The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.03 - March (2011 vol.10)
pp: 362-376
Yu Zhang , Rutgers University, North Brunswick
Zhibin Wu , Rutgers University, North Brunswick
Wade Trappe , Rutgers University, North Brunswick
ABSTRACT
In this paper, we introduce a delay-sensitive service that involves transmitting large amounts of location-based data to nodes at multiple locations. Given a limited amount of access points (APs) and an abundance of service requests that result from the nodes moving around, a typical content delivery service would inevitably introduce considerable delay. To solve this problem, we analyze the movement pattern of mobile nodes and approximate it as a semi-Markov process. Based on this model, we explore different components of the underlying service delay and propose that APs should use a multicast strategy to minimize the queuing delay component. Furthermore, we demonstrate the feasibility of employing nodes, which already have their own local copies of location-relevant data, to relay such data to other nodes by employing one or multiple communication channels. Lastly, we examine the resulting algorithms and study their performance relative to baseline content-delivery schemes through simulations.
INDEX TERMS
Location-dependent and sensitive, pervasive computing, wireless sensor networks.
CITATION
Yu Zhang, Zhibin Wu, Wade Trappe, "Adaptive Location-Oriented Content Delivery in Delay-Sensitive Pervasive Applications", IEEE Transactions on Mobile Computing, vol.10, no. 3, pp. 362-376, March 2011, doi:10.1109/TMC.2010.167
REFERENCES
[1] D. Niceulescu and B. Nath, "Trajectory Based Forwarding and Its Applications," Proc. ACM MobiCom, pp. 260-272, 2003.
[2] L. Lazos, R. Poovendran, and S. Capkun, "ROPE: Robust Position Estimation in Wireless Sensor Networks," Proc. Fourth Int'l Symp. Information Processing in Sensor Networks (IPSN '05), pp. 324-331, 2005.
[3] Z. Li, W. Trappe, Y. Zhang, and B. Nath, "Robust Statistical Methods for Securing Wireless Localization in Sensor Networks," Proc. Fourth Int'l Symp. Information Processing in Sensor Networks (IPSN '05), pp. 91-98, 2005.
[4] S. Capkun and J.P. Hubaux, "Secure Positioning of Wireless Devices with Application to Sensor Networks," Proc. IEEE INFOCOM, 2005.
[5] Y. Zhang, Z. Li, and W. Trappe, "Power-Modulated Challenge-Response Schemes for Verifying Location Claims," Proc. IEEE Global Telecomm. Conf., 2007.
[6] P. Bahl and V.N. Padmanabhan, "RADAR: An In-Building RF-Based User Location and Tracking System," Proc. IEEE INFOCOM, pp. 775-784, 2000.
[7] N. Priyantha, A. Chakraborty, and H. Balakrishnan, "The CRICKET Location-Support System," Proc. ACM MobiCom, pp. 32-43, 2000.
[8] D. Nicelescu and B. Nath, "Ad Hoc Positioning (APS) Using AOA," Proc. IEEE INFOCOM, pp. 1734-1743, 2003.
[9] Y. Shang, W. Ruml, and Y. Zhang, "Localization from Mere Connectivity," Proc. ACM MobiHoc, 2003.
[10] S. Chen, Y. Zhang, and W. Trappe, "Inverting Sensor Networks and Actuating the Environment for Spatio-Temporal Access Control," Proc. Fourth ACM Workshop Security of Ad Hoc and Sensor Networks (SASN '06), 2006.
[11] E. Bertino, B. Catania, M. Damiani, and P. Perlasca, "GEO-RBAC: A Spatially Aware RBAC," Proc. Tenth ACM Symp. Access Control Models and Technologies (SACMAT '05), 2005.
[12] F. Anjum, "Location Dependent Key Management Using Random Key-Predistribution in Sensor Networks," Proc. Fifth ACM Workshop Wireless Security, 2006.
[13] D. Liu and P. Ning, "Location-Based Pairwise Key Establishments for Static Sensor Networks," Proc. First ACM Workshop Security of Ad Hoc and Sensor Networks (SASN '03), 2003.
