In this chapter, we have developed an analytical model to analyze the epidemic information dissemination in MSNs. The model considers the change of mobile nodes’ interests by introducing two novel elements called pre-immunity and immunity.

With these elements, we have proposed information dissemination mechanism with four rules for epidemic information dissemination process. According to these four rules, the analytical model has been developed through ordinary differential equations. By conducting extensive trace-driven simulations, we have demonstrated that our analytical model is more accurate than existing ones.


  • 1. N. Kayastha, D. Niyato, P. Wang, E. Hossain, Applications, architectures, and protocol design issues for mobile social networks: a survey. Proc. IEEE 99(12), 2130-2158 (2011)
  • 2. Y. Wang, P. Ren, F. Gao, Z. Su, A hybrid underlay/overlay transmission mode for cognitive radio networks with statistical quality-of-service provisioning. IEEE Trans. Wirel. Commun. 13(3), 1482-1498 (2014)
  • 3. K. Zhang, X. Liang, X. Shen, R. Lu, Exploiting multimedia services in mobile social networks from security and privacy perspectives. IEEE Commun. Mag. 52(3), 58-65 (2014)
  • 4. X. Liang, K. Zhang, X. Shen, X. Lin, Security and privacy in mobile social networks: challenges and solutions. IEEE Wirel. Commun. 21(1), 33-41 (2014)
  • 5. F. Nazir, J. Ma, A. Seneviratne, Time critical content delivery using predictable patterns in mobile social networks, in Proceedings of the CSE, vol. 4 (Vancouver, 2009), pp. 1066-1073
  • 6. Y. Zhang, L. Song, W. Saad, Z. Dawy, Z. Han, Exploring social ties for enhanced device- to-device communications in wireless networks, in Proceedings of the IEEE GLOBECOM (Atlanta, 2013), pp. 4597-4602
  • 7. Y. Zhang, E. Pan, L. Song, W. Saad, Z. Dawy, Z. Han, Social network aware device-to-device communication in wireless networks. IEEE Trans. Wirel. Commun. 14(1), 177-190 (2015)
  • 8. Z. Wang, Y. Chen, C. Li, Corman: a novel cooperative opportunistic routing scheme in mobile ad hoc networks. IEEE J. Sel. Areas Commun. 30(2), 289-296 (2012)
  • 9. Y. Wang, M.C. Chuah, Y. Chen, Incentive based data sharing in delay tolerant mobile networks. IEEE Trans. Wirel. Commun. 13(1), 370-381 (2014)
  • 10. F. Kevin, A delay-tolerant network architecture for challenged internets, in Proceedings of the CATAPCC (New York, 2003), pp. 27-34
  • 11. A. Khosravi, J. Pan, Exploring personal interest in intermittently connected wireless mobile social networks, in Proceedings of the IEEE CCNC (Las Vegas, 2011), pp. 503-508
  • 12. H. Zhu, S. Du, M. Li, Z. Gao, Fairness-aware and privacy-preserving friend matching protocol in mobile social networks. IEEE Trans. Emerg. Top. Comput. 1(1), 192-200 (2013)
  • 13. L. Buttyan, J.-P. Hubaux, Security and cooperation in wireless networks: thwarting malicious and selfish behavior in the age of ubiquitous computing (Cambridge University Press, Cambridge, 2007)
  • 14. C. Zou, D. Towsley, W. Gong, Modeling and simulation study of the propagation and defense of internet e-mail worms. IEEE Trans. Dependable Secur. Comput. 4(2), 105-118 (2007)
  • 15. Y. Wang, X. Yang, Y. Han, X. Wang, Rumor spreading model with trust mechanism in complex social networks. Commun. Theor. Phys. 59(4), 510-516 (2013)
  • 16. S. Boccaletti, V. Latora, Y. Moreno, Complex networks: structure and dynamics. Phys. Rep. 424(4), 175-308 (2006)
  • 17. H. Wang, J. Han, L. Deng, K. Cheng, Dynamics of rumor spreading in mobile social networks. Acta Phys. Sin. 62(11), 1-12 (2013)
  • 18. F. Xiong, Y. Liu, Z. Zhang, Z. Jiang, Y. Zhang, An information diffusion model based on retweeting mechanism for online social media. Phys. Lett. 376(30), 2103-2108 (2012)
  • 19. Y. Zhang, Y. Liu, H. Zhang, H. Cheng, F. Xiong, The research of information dissemination model on online social network. Acta Phys. Sin. 60(5), 1-7 (2011)
  • 20. K. Zhang, X. Liang, R. Lu, X. Shen, H. Zhao, Vslp: Voronoi-socialspot-aided packet forwarding protocol with receiver location privacy in msns,in Proceedings of the IEEE GLOBECOM (CA,
  • 2012) , pp. 348-353
  • 21. M. Nekovee, Y. Moreno, G. Bianconi, M. Marsili, Theory of rumour spreading in complex social networks. Phys. A 374(1), 457-470 (2007)
  • 22. W. Zhang, Y. Ye, H. Tan, Q. Dai, T. Li, Information diffusion model based on social network, in Proceedings of the ICMCSA (Wuhan, 2013), pp. 145-150
  • 23. H. Dang, H. Wu, Clustering and cluster-based routing protocol for delay-tolerant mobile networks. IEEE Trans. Wirel. Commun. 9(6), 1874-1881 (2010)
  • 24. E. Talipov, Y. Chon, H. Cha, Content sharing over smartphone-based delay-tolerant networks. IEEE Trans. Mob. Comput. 12(3), 581-595 (2013)
  • 25. E. Sammou, Efficient probabilistic routing in delay tolerant networks, in Proceedings of the ICMCS (Tangier, 2012), pp. 584-589
  • 26. Y. Ma, A. Jamalipour, A cooperative cache-based content delivery framework for intermittently connected mobile ad hoc networks. IEEE Trans. Wirel. Commun. 9(1), 366-373 (2010)
  • 27. K. Zhang, X. Liang, M. Barua, R. Lu, X. Shen, Phda: a priority based health data aggregation with privacy preservation for cloud assisted wbans. Inf. Sci. 284, 1-12 (2014)
  • 28. K. Zhang, X. Liang, R. Lu, X. Shen, Exploiting private profile matching for efficient packet forwarding in mobile social networks. Oppor. Mob. Soc. Netw. 283-312 (2014)
  • 29. E. Bulut, B. Szymanski, Exploiting friendship relations for efficient routing in mobile social networks. IEEE Trans. Parallel Distrib. Syst. 23(12), 2254-2265 (2012)
  • 30. Y. Wang, J. Wu, W. Yang, Cloud-based multicasting with feedback in mobile social networks. IEEE Trans. Wirel. Commun. 12(12), 6043-6053 (2013)
  • 31. P. Costa, C. Mascolo, M. Musolesi, G. Picco, Socially-aware routing for publish-subscribe in delay-tolerant mobile ad hoc networks. IEEE J. Sel. Areas Commun. 26(5), 748-760 (2008)
  • 32. H. Sun, C. Wu, Epidemic forwarding in mobile social networks, in Proceedings of the IEEE ICC (Ottawa, 2012), pp. 1421-1425
  • 33. Y. Wu, S. Deng, H. Huang, Hop limited epidemic-like information spreading in mobile social networks with selfish nodes. J. Phys. A: Math. Theor. 46(26), 1-14 (2013)
  • 34. D. Adu-Gyamfi, Y. Wang, F. Zhang, M. Domenic, I. Memon, Y. Gustav, Modeling the spreading behavior of passive worms in mobile social networks, in Proceeding of the ICIII, vol. 1 (Xi’an,
  • 2013) , pp. 380-383
  • 35. Y. Wu, S. Deng, H. Huang, Information propagation through opportunistic communication in mobile social networks. Mob. Netw. Appl. 17(6), 773-781 (2012)
  • 36. K. Zhang, X. Liang, R. Lu, X. Shen, Pif: a personalized fine-grained spam filtering scheme with privacy preservation in mobile social networks. IEEE Trans. Comput. Soc. Syst. 2(3), 41-52 (2015)
  • 37. A. Clauset, C. Shalizi, M. Newman, Power-law distributions in empirical data. SIAM Rev. 51(4), 661-703 (2009)
  • 38. A. Clementi, C. Macci, A. Monti, F. Pasquale, R. Silvestri, Flooding time in edge-markovian dynamic graphs, in Proceedings of the ACM PDC (Toronto, 2008), pp. 213-222
  • 39. M. Karaliopoulos, Assessing the vulnerability of dtn data relaying schemes to node selfishness. IEEE Commun. Lett. 13(12), 923-925 (2009)
  • 40. Y. Li, G. Su, D. Wu, D. Jin, L. Su, L. Zeng, The impact of node selfishness on multicasting in delay tolerant networks. IEEE Trans. Veh. Technol. 60(5), 2224-2238 (2011)
  • 41. H. Zhu, L. Fu, G. Xue, Y. Zhu, M. Li, L. Ni, Recognizing exponential inter-contact time in vanets, in Proceedings of the IEEE INFOCOM (San Diego, 2010), pp. 1-5
  • 42. T. Karagiannis, J.L. Boudec, M. Vojnovic, Power law and exponential decay of intercontact times between mobile devices. IEEE Trans. Mob. Comput. 9(10), 1377-1390 (2010)
  • 43. R. Boas, Counterexamples to l’hopital’s rule. Am. Math. Mon. 93(9), 644-645 (1986)
  • 44. A. Vazquez, M. Weigt, Computational complexity arising from degree correlations in networks. Phys. Rev. E 67(2), 1-4 (2003)
  • 45. R. Albert, A.-L. Barabasi, Statistical mechanics of complex networks. Rev. Mod. Phys. 74(1), 47-49 (2002)
  • 46. M. Newman, S. Strogatz, D. Watts, Random graphs with arbitrary degree distributions and their applications. Phys. Rev. E 64(2), 1-17 (2001)
  • 47. D. Watts, S. Strogatz, Collective dynamics of small-worldnetworks. Nature 393(6684), 440442 (1998)
  • 48. B. Tian, D. Towsley, On distinguishing between internet power law topology generators, in Proceedings of the IEEE INFOCOM (Orlando, 2002), pp. 638-647
  • 49. Q. Xu, Z. Su, K. Zhang, P. Ren, X. Shen, Epidemic information dissemination in mobile social networks with opportunistic links. IEEE Trans. Emerg. Top. Comput. 3(3), 399-409 (2015)
< Prev   CONTENTS   Source   Next >