Skip to main content
  • 393 Accesses

Abstract

Mobile social networks (MSNs) have become new network paradigms which combine mobile networks and social services based on the social relations among users.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. W. Gao, Q. Li, B. Zhao, G. Cao, Multicasting in delay tolerant networks: a social network perspective, in Proceedings of the ACM MOBIHOC (New York, 2009), pp. 299–308

    Google Scholar 

  2. V. Le, Z. Feng, D. Bourse, P. Zhang, A cell based dynamic spectrum management scheme with interference mitigation for cognitive networks. Wirel. Pers. Commun. 49(2), 1594–1598 (2008)

    Google Scholar 

  3. H. Zhu, X. Lin, R. Lu, Y. Fan, Smart: a secure multilayer credit-based incentive scheme for delay-tolerant networks. IEEE Trans. Veh. Technol. 58(8), 4628–4639 (2009)

    Article  Google Scholar 

  4. K. Ota, M. Dong, J. Wang, S. Guo, Z. Cheng, M. Guo, Dynamic itinerary planning for mobile agents with a content-specific approach in wireless sensor networks, in Proceedings of the IEEE VTC (Ottawa, 2010), pp. 1–5

    Google Scholar 

  5. M. Dong, T. Kimata, K. Sugiura, K. Zettsu, Quality-of-experience (QoE) in emerging mobile social networks. IEICE Trans. Inf. Syst. 197(10), 2606–2612 (2014)

    Article  Google Scholar 

  6. W. Zhang, Y. Ye, H. Tan, Q. Dai, T. Li, Information diffusion model based on social network, in Proceedings of the MCSAAISC (Berlin, 2010), pp. 145–450

    Google Scholar 

  7. E. Bulut, B. Szymanski, Friendship based routing in delay tolerant mobile social networks, in Proceedings of the IEEE GLOBECOM (Miami, 2010), pp. 1–5

    Google Scholar 

  8. R. Pastor-Satorras, M. Rubi, A. Diaz-Guilera, Statistical mechanics of complex networks. Rev. Mod. Phys. 74(1), 47–97 (2002)

    Article  MathSciNet  Google Scholar 

  9. N. Kayastha, D. Niyato, P. Wang, E. Hossain, Applications, architectures, and protocol design issues for mobile social networks: a survey. Proc. IEEE 99(12), 2125–2129 (2011)

    Article  Google Scholar 

  10. J. Sun, An incentive scheme based on heterogeneous belief values for crowd sensing in mobile social networks, in Proceedings of the IEEE GLOBECOM (Atlanta, 2013), pp. 1717–1722

    Google Scholar 

  11. Q. Xu, Z. Su, B. Han, D. Fang, Z. Xu, Analytical model for epidemic information dissemination in mobile social networks with a novel selfishness division, in Proceedings of the LSMS and ICSEE (Shanghai, 2014), pp. 469–475

    Google Scholar 

  12. S. Ali, J. Qadir, A. Baig, Routing protocols in delay tolerant networks—a survey, in Proceedings of the ICET (Islamabad, 2010), pp. 70–75

    Google Scholar 

  13. A. Karam, N. Mohamed, Middleware for mobile social networks: a survey, in Proceedings of the HICSS (Maui, 2012), pp. 1482–1490

    Google Scholar 

  14. P. Ha, P. Tsigas, J. Anshus, F. Sname, SocioNet: a social-based multimedia access system for unstructured P2P networks. IEEE Trans. Parallel Distrib. Syst. 21(7), 1027–1041 (2010)

    Google Scholar 

  15. G. Cardone, A. Corradi, L. Foschini, R. Montanari, Socio-technical awareness to support recommendation and efficient delivery of ims-enabled mobile services. IEEE Commun. Mag. 50(6), 82–90 (2012)

    Article  Google Scholar 

  16. I. Roussaki, N. Kalatzis, N. Liampotis, P. Kosmides, M. Anagnostou, K. Doolin, E. Jennings, Y. Bouloudis, S. Xynogalas, Context-awareness in wireless and mobile computing revisited to embrace social networking. IEEE Commun. Mag. 50(50), 74–81 (2012)

