Modeling and Optimization for Mobile Social Networks by Zhou Su Qichao Xu Kuan Zhang & Xuemin (Sherman) Shen
Author:Zhou Su, Qichao Xu, Kuan Zhang & Xuemin (Sherman) Shen
Language: eng
Format: epub
Publisher: Springer International Publishing, Cham
4.1 Relay Services in MSNs
In MSNs [1–4], users can create and share their content with each other by using mobile devices equipped with short-range wireless interfaces via peer-to-peer opportunistic links [5–8]. In MSNs, the transmission path between the source and the destination is unstable or even unavailable sometimes [9]. Moreover, since the MSNs have unique features with different types of social ties among mobile nodes, e.g., friends, relatives, etc., the transmission path is even harder to set up than the conventional networks without social ties. Therefore, a store-carry-forward fashion is used to deliver bundles to the destination in MSNs, where this delivery fashion requires mobile nodes to provide relay services.
Although many studies have been carried out to design relay schemes for wireless networks [10–12], most of the relay services assume that the transmission path between the source and the destination always exists and is stable, where these studies cannot be directly applied to MSNs. In addition, the social ties among mobile nodes bring new challenges to the study of bundle delivery in MSNs. Therefore, it is still a new and open problem to design social-aware relay services for bundle delivery in MSNs.
In this chapter, as shown in Fig. 4.1, a novel relay scheme for delivering bundles in MSNs is proposed. First, each node has its own virtual currency and can earn currency as a relay for other nodes. When a node refuses to forward the bundle of others, it will not get paid. Therefore, this node will lose a chance to earn currency to afford the relay service from other nodes in the future, with the result that the proposed scheme can efficiently prevent nodes from being selfish. Next, a bundle carrier selects relay nodes based on its current status of limited resources. Specifically, if the status of the carrier is loose, it will select one of its friends to be a relay with a low agreement price. Otherwise, if the status of the carrier is tense, it will select any node it encounters, i.e., even a nonfriend node, with a high agreement price. Then, a bargain game is employed to model the transaction pricing between the bundle carrier and the relay node, which leads to a subgame perfect Nash equilibrium as the agreement of two players to maximize their benefits. In addition, with simulation experiments, it proves that the proposed scheme is efficient to improve both delivery ratio and delay.
Fig. 4.1Schematic of an incentive scheme in the MSN
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
The Mikado Method by Ola Ellnestam Daniel Brolund(25283)
Hello! Python by Anthony Briggs(24336)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(23429)
Kotlin in Action by Dmitry Jemerov(22506)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(21969)
Dependency Injection in .NET by Mark Seemann(21838)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(20707)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(19520)
Grails in Action by Glen Smith Peter Ledbrook(18602)
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(17031)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(15840)
Secrets of the JavaScript Ninja by John Resig & Bear Bibeault(13690)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(11851)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(11151)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10621)
Hit Refresh by Satya Nadella(9188)
The Kubernetes Operator Framework Book by Michael Dame(8564)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8400)
Robo-Advisor with Python by Aki Ranin(8360)