Optimal Relay Services for MSNs



In this chapter, the optimization of relay service for MSNs is studied. In MSNs, each user has his own virtual currency and can earn currency as a relay for other users. A bundle carrier selects relay users based on his current resource usage. A bargain game is employed to model the transaction pricing between the bundle carrier and the relay user, which leads to a subgame perfect Nash equilibrium as the agreement of two players to maximize their benefits. The simulation shows that the proposed scheme can efficiently improve both delivery ratio and delay performance in MSNs with an optimal relay service.


Mobile Node Relay Node Delivery Ratio Buffer Size Reserve Price 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    N. Kayastha, D. Niyato, P. Wang, E. Hossain, Applications, architectures, and protocol design issues for mobile social networks: a survey. Proc. IEEE 99(12), 2125–2129 (2011)CrossRefGoogle Scholar
  2. 2.
    Z. Su, Q. Xu, H. Zhu, Y. Wang, A novel design for content delivery over software defined mobile social networks. IEEE Netw. 29(4), 62–67 (2015)CrossRefGoogle Scholar
  3. 3.
    K. Zhu, W. Li, X. Fu, Smart: a social- and mobile-aware routing strategy for disruption-tolerant networks. IEEE Trans. Veh. Technol. 63(7), 3423–3434 (2014)CrossRefGoogle Scholar
  4. 4.
    Q. Xu, Z. Su, K. Zhang, P. Ren, Epidemic information dissemination in mobile social networks with opportunistic links. IEEE Trans. Emerg. Top. Comput. 3(3), 399C–409 (2015)CrossRefGoogle Scholar
  5. 5.
    Z. Su, Q. Xu, Content distribution over content centric mobile social networks in 5G. IEEE Commun. Mag. 53(6), 66–72 (2015)CrossRefGoogle Scholar
  6. 6.
    Y. Liu, Z. Yang, T. Ning, H. Wu, Efficient quality-of-service (qos) support in mobile opportunistic networks. IEEE Trans. Veh. Technol. 63(9), 4574–4584 (2014)CrossRefGoogle Scholar
  7. 7.
    Q. Xu, Z. Su, B. Han, D. Fang, Z. Xu, X. Gan, Analytical model with a novel selfishness division of mobile nodes to participate cooperation. Peer-to-Peer Netw. Appl. 9(4), 1–9 (2015)Google Scholar
  8. 8.
    X. Zhang, Z. Zhang, J. Xing, R. Yu, Exact outage analysis in cognitive two-way relay networks with opportunistic relay selection under primary user’s interference. IEEE Trans. Veh. Technol. 64(6), 2502–2511 (2015)CrossRefGoogle Scholar
  9. 9.
    K. Fall, A delay-tolerant network architecture for challenged internets, in Proceedings of ACM SIGCOMM (New York, 2003), pp. 27–34Google Scholar
  10. 10.
    J. Hubaux, Security and cooperation in wireless networks, in Proceedings of ESAS (Beijing, 2007), pp. 43–49Google Scholar
  11. 11.
    Y. Wang, M. Chuah, Y. Chen, Incentive based data sharing in delay tolerant mobile networks. IEEE Trans. Wirel. Commun. 13(13), 370–381 (2014)CrossRefGoogle Scholar
  12. 12.
    T. Chen, L. Zhu, F. Wu, S. Zhong, Stimulating cooperation in vehicular ad hoc networks: a coalitional game theoretic approach. IEEE Trans. Veh. Technol. 60(2), 566–579 (2011)CrossRefGoogle Scholar
  13. 13.
    F. Wu, T. Chen, S. Zhong, C. Qiao, G. Chen, A game-theoretic approach to stimulate cooperation for probabilistic routing in opportunistic networks. IEEE Trans. Wirel. Commun. 12(4), 1573–1583 (2013)CrossRefGoogle Scholar
  14. 14.
    L. Wei, Z. Cao, H. Zhu, MobiGame: a user-centric reputation based incentive protocol for delay/disruption tolerant networks, in Proceedings of IEEE GLOBECOM (Houston, 2011), pp. 1–5Google Scholar
  15. 15.
    M. Mahmoud, X. Shen, Pis: a practical incentive system for multihop wireless networks. IEEE Trans. Veh. Technol. 59(8), 4012–4025 (2010)CrossRefGoogle Scholar
  16. 16.
    T. Ning, Z. Yang, X. Xie, H. Wu, Incentive-aware data dissemination in delay-tolerant mobile networks, in Proceedings of IEEE SECON (Salt Lake City, 2011), pp. 539–547Google Scholar
  17. 17.
    C. Gueguen, A. Rachedi, M. Guizani, Incentive scheduler algorithm for cooperation and coverage extension in wireless networks. IEEE Trans. Veh. Technol. 62(2), 797–808 (2012)CrossRefGoogle Scholar
  18. 18.
    H. Im, Y. Lee, S. Bahk, Incentive-driven content distribution in wireless multimedia service networks, in Proceedings of IEEE GLBECOM (Miami, 2010), pp. 1–5Google Scholar
  19. 19.
    S. Lee, J. Park, M. Gerla, S. Lu, Secure incentives for commercial ad dissemination in vehicular networks. IEEE Trans. Veh. Technol. 61(6), 150–159 (2007)Google Scholar
  20. 20.
    F. Tseng, Y. Liu, J. Hwu, R. Chen, A secure reedcsolomon code incentive scheme for commercial ad dissemination over vanets. IEEE Trans. Veh. Technol. 60(9), 4598–4608 (2011)CrossRefGoogle Scholar
  21. 21.
    X. Liang, X. Li, T. Luan, R. Lu, X. Lin, X. Shen, Morality-driven data forwarding with privacy preservation in mobile social networks. IEEE Trans. Veh. Technol. 61(7), 3209–3222 (2012)CrossRefGoogle Scholar
  22. 22.
    Y. Wang, J. Wu, W. Yang, Cloud-based multicasting with feedback in mobile social networks. IEEE Trans. Wirel. Commun. 12(12), 6043–6053 (2013)CrossRefGoogle Scholar
  23. 23.
    D. Niyato, P. Wang, W. Saad, A. Hjorungnes, Controlled coalitional games for cooperative mobile social networks. IEEE Trans. Veh. Technol. 60(4), 1812–1824 (2011)CrossRefGoogle Scholar
  24. 24.
    E. Bulut, B. Szymanski, Friendship based routing in delay tolerant mobile social networks, in Proceedings of IEEE GLOBECOM (Miami, 2010), pp. 1–5Google Scholar
  25. 25.
    J. Wu, Y. Wang, Social feature-based multi-path routing in delay tolerant networks, in Proceedings of IEEE INFOCOM (Orlando, 2012), pp. 1368–1376Google Scholar
  26. 26.
    J. Lee, T. Quek, Device-to-device communication in wireless mobile social networks, in Proceedings of IEEE VTC (Seoul, 2014), pp. 1–5Google Scholar
  27. 27.
    X. Zhang, G. Cao, Efficient data forwarding in mobile social networks with diverse connectivity characteristics, in Proceedings of IEEE ICDCS (Madrid, 2014), pp. 31–40Google Scholar
  28. 28.
    J. Hu, L. Yang, L. Hanzo, Distributed cooperative social multicast aided content dissemination in random mobile networks. IEEE Trans. Veh. Technol. 64(7), 3075–3089 (2015)Google Scholar
  29. 29.
    C. Lin, W. Lin, C. Chou, Social-based content diffusion in pocket switched networks. IEEE Trans. Veh. Technol. 60(9), 4539–4548 (2011)CrossRefGoogle Scholar
  30. 30.
    S. Zhou, F. Wu, On designing collusion-resistant routing schemes for non-cooperative wireless ad hoc networks. IEEE Trans. Netw. 18(2), 582–595 (2010)CrossRefGoogle Scholar
  31. 31.
    F. Wu, T. Chen, S. Zhong, C. Qiao, G. Chen, A bargaining-based approach for incentive-compatible message forwarding in opportunistic networks, in Proceedings of IEEE ICC (Ottawa, 2012), pp. 789–793Google Scholar
  32. 32.
    D. Wen, Y. Cai, Z. Li, Y. Fan, An incentive compatible two-hop multi-copy routing protocol in DTNs, in Proceedings of IEEE MSN (Dalian, 2013), pp. 140–146Google Scholar
  33. 33.
    A. Rubinstein, M. Osborne, Bargain and Markets (Academic, San Diego, 1990)zbMATHGoogle Scholar
  34. 34.
    V. Le, Z. Feng, D. Bourse, P. Zhang, A cell based dynamic spectrum management scheme with interference mitigation for cognitive networks, in Proceedings of IEEE VTC (Singapore, 2008), pp. 1594–1598Google Scholar
  35. 35.
    R. Groenvelt, Stochastic Models in Mobile Ad Hoc Networks (Univ. Nice Press, Nice, 2005)Google Scholar
  36. 36.
    R. Albert, A. Barabsi, Statistical mechanics of complex networks. Rev. Mod. Phys. 74(1), 47–97 (2002)CrossRefMathSciNetGoogle Scholar
  37. 37.
    S. Ali, J. Qadir, A. Baig, Routing protocols in delay tolerant networks—a survey, in Proceedings of ICET (Islamabad, 2010), pp. 70–75Google Scholar
  38. 38.
    A. Socievole, F. Rango, C. Coscarella, Routing approaches and performance evaluation in delay tolerant networks, in Proceedings of WTS (New York, 2011), pp. 1–6Google Scholar
  39. 39.
    T. Huang, C. Lee, L. Chen, Prophet+: an adaptive prophet-based routing protocol for opportunistic network, in Proceedings of IEEE AINA (Perth, 2010), pp. 112–119Google Scholar

Copyright information

© Springer International Publishing AG 2016

Authors and Affiliations

  1. 1.School of Mechatronic Engineering and AutomationShanghai UniversityShanghaiChina
  2. 2.Department of Electrical and Computer EngineeringUniversity of WaterlooWaterlooCanada

Personalised recommendations