    Article  Google Scholar 

  17. K. Zhang, X. Shen, Security and Privacy for Mobile Healthcare Networks (Springer, Berlin, 2015)

    Google Scholar 

  18. http://www.forbes.com/

  19. K. Zhang, K. Yang, X. Liang, Z. Su, X. Shen, H. Luo, Security and privacy for mobile healthcare networks-from quality-of-protection perspective. IEEE Wirel. Commun. 22(4), 104–112 (2015)

    Article  Google Scholar 

  20. A. Toninelli, R. Montanari, A. Corradi, Enabling secure service discovery in mobile healthcare enterprise networks. IEEE Wirel. Commun. 16(3), 24–32 (2009)

    Article  Google Scholar 

  21. K. Zhang, X. Liang, X. Shen, R. Lu, Exploiting multimedia services in mobile social networks from security and privacy perspectives. IEEE Commun. Mag. 52(3), 58–65 (2014)

    Article  Google Scholar 

  22. K. Wei, M. Dong, K. Ota, K. Xu, Camf: Context-aware message forwarding in mobile social networks. IEEE Trans. Parallel Distrib. Syst. 26(8), 2178–2187 (2015)

    Google Scholar 

  23. A. Azaria, A. Richardson, S. Kraus, V. Subrahmanian, Behavioral analysis of insider threat: a survey and bootstrapped prediction in imbalanced data. IEEE Trans. Comput. Soc. Syst. 1(2), 135–155 (2014)

    Article  Google Scholar 

  24. J. Ren, Y. Zhang, K. Zhang, X. Shen, SACRM: social aware crowdsourcing with reputation management in mobile sensing. Comput. Commun. 65, 55–65 (2015)

    Article  Google Scholar 

  25. F. Soldo, A. Le, A. Markopoulou, Blacklisting recommendation system: using spatio-temporal patterns to predict future attacks. IEEE J. Sel. Areas Commun. 29(7), 1423–1437 (2011)

    Article  Google Scholar 

  26. K. Zhang, X. Liang, R. Lu, X. Shen, PIF: a personalized fine-grained spam filtering scheme with privacy preservation in mobile social networks. IEEE Trans. Comput. Soc. Syst. 2(3), 41–52 (2015)

    Article  Google Scholar 

  27. B. Agrawal, N. Kumar, and M. Molle, Controlling spam emails at the routers, in Proceedings of the IEEE ICC (Seoul, 2005), pp. 1588–1592

    Google Scholar 

  28. Z. Li, H. Shen, SOAP: a social network aided personalized and effective spam filter to clean your e-mail box, in Proceedings of the IEEE INFOCOM (Shanghai, 2011), pp. 1835–1843

    Google Scholar 

  29. M. Sirivianos, K. Kim, X. Yang, SocialFilter: introducing social trust to collaborative spam mitigation, in Proceedings of the IEEE INFOCOM (Shanghai, 2011), pp. 2300–2308

    Google Scholar 

  30. K. Zhang, X. Liang, R. Lu, K. Yang, X. Shen, Exploiting mobile social behaviors for sybil detection, in Proceedings of the IEEE INFOCOM (Hong Kong, 2015), pp. 271–279

    Google Scholar 

  31. M. Li, H. Zhu, Z. Gao, S. Chen, L. Yu, S. Hu, K. Ren, All your location are belong to us: breaking mobile social networks for automated user location tracking, in Proceedings of the ACM MOBIHOC (Philadelphia, 2014), pp. 43–52

    Google Scholar 

  32. X. Sheng, J. Tang, X. Xiao, G. Xue, Leveraging GPS-less sensing scheduling for green mobile crowd sensing. IEEE Internet Things J. 1(4), 328–336 (2014)

    Article  Google Scholar 

  33. M. Newman, Detecting community structure in networks. Eur. Phys. J. B Condens. Matter Complex Syst. 38(2), 321–330 (2004)

    Article  Google Scholar 

  34. L. Yang, X. Cao, D. Jin, X. Wang, D. Meng, A unified semi-supervised community detection framework using latent space graph regularization. IEEE Trans. Cybern. 45(11), 2585–2598 (2015)

