Login | Register

An Architecture for M2M Enabled Social Networks


An Architecture for M2M Enabled Social Networks

Bhowmik, Ashis Kumar (2014) An Architecture for M2M Enabled Social Networks. Masters thesis, Concordia University.

[thumbnail of Bhowmik_MSc_S2015.pdf]
Text (application/pdf)
Bhowmik_MSc_S2015.pdf - Accepted Version
Available under License Spectrum Terms of Access.


Social Networks (SNs), such as Facebook, Twitter, Google+, are becoming more and more popular nowadays. People are now more connected than before. They share information, pictures, videos and news with their family and friends. However, sharing physical phenomena in SNs is still a manual process done by people themselves. For instance, people would like to share current health status, feelings, thoughts, weather or riding information with friends. The sharing of ambient information automatically in SNs can promote independent living. Moreover, it can enhance the autonomy and confidence of elderly people via continuous monitoring and health support. A set of biometric sensors, for example, placed within a patient body can inform a doctor about patient’s health status; hence the doctor can perform a remote diagnosis.

Nowadays people are surrounded by devices like smartphone, sensors, cameras, computers and many other devices known as machines. These devices can automatically collect contextual information from the neighborhood. This thesis proposes an architecture for posting contextual information in SNs to support the automatic sharing of physical phenomena. In the proposed architecture, machines collect the contextual data through an overlay-based gateway to support scalability in terms of number of devices. Considering the resource-constrained devices, the architecture makes use of the Constrained Application Protocol (CoAP), a lightweight standard protocol. An SN processes that data into shareable information and disseminates it as appropriate within the users’ Community of Interests (COIs) (e.g., family, friends).

A proof of concept prototype is developed to verify the feasibility of the proposed architecture and its performance has been partially evaluated.

Divisions:Concordia University > Gina Cody School of Engineering and Computer Science > Electrical and Computer Engineering
Item Type:Thesis (Masters)
Authors:Bhowmik, Ashis Kumar
Institution:Concordia University
Degree Name:M.A. Sc.
Program:Electrical and Computer Engineering
Date:19 December 2014
Thesis Supervisor(s):Khendek, Ferhat and Glitho, Roch
Keywords:Social Networks, M2M, P2P Overlay, CoAP, Social Sharing
ID Code:979589
Deposited On:09 Jul 2015 19:04
Last Modified:18 Jan 2018 17:49


