3 THE MODEL
We initially start with an environment that represents
a squared city of (6.2 × 6.2) sq. miles divided in
to squared blocks (100× 100 blocks). We deployed
2,040 mobile sensors in the environment, exponen-
tially distributed from the center of the city (envi-
ronment) since most metropolises follow this popula-
tion distribution (Grossman-Clarke et al., 2005). The
event that is used in the measuring of the informa-
tion dissemination is generated in a random location
which is then considered the center of the dissemina-
tion (for the purposes of measuring distances). The
communication between sensors is peer-to-peer. The
communication range of sensors (sensors’ radius) is
55 yards (50 meters) in line Wi-Fi communication
range. In the simulation environment, each sensor
moves at a fixed speed of 1 block per tick (a tick is
equal to 1.2 minute in real time considering the nor-
mal human walking speed is ≈ 3.1 miles/h (≈ 5 km/h)
(Fitzpatrick et al., 2006). Sensors move according to
the Individual Mobility model proposed by Song et
al. (Song et al., 2010) because this model has the abil-
ity to accurately describe the characteristics of human
mobility. We provide the average of 100 runs for each
approach. The simulations stop when 90% of the net-
work knows about the event.
We proposed two novel forwarding approaches,
namely Strong-Ties-Based Forwarding (STBF) and
Weak-Ties-Based Forwarding (WTBF). These ap-
proaches are used for information dissemination,
where the spreading process is based on relation type
between sender and receiver(strong or weak relation).
Our proposal is that sensors can maintain the strength
of ties to use the strength to achieve different dissem-
ination patterns.
Each sensor in the simulation has to be able to
keep track of encounters with other sensors. For each
sensor, all encounters are memorized in a dynamic list
T
i
, where i represents a particular sensor in the en-
vironment. The items in this list represent the IDs
(e.g. MAC addresses) of the encountered sensors.
Each sensor has another dynamic list which is derived
from the T
i
list: the CST
i
list (the list of cumulative
strong ties) contains the sensors (candidates sensors)
that have strong ties with sensor i while the CWT
i
list
(the list of cumulativeweak ties) contains this list con-
tains the sensors (candidates sensors) that have weak
ties with sensor i. These derived lists are used respec-
tively by the STBF and WTBF approaches.
In STBF, we extract the strong ties for each sen-
sor from the T
i
list. As mentioned, the strong ties
emerge with people we associate with frequently and
frequency does not correlate with friendship. This
means, the strength of a tie represents frequency and
not affinity between two individuals. The friendship
relation between two individuals may be derived from
the strength of the relation, but the distribution of
these encounters and their regularity also play a role
(Bulut and Szymanski, 2010; Vaz de Melo et al.,
2013; Bai and Helmy, 2004). For the purposes of
this work, friendship definition is not important, but
rather frequency; most of us meet many people fre-
quently without considering them as friends (e.g., at
work). The strong ties of a sensor can be extracted
by taking the higher frequency sensors in its history
of encounters (T
i
list). This process can be performed
based on the so-called “80/20” rule (Newman, 2005).
This rule states that for many observations, approxi-
mately 80% of the effects caused by the other 20%.
This rule is common in economical and natural pro-
cesses, for example, 80% of a company’s sales come
from 20% of its clients. Statistically, this rule is ap-
plicable to the applications that follow a power law
distribution (Newman, 2005). Based on this statistical
phenomenon(since the degree distribution of nodes in
our model follows a power law distribution), for each
sensor i we take the higher 20% frequencies items of
the T
i
list at time t, and inserting the corresponding
sensor ID into the CST
i
in which contains the ID’s of
the sensors that have the higher frequencies (strong
ties) of the T
i
list.
In WTBF, we insert the sensor ID of the lower
80% frequencies items of the T
i
list into the CWT
i
list
(weak ties). This process is performed by each sen-
sor at every time step of the simulation. In order to
have values that are statistically significant, we em-
ploy (i) atraining procedure where we let all sensors
freely move in the environment in the absence of any
event for 100 time steps—this procedure represents a
proactive step before executing any of the approaches
we used in this work aiming to create a history of en-
counters and initiating the T
i
list for each sensor; then
we execute a (ii) checking procedure, at every time
step t and for each sensor i, the decision of insert-
ing an items into the CST
i
and CWT
i
lists is based on
Algorithm 1 which describes whether an element is
included in the CST
i
or in the CWT
i
of a particular
sensor. In our algorithm, we take into considerations
that a weak tie may, in the future, become a strong
tie. In this case, we remove this item from CWT
i
and
insert it into the CST
i
.
Once sensors have their CST
i
and CWT
i
lists (can-
didates lists), they can be used in the forwarding pro-
cess of STBF and WTBF respectively. This means a
sensor forwards data only to other sensors that are in
their candidates list. Furthermore, to carry out the for-
warding process, three conditions must be validated:
SENSORNETS2015-4thInternationalConferenceonSensorNetworks
86