    Article  Google Scholar 

  35. Z. Lu, X. Sun, Y. Wen, G. Cao, Algorithms and applications for community detection in weighted networks. IEEE Trans. Parallel Distrib. Syst. 26(11), 2916–2926 (2015)

    Article  Google Scholar 

  36. S. Jia, L. Gao, Y. Gao, H. Wang, Anti-triangle centrality-based community detection in complex networks. IET Syst. Biol. 8(3), 116–25 (2014)

    Article  Google Scholar 

  37. J. Whang, D. Gleich, I. Dhillon, Overlapping community detection using neighborhood-inflated seed expansion. IEEE Trans. Knowl. Data Eng. 28(5), 1272–1284 (2016)

    Article  Google Scholar 

  38. M. Chen, K. Kuzmin, B. Szymanski, Community detection via maximization of modularity and its variants. IEEE Trans. Comput. Soc. Syst. 1(1), 46–65 (2014)

    Article  Google Scholar 

  39. J. Su, T. Havens, Quadratic program-based modularity maximization for fuzzy community detection in social networks. IEEE Trans. Fuzzy Syst. 23(5), 1356–1371 (2015)

    Article  Google Scholar 

  40. L. Danon, A. Dłazguilera, J. Duch, A. Arenas, Comparing community structure identification. J. Stat. Mech. Theory Exp. (2005)

    Google Scholar 

  41. M. Talasila, R. Curtmola, C. Borcea, Improving location reliability in crowd sensed data with minimal efforts, in Proceedings of the WMNC (Dubai, 2013), pp. 1–8

    Google Scholar 

  42. Y. Wen, J. Shi, Q. Zhang, X. Tian, Quality-driven auction-based incentive mechanism for mobile crowd sensing. IEEE Trans. Veh. Technol. 64(9), 4203–4214 (2015)

    Article  Google Scholar 

  43. L. Pournajaf, A. Garcia-Ulloa, L. Xiong, V. Sunderam, Participant privacy in mobile crowd sensing task management: a survey of methods and challenges, in Proceedings of the ACM SIGMOD (New York, 2014)

    Google Scholar 

  44. H. Sun, C. Wu, Epidemic forwarding in mobile social networks, in Proceedings of the IEEE ICC (Ottawa, 2012), pp. 1421–1425

    Google Scholar 

  45. Y. Wu, S. Deng, H. Huang, Information propagation through opportunistic communication in mobile social networks. Mob. Netw. Appl. 17(6), 773–781 (2012)

    Article  Google Scholar 

  46. A. Mei, J. Stefa, Give2Get: forwarding in social mobile wireless networks of selfish individuals. IEEE Trans. Dependable Secur. Comput. 9(4), 568–581 (2012)

    Article  Google Scholar 

  47. M. Karaliopoulos, Assessing the vulnerability of DTN data relaying schemes to node selfishness. IEEE Commun. Lett. 13(12), 923–925 (2010)

    Article  Google Scholar 

  48. Y. Li, G. Su, D. Wu, D. Jin, L. Su, L. Zeng, The impact of node selfishness on multicasting in delay tolerant networks. IEEE Trans. Veh. Technol. 60(5), 2224–2238 (2011)

    Article  Google Scholar 

  49. H. Zhu, L. Fu, G. Xue, Y. Zhu, M. Li, L. Ni, Recognizing exponential inter-contact time in vanets, in Proceedings of IEEE INFOCOM (New Jersey, 2010), pp. 1–5

    Google Scholar 

  50. T. Karagiannis, J. Boudec, M. Vojnovic, Power law and exponential decay of intercontact times between mobile devices. IEEE Trans. Mob. Comput. 9(10), 1377–1390 (2010)

    Article  Google Scholar 

  51. Y. Wu, S. Deng, H. Huang, Evaluating the impact of selfish behaviors on epidemic forwarding in mobile social networks. J. Stat. Mech. Theory Exp. 2013(2), P02018 (2013)

    Article  MathSciNet  Google Scholar 

  52. Q. Xu, Z. Su, S. Guo, "A game theoretical incentive scheme for relay selection services in mobile social networks. IEEE Trans. Veh. Technol. PP(99), 1 (2015)