[1] G. Wu, S. Talwar, and K. Johnsson, “M2M: From mobile to embedded internet,” IEEE Commun. Mag., vol. 49, no. April, pp. 36–43, 2011.
[2] M. J. Booysen, J. Gilmore, S. Zeadally, and G. Van Rooyen, “Machine-to-machine (m2m) communications in vehicular networks,” KSII Trans. Internet Inf. Syst., vol. 6, no. 2, pp. 1–21, 2012.
[3] D. Niyato, L. Xiao, and P. Wang, “Machine-to-machine communications for home energy management system in smart grid,” Commun. Mag. IEEE, vol. 49, no. 4, pp. 53–59, 2011.
[4] Z. Fan and S. Tan, “M2M communications for E-health: Standards, enabling technologies, and research challenges,” in 2012 6th International Symposium on Medical Information and Communication Technology (ISMICT), 2012, pp. 1–4.
[5] “Facebook.” [Online]. Available: www.facebook.com. [Accessed: 10-Sep-2014].
[6] “Twitter.” [Online]. Available: twitter.com. [Accessed: 05-Sep-2014].
[7] “Google+.” [Online]. Available: plus.google.com. [Accessed: 05-Sep-2014].
[8] M. B. N. B. E. Danah, “Social network sites: Definition, history, and scholarship,” J. Comput. Commun., vol. 13, no. 1, pp. 210–230, Oct. 2007.
[9] “Reddit.” [Online]. Available: www.reddit.com. [Accessed: 05-Sep-2014].
[10] “LinkedIn.” [Online]. Available: www.linkedin.com. [Accessed: 05-Sep-2014].
[11] Pew Research Center’s Internet Project, “Social Media Update 2013,” 2014. [Online]. Available: http://www.pewinternet.org/2013/12/30/social-media-update-2013/. [Accessed: 20-Aug-2014].
[12] M. A. Rahman, A. El Saddik, and W. Gueaieb, “Senseface: A sensor network overlay for social networks,” in IEEE Instrumentation and Measurement Technology Conference, 2009. I2MTC ’09, 2009, no. May, pp. 5–7.
[13] A. J. Jara, M. A. Zamora, and A. F. G. Skarmeta, “An architecture based on internet of things to support mobility and security in medical environments,” in 7th IEEE Consumer Communications and Networking Conference (CCNC), 2010, pp. 1–5.
[14] M. Burke, C. Marlow, and T. Lento, “Feed me: motivating newcomer contribution in social network sites,” in Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2009, pp. 945–954.
[15] “livelens.” [Online]. Available: www.livelens.com. [Accessed: 01-Dec-2014].
[16] “Google Glass.” [Online]. Available: https://www.google.ca/glass/start/. [Accessed: 17-Nov-2014].
[17] M. C. Domingo, “A Context-Aware Service Architecture for the Integration of Body Sensor Networks and Social Networks through the IP Multimedia Subsystem,” IEEE Commun. Mag., vol. 49, no. 1, pp. 102–108, 2011.
[18] A. Osseiran, F. Boccardi, V. Braun, K. Kusume, P. Marsch, M. Maternia, O. Queseth, M. Schellmann, H. Schotten, H. Taoka, H. Tullberg, M. A. Uusitalo, B. Timus, and M. Fallgren, “Scenarios for 5G mobile and wireless communications: The vision of the METIS project,” IEEE Commun. Mag., vol. 52, no. 5, pp. 26–35, 2014.
[19] Z. Shelby, K. Hartke, and C. Bormann, “Constrained Application Protocol (CoAP),” IETF RFC 7252. [Online]. Available: https://tools.ietf.org/html/rfc7252.
[20] Google and MySpace, “OpenSocial API.” [Online]. Available: http://opensocial.org/. [Accessed: 05-May-2014].
[21] E. K. L. E. K. Lua, J. Crowcroft, M. Pias, R. Sharma, and S. Lim, “A survey and comparison of peer-to-peer overlay network schemes,” IEEE Commun. Surv. Tutorials, vol. 7, no. 2, 2005.
[22] R. T. Fielding, “Architectural Styles and the Design of Network-based Software Architectures,” 2000.
[23] L. Richardson and S. Ruby, RESTful web services. 2008, p. 440.
[24] I. Jung, H. Kim, D.-K. Hong, and H. Ju, “Protocol Reverse Engineering to Facebook Messages,” in 4th International Conference on Intelligent Systems, Modelling and Simulation, 2013, pp. 539–542.
[25] “SixDegrees.com.” [Online]. Available: http://en.wikipedia.org/wiki/SixDegrees.com. [Accessed: 12-Aug-2014].
[26] “AIM.” [Online]. Available: www.aim.com. [Accessed: 12-Aug-2014].
[27] “ICQ.” [Online]. Available: www.icq.com. [Accessed: 12-Aug-2014].
[28] “Asian Avenue.” [Online]. Available: www.asianave.com. [Accessed: 12-Aug-2014].
[29] “Black Planet.” [Online]. Available: BlackPlanet.com. [Accessed: 12-Aug-2014].
[30] “MiGente.” [Online]. Available: www.migente.com. [Accessed: 12-Aug-2014].
[31] “LiveJournal.” [Online]. Available: www.livejournal.com. [Accessed: 12-Aug-2014].
[32] “Ryze.com.” [Online]. Available: ryze.com. [Accessed: 12-Aug-2014].
[33] “Tribe.net.” [Online]. Available: tribe.net. [Accessed: 12-Aug-2014].
