Loading…
Trust-based and social-aware coalition formation game for multihop data uploading in 5G systems
In this paper a trust-based coalition formation game is proposed to design opportunistic hop-by-hop forwarding schemes, relying on cellular Device-to-Device (D2D) communications, to enhance content uploading services. The User Equipments (UEs) are sources of data to be uploaded to a cellular base st...
Saved in:
Published in: | Computer networks (Amsterdam, Netherlands : 1999) Netherlands : 1999), 2016-12, Vol.111, p.141-151 |
---|---|
Main Authors: | , , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c413t-e1c16a39a86bb6778eb04be6853daf4f3cacdf5022d9de0635e25da905fb6b43 |
---|---|
cites | cdi_FETCH-LOGICAL-c413t-e1c16a39a86bb6778eb04be6853daf4f3cacdf5022d9de0635e25da905fb6b43 |
container_end_page | 151 |
container_issue | |
container_start_page | 141 |
container_title | Computer networks (Amsterdam, Netherlands : 1999) |
container_volume | 111 |
creator | Militano, L. Orsino, A. Araniti, G. Nitti, M. Atzori, L. Iera, A. |
description | In this paper a trust-based coalition formation game is proposed to design opportunistic hop-by-hop forwarding schemes, relying on cellular Device-to-Device (D2D) communications, to enhance content uploading services. The User Equipments (UEs) are sources of data to be uploaded to a cellular base station (eNodeB) and are assumed to be rational self-interested players as they aim at maximizing their own utility. To this aim, the UEs cooperate to opportunistically implement proximity-based data exchanges where the presence of malicious nodes in the network is a constant threat for the successful cooperation. To cope with this issue, reliability and reputation notions are considered to model the level of trust among the players. Taking inspiration from the recent Social Internet of Things (SIoT) paradigm, social-awareness of the devices is spotted as a key parameter to effectively define the wished trustworthiness. The effectiveness of the proposed solution is validated through a simulative analysis showing a relevant reduction in the data loss due to malicious behavior of a subset of the devices. In particular, up to 86% reduction in terms of data loss is obtained with respect to the case where the proposed trust model is not implemented. Moreover, the trust-based and social-aware solution also guarantees higher gains in terms of the uploading time for the devices taking part of the cooperative D2D-based content uploading. |
doi_str_mv | 10.1016/j.comnet.2016.08.001 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_1864531879</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S1389128616302432</els_id><sourcerecordid>4320917545</sourcerecordid><originalsourceid>FETCH-LOGICAL-c413t-e1c16a39a86bb6778eb04be6853daf4f3cacdf5022d9de0635e25da905fb6b43</originalsourceid><addsrcrecordid>eNp9kE1LxDAQhosouH78Aw8BL15ak34k6UUQ0VVY8LL3ME2ma5a2WZNU8d-bdT158DTvwDPDzJNlV4wWjDJ-uy20GyeMRZm6gsqCUnaULZgUZS4ob49TrmSbs1Ly0-wshC2ltK5LucjU2s8h5h0ENAQmQ4LTFoYcPsEj0Q4GG62bSO_8CD9pAyPuWzLOQ7RvbkcMRCDzbnBg7LQhdiLNkoSvEHEMF9lJD0PAy996nq2fHtcPz_nqdfnycL_Kdc2qmCPTjEPVguRdx4WQ2NG6Qy6bykBf95UGbfqGlqVpDVJeNVg2Blra9B3v6uo8uzms3Xn3PmOIarRB4zDAhG4OikleN1US0ib0-g-6dbOf0nGJEpIK0QqRqPpAae9C8Nirnbcj-C_FqNpLV1t1kK720hWVKklPY3eHMUy_flj0KmiLk0ZjPeqojLP_L_gGc0KNlw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1878077977</pqid></control><display><type>article</type><title>Trust-based and social-aware coalition formation game for multihop data uploading in 5G systems</title><source>Library & Information Science Abstracts (LISA)</source><source>ScienceDirect Journals</source><creator>Militano, L. ; Orsino, A. ; Araniti, G. ; Nitti, M. ; Atzori, L. ; Iera, A.</creator><creatorcontrib>Militano, L. ; Orsino, A. ; Araniti, G. ; Nitti, M. ; Atzori, L. ; Iera, A.</creatorcontrib><description>In this paper a trust-based coalition formation game is proposed to design opportunistic hop-by-hop forwarding schemes, relying on cellular Device-to-Device (D2D) communications, to enhance content uploading services. The User Equipments (UEs) are sources of data to be uploaded to a cellular base station (eNodeB) and are assumed to be rational self-interested players as they aim at maximizing their own utility. To this aim, the UEs cooperate to opportunistically implement proximity-based data exchanges where the presence of malicious nodes in the network is a constant threat for the successful cooperation. To cope with this issue, reliability and reputation notions are considered to model the level of trust among the players. Taking inspiration from the recent Social Internet of Things (SIoT) paradigm, social-awareness of the devices is spotted as a key parameter to effectively define the wished trustworthiness. The effectiveness of the proposed solution is validated through a simulative analysis showing a relevant reduction in the data loss due to malicious behavior of a subset of the devices. In particular, up to 86% reduction in terms of data loss is obtained with respect to the case where the proposed trust model is not implemented. Moreover, the trust-based and social-aware solution also guarantees higher gains in terms of the uploading time for the devices taking part of the cooperative D2D-based content uploading.