SlideShare a Scribd company logo
1 of 35
Download to read offline
Rute Sofia
Rute.sofia@ulusofona.pt/rsofia@gmail.com
Technical University of Munich
2014.04.01
The Relevancy of Pervasive Sensing
In Connected Mobile Environments
2
Overview
Connected
Mobile
Environments
1. User-centric
networking
2. Mobility/
Roaming
Aspects
3. Social
Behavior in
Connected
Mobile
4. Pervasive
sensing
01-04-2014 2Rute Sofia, rute.sofia@ulusofona.pt,
http://copelabs.ulusofona.pt/~rsofia
Connected Mobile Environments
Some Food for Thought
• Connected Mobile Environments are about People
• Citizen integration into the system
• Services personalization on-the-go (learn with an
adaptive user profile – roaming/commuter behavior)
• Connected Mobile Environments require looking
into new paradigms
• User-centric networking
• Integration of social notions into the OSI stack
• Mobility Modeling is essential to ensure Internet
user/customer satisfaction
• Roaming prediction assists the most varied areas :
residential services; intelligent transportation systems;
smart environments
• Better QoE – more customers
• Connected Mobile Environments require knowledge
acquired on-the-fly
• Participatory sensing requires too much user
involvement
• Pervasive sensing is the key to generate new services
Connected Mobile
Environments
1. User-centric
networking
2. Mobility/
Roaming
Aspects
3. Social Behavior
in Connected
Mobile
4. Pervasive
sensing
01-04-2014 3Rute Sofia, rute.sofia@ulusofona.pt,
http://copelabs.ulusofona.pt/~rsofia
4
Connected
Mobile
Environments
1. User-
centric
networking
2. Mobility/
Roaming
Aspects
3. Social
Behavior in
Connected
Mobile
4. Pervasive
sensing
01-04-2014 4Rute Sofia, rute.sofia@ulusofona.pt,
http://copelabs.ulusofona.pt/~rsofia
 Shared access
 Why: broader roaming
 Neglected cooperation
potential
 Density implies bad
resource management
 Neglected available
spectrum
 Spectrum overlaps
 Architectures follow the
Internet end-to-end
principle
 Clear splitting between
network and end-user
devices
 Mobility is limited
 Roaming with specific
areas; static, centralized
models
Private
User-centric Networking
User as Prosumer, Networking Aspects
User-centric networking
01-04-2014 5Rute Sofia, rute.sofia@ulusofona.pt,
http://copelabs.ulusofona.pt/~rsofia
End-user devices
Direct sharing
Shared connectivity
Micro-provider device
User-centric relaying
Virtual node aggregated
relaying
Multi-hop relaying Direct aggregated relaying
MiFi, Whisher
Internet access point
Devices sharing connectivity
User-centric Networking
People-centric Architectures in Connected Environments*
*R. Sofia, P. Mendes, User-provided networks, Consumer as Provider. IEEE Communications
Magazine, vol. 46, pp86-91, 2008.
FON, ZON
01-04-2014 6Rute Sofia, rute.sofia@ulusofona.pt,
http://copelabs.ulusofona.pt/~rsofia
User-centric Networking
Relevant Aspects in Connected Mobile Environments
Trust Management
• Dynamically built
• Mimics human trust
Advanced Routing
• Based on user’s interests
• Opportunistic
Advanced
Resource Management
• Take advantage of
overlap and interference
Mobility Prediction
• Improve QoE
• Assist network operation
User-centricity
???
Destination: Mall
Getting off at next bus stop
01-04-2014 7Rute Sofia, rute.sofia@ulusofona.pt,
http://copelabs.ulusofona.pt/~rsofia
User-centric Networking
Circles of Trust in Connected Mobile Environments
Trust in Networking
Node
Wireless device that belongs to 1 individual (owner)
 Only the owner is responsible, for the case of shared
devices
An individual may own different nodes
Trust association
Unidirectional association between two nodes
Related to nodes’ interests and social networking
perception
Has a specific trust level or trust weight
Trust weight is based on QoE, previous history, etc.
Two nodes may hold more than one trust association
(due to QoE or type of traffic)
Trust Propagation
Based on direct and indirect recommendations
Passively overhead (e.g. via wireless beacons)
Based on dispositional trust adjusting over time
01-04-2014 8Rute Sofia, rute.sofia@ulusofona.pt,
http://copelabs.ulusofona.pt/~rsofia
User-centric Networking
Circles of Trust in Connected Mobile Environments, Example*
•Community 1 is already active
•ULOOP “Gateway” (equipment providing the shared Internet access) in red
•Maria in Blue, Tom in green
•In Community 1, Maria holds a trust level e.g. 4
Maria’s community 1 trust level: 4
Tom - new user in
Community 1 –
Maria provides
Internet access,
basic services
Tom gets the
quarantine level –
trust association
cost from Tom to
Maria = 2
01-04-2014 9Rute Sofia, rute.sofia@ulusofona.pt,
http://copelabs.ulusofona.pt/~rsofia
*EU FP7 ULOOP – User-centric Wireless Local Loop
http://uloop.eu/
User-centric Networking
Computing Trust in Connected Environments, the ULOOP suite*
•https://play.google.com/store/apps/details?id=eu.uloop.t31.android
•EU FP7 ULOOP, http://uloop.eu
1. Id creation – one time, one user, multiple
devices
• Crypto-id generation (SHA-256(Public Key) of a
KeyPair)
• Validation – any Id validator
• 1 crypto-id, multiple node-ids: Crypto-id || encrypted
MAC
2. Trust Setup (one time, one user)
• Dispositional trust - the way I trust thirds/the
world
• Affects trust computation
• Trust table <crypto-id, trust level, ageing>
• Wallet – initial set of credits
Bank
(Monetization)
Id Validator
(One time)
3. Trust negotiation and management
• During the MAC authentication phase
• Negotiates trust – uses tokens and credits
• Example: Token tk(i,j) = tl(i,j)*sqrt(c), tl in
[0,1]; c in [0,inf]
4. Rewards and Cooperation
• Cooperation manager mediates negotiation
• Triggers request for rewards
• Reward manager handles payments (monetization)
• Payments are secured with RSA
01-04-2014 10Rute Sofia, rute.sofia@ulusofona.pt,
http://copelabs.ulusofona.pt/~rsofia
User-centric Networking
Trust as a metric to provide QoS/QoE*
01-04-2014 11Rute Sofia, rute.sofia@ulusofona.pt,
http://copelabs.ulusofona.pt/~rsofia
Hostapd
STA
Auth Response
CAC
Request
Queue
Request with the highest
priority.
Resource
Manager
0: OK
32: Not OK
Request priority p(i,j)=Tokens(i,j)*Tl(j,i)
j: gateway
i: node requesting service
Tl: trust level
*R. Sofia, L. Lopes, Trust as a Fariness Parameter for
Quality of Experience, Book Chapter contribution,
Wireless Networks, Springer LCNS User-centric
Networking - Future Perspectives, 2014.
MAC 1 MAC 2
Internet
mac80211- TX
ST
A1
ST
A2
24
Mbps
18
Mbps
ACK
AC
K
Throughput of high rate
station is impaired by the
low rate station.
01-04-2014 12Rute Sofia, rute.sofia@ulusofona.pt,
http://copelabs.ulusofona.pt/~rsofia
User-centric Networking
Making the MAC Layer Fairer, Dynamic Frequency Sharing*
MAC 1 MAC 2
Internet
ST
A1
ST
A2
Throughput of
the high rate station is not
impaired by the low rate station.
The low rate station maintains
the same throughput with only
the addition of a small processing
time for the superframe.
User-centric Networking
Making the MAC Layer Fairer, Dynamic Frequency Sharing*
*L. Lopes, R. Sofia, H. Haci, H. Zhu,
A Proposal for Dynamic Spectrum Sharing in Wireless Networks, under submission, 2014.
H. Osman, H. Zhu, H. Haci, L. Lopes, R. Sofia. “Method and Apparatus for communication
in a wireless network” (EP 13191667.8), August 2013
01-04-2014 13Rute Sofia, rute.sofia@ulusofona.pt,
http://copelabs.ulusofona.pt/~rsofia
01-04-2014 Rute Sofia, rute.sofia@ulusofona.pt,
http://copelabs.ulusofona.pt/~rsofia
14
Avg Throughput Difference between the two stations (%)
Our proposal IEEE802.11g
Scenario I 3.59 82.32
Scenario II, LoS, UDP 27.04 27.04 68.11
Scenario II, LoS, TCP 16.65 16.65 44.44
Scenario II, nLoS, UDP 81.02 48.57
Scenario II, nLoS, TCP 41.97 82.95
User-centric Networking