[34] “Friendster.” [Online]. Available: www.friendster.com. [Accessed: 12-Aug-2014].
[35] “Match.com.” [Online]. Available: www.match.com. [Accessed: 12-Aug-2014].
[36] “Flickr.” [Online]. Available: www.flickr.com. [Accessed: 12-Aug-2014].
[37] “Last.fm.” [Online]. Available: www.last.fm. [Accessed: 12-Aug-2014].
[38] “YouTube.” [Online]. Available: www.youtube.com. [Accessed: 12-Aug-2014].
[39] “MySpace.” [Online]. Available: www.myspace.com. [Accessed: 12-Aug-2014].
[40] C. Kadushin, Understanding social networks: Theories, concepts, and findings, vol. 42, no. 2. Oxford University Press, 2012, pp. 249–251.
[41] A. Papadimitriou, D. Katsaros, and Y. Manolopoulos, “Social Network Analysis and Its Applications in Wireless Sensor and Vehicular Networks,” Next Gener. Soc. Technol. Leg. Issues, Lect. Notes Inst. Comput. Sci. Soc. Informatics Telecommun. Eng., vol. 26, pp. 411–420, 2010.
[42] I. Lequerica, M. G. Longaron, and P. M. Ruiz, “Drive and share: efficient provisioning of social networks in vehicular scenarios,” IEEE Commun. Mag., vol. 48, no. 11, pp. 90–97, 2010.
[43] “Cure Together.” [Online]. Available: curetogether.com. [Accessed: 12-Aug-2014].
[44] “PatientsLikeMe.” [Online]. Available: www.patientslikeme.com. [Accessed: 12-Aug-2014].
[45] S. Mohan and N. Agarwal, “A convergent framework for QoS-driven social media content delivery over mobile networks,” in Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE), 2011 2nd International Conference on, 2011, pp. 1–7.
[46] T. Reynaert and W. De Groef, “PESAP: a Privacy Enhanced Social Application Platform,” in Privacy, Security, Risk and Trust (PASSAT), 2012 International Conference on and 2012 International Confernece on Social Computing (SocialCom), 2012, pp. 827–833.
[47] “hi5.” [Online]. Available: www.hi5.com. [Accessed: 12-Aug-2014].
[48] J. Goldman, Facebook Cookbook, First Edit. Published by O’Reilly Media, 2009, p. 405.
[49] M. Häsel, “Opensocial: an enabler for social applications on the web,” Commun. ACM, vol. 54, no. 1, p. 139, Jan. 2011.
[50] “Introducing JSON.” [Online]. Available: www.json.org. [Accessed: 18-Oct-2014].
[51] “Extensible Markup Language (XML) 1.0 (Fifth Edition).” [Online]. Available: http://www.w3.org/TR/REC-xml/. [Accessed: 18-Oct-2014].
[52] “Atom,” RFC. [Online]. Available: https://tools.ietf.org/html/rfc4287. [Accessed: 18-Oct-2014].
[53] B. Leiba, “Oauth web authorization protocol,” IEEE Internet Comput., vol. 16, no. 1, pp. 74–77, 2012.
[54] The Apache Software Foundation, “Apache Shindig.” [Online]. Available: http://shindig.apache.org/. [Accessed: 21-Jul-2014].
[55] R. H. Glitho, “Application architectures for machine to machine communications: Research agenda vs. state-of-the art,” 7th Int. Conf. Broadband Commun. Biomed. Appl., pp. 1–5, Nov. 2011.
[56] “European Telecommunications Standards Institute.” [Online]. Available: http://www.etsi.org/. [Accessed: 10-Sep-2014].
[57] “Internet Engineering Task Force.” [Online]. Available: https://www.ietf.org/. [Accessed: 23-Sep-2014].
[58] “3rd Generation Partnership Project.” [Online]. Available: http://www.3gpp.org/. [Accessed: 10-Sep-2014].
[59] ETSI, “Machine-to-Machine communications (M2M); M2M service requirements,” 2010. [Online]. Available: http://www.etsi.org/deliver/etsi_ts/102600_102699/102689/01.01.01_60/ts_102689v010101p.pdf. [Accessed: 05-Aug-2014].
[60] I. Stoica, R. Morris, D. Liben-Nowell, D. R. Karger, M. F. Kaashoek, F. Dabek, and H. Balakrishnan, “Chord: A scalable peer-to-peer lookup protocol for Internet applications,” IEEE/ACM Trans. Netw., vol. 11, no. 1, pp. 17–32, 2003.
[61] B. Cohen, “BitTorrent.” [Online]. Available: http://bittorrent.org/. [Accessed: 10-Sep-2014].
[62] F. Belqasmi, R. Glitho, and C. Fu, “RESTful web services for service provisioning in next-generation networks: a survey,” Commun. Mag. IEEE, vol. 49, no. 12, pp. 66–73, 2011.
[63] “WADL.” [Online]. Available: http://www.w3.org/Submission/2009/SUBM-wadl-20090831/. [Accessed: 15-Jul-2014].
[64] “CoRE.” [Online]. Available: https://datatracker.ietf.org/wg/core/. [Accessed: 12-Aug-2014].
[65] W. Colitti, K. Steenhaut, N. De Caro, B. Buta, and V. Dobrota, “Evaluation of constrained application protocol for wireless sensor networks,” in 18th IEEE Workshop on18th IEEE Workshop on Local & Metropolitan Area Networks (LANMAN), 2011, pp. 1–6.
