Journal on Communications ›› 2015, Vol. 36 ›› Issue (1): 199-210.doi: 10.11959/j.issn.1000-436x.2015022
• Academic communication • Previous Articles Next Articles
Xiang WANG1,Su-peng LENG1,Ke ZHANG2,Hao LIU3
Online:
2015-01-25
Published:
2017-06-21
Supported by:
Xiang WANG,Su-peng LENG,Ke ZHANG,Hao LIU. Vehicular social network:a survey[J]. Journal on Communications, 2015, 36(1): 199-210.
"
社会度量 | 描述 | 在车载网络中的应用 |
距离(distance) | 社会网络中节点之间最短路径的跳数 | 表示车载用户之间的共同兴趣爱好的相似度。可用于VSN中的信息推送,社团划分,信息共享 |
网络密度(density) | 车载用户之间连接的密度 | 描述了网络中节点之间连接密度的分布。配合车载用户的地理位置可以用于优化RSU的部署,路由选路 |
社会关系强度(tie strength) | 2个节点之间的相遇的频次和相遇的时间长短 | 用来预测车载用户之间的行驶路径的相似度,优化路由协议以及它们之间的信息共享 |
节点度(node degree) | 节点在社会网络图中的度 | 描述车载用户在网络中的流行程度。社团内部进行信息传递时,社团内节点的度将是路由选路的一个重要度量值 |
中介中间性(betweenness centrality) | 在社会网络中,节点作为2个相邻节点的中间桥梁节点的度量 | 连接2个社会团体的中间节点会具有很高的中介中间性,这个中间节点在社团之间的信息交互过程中,起到了很关键的作用 |
聚集系数(cluster coefficient) | 在社会网络图中,节点的邻居节点之间的社会关系强度 | 聚集系数可以用于社团(community)发现,将具有相同兴趣爱好(比如:广告,告警信息,共享资源)的一群用户组成虚拟的社会团体 |
接近中心度(closeness centrality) | 在社会网络图中,与其他所有节点具有最短路径的节点 | 描述了最高效的路径和网络的可视性。选取接近中心度最高的节点作为信息分发和扩散的源节点,可以有效的减少信息扩散的时延和网络的开销 |
"
VSN组件 | 组件实例 | 组件作用 |
车载用户终端 | 车载通信设备、乘客携带的移动终端(手机、笔记本)以及车辆传感器(包括自动距离传感器,比如雷达、激光雷达、相机以及能够检测车辆行驶状况的车轮速度传感器与车轮角度传感器[ | 车载用户进行信息的发送与接收的通信设备;VSN的信息源,存储单元 |
基础接入网络 | 路旁单元(RSU,road side unit),基础无线通信系统(其接入方式包括蜂窝网、WiFi、WIMAX等) | 与车载用户协调塔建基础的车载通信网络(V2V (vehicle to vehicle)、V2R(vehicle to road side unit)、V2I(vehicle to infrastruction)) |
提供VSN与外部网络(Internet、外部服务器)的连接扩展VSN的信息内容 | ||
VSN服务器 | VSN后台服务器 | 收集和管理 VSN 用户的个人信息,可与外部服务器(比如facebook服务器,用户个人公开信息服务器等等)相连 |
VSN中社团的发现、创建、管理 | ||
VSN中的资源调度中心 | ||
VSN通信数据统计与分析中心 | ||
互联网络融合 | Internet接入 | 包含丰富的互联网资源以及第三方车载应用 |
定位系统 | 全球导航卫星系统(GNSS,global navigation satellite systems) | 精确的自动定位系统可以准确地提供自身的位置信息和其他用户甚至是目的节点的位置信息 |
本地定位系统(LPS,local position system)(例如LORAN) | ||
室内定位系统(indoor positioning systems)(如Active Bat等) | 为VSN的应用部署与协议设计提供非常重要的信息 |
[1] | WASSERMAN S . Social Network Analysis:Methods and Applications[M]. Cambridge University Press, 1994. |
[2] | KAYASTHA N , NIYATO D , WANG P , et al. Applications,architectures,and protocol design issues for mobile social networks:A survey[J]. Proceedings of the IEEE, 2011,99(12): 2130-2158. |
[3] | SMALDONE S , HAN L , SHANKAR P , et al. RoadSpeak:enabling voice chat on roadways using vehicular social networks[A]. Proceedings of the 1st Workshop on Social Network Systems[C].ACM 2008. 43-48. |
[4] | CHAINTREAU A , HUI P , CROWCROFT J , et al. Pocket switched networks:Real-world mobility and its consequences for opportunistic forwarding[R]. Technical Report UCAM-CL-TR-617,University of Cambridge,Computer Laboratory, 2005. |
[5] | SRINIVASAN V , MOTANI M , OOI W T . Analysis and implications of student contact patterns derived from campus schedules[A]. Proceedings of the 12th Annual International Conference on Mobile Computing and Networking[C].ACM, 2006. 86-97. |
[6] | Dartmouth University.A community resource for archiving wireless data at dartmouth[EB/OL]. . |
[7] | LU N , LUAN T H , WANG M , et al. Bounds of asymptotic performance limits of social-proximity vehicular networks[J]. IEEE/ACM Transactions on Networking, 2014,22(3): 812-825. |
[8] | YANG F C , WANG S G , LI J L , et al. An overview of internet of vehicles[J]. Communications,China, 2014,11(10): 1-15. |
[9] | HARTENSTEIN H , LABERTEAUX K P . A tutorial survey on vehicular ad hoc networks[J]. Communications Magazine,IEEE, 2008,46(6): 164-171. |
[10] | LIU X , LI Z , LI W , et al. Exploring social properties in vehicular ad hoc networks[A]. Proceedings of the Fourth Asia-Pacific Symposium on Internetware[C].ACM 2012,24. |
[11] | CUNHA F D , VIANNA A C , MINI R A F , et al. How effective is to look at a vehicular network under a social perception[A]. Wireless and Mobile Computing,Networking and Communications (WiMob),2013 IEEE 9th International Conference[C].IEEE, 2013. 154-159. |
[12] | VASTARDIS N , YANG K . Mobile social networks:architectures,social properties,and key research challenges[J]. Communications Surveys & Tutorials,IEEE, 2013,15(3): 1355-1371. |
[13] | 钱志鸿, 王义君 . 面向物联网的无线传感器网络综述[J]. 电子与信息学报, 2013,35(1):215-227. QIAN Z H , WANG Y J . Advances in theory and application of compressed sensing[J]. Journal of Electronics & Information Technology, 2013,35(1):215-227. |
[14] | LUAN T H , SHEN X , BAI F , et al. Feel bored? join verse! engineering vehicular proximity social network[J]. IEEE Transaction on Vehicular Technology, 2014,7: 1-12. |
[15] | YU N , HAN Q . Context-aware community:integrating contexts with contacts for proximity-based mobile social networking[A]. Distributed Computing in Sensor Systems (DCOSS),2013 IEEE International Conference[C].IEEE, 2013. 141-148. |
[16] | VASTARDIS N , YANG K . Multi-phase socially-aware routing in distributed mobile social networks[A]. Wireless Communications and Mobile Computing Conference(IWCMC)[C].IEEE, 2013. 1353-1358. |
[17] | GONG H , YU L . Study on routing protocols for delay tolerant mobile networks[J]. International Journal of Distributed Sensor Networks, 2013(2013):145727. |
[18] | HUI P , CROWCROFT J . How small labels create big improvements[A]. Pervasive Computing and Communications Workshops,Fifth Annual IEEE International Conference[C].IEEE, 2007,52(2): 65-70. |
[19] | XIAO M , WU J , HUANG L . Bubble rap:social-based forwarding in delay-tolerant networks[J]. IEEE Transactions on Mobile Computing, 2013,63(7): 1682-1695. |
[20] | HUI P , CROWCROFT J , YONEKI E . Bubble rap:social-based forwarding in delay-tolerant networks[J]. IEEE Transactions on Mobile Computing, 2011,10(11): 1576-1589. |
[21] | DALY E M , HAAHR M . Social network analysis for routing in disconnected delay-tolerant manets[A]. Proceedings of the 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing[C].ACM, 2007. 32-40. |
[22] | BITSCH L J á , VIOL v , GOLIATH A , et al. SimBetAge:utilizing temporal changes in social networks for pocket switched networks[A]. Proceedings of the 1st ACM workshop on User-provided networking:challenges and opportunities[C].ACM, 2009. 13-18. |
[23] | LI F , WU J . LocalCom:a community-based epidemic forwarding scheme in disruption-tolerant networks[A]. Sensor,Mesh and Ad Hoc Communications and Networks,6th Annual IEEE Communications Society Conference[C].IEEE, 2009. 1-9. |
[24] | JAHANBAKHSH K , SHOJA G C , KING V . Social-greedy:a socially-based greedy routing algorithm for delay tolerant networks[A]. Proceedings of the Second International Workshop on Mobile Opportunistic Networking[C].ACM, 2010. 159-162. |
[25] | MTIBAA A , MAY M , DIOT C , et al. Peoplerank:social opportunistic forwarding[A]. INFOCOM,2010 Proceedings IEEE, 2010. 1-5. |
[26] | BRIN S , PAGE L . The anatomy of a large-scale hypertextual Web search engine[J]. Computer Networks and ISDN Systems, 1998,30(1): 107-117. |
[27] | ZHANG Y , ZHAO J . Social network analysis on data diffusion in delay tolerant networks[A]. Proceedings of the tenth ACM International Symposium on Mobile Ad Hoc Networking and Computing[C].ACM, 2009. 345-346. |
[28] | NING T , YANG Z , WU H , et al. Self-Interest-driven incentives for ad dissemination in autonomous mobile social networks[A]. INFOCOM,2013 Proceedings IEEE[C].IEEE, 2013. 2310-2318. |
[29] | MAIHOFER C . A survey of geocast routing protocols[J]. Communications Surveys & Tutorials,IEEE, 2004,6(2): 32-42. |
[30] | NIYATO D , HAN Z , SAAD W , et al. A controlled coalitional game for wireless connection sharing and bandwidth allocation in mobile social networks[A]. Global Telecommunications Conference (GLOBECOM 2010),2010 IEEE[C]. 2010. 1-5. |
[31] | FAN J , CHEN J , DU Y , et al. Geocommunity-based broadcasting for data dissemination in mobile social networks[J]. IEEE Transactions on Parallel and Distributed Systems, 2013,24(4): 734-743. |
[32] | WU H , FUJIMOTO R , GUENSLER R , et al. MDDV:a mobility-centric data dissemination algorithm for vehicular networks[A]. Proceedings of the 1st ACM International Workshop on Vehicular Ad Hoc Networks[C].ACM, 2004. 47-56. |
[33] | FASOLO E , ZANELLA A , ZORZI M . An effective broadcast scheme for alert message propagation in vehicular ad hoc networks[A]. Communications,IEEE International Conference[C]. 2006. 3960-3965. |
[34] | FEI R , YANG K , CHENG X . A cooperative social and vehicular network and its dynamic bandwidth allocation algorithms[A]. Computer Communications Workshops (INFOCOM WKSHPS),2011 IEEE Conference[C]. 2011. 63-67. |
[35] | NIYATO D , WANG P , SAAD W , et al. Coalition formation games for bandwidth sharing in vehicle-to-roadside communications[A]. Wireless Communications and Networking Conference (WCNC) 2010 IEEE[C]. 2010. 1-5. |
[36] | SAAD W , HAN Z , HJORUNGNES A , et al. Coalition formation games for distributed cooperation among roadside units in vehicular networks[J]. IEEE Journal on Selected Areas in Communications, 2011,29(1): 48-60. |
[37] | NIYATO D , WANG P , SAAD W , et al. Controlled coalitional games for cooperative mobile social networks[J]. IEEE Transactions on Vehicular Technology, 2011,60(4): 1812-1824. |
[38] | LU R X , LIN X D , SHEN X M . SPRING:a social-based privacy-preserving packet forwarding protocol for vehicular delay tolerant networks[A]. INFOCOM,2010 Proceedings IEEE[C]. 2010. 1-9. |
[39] | KHOKHAR R H , NOOR R M , GHAFOOR K Z , et al. Fuzzy-assisted social-based routing for urban vehicular environments[J]. EURASIP Journal on Wireless Communications and Networking, 2011,(1): 1-15. |
[40] | HAN L . Social Caching and Vehicular Social Networks:Two Contributions to the Theory and Practice of Online Social Networks[M]. Rutgers University, 2013. |
[41] | HUANG D , ZHOU Z , HONG X , et al. Establishing email-based social network trust for vehicular networks[A]. Consumer Communications and Networking Conference (CCNC)[C]. 2010. 1-5. |
[42] | HU Y C , LABERTEAUX K P . Strong VANET security on a budget[A]. Proceedings of Workshop on Embedded Security in Cars (ESCAR)[C]. 2006. 1-9. |
[43] | 丁丽萍, 卢国庆 . 面向频繁模式挖掘的差分隐私保护研究综述[J]. 通信学报, 2014,35(10):200-209. DING L P , LU G Q , et al. Survey of differential privacy in frequent pattern mining[J]. Journal on Communications, 2014,35(10):200-209. |
[44] | SAMPIGETHAYA K , LI M , HUANG L , et al. Amoeba:Robust location privacy scheme for vanet[J]. IEEE Journal on Selected Areas in Communications, 2007,25(8): 1569-1589. |
[45] | CHEN G , RAHMAN F . Analyzing privacy designs of mobile social networking applications[A]. Embedded and Ubiquitous Computing,2008.EUC'08.IEEE/IFIP International Conference[C]. 2008. 83-88. |
[46] | LUN R X , LIN X D , LUAN T H , et al. Pseudonym changing at social spots:an effective strategy for location privacy in VANETs[J]. IEEE Transaction on Vehicular Technology, 2012,61(1): 86-96. |
[47] | RAYA M , HUBAUX J P . The security of VANETs[A]. Proceedings of the 2nd ACM International Workshop on Vehicular Ad Hoc Networks[C].ACM, 2005. 93-94. |
[48] | IEEE 1609.2-2006. IEEE Trial-Use Standard for Wireless Access in Vehicular Environments (WAVE) - Security Services for Applications and Management Messages[S]. 2006. |
[49] | LEINMüLLER T , MAIH?FER C , SCHOCH E , et al. Improved security in geographic ad hoc routing through autonomous position verification[A]. Proceedings of the 3rd International Workshop on Vehicular Ad Hoc Networks[C].ACM, 2006. 57-66. |
[50] | YAN G , OLARIU S , WEIGLE M C . Providing VANET security through active position detection[J]. Computer Communications, 2008,31(12): 2883-2897. |
[51] | GUETTE G , DUCOURTHIAL B . On the Sybil attack detection in VANET[A]. Mobile Adhoc and Sensor Systems,IEEE Internatonal Conference[C]. 2007. 1-6. |
[52] | LU N , LUAN T H , WANG M , et al. Capacity and delay analysis for social-proximity urban vehicular networks[A]. INFOCOM,2012 Proceedings IEEE[C]. 2012. 1476-1484. |
[53] | YAN S , LIHUA Y , SHUANG X . Privacy vulnerability analysis on routing in mobile social networks[A]. Parallel and Distributed Systems (ICPADS),2013 International Conference[C]. 2013. 454-455. |
[54] | CAHILL C , CHAMPAGNE D , ELLISON G , et al. Liberty ID-WSF authentication,single sign-on,and identity mapping services specification[EB/OL]. . |
[1] | Tao PENG, Wentao ZHONG, Guojun WANG, Entao LUO, Jinbo XIONG, Yining LIU, Wang Hao. Privacy-preserving precise profile matching in mobile social network [J]. Journal on Communications, 2022, 43(11): 90-103. |
[2] | Lei HE, Jianfeng MA, Dawei WEI. Attribute-based proxy signature scheme for unmanned aerial vehicle networks [J]. Journal on Communications, 2021, 42(11): 87-96. |
[3] | Chaoqiong FAN,Chenglin ZHAO,Bin LI. Hierarchical game based spectrum access optimization for anti-jamming in UAV network [J]. Journal on Communications, 2020, 41(6): 26-33. |
[4] | Wufei WU,Renfa LI,Gang ZENG,Yong XIE,Guoqi XIE. Survey of the intelligent and connected vehicle cybersecurity [J]. Journal on Communications, 2020, 41(6): 161-174. |
[5] | Ying PENG,Nao WANG,Gao-cai WANG. Optimal energy efficiency routing strategy based on community in mobile social network [J]. Journal on Communications, 2017, 38(5): 128-144. |
[6] | Hao LIU,Zhi-gang CHEN,Lian-ming ZHANG. Data forwarding incentive mechanism based on auction model in mobile social network [J]. Journal on Communications, 2017, 38(11): 111-120. |
[7] | Zhi-yuan LI,Ru-long CHEN,Ru-chuan WANG. Exploiting interests and behavior prediction for dynamic resource discovery in mobile social networking [J]. Journal on Communications, 2016, 37(4): 34-43. |
[8] | Chao LI,Li-hua YIN,Kui GENG,Bin-xing FANG. Location privacy preservation approach towards to content sharing on mobile online social network [J]. Journal on Communications, 2016, 37(11): 31-41. |
[9] | Yi-liang LIU,Ya-li SHI,Hao FENG,Liang-min WANG. Intrusion detection scheme based on neural network in vehicle network [J]. Journal on Communications, 2014, 35(Z2): 233-239. |
[10] | . Intrusion detection scheme based on neural network in vehicle network [J]. Journal on Communications, 2014, 35(Z2): 32-239. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|