Trust as a metric to provide QoS/QoE*
*R. Sofia, L. Lopes, Trust as a Fariness Parameter for Quality of Experience
in Wireless Networks, Book Chapter contribution References
pringer LCNS User-centric Networking - Future Perspectives, 2014.
15
Connected
Mobile
Environments
1. User-
centric
networking
2. Mobility/
Roaming
Aspects
3. Social
Behavior in
Connected
Mobile
4. Pervasive
sensing
01-04-2014 15Rute Sofia, rute.sofia@ulusofona.pt,
http://copelabs.ulusofona.pt/~rsofia
User IS part of the
network
Trust as a new QoE
metric – better QoE,
fairer QoS
User-centric Networking
Wrapping-up
Connected
Mobile
Environments
1. User-
centric
networking
2. Mobility/
Roaming
Aspects
3. Social
Behavior in
Connected
Mobile
4. Pervasive
sensing
Internet
Home
Coffee
MN
Mobility anchorpoint
Identifier @Home
Identifier @Visited Network
Remarks
End-user device has an identifier for each place
Can be the same, e.g., 3GPP
For the network, identifier is the same
Always the one used when starting the communication
Endpoint identifier: never changes
Visited network identifier is a “location marker”
Mobility anchorpoint
Tracks mapping between identifiers, as well as active identifiers
Transport
(OSI L4)
Network
(OSI L3)
Data/Link
(OSI L2,L1)
Application
(OSI L5-L7)
SIP/IMS
M-SCTP
HIP
Mobile IP
Layer 2 Mobility
(micro-mobility)
3GPP/4G/5G
Wi-FiWiMAX
802.21
Mobility Aspects
Today’s Mobility Management Solutions
01-04-2014 16Rute Sofia, rute.sofia@ulusofona.pt,
http://copelabs.ulusofona.pt/~rsofia
Mobility Aspects
Distributed Mobility Management, an Example
Distributed Mobility
Management
IETF DMM Working Group
Envisions distribution via
replication, or splitting
Our view: splitting and
placing some functionality
closer to the user
Today’s centralized
approaches
Control Plane
Mobile node registration in a central
mobility anchor point (MAP)
Secure exchange for binding
Data Plane
VO
User B
Sessions always on
Access Provider 1
Access Node
Access Provider 2
Access Node
Residential Gateway
User A
Mobility ControlPlane
Residential Gateway
Control /
Data Plane
AAA
Mobility
Anchorpoint
01-04-2014 17Rute Sofia, rute.sofia@ulusofona.pt,
http://copelabs.ulusofona.pt/~rsofia
Mobility Aspects
The True Challenges in Connected Mobile
Efficient selection of anchor points
Based on user satisfaction degree Based on network policies
Flexible mobility architectures
Distributed mobility management
Better for flater networks
Better for variable topologies
A new meaning to “anywhere, anytime”
Ways to estimate WHEN is session continuity
required (mobility estimation) and WHICH services
are required
Use any opportunity to transmit on user’s interests
01-04-2014 18Rute Sofia, rute.sofia@ulusofona.pt,
http://copelabs.ulusofona.pt/~rsofia
Mobility Aspects
The Rise of Mobility Modeling
Modeling and realistic operation – aren’t these two distinct fields
Optimal routing,
incorporate sensitivity
to movement
Simplified network
operation, predict future
movement aspects
Optimized mobility
management–
introduce estimation
Better connectivity
models – place better
mobility functionality
Why not just use ANY available model ?
Modeling impacts severely network operation
Social mobility modeling captures some realistic
human movement features
Why do we need mobility models anyway?
In connected mobile, nodes move freely – based
on human behavior and routines
Node movement patterns and relative location
(node to group) is relevant to ensure a good
communication
01-04-2014 19Rute Sofia, rute.sofia@ulusofona.pt,
http://copelabs.ulusofona.pt/~rsofia
Mobility Aspects
The Rise of SOCIAL Mobility Modeling
• Intel Lablet, Cambridge UK
• Distribution of bluetooth devices to people in different
settings (Cambridge, Infocom 2005, Tokyo)
• Wireless Topology Discovery Project (UCSD)
• Darthmouth CRAWDAD
Traces
• Up to now, most popular, but started around 2000
• Hard to assess applicability to reality
• E.g., end-user portable devices move with humans, not
randomly
• Traces corroborate gaps in applicability to reality
Synthetic
• Attempts to model human roaming behavior/movement
• Often based on the notion of social attractiveness
• Still present several gaps: obstacle collision; pause time
modeling; community detection
Social Mobility Modeling
01-04-2014 20Rute Sofia, rute.sofia@ulusofona.pt,
http://copelabs.ulusofona.pt/~rsofia
Mobility Aspects
Social Behavior Modeling
01-04-2014 21Rute Sofia, rute.sofia@ulusofona.pt,
http://copelabs.ulusofona.pt/~rsofia
Mobility Aspects
An example for roaming estimation*
• Passively captures networking context data that
characterizes visits to networks over time
Tracking
• Based on learnt behavior, infers time left to
handover and potential handover targets
Predicts
* R. Sofia (COPELABS), EP 13186562.9, 08.2013 – patent pending.
• Roaming patterns share affinity with human
routines
• Tracking such routine allows prediction
Motivation
• Improve handovers – reduce signaling
• Quality of Service/Better resource
management
• Better selection of mobility anchor points
Benefits
01-04-2014 22Rute Sofia, rute.sofia@ulusofona.pt,
http://copelabs.ulusofona.pt/~rsofia
Mobility Aspects
An example for roaming estimation*
Visited network 1, rank 0.8
Visited network 2,
rank 0.3
Visited network 3,
rank 0.9
Today
MTracker
 User equipment application that passively
ranks visited Wi-Fi networks over time, by
collecting a few parameter
 Number of visits
 Average visit time in seconds
 Information concerning the visited network
e.g. BSSID and SSID
 Attractiveness of the network to the user:
trust level the user has on that ULOOP
gateway
 Rank is periodically updated based on
the collected parameters
 Mtracker estimates a potential move
 Selects best network based on rank
 Consideres average visit time as the indicator
that a move can occur
01-04-2014 23Rute Sofia, rute.sofia@ulusofona.pt,
http://copelabs.ulusofona.pt/~rsofia
*http://www.youtube.com/watch?v=yzGJyDlamRU
24
Connected
Mobile
Environments
1. User-
centric
networking
2. Mobility/
Roaming
Aspects
3. Social
Behavior in
Networking
4. Pervasive
sensing
01-04-2014 24Rute Sofia, rute.sofia@ulusofona.pt,
http://copelabs.ulusofona.pt/~rsofia
•User-centricity: new
paradigms in mobile
•Mobility management
requires new approaches,
closer to human behavior
•Mobility estimation – a
relevant trend
Mobility Aspects
Wrapping-up
Connected
Mobile
Environments
1. User-
centric
networking
2. Mobility/
Roaming
Aspects
3. Social
Behavior in
Connected
Mobile
4. Pervasive
sensing
Future Connected Environments, Social behavior integration
Movement patterns
QoE based on social principles (e.g. trust,
influence)
Internet value-chain (wholesale models)
Flow from providers to citizens still Value-chain is not assymetric
Citizen as prosumer
Citizen shares the network Citizen provides content
Citizen personalizes services in
real-time
The end-to-end principle still rules
The network is dumb The edges have the intelligence
Edges as of today: user-centric
networks
The Internet as Social Media
Citizens control/carry networking nodes Citizens exchange data, shared interests
Social Behavior in Connected Mobile
Integrating Social Metrics – closer to Human Behavior
01-04-2014 25Rute Sofia, rute.sofia@ulusofona.pt,
http://copelabs.ulusofona.pt/~rsofia
Property/Parameter Social Capital Perspective Networking Perspective
Centrality: determine the
relative importance of a vertex
within the graph
The influence of a person on the social
structure
The impact a node has on the graph.
Importance here relates to information
dissemination.
Degree centrality: Nodes that
have more ties to other nodes
have a higher degree centrality.
Considers that such nodes are better