</description><identifier>ISSN: 1389-1286</identifier><identifier>EISSN: 1872-7069</identifier><identifier>DOI: 10.1016/j.comnet.2016.08.001</identifier><language>eng</language><publisher>Amsterdam: Elsevier B.V</publisher><subject>Associations ; Computer simulation ; Cooperation ; D2D ; D2D communications ; Data integrity ; Data loss ; Devices ; Formations ; Game theory ; Games ; Internet of Things ; Mathematical models ; Players ; Reduction ; Simulation ; Smartphones ; Social networks ; Social proximity ; Studies ; Trust ; Trustworthiness</subject><ispartof>Computer networks (Amsterdam, Netherlands : 1999), 2016-12, Vol.111, p.141-151</ispartof><rights>2016 Elsevier B.V.</rights><rights>Copyright Elsevier Sequoia S.A. Dec 24, 2016</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c413t-e1c16a39a86bb6778eb04be6853daf4f3cacdf5022d9de0635e25da905fb6b43</citedby><cites>FETCH-LOGICAL-c413t-e1c16a39a86bb6778eb04be6853daf4f3cacdf5022d9de0635e25da905fb6b43</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784,27924,27925,34135</link.rule.ids></links><search><creatorcontrib>Militano, L.</creatorcontrib><creatorcontrib>Orsino, A.</creatorcontrib><creatorcontrib>Araniti, G.</creatorcontrib><creatorcontrib>Nitti, M.</creatorcontrib><creatorcontrib>Atzori, L.</creatorcontrib><creatorcontrib>Iera, A.</creatorcontrib><title>Trust-based and social-aware coalition formation game for multihop data uploading in 5G systems</title><title>Computer networks (Amsterdam, Netherlands : 1999)</title><description>In this paper a trust-based coalition formation game is proposed to design opportunistic hop-by-hop forwarding schemes, relying on cellular Device-to-Device (D2D) communications, to enhance content uploading services. The User Equipments (UEs) are sources of data to be uploaded to a cellular base station (eNodeB) and are assumed to be rational self-interested players as they aim at maximizing their own utility. To this aim, the UEs cooperate to opportunistically implement proximity-based data exchanges where the presence of malicious nodes in the network is a constant threat for the successful cooperation. To cope with this issue, reliability and reputation notions are considered to model the level of trust among the players. Taking inspiration from the recent Social Internet of Things (SIoT) paradigm, social-awareness of the devices is spotted as a key parameter to effectively define the wished trustworthiness. The effectiveness of the proposed solution is validated through a simulative analysis showing a relevant reduction in the data loss due to malicious behavior of a subset of the devices. In particular, up to 86% reduction in terms of data loss is obtained with respect to the case where the proposed trust model is not implemented. Moreover, the trust-based and social-aware solution also guarantees higher gains in terms of the uploading time for the devices taking part of the cooperative D2D-based content uploading.</description><subject>Associations</subject><subject>Computer simulation</subject><subject>Cooperation</subject><subject>D2D</subject><subject>D2D communications</subject><subject>Data integrity</subject><subject>Data loss</subject><subject>Devices</subject><subject>Formations</subject><subject>Game theory</subject><subject>Games</subject><subject>Internet of Things</subject><subject>Mathematical models</subject><subject>Players</subject><subject>Reduction</subject><subject>Simulation</subject><subject>Smartphones</subject><subject>Social networks</subject><subject>Social proximity</subject><subject>Studies</subject><subject>Trust</subject><subject>Trustworthiness</subject><issn>1389-1286</issn><issn>1872-7069</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2016</creationdate><recordtype>article</recordtype><sourceid>F2A</sourceid><recordid>eNp9kE1LxDAQhosouH78Aw8BL15ak34k6UUQ0VVY8LL3ME2ma5a2WZNU8d-bdT158DTvwDPDzJNlV4wWjDJ-uy20GyeMRZm6gsqCUnaULZgUZS4ob49TrmSbs1Ly0-wshC2ltK5LucjU2s8h5h0ENAQmQ4LTFoYcPsEj0Q4GG62bSO_8CD9pAyPuWzLOQ7RvbkcMRCDzbnBg7LQhdiLNkoSvEHEMF9lJD0PAy996nq2fHtcPz_nqdfnycL_Kdc2qmCPTjEPVguRdx4WQ2NG6Qy6bykBf95UGbfqGlqVpDVJeNVg2Blra9B3v6uo8uzms3Xn3PmOIarRB4zDAhG4OikleN1US0ib0-g-6dbOf0nGJEpIK0QqRqPpAae9C8Nirnbcj-C_FqNpLV1t1kK720hWVKklPY3eHMUy_flj0KmiLk0ZjPeqojLP_L_gGc0KNlw</recordid><startdate>20161224</startdate><enddate>20161224</enddate><creator>Militano, L.</creator><creator>Orsino, A.</creator><creator>Araniti, G.</creator><creator>Nitti, M.</creator><creator>Atzori, L.</creator><creator>Iera, A.</creator><general>Elsevier B.V</general><general>Elsevier Sequoia S.A</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>E3H</scope><scope>F2A</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20161224</creationdate><title>Trust-based and social-aware coalition formation game for multihop data uploading in 5G systems</title><author>Militano, L. ; Orsino, A. ; Araniti, G. ; Nitti, M. ; Atzori, L. ; Iera, A.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c413t-e1c16a39a86bb6778eb04be6853daf4f3cacdf5022d9de0635e25da905fb6b43</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2016</creationdate><topic>Associations</topic><topic>Computer simulation</topic><topic>Cooperation</topic><topic>D2D</topic><topic>D2D communications</topic><topic>Data integrity</topic><topic>Data loss</topic><topic>Devices</topic><topic>Formations</topic><topic>Game theory</topic><topic>Games</topic><topic>Internet of Things</topic><topic>Mathematical models</topic><topic>Players</topic><topic>Reduction</topic><topic>Simulation</topic><topic>Smartphones</topic><topic>Social networks</topic><topic>Social proximity</topic><topic>Studies</topic><topic>Trust</topic><topic>Trustworthiness</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Militano, L.</creatorcontrib><creatorcontrib>Orsino, A.</creatorcontrib><creatorcontrib>Araniti, G.</creatorcontrib><creatorcontrib>Nitti, M.</creatorcontrib><creatorcontrib>Atzori, L.</creatorcontrib><creatorcontrib>Iera, A.</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>Library & Information Sciences Abstracts (LISA)</collection><collection>Library & Information Science Abstracts (LISA)</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Computer networks (Amsterdam, Netherlands : 1999)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Militano, L.</au><au>Orsino, A.</au><au>Araniti, G.</au><au>Nitti, M.</au><au>Atzori, L.</au><au>Iera, A.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Trust-based and social-aware coalition formation game for multihop data uploading in 5G systems</atitle><jtitle>Computer networks (Amsterdam, Netherlands : 1999)</jtitle><date>2016-12-24</date><risdate>2016</risdate><volume>111</volume><spage>141</spage><epage>151</epage><pages>141-151</pages><issn>1389-1286</issn><eissn>1872-7069</eissn><abstract>In this paper a trust-based coalition formation game is proposed to design opportunistic hop-by-hop forwarding schemes, relying on cellular Device-to-Device (D2D) communications, to enhance content uploading services. The User Equipments (UEs) are sources of data to be uploaded to a cellular base station (eNodeB) and are assumed to be rational self-interested players as they aim at maximizing their own utility. To this aim, the UEs cooperate to opportunistically implement proximity-based data exchanges where the presence of malicious nodes in the network is a constant threat for the successful cooperation. To cope with this issue, reliability and reputation notions are considered to model the level of trust among the players. Taking inspiration from the recent Social Internet of Things (SIoT) paradigm, social-awareness of the devices is spotted as a key parameter to effectively define the wished trustworthiness. The effectiveness of the proposed solution is validated through a simulative analysis showing a relevant reduction in the data loss due to malicious behavior of a subset of the devices. In particular, up to 86% reduction in terms of data loss is obtained with respect to the case where the proposed trust model is not implemented. Moreover, the trust-based and social-aware solution also guarantees higher gains in terms of the uploading time for the devices taking part of the cooperative D2D-based content uploading.</abstract><cop>Amsterdam</cop><pub>Elsevier B.V</pub><doi>10.1016/j.comnet.2016.08.001</doi><tpages>11</tpages><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1389-1286 |
ispartof | Computer networks (Amsterdam, Netherlands : 1999), 2016-12, Vol.111, p.141-151 |
issn | 1389-1286 1872-7069 |
language | eng |
recordid | cdi_proquest_miscellaneous_1864531879 |
source | Library & Information Science Abstracts (LISA); ScienceDirect Journals |
subjects | Associations Computer simulation Cooperation D2D D2D communications Data integrity Data loss Devices Formations Game theory Games Internet of Things Mathematical models Players Reduction Simulation Smartphones Social networks Social proximity Studies Trust Trustworthiness |
title | Trust-based and social-aware coalition formation game for multihop data uploading in 5G systems |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T15%3A59%3A29IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Trust-based%20and%20social-aware%20coalition%20formation%20game%20for%20multihop%20data%20uploading%20in%205G%20systems&rft.jtitle=Computer%20networks%20(Amsterdam,%20Netherlands%20:%201999)&rft.au=Militano,%20L.&rft.date=2016-12-24&rft.volume=111&rft.spage=141&rft.epage=151&rft.pages=141-151&rft.issn=1389-1286&rft.eissn=1872-7069&rft_id=info:doi/10.1016/j.comnet.2016.08.001&rft_dat=%3Cproquest_cross%3E4320917545%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c413t-e1c16a39a86bb6778eb04be6853daf4f3cacdf5022d9de0635e25da905fb6b43%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=1878077977&rft_id=info:pmid/&rfr_iscdi=true |