[66] RFC, “User Datagram Protocol.” [Online]. Available: https://www.ietf.org/rfc/rfc768.txt. [Accessed: 18-Oct-2014].
[67] K. Kuladinithi, O. Bergmann, T. Pötsch, M. Becker, and C. Görg, “Implementation of coap and its application in transport logistics,” in In Proceedings of the Workshop on Extending the Internet to Low power and Lossy Networks, 2011, vol. April.
[68] R. P. J. Preethi Rajasekaran and R. P. V. Chander, “A smarter toll gate based on Web of Things,” in IEEE International Conference on Electronics, Computing and Communication Technologies, 2013, pp. 1–6.
[69] E. Gamma, R. Helm, R. Johnson, and J. Vlissides, Design patterns: elements of reusable object-oriented software, vol. 206. 1994, p. 395.
[70] K. Hartke, “Observing Resources in CoAP,” Internet-Draft. [Online]. Available: https://datatracker.ietf.org/doc/draft-ietf-core-observe/. [Accessed: 23-Sep-2014].
[71] J. Breslin, S. Decker, M. Hauswirth, and G. Hynes, “Integrating social networks and sensor networks,” W3C Work. Futur. Soc. Netw., no. January, pp. 15–16, 2009.
[72] M. Kranz, L. Roalter, and F. Michahelles, “Things that twitter: social networks and the internet of things,” What can Internet Things do Citiz. Work. Eighth Int. Conf. Pervasive Comput. (Pervasive 2010), 2010.
[73] M. A. Rahman, A. El Saddik, and W. Gueaieb, “Data visualization: From body sensor network to social networks,” in IEEE International Workshop on Robotic and Sensors Environments, 2009. ROSE 2009., 2009, pp. 157 – 162.
[74] K. Knightson, N. Morita, and T. Towle, “NGN architecture: Generic principles, functional architecture, and implementation,” IEEE Commun. Mag., vol. 43, no. 10, pp. 49–56, 2005.
[75] A. Triantafyllidis, “A pervasive health system integrating patient monitoring, status logging, and social sharing,” IEEE J. Biomed. Heal. Informatics, vol. 17, no. 1, pp. 30–37, 2013.
[76] The World Wide Web Consortium (W3C), “SOAP.” [Online]. Available: http://www.w3.org/TR/soap/. [Accessed: 10-Jun-2014].
[77] M. Pulgarin, R. Glitho, and A. Quintero, “An Overlay Gateway for the Integration of IP Multimedia Subsystem and Mobile Sink Based-Wireless Sensor Networks,” in IEEE 72nd Vehicular Technology Conference Fall (VTC 2010-Fall), 2010, pp. 1 – 5.
[78] M. Aly and A. Quintero, “A presence-based architecture for a gateway to integrate vehicular ad-hoc networks (VANETs), IP multimedia subsystems (IMS) and wireless sensor networks (WSNs),” in 9th International Wireless Communications and Mobile Computing Conference (IWCMC), 2013, pp. 1648–1653.
[79] A. Muhammad and P. Fergus, “Peer-to-Peer Overlay Gateway Services for Home Automation and Management,” in IEEE 24th International Conference on Advanced Information Networking and Applications Workshops, 2010, pp. 880–886.
[80] a. Muhammad, M. Merabti, and B. Askwith, “E-System: Package Delivery Framework,” 2009 Second Int. Conf. Dev. eSystems Eng., pp. 196–201, Dec. 2009.
[81] C. Fu, R. Glitho, and F. Khendek, “A Novel Session Recovery Mechanism for Cluster-based Signaling Architecture for Conferencing in MANETs,” in 27th International Conference on Distributed Computing Systems Workshops (ICDCSW’07), 2007, p. 19.
[82] W. Colitti, K. Steenhaut, and N. De Caro, “Integrating wireless sensor networks with the web,” in Extending the Internet to Low powerand Lossy Networks (IP+SN 2011), 2011, pp. 2–6.
[83] F. Stroiescu, K. Daly, and B. Kuris, “Event detection in an assisted living environment,” in Annual International Conference of the IEEE, Engineering in Medicine and Biology Society, EMBC, 2011, vol. 2011, pp. 7581 – 7584.
[84] Impetus Labs, “Zing.” [Online]. Available: https://code.google.com/p/zing/. [Accessed: 05-May-2014].
[85] NETRESEC AB, “RawCap.” [Online]. Available: http://www.netresec.com/?page=RawCap. [Accessed: 08-Aug-2014].
[86] J. Park, J. Lee, and K. Kang, “Designing and predicting QoS of a wireless system for medical telemetry,” IEEE 37th Conf. Local Comput. Networks Work. (LCN Work., pp. 737–744, Oct. 2012.
All items in Spectrum are protected by copyright, with all rights reserved. The use of items is governed by Spectrum's terms of access.

Repository Staff Only: item control page

Downloads per month over past year

Research related to the current document (at the CORE website)
- Research related to the current document (at the CORE website)
Back to top Back to top