positioned (influence, information
dissemination). Alone, says little about
node influence. Together with the degree
centrality of neighbors, provides a better
measure
Nodes that have more ties to other nodes have
a higher degree centrality. These are not
necessarily better positioned.
Betweeness centrality: nodes
that have a high probability to
occur on a randomly chosen
shortest path between two
randomly chosen nodes have a
high betweenness.
Assists in finding “bridgers”: these are
nodes that limit clusters (interconnect
different clusters).
Links that are more central assist nodes in
better dissemination information, assuming a
plain connectivity model.
Closeness centrality: Sum of
its (shortest-path) distances to
any other node y normalized by
the maximum shortest-path
length.
High closeness centrality implies better
information propagation.
A node that has a higher number of shortest-
paths to all other nodes has a higher closeness
centrality. It also has a higher probability
of becoming a bottleneck
Link Strength: The strength of
a tie depends on the amount
of time spent on it and the
emotional intensity and intimacy
of the relation
If there is a strong tie between A
and B as well as between B and C, A and C
are
likely to develop a strong tie as well. This
ten-
dency cannot be observed for weak ties.
If there is a strong tie between A and B and
another between B and C, this says nothing
about A and C.
Social Behavior in Connected Mobile
Disconnect Between Social and Network Perspectives
01-04-2014 26Rute Sofia, rute.sofia@ulusofona.pt,
http://copelabs.ulusofona.pt/~rsofia
Social Behavior in Connected Mobile
Why Should we Integrate Social Metrics ?
• Analyse social behavior (e.g. skype calls, specific area)
• Considers traffic locality
• Place networking nodes accordingly to usefulness
• improve adoption modellng
Connectivity Modeling
• Improve dissemination of information
• Take advantage of any possible contact
• Social interaction as the vehicle for dissemination
Routing
• Improve resource allocation
• Improve user satisfaction
Resource Management
• Estimate movement
• Anticipate movement
• Improve mobility management
• Develop new services
Mobility management and
modeling
01-04-2014 27Rute Sofia, rute.sofia@ulusofona.pt,
http://copelabs.ulusofona.pt/~rsofia
Property/Para
meter
Social networking Analysis definition Networking Measurement
Metrics
Reach the degree of effective dissemination of certain
content or potential spread that a single
profilehas in the network
Rate of nodes reached;
proximity; propagation speed
Engagement the degree of participation and involvement of a
specific profile. A profile in networking can be
seen as e.g. a preferred location; an interest
towards a node/cluster/location.
growth of the followers of
profiles,
time spent in profiles,
number of visits
reciprocity
Link association strength
Influence the degree of attention and mobilization that a
certain profile can generate in other users
•FRINGE algorithm estimates the
impact of node based on direct
and indirect neighborhood
•Klout score
Social Behavior in Connected Mobile
Integrating Social Metrics, Example*
01-04-2014 28Rute Sofia, rute.sofia@ulusofona.pt,
http://copelabs.ulusofona.pt/~rsofia
* R. Sofia, P. Mendes, M. J. Damásio, S. Henriques, F. Giglietto, E. Giambitto and A. Bogliolo,
Moving Towards a Socially-Driven Internet Architectural Design (2012), in: ACM SIGCOMM CCR Newsletter, 42:3. 2012.
29
Connected
Mobile
Environments
1. User-
centric
networking
2. Mobility/
Roaming
Aspects
3. Social
Behavior in
Connected
Mobile
4. Pervasive
sensing
01-04-2014 29Rute Sofia, rute.sofia@ulusofona.pt,
http://copelabs.ulusofona.pt/~rsofia
•Networking architectures must consider
social metrics – QoE and QoS
• Metrics must integrate social (knowledge
value) and technological perspectives
(technological adoption value)
•Where to start: trust, influence/reach
Social Behavior
Wrapping-up
Connected
Mobile
Environments
1. User-
centric
networking
2. Mobility/
Roaming
Aspects
3. Social
Behavior in
Connected
Mobile
4. Pervasive
sensing
Connected
Mobile
Environments
1. User-
centric
networking
2. Mobility/
Roaming
Aspects
3. Social
Behavior in
Connected
Mobile
4. Pervasive
sensing
Pervasive Sensing
Integrating Social Metrics: the How
• Always with the user
• New cars come equipped with GPS, navigation systems, and
lots of sensors
• Residential households with an average of 3 devices
Any portable device with
mobile/wireless capabilities
• Simplified and personalizeable systems
• Positioning
• Middleware that supports any type of sensor
Software defined solutions
• Increase the network on the go (user-centric networking)
• Seamless exchange stronger in trusted circles
Capability to share
connectivity
• Citizens that share routines – familiar strangers
• Exchange grows with trust
Relies on shared interests
01-04-2014 30Rute Sofia, rute.sofia@ulusofona.pt,
http://copelabs.ulusofona.pt/~rsofia
Pervasive Sensing
Paradigms
• Devised for a specific purpose, e.g. health monitoring
• Focused on data capture and collection
• Example: fitness tracker
Personal sensing
• User is actively engaged – provides data or context
• Requires some infrastructure (software and hardware)
• Example: http://urban.cens.ucla.edu/
Participatory sensing
• Increase the network on the go (user-centric networking)
• Seamless exchange stronger in trusted circles
• Pervasive – carried by the citizen
• Depends on shared interests
Mobile-centric sensing
01-04-2014 31Rute Sofia, rute.sofia@ulusofona.pt,
http://copelabs.ulusofona.pt/~rsofia
Pervasive Sensing
A New Platform for Connected Mobile Environments*
PerSense
Pervasive
Sensing
Framework
32
PerSense
Pervasive
Sensing
Framework
GPS
Accelerometer
WiFi
BluetoothCall log
Sensing and Data Capture (SEC) Behavior Inference (BE)
Context Modeling (COM)
Pervasive Data sharing (PERSH)
Opportunistic
Computing
Big Data
Analysis
Pervasive
Sensing Data
Centric
Opportunistic
Networking
Online Social Networks
Post
PerSense
Pervasive
Sensing
Framework
PerSense
Pervasive
Sensing
Framework
* P. Mendes. R. Sofia, PerSense, a Pervasive Sensing Framework. Under submission, 2014
01-04-2014 32Rute Sofia, rute.sofia@ulusofona.pt,
http://copelabs.ulusofona.pt/~rsofia
PerSense
PerSense enabled Access Point
Standard Access Point
2- Bob goes Shopping as usual
PerSense updates roaming data
1- Bob meets Peter
PerSense social info updated
4- Bob’s tries to find Bob
•PerSense predicts that Bob’s at Market
•PerSense estimates arrival time to home
•PerSense is configure to call Authorities if
Bob does not arrive 1 hour after estimated
time
Home
3- Bob goes to the Market
PerSense info stored at Bob’s MOT.
Pervasive Sensing
Example, Intermittently Connected Mobile Environments
01-04-2014 33Rute Sofia, rute.sofia@ulusofona.pt,
http://copelabs.ulusofona.pt/~rsofia
34
Summary
Connected
Mobile
Environments
1. User-
centric
networking
2. Mobility/
Roaming
Aspects
3. Social
Behavior in
Networking
4. Pervasive
sensing
01-04-2014 34Rute Sofia, rute.sofia@ulusofona.pt,
http://copelabs.ulusofona.pt/~rsofia
•Networking architectures must
consider social metrics – QoE
and QoS
• Metrics must integrate social
(knowledge value) and
technological perspectives
(technological adoption value)
•Mobility management requires new
approaches, closer to human
behavior
•Mobility estimation as a
relevant trend to address
•User devices as part of the
network
•Trust as a new QoE metric
– better QoE, fairer QoS
•Essential to provide an
adequate contextual definition
of human roaming behavior
•Self-organizing, and non-
intrusive
3501-04-2014 35Rute Sofia, rute.sofia@ulusofona.pt,
http://copelabs.ulusofona.pt/~rsofia

