Professional Documents
Culture Documents
VOL. 25,
NO. 12,
DECEMBER 2014
INTRODUCTION
The authors are with the School of Electrical and Information Engineering,
University of Sydney, NSW 2006, Australia.
E-mail: {ns.ahmed, abbas.jamalipour}@sydney.edu.au.
helpful to discover and access the everyday comfort services in the case of a longer communication disruption
caused by an extreme emergency [6].
Often, users in MANETs are required to implement a
selection strategy since a single service can be offered by
multiple providers especially in service rich urban terrains.
Yet, the commonly used service selection methods for
MANETs [7], [8], [9] fail to distinguish between safetyrelated and comfort services. Moreover, it can be understood that users service expectations are different for each
of these classes. This is due to the fact that contexts, while a
service is requested, play a key role in determining users
expectations [10], [11]. For instance, in reality, users have
been observed to expect safety-related services to be highly
delay-sensitive in nature and thus expect to access them
from one of the most reliable service providers. On the other
hand, the same users are usually observed not to have the
delay-sensitive requirements for comfort services provided
that they can access these services from one of the most popular service providers comparing preceding service consumers opinions published through social networking,
micro-blogging sites etc. [12], [13], [14].
On the other hand, the current mobile devices such as
mobile phones, tablet and laptops are sensor-enabled,
equipped with built-in global positioning system (GPS) and
closely carried by their human users. As a result, these devices are capable of capturing users context information
including users location, velocity, body temperature and
surrounding ambiance. Additionally, these devices can also
monitor and collect other users context information using
their machine-to-machine (M2M) connectivity, e.g., Wi-Fi
connectivity, with those users mobile devices. These context information can be used to classify the requested service and to tailor a service selection strategy specifically for
that class reflecting the users service expectations. Consequently, this work proposes a context-aware M2M-based
1045-9219 2014 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
SUROBHI AND JAMALIPOUR: A CONTEXT-AWARE M2M-BASED MIDDLEWARE FOR SERVICE SELECTION IN MOBILE AD-HOC NETWORKS
RELATED WORK
3057
3058
VOL. 25,
NO. 12,
DECEMBER 2014
PRELIMINARIES
SUROBHI AND JAMALIPOUR: A CONTEXT-AWARE M2M-BASED MIDDLEWARE FOR SERVICE SELECTION IN MOBILE AD-HOC NETWORKS
A flow chart of the proposed context-aware M2M-based service selection middleware is presented in Fig. 2 which
explains that a middleware, operating on a users mobile
device, initiates its functions upon receiving a service request
from the user. The service requested is classified using users
physical contexts that represent the network environments,
i.e., the emergency environment is detected from users
velocity which significantly increases during an emergency
for faster evacuation. Hence, from the velocity information,
collected through the Wi-Fi-based M2M connectivity and the
integrated GPS of mobile devices, the requested service is
classified to be either a safety-related or comfort service.
Now, for either class, a MANET is initiated using the computing contexts, i.e., when the dedicated server (or a replica)
is unreachable, the middleware initiates an alternative network connection for discovering the service. The middleware then tailors individual selection methods incorporating
user-related contexts, also referred to as the users service
expectations, for the detected class of services. Such user
expectations for individual service classes are considered to
be pre-defined by the users within the middleware. Details
of accessing the safety-related and comfort services are
described in Sections 4.1 and 4.2 respectively.
3059
the locally cached lookup table, it conducts a service discovery phase. This phase is conducted by modifying the
cross-layer service discovery method presented in [18] in
which service is discovered by piggybacking a service
request, SREQ, with the route request, RREQ, of the AODV
routing [28]. The service reply, SREP, from a provider is
then piggybacked with the route reply, RREP, of the
AODV routing. Generally, this routing technique returns
the hop counts between the user and discovered providers,
H1 ; H2 ; . . . ; HK and providers addresses P1 ; P2 ; . . . ; PK for
k 1; 2; . . . ; K providers.
We further modify the aforementioned routing as follows: each providers capacity information C1 ; C2 ; . . . ; CK is
requested with the SREQ which is piggybacked with the
SREP. Besides, each intermediate node is requested with the
RREQ to piggyback their remaining energy E1 ; E2 ; . . . ; EM
and mobility information, i.e., velocity and movement angle
for m 1; 2; . . . ; M intermediate nodes with the RREP. By
using such modifications, a simultaneous routing and service discovery with the intended information for safetyrelated service selection is performed by flooding fewer
messages in the MANET.
The mobility information is readily used to find the link
expiry time, LET, of links present between the user and the
service providers. The LET indicates the duration of time a
user may remain connected with another user (or a provider) before they become disconnected due to mobility
[29]. Now, for two users i and j with location: x1 ; y1 and
x2 ; y2 , velocity: V1 and V2 and phase angle: u1 and u2
respectively, the LET can be calculated as in Eq. 1. Then,
for l links, where l 1; 2; . . . ; L, presented along the route
between the service requesting user, i, and a provider, K,
the link with the shortest LET defines the route expiry time,
RET, as presented in Eq. 2. The RET provides an estimation of the maximum time duration a route would remain
active between the user and the provider [29]. Finally, for
each discovered provider, hop counts, providers capacity,
intermediate users remaining energy and the RET of each
route are stored in the lookup table.
q
pq rs p2 r2 R2 pr qs2
;
LETij
p2 r2
(1)
where p V1 cos u1 V2 cos u2
r V1 sin u1 V2 sin u2 ; q x1 x2 ; s y1 y2
RETi;K minLET l :
(2)
3060
VOL. 25,
NO. 12,
DECEMBER 2014
(3)
JRET maxRETi;k
(4)
Fig. 3. Flowchart of proposed opinion quantification.
s:t:
Ck Cmax ; Em Emin :
(5)
opinion query only to 3-hop neighbors. Hence, the middleware sends an opinion query, QO OREQ; S; Pk and the
neighbors send the opinion reply (if they have an opinion)
as RO OREPk ; S; Pk where OREQ is the opinion request
for a desired service S from the provider Pk and OREPk are
the number of opinions obtained for the provider. These
opinions are also stored in the lookup table. However, to be
used as the selection criterion, these opinions are required
to be quantified first.
SUROBHI AND JAMALIPOUR: A CONTEXT-AWARE M2M-BASED MIDDLEWARE FOR SERVICE SELECTION IN MOBILE AD-HOC NETWORKS
(6)
3061
3062
VOL. 25,
NO. 12,
DECEMBER 2014
Then, in Fig. 4b, we compare the comfort service selection method with the MHCC method. The proposed method
has a higher success rate than the MHC method because
hop information is only one of the selection criterion.
Besides, the number of collected opinions about providers
of a particular service can be different for two neighboring
users which may result in different ranking of the same providers for those users. This, in turn, further reduces traffic
congestion resulting in a higher success rate. Note that the
transmission range has an effect on the success rate of the
comfort service selection and the MHCC methods similar to
the safety-related service selection and the MHCE methods
for reasons as explained earlier.
Next, we observe from Figs. 5a and 5b respectively that
the safety-related and comfort service selection method, in
general, has a lower response time with fewer users present
in the network. It can be understood that with fewer users
in the network, the amount of collected information is
smaller, i.e., velocity information to compute RET for the
safety-related service selection method and the number of
service-related opinions for the comfort service selection
method. Therefore, shorter time is required to process them
for analyzing the respective selection criteria and ranking
the providers before sending a SRREQ. Conversely, the
amount of collected information increases with an
increased number of users in the network which in turn
increases the time needed for the selection process. Subsequently, a rise in the response time is observed for both of
the proposed method.
To elaborate, we also observe from Fig. 5a that the
MHCE method has a shorter response time for fewer
number of users since the amount of information needs to
be analyzed for service selection is small. Now, with
fewer discovered providers, due to fewer users in the network, the proposed method may not find routes with
high enough RET and thus be required to send SRREQ to
more than one provider before being successful to receive
an SRREP. Hence, it has a response time similar or slightly
higher than the MHCE method for fewer users in the network. By contrast, as the number of users increases, introducing more discovered providers and routes to them, the
probability of obtaining many stable routes to a provider
becomes higher. Hence, the proposed method results in a
SUROBHI AND JAMALIPOUR: A CONTEXT-AWARE M2M-BASED MIDDLEWARE FOR SERVICE SELECTION IN MOBILE AD-HOC NETWORKS
3063
TABLE 1
User Satisfaction Rate at Different Transmission Ranges
3064
comfort services in the post-emergency networks. Therefore, in the future, security and trust issues during the
opinion collection can also be considered to evaluate the
network performances.
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
G. Paravati, C. Celozzi, A. Sanna, and F. Lamberti, A FeedbackBased Control Technique for Interactive Live Streaming Systems
to Mobile Devices, IEEE Trans. Consumer Electronics, vol. 56,
no. 1, pp. 190-197, Feb. 2010.
A.J. Mashhadi, S.B. Mokhtar, and L. Capra, Habit: Leveraging
Human Mobility and Social Network for Efficient Content Dissemination in Delay Tolerant Networks, Proc. IEEE Intl Symp. A
World of Wireless, Mobile and Multimedia Networks and Workshops
(WoWMoM 09), pp. 1-6, 2009.
