homes. The whole network is composed of some overlapped star-topology communities, as community can easily be detected. Each community exactly contains a group of nodes that have the common interest to the community home. 3.Delay Tolerant Network Module: A Delay-Tolerant Network (DTN) is a general-purpose over- lay network that operates on top of varying regional net- works, including the Internet. DTNs allow regional net- works with varying delay characteristics to interoperate by providing mechanisms to translate between their respective network parameters. Therefore, the underlying protocols and technologies for these regional networks may differ con- siderably, but the flexibility of the DTN architecture allow s them to be connected to each other. 4. Opportunistic Routing Module: We adopt the optimal opportunistic routing scheme by maintaining an optimal relay set for each home. Each home only forwards its message to the node in its optimal relay set and ignores other relays. Since this scheme solves the problem of whether a home should select a visited node as the relay of message delivery or ignore this visited node to wait for those better relays, it can achieve the optimal performance. The optimal opportunistic routing scheme means that each message sender delivers messages via its optimal relay set (i.e., delivers messages via the first encountered relay in this set). The key problem is to determine whether a relay belongs to the optimal relay set for each message sender.
  • 4. SOFTWARE REQUIREMENTS: Operating System : Windows Technology : Java and J2EE Web Technologies : Html, JavaScript, CSS IDE : My Eclipse Web Server : Tomcat Tool kit : Android Phone Database : My SQL Java Version : J2SDK1.5 HARDWARE REQUIREMENTS: Hardware : Pentium Speed : 1.1 GHz RAM : 1GB Hard Disk : 20 GB Floppy Drive : 1.44 MB Key Board : Standard Windows Keyboard Mouse : Two or Three Button Mouse Monitor : SVGA