Analysis of smartphone user mobility traces for opportunistic data collection in wireless sensor networks

نویسندگان

  • Xiuchao Wu
  • Kenneth N. Brown
  • Cormac J. Sreenan
چکیده

The increasing ubiquity of smartphones coupled with the mobility of their users will allow the use of smartphones to enhance the operation of wireless sensor networks. In addition to accessing data from a wireless sensor network for personal use, and the generation of data through participatory sensing, we propose the use of smartphones to collect data from sensor nodes opportunistically. For this to be feasible, the mobility patterns of smartphone usersmust support opportunistic use.We analyze the dataset from theMobile Data Challenge by Nokia, and we identify the significant patterns, including strong spatial and temporal localities. These patterns should be exploited when designing protocols and algorithms, and their existence supports the proposal for opportunistic data collection through smartphones. © 2013 Elsevier B.V. All rights reserved.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Analysis of Smartphone User Mobility Traces for Opportunistic Data Collection

Considering that smartphones are tightly-coupled with their users, the interaction between smartphones and wireless sensor networks will play a very important role in pervasive computing for improving our daily life. Instead of using smartphones to access the services provided by various wireless sensor networks, we focus on using smartphones to collect data from sensor nodes opportunistically....

متن کامل

Contact Probing Mechanisms for Opportunistic Sensor Data Collection

In many emerging wireless sensor network scenarios, the use of a fixed infrastructure of base stations for data collection is either infeasible, or prohibitive in terms of deployment and maintenance costs. Instead, we consider the use of mobile devices (i.e. smartphones) carried by people in their daily life to collect data from sensor nodes opportunistically. As the movement of these mobile no...

متن کامل

Security Analysis of Lightweight Authentication Scheme with Key Agreement using Wireless Sensor Network for Agricultural Monitoring System

Wireless sensor networks have many applications in the real world and have been developed in various environments. But the limitations of these networks, including the limitations on the energy and processing power of the sensors, have posed many challenges to researchers. One of the major challenges is the security of these networks, and in particular the issue of authentication in the wireles...

متن کامل

Target Tracking Based on Virtual Grid in Wireless Sensor Networks

One of the most important and typical application of wireless sensor networks (WSNs) is target tracking. Although target tracking, can provide benefits for large-scale WSNs and organize them into clusters but tracking a moving target in cluster-based WSNs suffers a boundary problem. The main goal of this paper was to introduce an efficient and novel mobility management protocol namely Target Tr...

متن کامل

A Priority-based Routing Algorithm for Underwater Wireless Sensor Networks (UWSNs)

Advances in low-power electronics design and wireless communication have enabled the development of low cost, low power micro-sensor nodes. These sensor nodes are capable of sensing, processing and forwarding which have many applications such as underwater networks. In underwater wireless sensor networks (UWSNs) applications, sensors which are placed in underwater environments and predicted ena...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Pervasive and Mobile Computing

دوره 9  شماره 

صفحات  -

تاریخ انتشار 2013