Skip to main content
Log in

A Service Pricing-based Two-Stage Incentive Algorithm for Socially Aware Networks

  • Published:
Journal of Signal Processing Systems Aims and scope Submit manuscript

Abstract

In socially aware networks, data forwarding is usually performed based on opportunistic peer-to-peer connections and using a store-and-forward method. This method requires active collaboration from all nodes. However, due to resource limitations and other factors, several nodes exhibit selfishness and are unwilling to consume their resources to assist other nodes in forwarding data. To tackle the problems of insufficient participating nodes and low willingness to participate, this paper proposes a Service pricing-based Two-stage Incentive Algorithm (STIA). First, in view of the lack of rewards for high reputation nodes in reputation incentive and the indistinguishability of prices for different service levels in credit mechanism, leading to poor incentive effects, this paper uses the service quality of nodes and their own resources to design message pricing functions as rewards for service providers and prevents nodes from making fraudulent offers by disclosing the resource status of both parties. Secondly, this paper considers the case where relay nodes will discard accepted data, thus proposing a two-stage incentive mechanism that motivates nodes to receive and forward data. Finally, in response to nodes discarding received messages due to short-term currency shortages, nodes are permitted to overdraw their currency according to their forwarding capacity under the condition of setting restrictions to increase network cooperation. Experimental simulation results show that STIA offers significant improvements in delivery ratio and latency of messages over existing incentive schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Figure 1
Figure 2
Figure 3
Figure 4
Figure 5
Figure 6
Figure 7
Figure 8
Figure 9

Similar content being viewed by others

Data Availability

Data available on request from the authors.

Code Availability

Code available on request from the authors.

References

  1. Xia, F., Liu, L., Li, J., Ma, J., & Vasilakos, A. V. (2015). Socially aware networking: A survey. IEEE Systems Journal, 9, 904–921.

  2. Xiang, S., & Yang, J. (2018). Performance reliability evaluation for mobile ad hoc networks. Reliability Engineering & System Safety, 169, 32–39.

  3. Ning, Z., Liu, L., Xia, F., Jedari, B., Lee, I., & Zhang, W. (2017). Cais: A copy adjustable incentive scheme in community-based socially aware networking. IEEE Transactions on Vehicular Technology, 66, 3406–3419.

  4. Xiao, N., Xinyi, R., Xiong, Z., Xu, F., Zhang, X., Xu, Q., Zhao, X., & Ye, C. (2021). A diversity-based selfish node detection algorithm for socially aware networking. Journal of signal Processing Systems, 93, 811–825.

  5. Xiong, Z., Wu, Y., Ye, C., Zhang, X., & Xu, F. (2019). Color image chaos encryption algorithm combining crc and nine palace map. Multimedia Tools and Applications, 78, 31035–31055.

  6. Qiu, M., Gai, K., & Xiong, Z. (2018). Privacy-preserving wireless communications using bipartite matching in social big data. FGCS, 87, 772–781.

  7. Qiu, H., Qiu, M., Liu, M., & Memmi, G. (2020). Secure health data sharing for medical cyber-physical systems for the healthcare 4.0. IEEE Journal of Biomedical and Health Informatics, 24, 2499–2505.

  8. Lu, Z., Wang, N., Wu, J., & Qiu, M. (2018). IoTDeM: An IoT Big Data-oriented MapReduce performance prediction extended model in multiple edge clouds. JPDC, 118, 316–327.

  9. Wang, J., Qiu, M., & Guo, B. (2017). Enabling real-time information service on telehealth system over cloud-based big data platform. Journal of Systems Architecture, 72, 69–79.

  10. Qiu, M., Liu, J., Li, J., et al. (2011). A novel energy-aware fault tolerance mechanism for wireless sensor networks. In IEEE/ACM Conference GCC.

  11. Qiu, H., Qiu, M., & Lu, Z. (2020). Selective encryption on ecg data in body sensor network based on supervised machine learning. Information Fusion, 55, 59–67.

  12. Liu, M., Zhang, S., et al. (2012). H infinite state estimation for discrete-time chaotic systems based on a unified model. IEEE Trans. on Systems, Man, and Cybernetics (B).

  13. Qiu, M., Li, H., & Sha, E. (2009). Heterogeneous real-time embedded software optimization considering hardware platform. In ACM Symposium on Applied Computing (pp. 1637–1641).

  14. Qiu, M., Xue, C., Shao, Z., & Sha, E. (2007). Energy minimization with soft real-time and dvs for uniprocessor and multiprocessor embedded systems. In IEEE DATE Conf. (pp. 1–6).

  15. Qiu, M., Cao, D., Su, H., & Gai, K. (2016). Data transfer minimization for financial derivative pricing using monte carlo simulation with GPU in 5G. International Journal of Communication Systems, 29, 2364–2374.

  16. Wu, G., Zhang, H., et al. (2013). A decentralized approach for mining event correlations in distributed system monitoring. JPDC, 73, 330–340.

  17. Qiu, L., et al. (2016). Optimal big data sharing approach for tele-health in cloud computing. In IEEE SmartCloud (pp. 184–189).