More Related Content

Similar to The Role of Pervasive Sensing in Connected Mobile Environments

IDP: A Privacy Provisioning Framework for TIP Attributes in Trusted Third Par...
IDP: A Privacy Provisioning Framework for TIP Attributes in Trusted Third Par...IDP: A Privacy Provisioning Framework for TIP Attributes in Trusted Third Par...
IDP: A Privacy Provisioning Framework for TIP Attributes in Trusted Third Par...
Rida Qayyum
 
Privacy preserving location sharing services for social networks(1)
Privacy preserving location sharing services for social networks(1)Privacy preserving location sharing services for social networks(1)
Privacy preserving location sharing services for social networks(1)
Kamal Spring
 
Clientserver Presentation
Clientserver PresentationClientserver Presentation
Clientserver Presentation
Tuhin_Das
 
User-Defined Privacy Grid System for Continuous Location-Based Services
User-Defined Privacy Grid System for Continuous Location-Based ServicesUser-Defined Privacy Grid System for Continuous Location-Based Services
User-Defined Privacy Grid System for Continuous Location-Based Services
1crore projects
 

Similar to The Role of Pervasive Sensing in Connected Mobile Environments (20)

IRJET- Design of Anonymous Publish-Subscribe Messaging System in a P2P Networ...
IRJET- Design of Anonymous Publish-Subscribe Messaging System in a P2P Networ...IRJET- Design of Anonymous Publish-Subscribe Messaging System in a P2P Networ...
IRJET- Design of Anonymous Publish-Subscribe Messaging System in a P2P Networ...
 
Situation Alert and Quality of Service using Collaborative Filtering for Web ...
Situation Alert and Quality of Service using Collaborative Filtering for Web ...Situation Alert and Quality of Service using Collaborative Filtering for Web ...
Situation Alert and Quality of Service using Collaborative Filtering for Web ...
 
IDP: A Privacy Provisioning Framework for TIP Attributes in Trusted Third Par...
IDP: A Privacy Provisioning Framework for TIP Attributes in Trusted Third Par...IDP: A Privacy Provisioning Framework for TIP Attributes in Trusted Third Par...
IDP: A Privacy Provisioning Framework for TIP Attributes in Trusted Third Par...
 
Content Sharing over Smartphone-Based Delay-Tolerant Networks
Content Sharing over Smartphone-Based Delay-Tolerant NetworksContent Sharing over Smartphone-Based Delay-Tolerant Networks
Content Sharing over Smartphone-Based Delay-Tolerant Networks
 
ACN.pptx
ACN.pptxACN.pptx
ACN.pptx
 
How can users' interests be considered to improve content dissemination/retri...
How can users' interests be considered to improve content dissemination/retri...How can users' interests be considered to improve content dissemination/retri...
How can users' interests be considered to improve content dissemination/retri...
 
Privacy preserving location sharing services for social networks(1)
Privacy preserving location sharing services for social networks(1)Privacy preserving location sharing services for social networks(1)
Privacy preserving location sharing services for social networks(1)
 
V2X, V2I, and the Cellular Infrastructure
V2X, V2I, and the Cellular InfrastructureV2X, V2I, and the Cellular Infrastructure
V2X, V2I, and the Cellular Infrastructure
 
Improvements for DMM in SDN and Virtualization-Based Mobile Network Architecture
Improvements for DMM in SDN and Virtualization-Based Mobile Network ArchitectureImprovements for DMM in SDN and Virtualization-Based Mobile Network Architecture
Improvements for DMM in SDN and Virtualization-Based Mobile Network Architecture
 
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREIMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
 
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTUREIMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
IMPROVEMENTS FOR DMM IN SDN AND VIRTUALIZATION-BASED MOBILE NETWORK ARCHITECTURE
 
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
 
Design and development of non server peer 2 peer secure communication using j...
Design and development of non server peer 2 peer secure communication using j...Design and development of non server peer 2 peer secure communication using j...
Design and development of non server peer 2 peer secure communication using j...
 
Mobile Technology
Mobile TechnologyMobile Technology
Mobile Technology
 
Clientserver Presentation
Clientserver PresentationClientserver Presentation
Clientserver Presentation
 
Scalability and Resilience of Multi-Tenant Distributed Clouds in the Big Serv...
Scalability and Resilience of Multi-Tenant Distributed Clouds in the Big Serv...Scalability and Resilience of Multi-Tenant Distributed Clouds in the Big Serv...
Scalability and Resilience of Multi-Tenant Distributed Clouds in the Big Serv...
 