J.C. Oberg, A.G. Whitt, and R.M. Mills, Disasters Will HappenAre You Ready? IEEE Comm. Magazine, vol. 49, no. 1, pp. 36-42,
Jan. 2011.
L. Baochun and K.H. Wang, NonStop: Continuous Multimedia
Streaming in Wireless Ad Hoc Networks with Node Mobility,
IEEE J. Selected Areas in Comm., vol. 21, no. 10, pp. 1627-1641, Dec.
2003.
A.N. Mian, R. Baldoni, and R. Beraldi, A Survey of Service Discovery Protocols in Multihop Mobile Ad Hoc Networks, IEEE
Pervasive Computing, vol. 8, no. 1, pp. 66-74, Jan.-Mar. 2009.
C.N. Ververidis and G.C. Polyzos, Service Discovery for Mobile
Ad Hoc Networks: A Survey of Issues and Techniques, IEEE
Comm. Surveys & Tutorials, vol. 10, no. 3, pp. 30-45, Third Quarter
2008.
C. Frank and H. Karl, Consistency Challenges of Service Discovery in Mobile Ad Hoc Networks, Proc. ACM Intl Symp.
Modeling, Analysis and Simulation of Wireless and Mobile Systems
(MSWiM 04), pp. 105-114, 2004.
A. Varshavsky, B. Reid, and E. De Lara, A Cross-Layer Approach
to Service Discovery and Selection in MANETs, Proc. IEEE Intl
Conf. Mobile Ad Hoc and Sensor Systems Conf. (MASS 05), pp. 466474, 2005.
S.E. Athanaileas, C.N. Ververidis, and G.C. Polyzos, Optimized
Service Selection for MANETs Using an AODV-Based Service Discovery Protocol, Proc. Ann. Mediterranean Ad Hoc Networking
Workshop (MEDHOCNET 07), 2007.
S.S. Yau and F. Karim, An Energy-Efficient Object Discovery Protocol for Context-Sensitive Middleware for Ubiquitous
Computing, IEEE Trans. Parallel and Distributed Systems, vol. 14,
no. 11, pp. 1074-1085, Nov. 2003.
V.C. Trinh and A.J. Gonzalez, Discovering Contexts from
Observed Human Performance, IEEE Trans. Human-Machine Systems, vol. 43, no. 4, pp. 359-370, July 2013.
E. Cambria, B. Schuller, Y. Xia, and C. Havasi, New Avenues in
Opinion Mining and Sentiment Analysis, IEEE Intelligent Systems, vol. 28, no. 2, pp. 15-21, Mar./Apr. 2013.
H.K. Kim, J.K. Kim, and Y.U. Ryu, Personalized Recommendation over a Customer Network for Ubiquitous Shopping, IEEE
Trans. Services Computing, vol. 2, no. 2, pp. 140-151, Apr./June
2009.
X. Yang, Y. Guo, and Y. Liu, Bayesian-Inference-Based Recommendation in Online Social Networks, IEEE Trans. Parallel and
Distributed Systems, vol. 24, no. 4, pp. 642-651, Apr. 2013.
G. Wu, S. Talwar, K. Johnsson, N. Himayat, and K.D. Johnson,
M2M: From Mobile to Embedded Internet, IEEE Comm. Magazine, vol. 49, no. 4, pp. 36-43, Apr. 2011.
N.A. Surobhi and A. Jamalipour, Opinion Based Service Selection in a Pervasive Cooperative Consumer Network, Proc. IEEE
Wireless Comm. and Networking Conf. (WCNC 12), pp. 3318-3322,
2012.
V. Lenders, M. May, and B. Plattner, Service Discovery in Mobile
Ad Hoc Networks: A Field Theoretic Approach, J. Pervasive and
Mobile Computing, vol. 1, no. 3, pp. 343-370, 2005.
R. Koodli and C. Perkins, Service Discovery in On Demand Ad
Hoc Networks, I.E.T.F Draft, http://tools.ietf.org/html/draftkoodli-manet-servicediscovery-00, 2002.
P. Makris, D.N. Skoutas, and C. Skianis, A Survey on ContextAware Mobile and Wireless Networking: On Networking and
Computing Environments Integration, IEEE Comm. Surveys &
Tutorials, vol. 15, no. 1, pp. 362-386, First Quarter 2013.
VOL. 25,
NO. 12,
DECEMBER 2014
SUROBHI AND JAMALIPOUR: A CONTEXT-AWARE M2M-BASED MIDDLEWARE FOR SERVICE SELECTION IN MOBILE AD-HOC NETWORKS
3065