    Google Scholar 

  53. E. Bulu, B. Szymanski, Exploiting friendship relations for efficient routing in mobile social networks. IEEE Trans. Parallel Distrib. Syst. 23(23), 2254–2265 (2012)

    Article  Google Scholar 

  54. Q. Xu, Z. Su, K. Zhang, P. Ren, X. Shen, Epidemic information dissemination in mobile social networks with opportunistic links. IEEE Trans. Emerg. Top. Comput. 3(3), 399–409 (2015)

    Article  Google Scholar 

  55. Y. Wang, J. Wu, W. Yang, Cloud-based multicasting with feedback in mobile social networks. IEEE Trans. Wirel. Commun. 12(12), 6043–6053 (2013)

    Article  Google Scholar 

  56. X. Fan, V. Li, K. Xu, Fairness analysis of routing in opportunistic mobile networks. IEEE Trans. Veh. Technol. 63(3), 1282–1295 (2014)

    Article  Google Scholar 

  57. X. Zhang, Z. Zhang, J. Xing, R. Yu, Exact outage analysis in cognitive two-way relay networks with opportunistic relay selection under primary user’s interference. IEEE Trans. Veh. Technol. 64(6), 1–1 (2014)

    Article  Google Scholar 

  58. K. Fall, A delay-tolerant network architecture for challenged internets, in Proceedings of the ACM SIGCOMM (New York, 2003), pp. 27–34

    Google Scholar 

  59. G. Lin, G. Noubir, R. Rajmohan, Mobility models for ad hoc network simulation, in Proceedings of IEEE INFOCOM (Hong Kong, 2004), p. 463

    Google Scholar 

  60. M. Kim, D. Kotz, Modeling users’ mobility among wifi access points, in Proceedings of the WTMM (Berkeley, 2005), pp. 19–24

    Google Scholar 

  61. J. Lee, C. Hou, Modeling steady-state and transient behaviors of user mobility: formulation, analysis, and application, in Proceedings of the ACM MOBIHOC (New York, 2006), pp. 85–96

    Google Scholar 

  62. C. Bettstetter, G. Resta, P. Santi, The node distribution of the random waypoint mobility model for wireless ad hoc networks. IEEE Trans. Mob. Comput. 2(3), 257–269 (2003)

    Article  Google Scholar 

  63. G. Resta, P. Santi, Wiqosm: an integrated qos-aware mobility and user behavior model for wireless data networks. IEEE Trans. Mob. Comput. 7(2), 187–198 (2008)

    Article  Google Scholar 

  64. M. Balazinska, P. Castro, Characterizing mobility and network usage in a corporate wireless local-area network, in Proceedings of the ICMSAS (New York, 2003), pp. 303–316

    Google Scholar 

  65. X. Liang, K. Zhang, X. Shen, X. Lin, Security and privacy in mobile social networks: challenges and solutions. IEEE Wirel. Commun. 21(21), 33–41 (2014)

    Article  Google Scholar 

  66. Y. Wang, M. Chuah, Y. Chen, Incentive based data sharing in delay tolerant mobile networks. IEEE Trans. Wirel. Commun. 13(13), 370–381 (2014)

    Article  Google Scholar 

  67. T. Chen, L. Zhu, F. Wu, S. Zhong, Stimulating cooperation in vehicular ad hoc networks: a coalitional game theoretic approach. IEEE Trans. Veh. Technol. 60(2), 566–579 (2011)

    Article  Google Scholar 

  68. F. Wu, T. Chen, S. Zhong, C. Qiao, G. Chen, A game-theoretic approach to stimulate cooperation for probabilistic routing in opportunistic networks. IEEE Trans. Wirel. Commun. 12(4), 1573–1583 (2013)

    Article  Google Scholar 

  69. L. Wei, Z. Cao, H. Zhu, Mobigame: a user-centric reputation based incentive protocol for delay/disruption tolerant networks, in Proceedings of the IEEE GLOBECOM (Houston, 2011), pp. 1–5

    Google Scholar 

  70. M. Mahmoud, X. Shen, PIS: a practical incentive system for multihop wireless networks. IEEE Trans. Veh. Technol. 59(8), 4012–4025 (2010)

