Skip to main content
Log in

Rumor spreading in interdependent social networks

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Social networks have been witnessed tremendous success and become an indispensable part of people’s daily life. Thus, many other applications are integrated into social networks to achieve better popularity and efficiency. Unfortunately, novel security problems are emerging as the mutual cooperation and dependence contribute to forming the interdependent networks which are vulnerable for cascading failures. However, when it is come to the social networks involved interdependent networks, one of the most critical security threats is rumor propagation which caused harmful impact such as slander, fraud and panic. In this paper, we examined the security environment for interdependent social networks. The spreader-ignorant-doubter-stifler (SIDR) model is proposed to study the rumor spreading in the interdependent social networks. After theoretical and numerical analysis, the targeted security arrangements are proposed to enhance the security.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Leo Y, Karsai M, Sarraute C, Fleury E (2016) Correlations of consumption patterns in social-economic networks. In: Proceedings IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)

  2. Niamut O, Mu M, Denazis S, Race N (2016) Social telemedia: The relationship between social information and networked media. Computer 49(5):92–97

    Article  Google Scholar 

  3. Vegni A, Loscr V (2015) A survey on vehicular social networks. IEEE Commun Surv Tutorials 17 (4):2397–2419

    Article  Google Scholar 

  4. Wang H, Wang F, Liu J, lin C, Xu K, Wang C (2013) Accelerating peer-to-peer file sharing with social relations. IEEE J Sel Area Comm 31(9):66–74

    Article  Google Scholar 

  5. Zhao WX, Li S, He Y, Chang EY, Wen J, Li X (2016) Connecting social media to E-commerce: cold-start product recommendation using microblogging information. IEEE Trans Knowl Data Eng 28(5):1147–1159

    Article  Google Scholar 

  6. Buldyrev S, Parshani R, Paul G, Stanley H, Havlin S (2010) Catastrophic cascade of failures in interdependent networks. Nature 464:1025–1028

    Article  Google Scholar 

  7. Schneider C, Yazdani N, Arajo N, Havlin S, Herrmann H (1969) Towards designing robust coupled networks. Sci Rep 3:1–7

    Google Scholar 

  8. Fu G, Dawson R, Khoury M, Bullock S (2014) Interdependent networks: Vulnerability analysis and strategies to limit cascading failure. Eur Phys J B 87(7):1–10

    Article  Google Scholar 

  9. Jamilah, Handayani PW (2016) Analysis on effects of brand community on brand loyalty in the social media: A case study of an online transportation (UBER). In: Proceedings IEEE International Conference on Advanced Computer Science and Information Systems (ICACSIS)

  10. Hu Y, Wang D, Zhong H, Wu F (2014) Socialtrust: Enabling long-term social cooperation in peer-to-peer services. Peer-to-Peer Netw Appl 7(4):525–538

    Article  Google Scholar 

  11. Li M, Alessio B, Zhou W (2010) OST: A transaction based online social trust model for social network and file sharing security. In: Proceedings IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC)

  12. Yi C, Bao Y, Jiang J, Xue Y (2014) Mitigation strategy against cascading failures on social networks. China Commun 11(8):37–46

    Article  Google Scholar 

  13. Fire M, Goldschmidt R, Elovici Y (2014) Online social networks: Threats and solutions. IEEE Commun Surv Tut 16(4):2019–2036

    Article  Google Scholar 

  14. Han Q, Wen H, Feng G, Wang L, Pan F (2015) Secure interdependent networks for peer-to-peer and online social network. In: Proceedings IEEE Global Communications Conference (GLOBECOM)

  15. Daley DJ, Gani J (2000) Epidemic modelling. Cambridge University Press, Cambridge

    MATH  Google Scholar 

  16. Nekovee M, Moreno Y, Bianconi G, Marsili M (2007) Theory of rumour spreading in complex social networks. Phys A 374:457–470

    Article  Google Scholar 

  17. Wang J, Zhao L, Huang R (2014) SIRAru rumor spreading model in complex networks. Phys A 398:43–55

    Article  MathSciNet  Google Scholar 

  18. Zan Y, Wu J, Li P, Yu Q (2014) SICR rumor spreading model in complex networks: Counterattack and self-resistance. Phys A 405:159–170

    Article  MathSciNet  Google Scholar 

  19. Wang J, Wang W, Wang C (2016) How the anti-rumor kills the rumor: Conflicting information propagation in networks. In: Proceedings IEEE International Conference on Communications (ICC)

  20. Dang A, Smit M, Moh’d A, Minghim R, Milios E (2016) Toward understanding how users respond to rumours in social media. In: Proceedings IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)

  21. Wang L, Wu H, Stber GL (2017) Cooperative jamming aided secrecy enhancement in P2P communications with social interaction constraints. IEEE Trans Veh Technol 66(2):1144–1158

    Article  Google Scholar 

  22. Parshani R, Buldyrev S, Havlin S (2010) Interdependent networks: Reducing the coupling strength leads to a change from a first to second order percolation transition. Phys Rev Lett 105:n1–n4

    Article  Google Scholar 

  23. Khamfroush H, Bartolini N, La Porta TF, Swami A, Dillman J (2016) On propagation of phenomena in interdependent networks. IEEE Trans Netw Sci Eng 3(4)

  24. Wattsand D, Strogatz SH (1998) Collective dynamics of small-world networks. Nature 393(6684):440–442

    Article  MATH  Google Scholar 

  25. Barabsi AL, Albert R (1999) Emergence of scaling in random networks. Science 286(5439):509–512

    Article  MathSciNet  MATH  Google Scholar 

  26. Viswanath B, Mislove A, Cha M, Gummadi KP (2009) On the evolution of user interaction in facebook. In: Proceedings 2nd ACM SIGCOMM Workshop on Social Networks (WOSN’09)

  27. He Z, Cai Z, Yu J, Wang X, Sun Y, Li Y (2017) Cost-efficient Strategies for Restraining Rumor Spreading in Mobile Social Networks, IEEE Transactions on Vehicular Technolog, early access

  28. Han Q, Wen H, Wu J, Ren M (2015) Rumor spreading and security monitoring in complex networks. In: Proceedings LNCS International Conference on Computational Social Networks (CSoNet)

Download references

Acknowledgements

This work is supported by NSFC (Grant No. 61572114, 61379027, 61701048), RFDP (Grant No. 2016YFB0800605) and YFCU (Grant No. 2017XJZ31).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hong Wen.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Han, Q., Wen, H. & Miao, F. Rumor spreading in interdependent social networks. Peer-to-Peer Netw. Appl. 11, 955–965 (2018). https://doi.org/10.1007/s12083-017-0616-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-017-0616-y

Keywords