  18. Li, Y., Song, Y., Jia, L., et al. (2020). Intelligent fault diagnosis by fusing domain adversarial training and maximum mean discrepancy via ensemble learning. IEEE Trans. on Industrial Informatics, 17, 2833–2841.

  19. Qiu, M., Sha, E., Liu, M., Lin, M., Hua, S., & Yang, L. (2008). Energy minimization with loop fusion and multi-functional-unit scheduling for multidimensional DSP. JPDC, 68, 443–455.

  20. Qiu, M., Khisamutdinov, E., & other. (2013). Rna nanotechnology for computer design and in vivo computation.

  21. Fall, K., & Farrell, S. (2008). Dtn: an architectural retrospective. IEEE Journal on Selected Areas in Communications, 26, 828–836.

  22. Xia, F., Liu, L., Li, J., Ahmed, A. M., Yang, L. T., & Ma, J. (2015). Beeinfo: Interest-based forwarding using artificial bee colony for socially aware networking. IEEE Transactions on Vehicular Technology, 64, 1188–1200.

  23. Bocquillon, R., & Jouglet, A. (2018). Robust routing in deterministic delay-tolerant networks. Computers & Operations Research, 92, 77–86.

  24. Wu, J., Chen, Z., & Zhao, M. (2019). Weight distribution and community reconstitution based on communities communications in social opportunistic networks. Peer-to-Peer Networking and Applications, 12, 158–166.

  25. MA, X.-b., ZHENG, T.-y., & LI, M.-z. (2019). Analysis and regulation of effects of selfishness on opportunistic network. ACTA ELECTONICA SINICA, 47, 837.

  26. Socievole, A., De Rango, F., Caputo, A., & Marano, S. (2016). Simulating node selfishness in opportunistic networks. In 2016 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS) (pp. 1–6). IEEE.

  27. Wang, R., Wang, Z., Ma, W., Deng, S., & Huang, H. (2019). Epidemic routing performance in dtn with selfish nodes. IEEE Access, 7, 65560–65568.

  28. Loudari, S. E., & Benamar, N. (2019). Effects of selfishness on the energy consumption in opportunistic networks: a performance assessment. In 2019 International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS) (pp. 1–7). IEEE.

  29. Rehman, G.-U., Ghani, A., Muhammad, S., Singh, M., & Singh, D. (2020). Selfishness in vehicular delay-tolerant networks: A review. Sensors, 20, 3000.

  30. Gai, K., Du, Z., et al. (2015). Efficiency-aware workload optimizations of heterogeneous cloud computing for capacity planning in financial industry. In IEEE 2nd CSCloud.

  31. Li, J., Qiu, M., Niu, J., et al. (2013). Thermal-aware task scheduling in 3d chip multiprocessor with real-time constrained workloads. ACM Transactions on Embedded Computing Systems (TECS), 12, 1–22.

  32. Qiu, M., Chen, Z., Niu, J., et al. (2015). Data allocation for hybrid memory with genetic algorithm. IEEE Transaction on Emerging Topics in Computing, 3, 544–555.

  33. Qiu, M., Zhang, L., Ming, Z., Chen, Z., Qin, X., & Yang, L. (2013). Security-aware optimization for ubiquitous computing systems with seat graph approach. Journal of Computer and System Sciences, 79, 518–529.

  34. Shao, Z., Xue, C., Zhuge, Q., et al. (2006). Security protection and checking for embedded system integration against buffer overflow attacks via hardware/software. IEEE Transactions on Computers, 55, 443–453.

  35. Buttyán, L., Dóra, L., Félegyházi, M., & Vajda, I. (2010). Barter trade improves message delivery in opportunistic networks. Ad Hoc Networks, 8, 1–14.

  36. Zhou, H., Chen, J., Fan, J., Du, Y., & Das, S. K. (2013). Consub: Incentive-based content subscribing in selfish opportunistic mobile networks. IEEE Journal on Selected Areas in Communications, 31, 669–679.

  37. Liu, L., Yang, Q., Kong, X., Liaqat, H. B., Ahmed, A. M., Deonauth, N., & Xia, F. (2015). Com-bis: A community-based barter incentive scheme in socially aware networking. International Journal of Distributed Sensor Networks, 11, 671012.

  38. Moati, N., Otrok, H., Mourad, A., & Robert, J.-M. (2014). Reputation-based cooperative detection model of selfish nodes in cluster-based qos-olsr protocol. Wireless Personal Communications, 75, 1747–1768.

  39. Wang, E. K., Liang, Z., Chen, C.-M., Kumari, S., & Khan, M. K. (2020). Porx: A reputation incentive scheme for blockchain consensus of iiot. Future Generation Computer Systems, 102, 140–151.

  40. Gantayat, P. K., & Das, S. (2021). Optimized trust and reputation-based routing protocol in delay-tolerant networks. In Data Engineering and Intelligent Computing (pp. 581–588). Springer.

  41. Guaya-Delgado, L., Pallarès-Segarra, E., Mezher, A. M., & Forné, J. (2019). A novel dynamic reputation-based source routing protocol for mobile ad hoc networks. EURASIP Journal on Wireless Communications and Networking, 2019, 1–16.

  42. Li, N., & Das, S. K. (2013). A trust-based framework for data forwarding in opportunistic networks. Ad Hoc Networks, 11, 1497–1509.

  43. Seregina, T., Brun, O., El-Azouzi, R., & Prabhu, B. J. (2017). On the design of a reward-based incentive mechanism for delay tolerant networks. IEEE Transactions on Mobile Computing, 16, 453–465.

  44. Jedari, B., Liu, L., Qiu, T., Rahim, A., & Xia, F. (2017). A game-theoretic incentive scheme for social-aware routing in selfish mobile social networks. Future Generation Computer Systems, 70, 178–190.

  45. Nazih, O., Benamar, N., & Younis, M. (2020). An evolutionary bargaining-based approach for incentivized cooperation in opportunistic networks. International Journal of Communication Systems, 33, e4377.

  46. Wu, F., Chen, T., Zhong, S., Qiao, C., & Chen, G. (2013). A game-theoretic approach to stimulate cooperation for probabilistic routing in opportunistic networks. IEEE Transactions on Wireless Communications, 12, 1573–1583.

  47. Haq, A., & Faheem, Y. (2020). A peer-to-peer communication based content distribution protocol for incentive-aware delay tolerant networks. Wireless Networks, 26, 583–601.

  48. Xu, Q., Su, Z., & Guo, S. (2016). A game theoretical incentive scheme for relay selection services in mobile social networks. IEEE Transactions on Vehicular Technology, 65, 6692–6702.

  49. Liu, Q., Liu, M., Li, Y., & Daneshmand, M. (2015). A novel game based incentive strategy for opportunistic networks. In 2015 IEEE Global Communications Conference (GLOBECOM) (pp. 1–6). IEEE.

  50. Liu, H., Chen, Z., & Zhang, L. (2017). Research on node incentive protocol in selfish mobile peer-to-peer network. Journal of Electronics & Information Technology, 39, 1986–1992.

  51. Xiong, Z., Xiao, N., Xu, F., Zhang, X., Xu, Q., Zhang, K., & Ye, C. (2021). An equivalent exchange based data forwarding incentive scheme for socially aware networks. Journal of Signal Processing Systems, 93, 249–263.

  52. Keränen, A., Ott, J., & Kärkkäinen, T. (2009). The one simulator for dtn protocol evaluation. In Proceedings of the 2nd International Conference On Simulation Tools and Techniques (pp. 1–10).

  53. Spyropoulos, T., Psounis, K., & Raghavendra, C. S. (2005). Spray and wait: an efficient routing scheme for intermittently connected mobile networks. In Proceedings of the 2005 ACM SIGCOMM workshop on Delay-tolerant networking (pp. 252–259).

Download references

Acknowledgements

This work was partially supported by the National Natural Science Foundation of China (No.61972136), and Hubei Natural Science Foundation (No.2020CFB497, No.2020CFB571), MOE(Ministry of Education in China) Project of Humanities and Social Sciences (No.20YJAZH112), the Hubei Provincial Department of Education Outstanding Youth Scientific Innovation Team Support Foundation (No.T201410, T2020017), the Science and Technology Research Projects of Hubei Provincial Department of Education (No.Q20162706).

Funding

This article was partially supported by the National Natural Science Foundation of China (No.61972136) and Hubei Natural Science Foundation (No.2020CFB497, No.2020CFB571), MOE(Ministry of Education in China) Project of Humanities and Social Sciences (No.20YJAZH112), the Hubei Provincial Department of Education Outstanding Youth Scientific Innovation Team Support Foundation (No.T201410, T2020017), the Science and Technology Research Projects of Hubei Provincial Department of Education (No.Q20162706).

Author information

Authors and Affiliations

Authors

Contributions

Zenggang Xiong: Supervision, Conceptualization, Methodology, Writing - Review & Editing. Xiang Li: Software, Validation, Formal analysis, Writing - Original Draft, Visualization. Xuemin Zhang: Project administration, Conceptualization. Sanyuan Zhu: Methodology, Formal analysis. Fang Xu: Visualization, Writing - Review & Editing. Xiaochao Zhao: algorithm implementation, Writing - Review & Editing. Yunyun Wu: Simulation ,Writing - Review & Editing. Minyang Zeng: Simulation, algorithm implementation.

Corresponding author

Correspondence to Zhu Sanyuan.

Ethics declarations

Ethical Approval

For this type of study formal consent was not required. This manuscript does not contain any studies with human participants or animals performed by any of the authors.

Competing Interest

The authors declare that they have no competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the Topical Collection on Big Data Security Track

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zenggang, X., Xiang, L., Xueming, Z. et al. A Service Pricing-based Two-Stage Incentive Algorithm for Socially Aware Networks. J Sign Process Syst 94, 1227–1242 (2022). https://doi.org/10.1007/s11265-022-01768-1

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11265-022-01768-1

Keywords

Navigation