Security Issues of Network Mobility (NEMO) with Tor Architecture
Security Issues of Network Mobility (NEMO) with Tor ArchitectureSecurity Issues of Network Mobility (NEMO) with Tor Architecture
Security Issues of Network Mobility (NEMO) with Tor Architecture
 
Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy En...
Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy En...Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy En...
Cloaking Areas Location Based Services Using Dynamic Grid System & Privacy En...
 
User-Defined Privacy Grid System for Continuous Location-Based Services
User-Defined Privacy Grid System for Continuous Location-Based ServicesUser-Defined Privacy Grid System for Continuous Location-Based Services
User-Defined Privacy Grid System for Continuous Location-Based Services
 
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
USER-DEFINED PRIVACY GRID SYSTEM FOR CONTINUOUS LOCATION-BASED SERVICES - IEE...
 

More from Rute C. Sofia

ULOOP project overview - the second generation of user-centric networking
ULOOP project overview - the second generation of user-centric networkingULOOP project overview - the second generation of user-centric networking
ULOOP project overview - the second generation of user-centric networking
Rute C. Sofia
 

More from Rute C. Sofia (20)

IoT Lab @COPELABS
IoT Lab @COPELABSIoT Lab @COPELABS
IoT Lab @COPELABS
 
Unified Communications in IoT, Evolutionary Aspects and the Role of Informati...
Unified Communications in IoT, Evolutionary Aspects and the Role of Informati...Unified Communications in IoT, Evolutionary Aspects and the Role of Informati...
Unified Communications in IoT, Evolutionary Aspects and the Role of Informati...
 
Piloto IPv6 - FCCN (1999)
Piloto IPv6 - FCCN (1999)Piloto IPv6 - FCCN (1999)
Piloto IPv6 - FCCN (1999)
 
Estudo do Protocolo ISAKMP/OAkley como Norma de Gestão de Chaves da Arquitect...
Estudo do Protocolo ISAKMP/OAkley como Norma de Gestão de Chaves da Arquitect...Estudo do Protocolo ISAKMP/OAkley como Norma de Gestão de Chaves da Arquitect...
Estudo do Protocolo ISAKMP/OAkley como Norma de Gestão de Chaves da Arquitect...
 
SICAP, a Shared-segment Inter-domain Control Aggregation Protocol (portuguese)
SICAP, a Shared-segment Inter-domain Control Aggregation Protocol (portuguese)SICAP, a Shared-segment Inter-domain Control Aggregation Protocol (portuguese)
SICAP, a Shared-segment Inter-domain Control Aggregation Protocol (portuguese)
 
Social Interaction and the Power of Mobility Estimation (2013)
Social Interaction and the Power of Mobility Estimation (2013)Social Interaction and the Power of Mobility Estimation (2013)
Social Interaction and the Power of Mobility Estimation (2013)
 
Global Mobility Management in Multi-access Networks
Global Mobility Management in Multi-access NetworksGlobal Mobility Management in Multi-access Networks
Global Mobility Management in Multi-access Networks
 
Mobility Management: Centralized vs. de-centralized approaches
Mobility Management: Centralized vs. de-centralized approachesMobility Management: Centralized vs. de-centralized approaches
Mobility Management: Centralized vs. de-centralized approaches
 
a SICAP: Shared-Segment based Inter-domain Control Aggregation Protocol.
a SICAP: Shared-Segment based Inter-domain Control Aggregation Protocol.a SICAP: Shared-Segment based Inter-domain Control Aggregation Protocol.
a SICAP: Shared-Segment based Inter-domain Control Aggregation Protocol.
 
ReCoop: Cooperative Wireless Networks, CeBIT 2010
ReCoop: Cooperative Wireless Networks, CeBIT 2010ReCoop: Cooperative Wireless Networks, CeBIT 2010
ReCoop: Cooperative Wireless Networks, CeBIT 2010
 
A Primer on Advanced Ethernet Forwarding
A Primer on Advanced Ethernet ForwardingA Primer on Advanced Ethernet Forwarding
A Primer on Advanced Ethernet Forwarding
 
Advanced in Forwarding and Routing
Advanced in Forwarding and RoutingAdvanced in Forwarding and Routing
Advanced in Forwarding and Routing
 
Future Internet Networking Architectures, New Paradigms
Future Internet Networking Architectures, New ParadigmsFuture Internet Networking Architectures, New Paradigms
Future Internet Networking Architectures, New Paradigms
 
COPELABS, an overview to ULHT Students
COPELABS, an overview to ULHT StudentsCOPELABS, an overview to ULHT Students
COPELABS, an overview to ULHT Students
 
Trust Management: Requirement in user-centric networking?
Trust Management: Requirement in user-centric networking?Trust Management: Requirement in user-centric networking?
Trust Management: Requirement in user-centric networking?
 
Social Sustainability Enabler: a Usage Scenario for E-inclusion
Social Sustainability Enabler: a Usage Scenario for E-inclusionSocial Sustainability Enabler: a Usage Scenario for E-inclusion
Social Sustainability Enabler: a Usage Scenario for E-inclusion
 
ULOOP project overview - the second generation of user-centric networking
ULOOP project overview - the second generation of user-centric networkingULOOP project overview - the second generation of user-centric networking
ULOOP project overview - the second generation of user-centric networking
 
ULOOP Second industrial workshop overview
ULOOP Second industrial workshop overviewULOOP Second industrial workshop overview
ULOOP Second industrial workshop overview
 
ULOOP standardization
ULOOP standardizationULOOP standardization
ULOOP standardization
 
User in control: the ULOOP approach
User in control: the ULOOP approachUser in control: the ULOOP approach
User in control: the ULOOP approach
 

Recently uploaded

CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service OnlineCALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
anilsa9823
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
shivangimorya083
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
sexy call girls service in goa
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
Diya Sharma
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Sheetaleventcompany
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
ellan12
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 

Recently uploaded (20)

CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service OnlineCALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Sarai Rohilla Escort Service Delhi N.C.R.
 

The Role of Pervasive Sensing in Connected Mobile Environments

  • 1. Rute Sofia Rute.sofia@ulusofona.pt/rsofia@gmail.com Technical University of Munich 2014.04.01 The Relevancy of Pervasive Sensing In Connected Mobile Environments
  • 2. 2 Overview Connected Mobile Environments 1. User-centric networking 2. Mobility/ Roaming Aspects 3. Social Behavior in Connected Mobile 4. Pervasive sensing 01-04-2014 2Rute Sofia, rute.sofia@ulusofona.pt, http://copelabs.ulusofona.pt/~rsofia
  • 3. Connected Mobile Environments Some Food for Thought • Connected Mobile Environments are about People • Citizen integration into the system • Services personalization on-the-go (learn with an adaptive user profile – roaming/commuter behavior) • Connected Mobile Environments require looking into new paradigms • User-centric networking • Integration of social notions into the OSI stack • Mobility Modeling is essential to ensure Internet user/customer satisfaction • Roaming prediction assists the most varied areas : residential services; intelligent transportation systems; smart environments • Better QoE – more customers • Connected Mobile Environments require knowledge acquired on-the-fly • Participatory sensing requires too much user involvement • Pervasive sensing is the key to generate new services Connected Mobile Environments 1. User-centric networking 2. Mobility/ Roaming Aspects 3. Social Behavior in Connected Mobile 4. Pervasive sensing 01-04-2014 3Rute Sofia, rute.sofia@ulusofona.pt, http://copelabs.ulusofona.pt/~rsofia
  • 4. 4 Connected Mobile Environments 1. User- centric networking 2. Mobility/ Roaming Aspects 3. Social Behavior in Connected Mobile 4. Pervasive sensing 01-04-2014 4Rute Sofia, rute.sofia@ulusofona.pt, http://copelabs.ulusofona.pt/~rsofia
  • 5.  Shared access  Why: broader roaming  Neglected cooperation potential  Density implies bad resource management  Neglected available spectrum  Spectrum overlaps  Architectures follow the Internet end-to-end principle  Clear splitting between network and end-user devices  Mobility is limited  Roaming with specific areas; static, centralized models Private User-centric Networking User as Prosumer, Networking Aspects User-centric networking 01-04-2014 5Rute Sofia, rute.sofia@ulusofona.pt, http://copelabs.ulusofona.pt/~rsofia
  • 6. End-user devices Direct sharing Shared connectivity Micro-provider device User-centric relaying Virtual node aggregated relaying Multi-hop relaying Direct aggregated relaying MiFi, Whisher Internet access point Devices sharing connectivity User-centric Networking People-centric Architectures in Connected Environments* *R. Sofia, P. Mendes, User-provided networks, Consumer as Provider. IEEE Communications Magazine, vol. 46, pp86-91, 2008. FON, ZON 01-04-2014 6Rute Sofia, rute.sofia@ulusofona.pt, http://copelabs.ulusofona.pt/~rsofia
  • 7. User-centric Networking Relevant Aspects in Connected Mobile Environments Trust Management • Dynamically built • Mimics human trust Advanced Routing • Based on user’s interests • Opportunistic Advanced Resource Management • Take advantage of overlap and interference Mobility Prediction • Improve QoE • Assist network operation User-centricity ??? Destination: Mall Getting off at next bus stop 01-04-2014 7Rute Sofia, rute.sofia@ulusofona.pt, http://copelabs.ulusofona.pt/~rsofia
  • 8. User-centric Networking Circles of Trust in Connected Mobile Environments Trust in Networking Node Wireless device that belongs to 1 individual (owner)  Only the owner is responsible, for the case of shared devices An individual may own different nodes Trust association Unidirectional association between two nodes Related to nodes’ interests and social networking perception Has a specific trust level or trust weight Trust weight is based on QoE, previous history, etc. Two nodes may hold more than one trust association (due to QoE or type of traffic) Trust Propagation Based on direct and indirect recommendations Passively overhead (e.g. via wireless beacons) Based on dispositional trust adjusting over time 01-04-2014 8Rute Sofia, rute.sofia@ulusofona.pt, http://copelabs.ulusofona.pt/~rsofia
  • 9. User-centric Networking Circles of Trust in Connected Mobile Environments, Example* •Community 1 is already active •ULOOP “Gateway” (equipment providing the shared Internet access) in red •Maria in Blue, Tom in green •In Community 1, Maria holds a trust level e.g. 4 Maria’s community 1 trust level: 4 Tom - new user in Community 1 – Maria provides Internet access, basic services Tom gets the quarantine level – trust association cost from Tom to Maria = 2 01-04-2014 9Rute Sofia, rute.sofia@ulusofona.pt, http://copelabs.ulusofona.pt/~rsofia *EU FP7 ULOOP – User-centric Wireless Local Loop http://uloop.eu/
  • 10. User-centric Networking Computing Trust in Connected Environments, the ULOOP suite* •https://play.google.com/store/apps/details?id=eu.uloop.t31.android •EU FP7 ULOOP, http://uloop.eu 1. Id creation – one time, one user, multiple devices • Crypto-id generation (SHA-256(Public Key) of a KeyPair) • Validation – any Id validator • 1 crypto-id, multiple node-ids: Crypto-id || encrypted MAC 2. Trust Setup (one time, one user) • Dispositional trust - the way I trust thirds/the world • Affects trust computation • Trust table <crypto-id, trust level, ageing> • Wallet – initial set of credits Bank (Monetization) Id Validator (One time) 3. Trust negotiation and management • During the MAC authentication phase • Negotiates trust – uses tokens and credits • Example: Token tk(i,j) = tl(i,j)*sqrt(c), tl in [0,1]; c in [0,inf] 4. Rewards and Cooperation • Cooperation manager mediates negotiation • Triggers request for rewards • Reward manager handles payments (monetization) • Payments are secured with RSA 01-04-2014 10Rute Sofia, rute.sofia@ulusofona.pt, http://copelabs.ulusofona.pt/~rsofia
  • 11. User-centric Networking Trust as a metric to provide QoS/QoE* 01-04-2014 11Rute Sofia, rute.sofia@ulusofona.pt, http://copelabs.ulusofona.pt/~rsofia Hostapd STA Auth Response CAC Request Queue Request with the highest priority. Resource Manager 0: OK 32: Not OK Request priority p(i,j)=Tokens(i,j)*Tl(j,i) j: gateway i: node requesting service Tl: trust level *R. Sofia, L. Lopes, Trust as a Fariness Parameter for Quality of Experience, Book Chapter contribution, Wireless Networks, Springer LCNS User-centric Networking - Future Perspectives, 2014.
  • 12. MAC 1 MAC 2 Internet mac80211- TX ST A1 ST A2 24 Mbps 18 Mbps ACK AC K Throughput of high rate station is impaired by the low rate station. 01-04-2014 12Rute Sofia, rute.sofia@ulusofona.pt, http://copelabs.ulusofona.pt/~rsofia User-centric Networking Making the MAC Layer Fairer, Dynamic Frequency Sharing*
  • 13. MAC 1 MAC 2 Internet ST A1 ST A2 Throughput of the high rate station is not impaired by the low rate station. The low rate station maintains the same throughput with only the addition of a small processing time for the superframe. User-centric Networking Making the MAC Layer Fairer, Dynamic Frequency Sharing* *L. Lopes, R. Sofia, H. Haci, H. Zhu, A Proposal for Dynamic Spectrum Sharing in Wireless Networks, under submission, 2014. H. Osman, H. Zhu, H. Haci, L. Lopes, R. Sofia. “Method and Apparatus for communication in a wireless network” (EP 13191667.8), August 2013 01-04-2014 13Rute Sofia, rute.sofia@ulusofona.pt, http://copelabs.ulusofona.pt/~rsofia
  • 14. 01-04-2014 Rute Sofia, rute.sofia@ulusofona.pt, http://copelabs.ulusofona.pt/~rsofia 14 Avg Throughput Difference between the two stations (%) Our proposal IEEE802.11g Scenario I 3.59 82.32 Scenario II, LoS, UDP 27.04 27.04 68.11 Scenario II, LoS, TCP 16.65 16.65 44.44 Scenario II, nLoS, UDP 81.02 48.57 Scenario II, nLoS, TCP 41.97 82.95 User-centric Networking Trust as a metric to provide QoS/QoE* *R. Sofia, L. Lopes, Trust as a Fariness Parameter for Quality of Experience in Wireless Networks, Book Chapter contribution References pringer LCNS User-centric Networking - Future Perspectives, 2014.
  • 15. 15 Connected Mobile Environments 1. User- centric networking 2. Mobility/ Roaming Aspects 3. Social Behavior in Connected Mobile 4. Pervasive sensing 01-04-2014 15Rute Sofia, rute.sofia@ulusofona.pt, http://copelabs.ulusofona.pt/~rsofia User IS part of the network Trust as a new QoE metric – better QoE, fairer QoS User-centric Networking Wrapping-up Connected Mobile Environments 1. User- centric networking 2. Mobility/ Roaming Aspects 3. Social Behavior in Connected Mobile 4. Pervasive sensing
  • 16. Internet Home Coffee MN Mobility anchorpoint Identifier @Home Identifier @Visited Network Remarks End-user device has an identifier for each place Can be the same, e.g., 3GPP For the network, identifier is the same Always the one used when starting the communication Endpoint identifier: never changes Visited network identifier is a “location marker” Mobility anchorpoint Tracks mapping between identifiers, as well as active identifiers Transport (OSI L4) Network (OSI L3) Data/Link (OSI L2,L1) Application (OSI L5-L7) SIP/IMS M-SCTP HIP Mobile IP Layer 2 Mobility (micro-mobility) 3GPP/4G/5G Wi-FiWiMAX 802.21 Mobility Aspects Today’s Mobility Management Solutions 01-04-2014 16Rute Sofia, rute.sofia@ulusofona.pt, http://copelabs.ulusofona.pt/~rsofia
  • 17. Mobility Aspects Distributed Mobility Management, an Example Distributed Mobility Management IETF DMM Working Group Envisions distribution via replication, or splitting Our view: splitting and placing some functionality closer to the user Today’s centralized approaches Control Plane Mobile node registration in a central mobility anchor point (MAP) Secure exchange for binding Data Plane VO User B Sessions always on Access Provider 1 Access Node Access Provider 2 Access Node Residential Gateway User A Mobility ControlPlane Residential Gateway Control / Data Plane AAA Mobility Anchorpoint 01-04-2014 17Rute Sofia, rute.sofia@ulusofona.pt, http://copelabs.ulusofona.pt/~rsofia
  • 18. Mobility Aspects The True Challenges in Connected Mobile Efficient selection of anchor points Based on user satisfaction degree Based on network policies Flexible mobility architectures Distributed mobility management Better for flater networks Better for variable topologies A new meaning to “anywhere, anytime” Ways to estimate WHEN is session continuity required (mobility estimation) and WHICH services are required Use any opportunity to transmit on user’s interests 01-04-2014 18Rute Sofia, rute.sofia@ulusofona.pt, http://copelabs.ulusofona.pt/~rsofia
  • 19. Mobility Aspects The Rise of Mobility Modeling Modeling and realistic operation – aren’t these two distinct fields Optimal routing, incorporate sensitivity to movement Simplified network operation, predict future movement aspects Optimized mobility management– introduce estimation Better connectivity models – place better mobility functionality Why not just use ANY available model ? Modeling impacts severely network operation Social mobility modeling captures some realistic human movement features Why do we need mobility models anyway? In connected mobile, nodes move freely – based on human behavior and routines Node movement patterns and relative location (node to group) is relevant to ensure a good communication 01-04-2014 19Rute Sofia, rute.sofia@ulusofona.pt, http://copelabs.ulusofona.pt/~rsofia
  • 20. Mobility Aspects The Rise of SOCIAL Mobility Modeling • Intel Lablet, Cambridge UK • Distribution of bluetooth devices to people in different settings (Cambridge, Infocom 2005, Tokyo) • Wireless Topology Discovery Project (UCSD) • Darthmouth CRAWDAD Traces • Up to now, most popular, but started around 2000 • Hard to assess applicability to reality • E.g., end-user portable devices move with humans, not randomly • Traces corroborate gaps in applicability to reality Synthetic • Attempts to model human roaming behavior/movement • Often based on the notion of social attractiveness • Still present several gaps: obstacle collision; pause time modeling; community detection Social Mobility Modeling 01-04-2014 20Rute Sofia, rute.sofia@ulusofona.pt, http://copelabs.ulusofona.pt/~rsofia
  • 21. Mobility Aspects Social Behavior Modeling 01-04-2014 21Rute Sofia, rute.sofia@ulusofona.pt, http://copelabs.ulusofona.pt/~rsofia
  • 22. Mobility Aspects An example for roaming estimation* • Passively captures networking context data that characterizes visits to networks over time Tracking • Based on learnt behavior, infers time left to handover and potential handover targets Predicts * R. Sofia (COPELABS), EP 13186562.9, 08.2013 – patent pending. • Roaming patterns share affinity with human routines • Tracking such routine allows prediction Motivation • Improve handovers – reduce signaling • Quality of Service/Better resource management • Better selection of mobility anchor points Benefits 01-04-2014 22Rute Sofia, rute.sofia@ulusofona.pt, http://copelabs.ulusofona.pt/~rsofia
  • 23. Mobility Aspects An example for roaming estimation* Visited network 1, rank 0.8 Visited network 2, rank 0.3 Visited network 3, rank 0.9 Today MTracker  User equipment application that passively ranks visited Wi-Fi networks over time, by collecting a few parameter  Number of visits  Average visit time in seconds  Information concerning the visited network e.g. BSSID and SSID  Attractiveness of the network to the user: trust level the user has on that ULOOP gateway  Rank is periodically updated based on the collected parameters  Mtracker estimates a potential move  Selects best network based on rank  Consideres average visit time as the indicator that a move can occur 01-04-2014 23Rute Sofia, rute.sofia@ulusofona.pt, http://copelabs.ulusofona.pt/~rsofia *http://www.youtube.com/watch?v=yzGJyDlamRU
  • 24. 24 Connected Mobile Environments 1. User- centric networking 2. Mobility/ Roaming Aspects 3. Social Behavior in Networking 4. Pervasive sensing 01-04-2014 24Rute Sofia, rute.sofia@ulusofona.pt, http://copelabs.ulusofona.pt/~rsofia •User-centricity: new paradigms in mobile •Mobility management requires new approaches, closer to human behavior •Mobility estimation – a relevant trend Mobility Aspects Wrapping-up Connected Mobile Environments 1. User- centric networking 2. Mobility/ Roaming Aspects 3. Social Behavior in Connected Mobile 4. Pervasive sensing
  • 25. Future Connected Environments, Social behavior integration Movement patterns QoE based on social principles (e.g. trust, influence) Internet value-chain (wholesale models) Flow from providers to citizens still Value-chain is not assymetric Citizen as prosumer Citizen shares the network Citizen provides content Citizen personalizes services in real-time The end-to-end principle still rules The network is dumb The edges have the intelligence Edges as of today: user-centric networks The Internet as Social Media Citizens control/carry networking nodes Citizens exchange data, shared interests Social Behavior in Connected Mobile Integrating Social Metrics – closer to Human Behavior 01-04-2014 25Rute Sofia, rute.sofia@ulusofona.pt, http://copelabs.ulusofona.pt/~rsofia
  • 26. Property/Parameter Social Capital Perspective Networking Perspective Centrality: determine the relative importance of a vertex within the graph The influence of a person on the social structure The impact a node has on the graph. Importance here relates to information dissemination. Degree centrality: Nodes that have more ties to other nodes have a higher degree centrality. Considers that such nodes are better positioned (influence, information dissemination). Alone, says little about node influence. Together with the degree centrality of neighbors, provides a better measure Nodes that have more ties to other nodes have a higher degree centrality. These are not necessarily better positioned. Betweeness centrality: nodes that have a high probability to occur on a randomly chosen shortest path between two randomly chosen nodes have a high betweenness. Assists in finding “bridgers”: these are nodes that limit clusters (interconnect different clusters). Links that are more central assist nodes in better dissemination information, assuming a plain connectivity model. Closeness centrality: Sum of its (shortest-path) distances to any other node y normalized by the maximum shortest-path length. High closeness centrality implies better information propagation. A node that has a higher number of shortest- paths to all other nodes has a higher closeness centrality. It also has a higher probability of becoming a bottleneck Link Strength: The strength of a tie depends on the amount of time spent on it and the emotional intensity and intimacy of the relation If there is a strong tie between A and B as well as between B and C, A and C are likely to develop a strong tie as well. This ten- dency cannot be observed for weak ties. If there is a strong tie between A and B and another between B and C, this says nothing about A and C. Social Behavior in Connected Mobile Disconnect Between Social and Network Perspectives 01-04-2014 26Rute Sofia, rute.sofia@ulusofona.pt, http://copelabs.ulusofona.pt/~rsofia
  • 27. Social Behavior in Connected Mobile Why Should we Integrate Social Metrics ? • Analyse social behavior (e.g. skype calls, specific area) • Considers traffic locality • Place networking nodes accordingly to usefulness • improve adoption modellng Connectivity Modeling • Improve dissemination of information • Take advantage of any possible contact • Social interaction as the vehicle for dissemination Routing • Improve resource allocation • Improve user satisfaction Resource Management • Estimate movement • Anticipate movement • Improve mobility management • Develop new services Mobility management and modeling 01-04-2014 27Rute Sofia, rute.sofia@ulusofona.pt, http://copelabs.ulusofona.pt/~rsofia
  • 28. Property/Para meter Social networking Analysis definition Networking Measurement Metrics Reach the degree of effective dissemination of certain content or potential spread that a single profilehas in the network Rate of nodes reached; proximity; propagation speed Engagement the degree of participation and involvement of a specific profile. A profile in networking can be seen as e.g. a preferred location; an interest towards a node/cluster/location. growth of the followers of profiles, time spent in profiles, number of visits reciprocity Link association strength Influence the degree of attention and mobilization that a certain profile can generate in other users •FRINGE algorithm estimates the impact of node based on direct and indirect neighborhood •Klout score Social Behavior in Connected Mobile Integrating Social Metrics, Example* 01-04-2014 28Rute Sofia, rute.sofia@ulusofona.pt, http://copelabs.ulusofona.pt/~rsofia * R. Sofia, P. Mendes, M. J. Damásio, S. Henriques, F. Giglietto, E. Giambitto and A. Bogliolo, Moving Towards a Socially-Driven Internet Architectural Design (2012), in: ACM SIGCOMM CCR Newsletter, 42:3. 2012.
  • 29. 29 Connected Mobile Environments 1. User- centric networking 2. Mobility/ Roaming Aspects 3. Social Behavior in Connected Mobile 4. Pervasive sensing 01-04-2014 29Rute Sofia, rute.sofia@ulusofona.pt, http://copelabs.ulusofona.pt/~rsofia •Networking architectures must consider social metrics – QoE and QoS • Metrics must integrate social (knowledge value) and technological perspectives (technological adoption value) •Where to start: trust, influence/reach Social Behavior Wrapping-up Connected Mobile Environments 1. User- centric networking 2. Mobility/ Roaming Aspects 3. Social Behavior in Connected Mobile 4. Pervasive sensing Connected Mobile Environments 1. User- centric networking 2. Mobility/ Roaming Aspects 3. Social Behavior in Connected Mobile 4. Pervasive sensing
  • 30. Pervasive Sensing Integrating Social Metrics: the How • Always with the user • New cars come equipped with GPS, navigation systems, and lots of sensors • Residential households with an average of 3 devices Any portable device with mobile/wireless capabilities • Simplified and personalizeable systems • Positioning • Middleware that supports any type of sensor Software defined solutions • Increase the network on the go (user-centric networking) • Seamless exchange stronger in trusted circles Capability to share connectivity • Citizens that share routines – familiar strangers • Exchange grows with trust Relies on shared interests 01-04-2014 30Rute Sofia, rute.sofia@ulusofona.pt, http://copelabs.ulusofona.pt/~rsofia
  • 31. Pervasive Sensing Paradigms • Devised for a specific purpose, e.g. health monitoring • Focused on data capture and collection • Example: fitness tracker Personal sensing • User is actively engaged – provides data or context • Requires some infrastructure (software and hardware) • Example: http://urban.cens.ucla.edu/ Participatory sensing • Increase the network on the go (user-centric networking) • Seamless exchange stronger in trusted circles • Pervasive – carried by the citizen • Depends on shared interests Mobile-centric sensing 01-04-2014 31Rute Sofia, rute.sofia@ulusofona.pt, http://copelabs.ulusofona.pt/~rsofia
  • 32. Pervasive Sensing A New Platform for Connected Mobile Environments* PerSense Pervasive Sensing Framework 32 PerSense Pervasive Sensing Framework GPS Accelerometer WiFi BluetoothCall log Sensing and Data Capture (SEC) Behavior Inference (BE) Context Modeling (COM) Pervasive Data sharing (PERSH) Opportunistic Computing Big Data Analysis Pervasive Sensing Data Centric Opportunistic Networking Online Social Networks Post PerSense Pervasive Sensing Framework PerSense Pervasive Sensing Framework * P. Mendes. R. Sofia, PerSense, a Pervasive Sensing Framework. Under submission, 2014 01-04-2014 32Rute Sofia, rute.sofia@ulusofona.pt, http://copelabs.ulusofona.pt/~rsofia
  • 33. PerSense PerSense enabled Access Point Standard Access Point 2- Bob goes Shopping as usual PerSense updates roaming data 1- Bob meets Peter PerSense social info updated 4- Bob’s tries to find Bob •PerSense predicts that Bob’s at Market •PerSense estimates arrival time to home •PerSense is configure to call Authorities if Bob does not arrive 1 hour after estimated time Home 3- Bob goes to the Market PerSense info stored at Bob’s MOT. Pervasive Sensing Example, Intermittently Connected Mobile Environments 01-04-2014 33Rute Sofia, rute.sofia@ulusofona.pt, http://copelabs.ulusofona.pt/~rsofia
  • 34. 34 Summary Connected Mobile Environments 1. User- centric networking 2. Mobility/ Roaming Aspects 3. Social Behavior in Networking 4. Pervasive sensing 01-04-2014 34Rute Sofia, rute.sofia@ulusofona.pt, http://copelabs.ulusofona.pt/~rsofia •Networking architectures must consider social metrics – QoE and QoS • Metrics must integrate social (knowledge value) and technological perspectives (technological adoption value) •Mobility management requires new approaches, closer to human behavior •Mobility estimation as a relevant trend to address •User devices as part of the network •Trust as a new QoE metric – better QoE, fairer QoS •Essential to provide an adequate contextual definition of human roaming behavior •Self-organizing, and non- intrusive
  • 35. 3501-04-2014 35Rute Sofia, rute.sofia@ulusofona.pt, http://copelabs.ulusofona.pt/~rsofia