Loading…

Trust-based and social-aware coalition formation game for multihop data uploading in 5G systems

In this paper a trust-based coalition formation game is proposed to design opportunistic hop-by-hop forwarding schemes, relying on cellular Device-to-Device (D2D) communications, to enhance content uploading services. The User Equipments (UEs) are sources of data to be uploaded to a cellular base st...

Full description

Saved in:
Bibliographic Details
Published in:Computer networks (Amsterdam, Netherlands : 1999) Netherlands : 1999), 2016-12, Vol.111, p.141-151
Main Authors: Militano, L., Orsino, A., Araniti, G., Nitti, M., Atzori, L., Iera, A.
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c413t-e1c16a39a86bb6778eb04be6853daf4f3cacdf5022d9de0635e25da905fb6b43
cites cdi_FETCH-LOGICAL-c413t-e1c16a39a86bb6778eb04be6853daf4f3cacdf5022d9de0635e25da905fb6b43
container_end_page 151
container_issue
container_start_page 141
container_title Computer networks (Amsterdam, Netherlands : 1999)
container_volume 111
creator Militano, L.
Orsino, A.
Araniti, G.
Nitti, M.
Atzori, L.
Iera, A.
description In this paper a trust-based coalition formation game is proposed to design opportunistic hop-by-hop forwarding schemes, relying on cellular Device-to-Device (D2D) communications, to enhance content uploading services. The User Equipments (UEs) are sources of data to be uploaded to a cellular base station (eNodeB) and are assumed to be rational self-interested players as they aim at maximizing their own utility. To this aim, the UEs cooperate to opportunistically implement proximity-based data exchanges where the presence of malicious nodes in the network is a constant threat for the successful cooperation. To cope with this issue, reliability and reputation notions are considered to model the level of trust among the players. Taking inspiration from the recent Social Internet of Things (SIoT) paradigm, social-awareness of the devices is spotted as a key parameter to effectively define the wished trustworthiness. The effectiveness of the proposed solution is validated through a simulative analysis showing a relevant reduction in the data loss due to malicious behavior of a subset of the devices. In particular, up to 86% reduction in terms of data loss is obtained with respect to the case where the proposed trust model is not implemented. Moreover, the trust-based and social-aware solution also guarantees higher gains in terms of the uploading time for the devices taking part of the cooperative D2D-based content uploading.
doi_str_mv 10.1016/j.comnet.2016.08.001
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1864531879</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S1389128616302432</els_id><sourcerecordid>4320917545</sourcerecordid><originalsourceid>FETCH-LOGICAL-c413t-e1c16a39a86bb6778eb04be6853daf4f3cacdf5022d9de0635e25da905fb6b43</originalsourceid><addsrcrecordid>eNp9kE1LxDAQhosouH78Aw8BL15ak34k6UUQ0VVY8LL3ME2ma5a2WZNU8d-bdT158DTvwDPDzJNlV4wWjDJ-uy20GyeMRZm6gsqCUnaULZgUZS4ob49TrmSbs1Ly0-wshC2ltK5LucjU2s8h5h0ENAQmQ4LTFoYcPsEj0Q4GG62bSO_8CD9pAyPuWzLOQ7RvbkcMRCDzbnBg7LQhdiLNkoSvEHEMF9lJD0PAy996nq2fHtcPz_nqdfnycL_Kdc2qmCPTjEPVguRdx4WQ2NG6Qy6bykBf95UGbfqGlqVpDVJeNVg2Blra9B3v6uo8uzms3Xn3PmOIarRB4zDAhG4OikleN1US0ib0-g-6dbOf0nGJEpIK0QqRqPpAae9C8Nirnbcj-C_FqNpLV1t1kK720hWVKklPY3eHMUy_flj0KmiLk0ZjPeqojLP_L_gGc0KNlw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1878077977</pqid></control><display><type>article</type><title>Trust-based and social-aware coalition formation game for multihop data uploading in 5G systems</title><source>Library &amp; Information Science Abstracts (LISA)</source><source>ScienceDirect Journals</source><creator>Militano, L. ; Orsino, A. ; Araniti, G. ; Nitti, M. ; Atzori, L. ; Iera, A.</creator><creatorcontrib>Militano, L. ; Orsino, A. ; Araniti, G. ; Nitti, M. ; Atzori, L. ; Iera, A.</creatorcontrib><description>In this paper a trust-based coalition formation game is proposed to design opportunistic hop-by-hop forwarding schemes, relying on cellular Device-to-Device (D2D) communications, to enhance content uploading services. The User Equipments (UEs) are sources of data to be uploaded to a cellular base station (eNodeB) and are assumed to be rational self-interested players as they aim at maximizing their own utility. To this aim, the UEs cooperate to opportunistically implement proximity-based data exchanges where the presence of malicious nodes in the network is a constant threat for the successful cooperation. To cope with this issue, reliability and reputation notions are considered to model the level of trust among the players. Taking inspiration from the recent Social Internet of Things (SIoT) paradigm, social-awareness of the devices is spotted as a key parameter to effectively define the wished trustworthiness. The effectiveness of the proposed solution is validated through a simulative analysis showing a relevant reduction in the data loss due to malicious behavior of a subset of the devices. In particular, up to 86% reduction in terms of data loss is obtained with respect to the case where the proposed trust model is not implemented. Moreover, the trust-based and social-aware solution also guarantees higher gains in terms of the uploading time for the devices taking part of the cooperative D2D-based content uploading.</description><identifier>ISSN: 1389-1286</identifier><identifier>EISSN: 1872-7069</identifier><identifier>DOI: 10.1016/j.comnet.2016.08.001</identifier><language>eng</language><publisher>Amsterdam: Elsevier B.V</publisher><subject>Associations ; Computer simulation ; Cooperation ; D2D ; D2D communications ; Data integrity ; Data loss ; Devices ; Formations ; Game theory ; Games ; Internet of Things ; Mathematical models ; Players ; Reduction ; Simulation ; Smartphones ; Social networks ; Social proximity ; Studies ; Trust ; Trustworthiness</subject><ispartof>Computer networks (Amsterdam, Netherlands : 1999), 2016-12, Vol.111, p.141-151</ispartof><rights>2016 Elsevier B.V.</rights><rights>Copyright Elsevier Sequoia S.A. Dec 24, 2016</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c413t-e1c16a39a86bb6778eb04be6853daf4f3cacdf5022d9de0635e25da905fb6b43</citedby><cites>FETCH-LOGICAL-c413t-e1c16a39a86bb6778eb04be6853daf4f3cacdf5022d9de0635e25da905fb6b43</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925,34135</link.rule.ids></links><search><creatorcontrib>Militano, L.</creatorcontrib><creatorcontrib>Orsino, A.</creatorcontrib><creatorcontrib>Araniti, G.</creatorcontrib><creatorcontrib>Nitti, M.</creatorcontrib><creatorcontrib>Atzori, L.</creatorcontrib><creatorcontrib>Iera, A.</creatorcontrib><title>Trust-based and social-aware coalition formation game for multihop data uploading in 5G systems</title><title>Computer networks (Amsterdam, Netherlands : 1999)</title><description>In this paper a trust-based coalition formation game is proposed to design opportunistic hop-by-hop forwarding schemes, relying on cellular Device-to-Device (D2D) communications, to enhance content uploading services. The User Equipments (UEs) are sources of data to be uploaded to a cellular base station (eNodeB) and are assumed to be rational self-interested players as they aim at maximizing their own utility. To this aim, the UEs cooperate to opportunistically implement proximity-based data exchanges where the presence of malicious nodes in the network is a constant threat for the successful cooperation. To cope with this issue, reliability and reputation notions are considered to model the level of trust among the players. Taking inspiration from the recent Social Internet of Things (SIoT) paradigm, social-awareness of the devices is spotted as a key parameter to effectively define the wished trustworthiness. The effectiveness of the proposed solution is validated through a simulative analysis showing a relevant reduction in the data loss due to malicious behavior of a subset of the devices. In particular, up to 86% reduction in terms of data loss is obtained with respect to the case where the proposed trust model is not implemented. Moreover, the trust-based and social-aware solution also guarantees higher gains in terms of the uploading time for the devices taking part of the cooperative D2D-based content uploading.</description><subject>Associations</subject><subject>Computer simulation</subject><subject>Cooperation</subject><subject>D2D</subject><subject>D2D communications</subject><subject>Data integrity</subject><subject>Data loss</subject><subject>Devices</subject><subject>Formations</subject><subject>Game theory</subject><subject>Games</subject><subject>Internet of Things</subject><subject>Mathematical models</subject><subject>Players</subject><subject>Reduction</subject><subject>Simulation</subject><subject>Smartphones</subject><subject>Social networks</subject><subject>Social proximity</subject><subject>Studies</subject><subject>Trust</subject><subject>Trustworthiness</subject><issn>1389-1286</issn><issn>1872-7069</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><sourceid>F2A</sourceid><recordid>eNp9kE1LxDAQhosouH78Aw8BL15ak34k6UUQ0VVY8LL3ME2ma5a2WZNU8d-bdT158DTvwDPDzJNlV4wWjDJ-uy20GyeMRZm6gsqCUnaULZgUZS4ob49TrmSbs1Ly0-wshC2ltK5LucjU2s8h5h0ENAQmQ4LTFoYcPsEj0Q4GG62bSO_8CD9pAyPuWzLOQ7RvbkcMRCDzbnBg7LQhdiLNkoSvEHEMF9lJD0PAy996nq2fHtcPz_nqdfnycL_Kdc2qmCPTjEPVguRdx4WQ2NG6Qy6bykBf95UGbfqGlqVpDVJeNVg2Blra9B3v6uo8uzms3Xn3PmOIarRB4zDAhG4OikleN1US0ib0-g-6dbOf0nGJEpIK0QqRqPpAae9C8Nirnbcj-C_FqNpLV1t1kK720hWVKklPY3eHMUy_flj0KmiLk0ZjPeqojLP_L_gGc0KNlw</recordid><startdate>20161224</startdate><enddate>20161224</enddate><creator>Militano, L.</creator><creator>Orsino, A.</creator><creator>Araniti, G.</creator><creator>Nitti, M.</creator><creator>Atzori, L.</creator><creator>Iera, A.</creator><general>Elsevier B.V</general><general>Elsevier Sequoia S.A</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>E3H</scope><scope>F2A</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20161224</creationdate><title>Trust-based and social-aware coalition formation game for multihop data uploading in 5G systems</title><author>Militano, L. ; Orsino, A. ; Araniti, G. ; Nitti, M. ; Atzori, L. ; Iera, A.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c413t-e1c16a39a86bb6778eb04be6853daf4f3cacdf5022d9de0635e25da905fb6b43</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Associations</topic><topic>Computer simulation</topic><topic>Cooperation</topic><topic>D2D</topic><topic>D2D communications</topic><topic>Data integrity</topic><topic>Data loss</topic><topic>Devices</topic><topic>Formations</topic><topic>Game theory</topic><topic>Games</topic><topic>Internet of Things</topic><topic>Mathematical models</topic><topic>Players</topic><topic>Reduction</topic><topic>Simulation</topic><topic>Smartphones</topic><topic>Social networks</topic><topic>Social proximity</topic><topic>Studies</topic><topic>Trust</topic><topic>Trustworthiness</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Militano, L.</creatorcontrib><creatorcontrib>Orsino, A.</creatorcontrib><creatorcontrib>Araniti, G.</creatorcontrib><creatorcontrib>Nitti, M.</creatorcontrib><creatorcontrib>Atzori, L.</creatorcontrib><creatorcontrib>Iera, A.</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>Library &amp; Information Sciences Abstracts (LISA)</collection><collection>Library &amp; Information Science Abstracts (LISA)</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Computer networks (Amsterdam, Netherlands : 1999)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Militano, L.</au><au>Orsino, A.</au><au>Araniti, G.</au><au>Nitti, M.</au><au>Atzori, L.</au><au>Iera, A.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Trust-based and social-aware coalition formation game for multihop data uploading in 5G systems</atitle><jtitle>Computer networks (Amsterdam, Netherlands : 1999)</jtitle><date>2016-12-24</date><risdate>2016</risdate><volume>111</volume><spage>141</spage><epage>151</epage><pages>141-151</pages><issn>1389-1286</issn><eissn>1872-7069</eissn><abstract>In this paper a trust-based coalition formation game is proposed to design opportunistic hop-by-hop forwarding schemes, relying on cellular Device-to-Device (D2D) communications, to enhance content uploading services. The User Equipments (UEs) are sources of data to be uploaded to a cellular base station (eNodeB) and are assumed to be rational self-interested players as they aim at maximizing their own utility. To this aim, the UEs cooperate to opportunistically implement proximity-based data exchanges where the presence of malicious nodes in the network is a constant threat for the successful cooperation. To cope with this issue, reliability and reputation notions are considered to model the level of trust among the players. Taking inspiration from the recent Social Internet of Things (SIoT) paradigm, social-awareness of the devices is spotted as a key parameter to effectively define the wished trustworthiness. The effectiveness of the proposed solution is validated through a simulative analysis showing a relevant reduction in the data loss due to malicious behavior of a subset of the devices. In particular, up to 86% reduction in terms of data loss is obtained with respect to the case where the proposed trust model is not implemented. Moreover, the trust-based and social-aware solution also guarantees higher gains in terms of the uploading time for the devices taking part of the cooperative D2D-based content uploading.</abstract><cop>Amsterdam</cop><pub>Elsevier B.V</pub><doi>10.1016/j.comnet.2016.08.001</doi><tpages>11</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1389-1286
ispartof Computer networks (Amsterdam, Netherlands : 1999), 2016-12, Vol.111, p.141-151
issn 1389-1286
1872-7069
language eng
recordid cdi_proquest_miscellaneous_1864531879
source Library & Information Science Abstracts (LISA); ScienceDirect Journals
subjects Associations
Computer simulation
Cooperation
D2D
D2D communications
Data integrity
Data loss
Devices
Formations
Game theory
Games
Internet of Things
Mathematical models
Players
Reduction
Simulation
Smartphones
Social networks
Social proximity
Studies
Trust
Trustworthiness
title Trust-based and social-aware coalition formation game for multihop data uploading in 5G systems
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T15%3A59%3A29IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Trust-based%20and%20social-aware%20coalition%20formation%20game%20for%20multihop%20data%20uploading%20in%205G%20systems&rft.jtitle=Computer%20networks%20(Amsterdam,%20Netherlands%20:%201999)&rft.au=Militano,%20L.&rft.date=2016-12-24&rft.volume=111&rft.spage=141&rft.epage=151&rft.pages=141-151&rft.issn=1389-1286&rft.eissn=1872-7069&rft_id=info:doi/10.1016/j.comnet.2016.08.001&rft_dat=%3Cproquest_cross%3E4320917545%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c413t-e1c16a39a86bb6778eb04be6853daf4f3cacdf5022d9de0635e25da905fb6b43%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1878077977&rft_id=info:pmid/&rfr_iscdi=true