[14] L. Aalto, N. Göthlin, J. Korhonen, and T. Ojala, "Bluetooth and WAP Push Based Location-Aware Mobile Advertising System," Proc. Second Int'l Conf. Mobile Systems, Applications, and Services (MobiSys '04), 2004.
[15] J. Ortiz, C. Baker, D. Moon, R. Fonseca, and I. Stoica, "Beacon Location Service: A Location Service for Point-to-Point Routing in Wireless Sensor Networks," Proc. Sixth Int'l Conf. Information Processing in Sensor Networks (IPSN '07), 2007.
[16] J. Lil, A. Kubota, and H. Kameda, "Location Management for PCS Networks with Consideration of Mobility Patterns," Proc. IEEE INFOCOM, 2005.
[17] J. Lin and S. Paul, "RMTP: A Reliable Multicast Transport Protocol," Proc. IEEE INFOCOM, 1996.
[18] R. Bhatia and L. Li, "Characterizing Achievable Multicast Rates in Multi-Hop Wireless Networks," Proc. ACM MobiHoc, 2003.
[19] P. Chaporkar, A. Bhat, and S. Sarkar, "An Adaptive Strategy for Maximizing Throughput in MAC Layer Wireless Multicast," Proc. ACM MobiHoc, 2004.
[20] Q. Cao, T. Abdelzaher, T. He, and R. Kravets, "Cluster-Based Forwarding for Reliable End-to-End Delivery in Wireless Sensor Networks," Proc. IEEE INFOCOM, 2007.
[21] W. Yuen, R. Yates, and S. Mau, "Exploiting Data Diversity and Multiuser Diversity in Noncooperative Mobile Infostation Networks," Proc. IEEE INFOCOM, 2003.
[22] U. Kubach and K. Rothermel, "Exploiting Location Information for Infostation-Based Hoarding," Proc. ACM MobiCom, 2001.
[23] T. Small and Z. Haas, "The Shared Wireless Infostation Model: A New Ad Hoc Networking Paradigm (or Where There Is a Whale, There Is a Way)," Proc. ACM MobiHoc, 2003.
[24] K. Fall, "A Delay-Tolerant Network Architecture for Challenged Internets," Proc. ACM SIGCOMM, 2003.
[25] S. Jain, K. Fall, and R. Patra, "Routing in a Delay Tolerant Network," Proc. ACM SIGCOMM, 2004.
[26] A. Kate, G. Zaverucha, and U. Hengartner, "Anonymity and Security in Delay Tolerant Networks," Proc. Third Int'l Conf. Security and Privacy in Comm. Networks (SecureComm '07), 2007.
[27] J. Proakis, Digital Communications, fourth ed. McGraw-Hill, 2001.
[28] D. Tse and P. Viswanath, Fundamentals of Wireless Communications. Cambridge Univ., 2005.
[29] D. Zhang, Wireless Communications. Cambridge Univ., 2005.
[30] D. Zhang and N.B. Mandayam, "Bandwidth Exchange as an Incentive for Relaying in Wireless Networks," Proc. Conf. Information Sciences and Systems (CISS '08), 2008.
[31] C. Raman, G. Foschini, R. Valenzuela, R. Yates, and N.B. Mandayam, "Power Savings from Half-Duplex Relaying in Downlink Cellular Systems," Proc. Ann. Allerton Conf. Comm., Control, and Computing, 2009.
[32] R. Howard, Dynamic Probabilistic Systems. John Wiley & Sons, 1971.
[33] R. Yates and D. Goodman, Probability and Stochastic Processes: A Friendly Introduction for Electrical and Computer Engineers. John Wiley & Sons, 2003.
[34] A. Papoulis and S. Pillai, Probability, Random Variables, and Stochastic Processes. McGraw-Hill, 2002.
[35] T. Cormen, C. Leiserson, and R. Rivest, Introduction to Algorithms. Massachusetts Inst. of Tech nology, 2001.
15 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool