Desktop version

Home arrow Engineering arrow Modeling and Optimization for Mobile Social Networks

Source

Summary

This chapter has presented a game-theoretic scheme for relay selection to stimulate nodes to participate in bundle delivery in MSNs. In the proposed scheme, the bundle carrier can select a friend node or a stranger to be a relay node based on its status and then pay for the corresponding virtual currency for relay service. In addition, the transaction pricing can be decided by a bargain game, where a subgame Nash perfect equilibrium is used to calculate the agreement price. Extensive simulations show that the proposed scheme can outperform other existing schemes with a higher delivery ratio and lower delivery delay. Future work will entail the security issues of payment if there are some fraudulent nodes in MSNs.

References

  • 1. N. Kayastha, D. Niyato, P. Wang, E. Hossain, Applications, architectures, and protocol design issues for mobile social networks: a survey. Proc. IEEE 99(12), 2125-2129 (2011)
  • 2. Z. Su, Q. Xu, H. Zhu, Y. Wang, A novel design for content delivery over software defined mobile social networks. IEEE Netw. 29(4), 62-67 (2015)
  • 3. K. Zhu, W. Li, X. Fu, Smart: a social- and mobile-aware routing strategy for disruption-tolerant networks. IEEE Trans. Veh. Technol. 63(7), 3423-3434 (2014)
  • 4. Q. Xu, Z. Su, K. Zhang, P. Ren, Epidemic information dissemination in mobile social networks with opportunistic links. IEEE Trans. Emerg. Top. Comput. 3(3), 399C-409 (2015)
  • 5. Z. Su, Q. Xu, Content distribution over content centric mobile social networks in 5G. IEEE Commun. Mag. 53(6), 66-72 (2015)
  • 6. Y. Liu, Z. Yang, T. Ning, H. Wu, Efficient quality-of-service (QoS) support in mobile opportunistic networks. IEEE Trans. Veh. Technol. 63(9), 4574-4584 (2014)
  • 7. Q. Xu, Z. Su, B. Han, D. Fang, Z. Xu, X. Gan, Analytical model with a novel selfishness division of mobile nodes to participate cooperation. Peer-to-Peer Netw. Appl. 9(4), 1-9 (2015)
  • 8. X. Zhang, Z. Zhang, J. Xing, R. Yu, Exact outage analysis in cognitive two-way relay networks with opportunistic relay selection under primary user’s interference. IEEE Trans. Veh. Technol. 64(6), 2502-2511 (2015)
  • 9. K. Fall, A delay-tolerant network architecture for challenged internets, in Proceedings of ACM SIGCOMM (New York, 2003), pp. 27-34
  • 10. J. Hubaux, Security and cooperation in wireless networks, in Proceedings of ESAS (Beijing, 2007), pp. 43-49
  • 11. Y. Wang, M. Chuah, Y. Chen, Incentive based data sharing in delay tolerant mobile networks. IEEE Trans. Wirel. Commun. 13(13), 370-381 (2014)
  • 12. T. Chen, L. Zhu, F. Wu, S. Zhong, Stimulating cooperation in vehicular ad hoc networks: a coalitional game theoretic approach. IEEE Trans. Veh. Technol. 60(2), 566-579 (2011)
  • 13. F. Wu, T. Chen, S. Zhong, C. Qiao, G. Chen, A game-theoretic approach to stimulate cooperation for probabilistic routing in opportunistic networks. IEEE Trans. Wirel. Commun. 12(4), 1573- 1583(2013)
  • 14. L. Wei, Z. Cao, H. Zhu, MobiGame: a user-centric reputation based incentive protocol for delay/disruption tolerant networks, in Proceedings of IEEE GLOBECOM (Houston, 2011),