    Article  Google Scholar 

  71. H. Zhu, S. Du, M. Li, Z. Gao, Fairness-aware and privacy-preserving friend matching protocol in mobile social networks. IEEE Trans. Emerg. Top. Comput. 1(1), 192–200 (2013)

    Article  Google Scholar 

  72. M. Li, S. Yu, N. Cao, W. Lou, Privacy-preserving distributed profile matching in proximity-based mobile social networks. IEEE Trans. Wirel. Commun. 12(5), 2024–2033 (2013)

    Article  Google Scholar 

  73. R. Lu, X. Lin, H. Zhu, P. Ho, X. Shen, A novel anonymous mutual authentication protocol with provable link-layer location privacy. IEEE Trans. Veh. Technol. 58(3), 1454–1466 (2009)

    Article  Google Scholar 

  74. R. Lu, X. Lin, Z. Shi, J. Shao, PLAM: A privacy-preserving framework for local-area mobile social networks, in Proceedings of the IEEE INFOCOM (Toronto, 2014), pp. 763–771

    Google Scholar 

  75. Y. Wang, D. Xu, F. Li, Providing location-aware location privacy protection for mobile location-based services. Tsinghua Sci. Technol. 21(3), 243–259 (2016)

    Article  MathSciNet  Google Scholar 

  76. L. Guo, C. Zhang, H. Yue, Y. Fang, A privacy-preserving social-assisted mobile content dissemination scheme in DTNS. IEEE Trans. Mob. Comput. 13(12), 2301–2309 (2013)

    Google Scholar 

  77. Q. Lian, Z. Zhang, M. Yang, B. Zhao, An empirical study of collusion behavior in the maze p2p file-sharing system, in Proceedings of the ICDCS (Toronto, 2007), pp. 56–56

    Google Scholar 

  78. K. Yang, K. Zhang, J. Ren, X. Shen, Security and privacy in mobile crowdsourcing networks: challenges and opportunities. IEEE Commun. 53(8), 75–81 (2015)

    Article  Google Scholar 

  79. K. Zhang, X. Liang, R. Lu, X. Shen, Sybil attacks and their defenses in the internet of things. IEEE Internet Things J. 1(5), 372–383 (2014)

    Article  Google Scholar 

  80. S. Abbas, M. Merabti, D. Llewellyn-Jones, K. Kifayat, Lightweight sybil attack detection in manets. IEEE Syst. J. 7(2), 236–248 (2013)

    Article  Google Scholar 

  81. H. Yu, M. Kaminsky, P. Gibbons, A. Flaxman, Sybilguard: defending against sybil attacks via social networks. IEEE/ACM Trans. Netw. 16(3), 576–589 (2008)

    Article  Google Scholar 

  82. D. Quercia, S. Hailes, Sybil attacks against mobile users: friends and foes to the rescue, in Proceedings of the IEEE INFOCOM (San Diego, 2010), pp. 1–5

    Google Scholar 

  83. Y. Ping, H. Yafei, Z. Yiping, Z. Shiyong, D. Zhoulin, Flooding attack and defence in ad hoc networks. J. Syst. Eng. Electron. 17(2), 410–416 (2006)

    Article  MATH  Google Scholar 

  84. P. Yi, F. Zou, V. Zou, Z. Wang, Performance analysis of mobile ad hoc networks under flooding attacks. J. Syst. Eng. Electron. 22(11), 334–339 (2011)

    Article  Google Scholar 

  85. H. Kim, R.B. Chitti, J. Song, Novel defense mechanism against data flooding attacks in wireless ad hoc networks. IEEE Trans. Consum. Electron. 56(2), 579–582 (2010)

    Article  Google Scholar 

  86. M. Fallah, A puzzle-based defense strategy against flooding attacks using game theory. IEEE Trans. Dependable Secur. Comput. 7(1), 5–9 (2010)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhou Su .

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing AG

About this chapter

Cite this chapter

Su, Z., Xu, Q., Zhang, K., Shen, X. (2016). Introduction. In: Modeling and Optimization for Mobile Social Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-47922-4_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-47922-4_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-47921-7

  • Online ISBN: 978-3-319-47922-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics