Abstract
Mobile social networks (MSNs) have become new network paradigms which combine mobile networks and social services based on the social relations among users.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
W. Gao, Q. Li, B. Zhao, G. Cao, Multicasting in delay tolerant networks: a social network perspective, in Proceedings of the ACM MOBIHOC (New York, 2009), pp. 299–308
V. Le, Z. Feng, D. Bourse, P. Zhang, A cell based dynamic spectrum management scheme with interference mitigation for cognitive networks. Wirel. Pers. Commun. 49(2), 1594–1598 (2008)
H. Zhu, X. Lin, R. Lu, Y. Fan, Smart: a secure multilayer credit-based incentive scheme for delay-tolerant networks. IEEE Trans. Veh. Technol. 58(8), 4628–4639 (2009)
K. Ota, M. Dong, J. Wang, S. Guo, Z. Cheng, M. Guo, Dynamic itinerary planning for mobile agents with a content-specific approach in wireless sensor networks, in Proceedings of the IEEE VTC (Ottawa, 2010), pp. 1–5
M. Dong, T. Kimata, K. Sugiura, K. Zettsu, Quality-of-experience (QoE) in emerging mobile social networks. IEICE Trans. Inf. Syst. 197(10), 2606–2612 (2014)
W. Zhang, Y. Ye, H. Tan, Q. Dai, T. Li, Information diffusion model based on social network, in Proceedings of the MCSAAISC (Berlin, 2010), pp. 145–450
E. Bulut, B. Szymanski, Friendship based routing in delay tolerant mobile social networks, in Proceedings of the IEEE GLOBECOM (Miami, 2010), pp. 1–5
R. Pastor-Satorras, M. Rubi, A. Diaz-Guilera, Statistical mechanics of complex networks. Rev. Mod. Phys. 74(1), 47–97 (2002)
N. Kayastha, D. Niyato, P. Wang, E. Hossain, Applications, architectures, and protocol design issues for mobile social networks: a survey. Proc. IEEE 99(12), 2125–2129 (2011)
J. Sun, An incentive scheme based on heterogeneous belief values for crowd sensing in mobile social networks, in Proceedings of the IEEE GLOBECOM (Atlanta, 2013), pp. 1717–1722
Q. Xu, Z. Su, B. Han, D. Fang, Z. Xu, Analytical model for epidemic information dissemination in mobile social networks with a novel selfishness division, in Proceedings of the LSMS and ICSEE (Shanghai, 2014), pp. 469–475
S. Ali, J. Qadir, A. Baig, Routing protocols in delay tolerant networks—a survey, in Proceedings of the ICET (Islamabad, 2010), pp. 70–75
A. Karam, N. Mohamed, Middleware for mobile social networks: a survey, in Proceedings of the HICSS (Maui, 2012), pp. 1482–1490
P. Ha, P. Tsigas, J. Anshus, F. Sname, SocioNet: a social-based multimedia access system for unstructured P2P networks. IEEE Trans. Parallel Distrib. Syst. 21(7), 1027–1041 (2010)
G. Cardone, A. Corradi, L. Foschini, R. Montanari, Socio-technical awareness to support recommendation and efficient delivery of ims-enabled mobile services. IEEE Commun. Mag. 50(6), 82–90 (2012)
I. Roussaki, N. Kalatzis, N. Liampotis, P. Kosmides, M. Anagnostou, K. Doolin, E. Jennings, Y. Bouloudis, S. Xynogalas, Context-awareness in wireless and mobile computing revisited to embrace social networking. IEEE Commun. Mag. 50(50), 74–81 (2012)
K. Zhang, X. Shen, Security and Privacy for Mobile Healthcare Networks (Springer, Berlin, 2015)
K. Zhang, K. Yang, X. Liang, Z. Su, X. Shen, H. Luo, Security and privacy for mobile healthcare networks-from quality-of-protection perspective. IEEE Wirel. Commun. 22(4), 104–112 (2015)
A. Toninelli, R. Montanari, A. Corradi, Enabling secure service discovery in mobile healthcare enterprise networks. IEEE Wirel. Commun. 16(3), 24–32 (2009)
K. Zhang, X. Liang, X. Shen, R. Lu, Exploiting multimedia services in mobile social networks from security and privacy perspectives. IEEE Commun. Mag. 52(3), 58–65 (2014)
K. Wei, M. Dong, K. Ota, K. Xu, Camf: Context-aware message forwarding in mobile social networks. IEEE Trans. Parallel Distrib. Syst. 26(8), 2178–2187 (2015)
A. Azaria, A. Richardson, S. Kraus, V. Subrahmanian, Behavioral analysis of insider threat: a survey and bootstrapped prediction in imbalanced data. IEEE Trans. Comput. Soc. Syst. 1(2), 135–155 (2014)
J. Ren, Y. Zhang, K. Zhang, X. Shen, SACRM: social aware crowdsourcing with reputation management in mobile sensing. Comput. Commun. 65, 55–65 (2015)
F. Soldo, A. Le, A. Markopoulou, Blacklisting recommendation system: using spatio-temporal patterns to predict future attacks. IEEE J. Sel. Areas Commun. 29(7), 1423–1437 (2011)
K. Zhang, X. Liang, R. Lu, X. Shen, PIF: a personalized fine-grained spam filtering scheme with privacy preservation in mobile social networks. IEEE Trans. Comput. Soc. Syst. 2(3), 41–52 (2015)
B. Agrawal, N. Kumar, and M. Molle, Controlling spam emails at the routers, in Proceedings of the IEEE ICC (Seoul, 2005), pp. 1588–1592
Z. Li, H. Shen, SOAP: a social network aided personalized and effective spam filter to clean your e-mail box, in Proceedings of the IEEE INFOCOM (Shanghai, 2011), pp. 1835–1843
M. Sirivianos, K. Kim, X. Yang, SocialFilter: introducing social trust to collaborative spam mitigation, in Proceedings of the IEEE INFOCOM (Shanghai, 2011), pp. 2300–2308
K. Zhang, X. Liang, R. Lu, K. Yang, X. Shen, Exploiting mobile social behaviors for sybil detection, in Proceedings of the IEEE INFOCOM (Hong Kong, 2015), pp. 271–279
M. Li, H. Zhu, Z. Gao, S. Chen, L. Yu, S. Hu, K. Ren, All your location are belong to us: breaking mobile social networks for automated user location tracking, in Proceedings of the ACM MOBIHOC (Philadelphia, 2014), pp. 43–52
X. Sheng, J. Tang, X. Xiao, G. Xue, Leveraging GPS-less sensing scheduling for green mobile crowd sensing. IEEE Internet Things J. 1(4), 328–336 (2014)
M. Newman, Detecting community structure in networks. Eur. Phys. J. B Condens. Matter Complex Syst. 38(2), 321–330 (2004)
L. Yang, X. Cao, D. Jin, X. Wang, D. Meng, A unified semi-supervised community detection framework using latent space graph regularization. IEEE Trans. Cybern. 45(11), 2585–2598 (2015)
Z. Lu, X. Sun, Y. Wen, G. Cao, Algorithms and applications for community detection in weighted networks. IEEE Trans. Parallel Distrib. Syst. 26(11), 2916–2926 (2015)
S. Jia, L. Gao, Y. Gao, H. Wang, Anti-triangle centrality-based community detection in complex networks. IET Syst. Biol. 8(3), 116–25 (2014)
J. Whang, D. Gleich, I. Dhillon, Overlapping community detection using neighborhood-inflated seed expansion. IEEE Trans. Knowl. Data Eng. 28(5), 1272–1284 (2016)
M. Chen, K. Kuzmin, B. Szymanski, Community detection via maximization of modularity and its variants. IEEE Trans. Comput. Soc. Syst. 1(1), 46–65 (2014)
J. Su, T. Havens, Quadratic program-based modularity maximization for fuzzy community detection in social networks. IEEE Trans. Fuzzy Syst. 23(5), 1356–1371 (2015)
L. Danon, A. Dłazguilera, J. Duch, A. Arenas, Comparing community structure identification. J. Stat. Mech. Theory Exp. (2005)
M. Talasila, R. Curtmola, C. Borcea, Improving location reliability in crowd sensed data with minimal efforts, in Proceedings of the WMNC (Dubai, 2013), pp. 1–8
Y. Wen, J. Shi, Q. Zhang, X. Tian, Quality-driven auction-based incentive mechanism for mobile crowd sensing. IEEE Trans. Veh. Technol. 64(9), 4203–4214 (2015)
L. Pournajaf, A. Garcia-Ulloa, L. Xiong, V. Sunderam, Participant privacy in mobile crowd sensing task management: a survey of methods and challenges, in Proceedings of the ACM SIGMOD (New York, 2014)
H. Sun, C. Wu, Epidemic forwarding in mobile social networks, in Proceedings of the IEEE ICC (Ottawa, 2012), pp. 1421–1425
Y. Wu, S. Deng, H. Huang, Information propagation through opportunistic communication in mobile social networks. Mob. Netw. Appl. 17(6), 773–781 (2012)
A. Mei, J. Stefa, Give2Get: forwarding in social mobile wireless networks of selfish individuals. IEEE Trans. Dependable Secur. Comput. 9(4), 568–581 (2012)
M. Karaliopoulos, Assessing the vulnerability of DTN data relaying schemes to node selfishness. IEEE Commun. Lett. 13(12), 923–925 (2010)
Y. Li, G. Su, D. Wu, D. Jin, L. Su, L. Zeng, The impact of node selfishness on multicasting in delay tolerant networks. IEEE Trans. Veh. Technol. 60(5), 2224–2238 (2011)
H. Zhu, L. Fu, G. Xue, Y. Zhu, M. Li, L. Ni, Recognizing exponential inter-contact time in vanets, in Proceedings of IEEE INFOCOM (New Jersey, 2010), pp. 1–5
T. Karagiannis, J. Boudec, M. Vojnovic, Power law and exponential decay of intercontact times between mobile devices. IEEE Trans. Mob. Comput. 9(10), 1377–1390 (2010)
Y. Wu, S. Deng, H. Huang, Evaluating the impact of selfish behaviors on epidemic forwarding in mobile social networks. J. Stat. Mech. Theory Exp. 2013(2), P02018 (2013)
Q. Xu, Z. Su, S. Guo, "A game theoretical incentive scheme for relay selection services in mobile social networks. IEEE Trans. Veh. Technol. PP(99), 1 (2015)
E. Bulu, B. Szymanski, Exploiting friendship relations for efficient routing in mobile social networks. IEEE Trans. Parallel Distrib. Syst. 23(23), 2254–2265 (2012)
Q. Xu, Z. Su, K. Zhang, P. Ren, X. Shen, Epidemic information dissemination in mobile social networks with opportunistic links. IEEE Trans. Emerg. Top. Comput. 3(3), 399–409 (2015)
Y. Wang, J. Wu, W. Yang, Cloud-based multicasting with feedback in mobile social networks. IEEE Trans. Wirel. Commun. 12(12), 6043–6053 (2013)
X. Fan, V. Li, K. Xu, Fairness analysis of routing in opportunistic mobile networks. IEEE Trans. Veh. Technol. 63(3), 1282–1295 (2014)
X. Zhang, Z. Zhang, J. Xing, R. Yu, Exact outage analysis in cognitive two-way relay networks with opportunistic relay selection under primary user’s interference. IEEE Trans. Veh. Technol. 64(6), 1–1 (2014)
K. Fall, A delay-tolerant network architecture for challenged internets, in Proceedings of the ACM SIGCOMM (New York, 2003), pp. 27–34
G. Lin, G. Noubir, R. Rajmohan, Mobility models for ad hoc network simulation, in Proceedings of IEEE INFOCOM (Hong Kong, 2004), p. 463
M. Kim, D. Kotz, Modeling users’ mobility among wifi access points, in Proceedings of the WTMM (Berkeley, 2005), pp. 19–24
J. Lee, C. Hou, Modeling steady-state and transient behaviors of user mobility: formulation, analysis, and application, in Proceedings of the ACM MOBIHOC (New York, 2006), pp. 85–96
C. Bettstetter, G. Resta, P. Santi, The node distribution of the random waypoint mobility model for wireless ad hoc networks. IEEE Trans. Mob. Comput. 2(3), 257–269 (2003)
G. Resta, P. Santi, Wiqosm: an integrated qos-aware mobility and user behavior model for wireless data networks. IEEE Trans. Mob. Comput. 7(2), 187–198 (2008)
M. Balazinska, P. Castro, Characterizing mobility and network usage in a corporate wireless local-area network, in Proceedings of the ICMSAS (New York, 2003), pp. 303–316
X. Liang, K. Zhang, X. Shen, X. Lin, Security and privacy in mobile social networks: challenges and solutions. IEEE Wirel. Commun. 21(21), 33–41 (2014)
Y. Wang, M. Chuah, Y. Chen, Incentive based data sharing in delay tolerant mobile networks. IEEE Trans. Wirel. Commun. 13(13), 370–381 (2014)
T. Chen, L. Zhu, F. Wu, S. Zhong, Stimulating cooperation in vehicular ad hoc networks: a coalitional game theoretic approach. IEEE Trans. Veh. Technol. 60(2), 566–579 (2011)
F. Wu, T. Chen, S. Zhong, C. Qiao, G. Chen, A game-theoretic approach to stimulate cooperation for probabilistic routing in opportunistic networks. IEEE Trans. Wirel. Commun. 12(4), 1573–1583 (2013)
L. Wei, Z. Cao, H. Zhu, Mobigame: a user-centric reputation based incentive protocol for delay/disruption tolerant networks, in Proceedings of the IEEE GLOBECOM (Houston, 2011), pp. 1–5
M. Mahmoud, X. Shen, PIS: a practical incentive system for multihop wireless networks. IEEE Trans. Veh. Technol. 59(8), 4012–4025 (2010)
H. Zhu, S. Du, M. Li, Z. Gao, Fairness-aware and privacy-preserving friend matching protocol in mobile social networks. IEEE Trans. Emerg. Top. Comput. 1(1), 192–200 (2013)
M. Li, S. Yu, N. Cao, W. Lou, Privacy-preserving distributed profile matching in proximity-based mobile social networks. IEEE Trans. Wirel. Commun. 12(5), 2024–2033 (2013)
R. Lu, X. Lin, H. Zhu, P. Ho, X. Shen, A novel anonymous mutual authentication protocol with provable link-layer location privacy. IEEE Trans. Veh. Technol. 58(3), 1454–1466 (2009)
R. Lu, X. Lin, Z. Shi, J. Shao, PLAM: A privacy-preserving framework for local-area mobile social networks, in Proceedings of the IEEE INFOCOM (Toronto, 2014), pp. 763–771
Y. Wang, D. Xu, F. Li, Providing location-aware location privacy protection for mobile location-based services. Tsinghua Sci. Technol. 21(3), 243–259 (2016)
L. Guo, C. Zhang, H. Yue, Y. Fang, A privacy-preserving social-assisted mobile content dissemination scheme in DTNS. IEEE Trans. Mob. Comput. 13(12), 2301–2309 (2013)
Q. Lian, Z. Zhang, M. Yang, B. Zhao, An empirical study of collusion behavior in the maze p2p file-sharing system, in Proceedings of the ICDCS (Toronto, 2007), pp. 56–56
K. Yang, K. Zhang, J. Ren, X. Shen, Security and privacy in mobile crowdsourcing networks: challenges and opportunities. IEEE Commun. 53(8), 75–81 (2015)
K. Zhang, X. Liang, R. Lu, X. Shen, Sybil attacks and their defenses in the internet of things. IEEE Internet Things J. 1(5), 372–383 (2014)
S. Abbas, M. Merabti, D. Llewellyn-Jones, K. Kifayat, Lightweight sybil attack detection in manets. IEEE Syst. J. 7(2), 236–248 (2013)
H. Yu, M. Kaminsky, P. Gibbons, A. Flaxman, Sybilguard: defending against sybil attacks via social networks. IEEE/ACM Trans. Netw. 16(3), 576–589 (2008)
D. Quercia, S. Hailes, Sybil attacks against mobile users: friends and foes to the rescue, in Proceedings of the IEEE INFOCOM (San Diego, 2010), pp. 1–5
Y. Ping, H. Yafei, Z. Yiping, Z. Shiyong, D. Zhoulin, Flooding attack and defence in ad hoc networks. J. Syst. Eng. Electron. 17(2), 410–416 (2006)
P. Yi, F. Zou, V. Zou, Z. Wang, Performance analysis of mobile ad hoc networks under flooding attacks. J. Syst. Eng. Electron. 22(11), 334–339 (2011)
H. Kim, R.B. Chitti, J. Song, Novel defense mechanism against data flooding attacks in wireless ad hoc networks. IEEE Trans. Consum. Electron. 56(2), 579–582 (2010)
M. Fallah, A puzzle-based defense strategy against flooding attacks using game theory. IEEE Trans. Dependable Secur. Comput. 7(1), 5–9 (2010)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this chapter
Cite this chapter
Su, Z., Xu, Q., Zhang, K., Shen, X. (2016). Introduction. In: Modeling and Optimization for Mobile Social Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-47922-4_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-47922-4_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-47921-7
Online ISBN: 978-3-319-47922-4
eBook Packages: Computer ScienceComputer Science (R0)