pp. 1-5

  • 15. M. Mahmoud, X. Shen, PIS: a practical incentive system for multihop wireless networks. IEEE Trans. Veh. Technol. 59(8), 4012-4025 (2010)
  • 16. T. Ning, Z. Yang, X. Xie, H. Wu, Incentive-aware data dissemination in delay-tolerant mobile networks, in Proceedings of IEEE SECON (Salt Lake City, 2011), pp. 539-547
  • 17. C. Gueguen, A. Rachedi, M. Guizani, Incentive scheduler algorithm for cooperation and coverage extension in wireless networks. IEEE Trans. Veh. Technol. 62(2), 797-808 (2012)
  • 18. H. Im, Y. Lee, S. Bahk, Incentive-driven content distribution in wireless multimedia service networks, in Proceedings of IEEE GLBECOM (Miami, 2010), pp. 1-5
  • 19. S. Lee, J. Park, M. Gerla, S. Lu, Secure incentives for commercial ad dissemination in vehicular networks. IEEE Trans. Veh. Technol. 61(6), 150-159 (2007)
  • 20. F. Tseng, Y. Liu, J. Hwu, R. Chen, A secure reedcsolomon code incentive scheme for commercial ad dissemination over vanets. IEEE Trans. Veh. Technol. 60(9), 4598-4608 (2011)
  • 21. X. Liang, X. Li, T. Luan, R. Lu, X. Lin, X. Shen, Morality-driven data forwarding with privacy preservation in mobile social networks. IEEE Trans. Veh. Technol. 61(7), 3209-3222 (2012)
  • 22. Y. Wang, J. Wu, W. Yang, Cloud-based multicasting with feedback in mobile social networks. IEEE Trans. Wirel. Commun. 12(12), 6043-6053 (2013)
  • 23. D. Niyato, P. Wang, W. Saad, A. Hjorungnes, Controlled coalitional games for cooperative mobile social networks. IEEE Trans. Veh. Technol. 60(4), 1812-1824 (2011)
  • 24. E. Bulut, B. Szymanski, Friendship based routing in delay tolerant mobile social networks, in Proceedings of IEEE GLOBECOM (Miami, 2010), pp. 1-5
  • 25. J. Wu, Y. Wang, Social feature-based multi-path routing in delay tolerant networks, in Proceedings of IEEE INFOCOM (Orlando, 2012), pp. 1368-1376
  • 26. J. Lee, T. Quek, Device-to-device communication in wireless mobile social networks, in Proceedings of IEEE VTC (Seoul, 2014), pp. 1-5
  • 27. X. Zhang, G. Cao, Efficient data forwarding in mobile social networks with diverse connectivity characteristics, in Proceedings of IEEE ICDCS (Madrid, 2014), pp. 31-40
  • 28. J. Hu, L. Yang, L. Hanzo, Distributed cooperative social multicast aided content dissemination in random mobile networks. IEEE Trans. Veh. Technol. 64(7), 3075-3089 (2015)
  • 29. C. Lin, W. Lin, C. Chou, Social-based content diffusion in pocket switched networks. IEEE Trans. Veh. Technol. 60(9), 4539-4548 (2011)
  • 30. S. Zhou, F. Wu, On designing collusion-resistant routing schemes for non-cooperative wireless ad hoc networks. IEEE Trans. Netw. 18(2), 582-595 (2010)
  • 31. F. Wu, T. Chen, S. Zhong, C. Qiao, G. Chen, A bargaining-based approach for incentive- compatible message forwarding in opportunistic networks, in Proceedings of IEEE ICC (Ottawa, 2012), pp. 789-793
  • 32. D. Wen, Y. Cai, Z. Li, Y. Fan, An incentive compatible two-hop multi-copy routing protocol in DTNs, in Proceedings of IEEE MSN (Dalian, 2013), pp. 140-146
  • 33. A. Rubinstein, M. Osborne, Bargain and Markets (Academic, San Diego, 1990)
  • 34. V. Le, Z. Feng, D. Bourse, P. Zhang, A cell based dynamic spectrum management scheme with interference mitigation for cognitive networks, in Proceedings of IEEE VTC (Singapore, 2008), pp. 1594-1598
  • 35. R. Groenvelt, Stochastic Models in Mobile Ad Hoc Neworks (Univ. Nice Press, Nice, 2005)
  • 36. R. Albert, A. Barabsi, Statistical mechanics of complex networks. Rev. Mod. Phys. 74(1), 47-97 (2002)
  • 37. S. Ali, J. Qadir, A. Baig, Routing protocols in delay tolerant networks—a survey, in Proceedings ofICET (Islamabad, 2010), pp. 70-75
  • 38. A. Socievole, F. Rango, C. Coscarella, Routing approaches and performance evaluation in delay tolerant networks, in Proceedings of WTS (New York, 2011), pp. 1-6
  • 39. T. Huang, C. Lee, L. Chen, Prophet+: an adaptive prophet-based routing protocol for opportunistic network, in Proceedings of IEEE AINA (Perth, 2010), pp. 112-119
 
Source
Found a mistake? Please highlight the word and press Shift + Enter  
< Prev   CONTENTS   Next >