Influential nodes selection to enhance data dissemination in mobile social networks: A survey

Abstract Downloading of contents on mobile devices has been increasing rapidly since the introduction of mobile communication technologies. The huge traffic load presents a significant challenge to mobile network operators. Therefore, mobile social network (MSN) has been proposed to leverage cellular links by offloading mobile traffic via device-to-device communications. To do so, applying effective algorithm to identify influential spreader in MSN is of critical importance. Recently, various techniques have been proposed, each with its particular points of interest and impediments. In this paper, we provide a comprehensive survey of different techniques used to identify influential nodes in MSNs. In this regard, we discuss the advantages and disadvantages of the methods used to select initial seeds. We also review MSNs with regard to characteristics, platforms, classification, benefits, and challenges. In addition, we review data dissemination algorithms in MSNs. We then analyze and indicate the node selection complication in future networks. Finally, we outline possible future research directions and summarize the major challenges for on-going node selection in MSNs research.

[1]  Ulf Hassler,et al.  Improvement of X-ray castings inspection reliability by using Dempster-Shafer data fusion theory , 2011, Pattern Recognit. Lett..

[2]  Jörg Ott,et al.  A disconnection-tolerant transport for drive-thru Internet environments , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..

[3]  Pekka Pirinen,et al.  A brief overview of 5G research activities , 2014, 1st International Conference on 5G for Ubiquitous Connectivity.

[4]  Ronghui Hou,et al.  Identifying Influential Nodes Based on Community Structure to Speed up the Dissemination of Information in Complex Network , 2018, IEEE Access.

[5]  M E J Newman,et al.  Fast algorithm for detecting community structure in networks. , 2003, Physical review. E, Statistical, nonlinear, and soft matter physics.

[6]  Anna-Kaisa Pietilainen Opportunistic mobile social networks at work , 2010 .

[7]  Xuemin Shen,et al.  Stimulating Cooperation in Multi-hop Wireless Networks Using Cheating Detection System , 2010, 2010 Proceedings IEEE INFOCOM.

[8]  Duanbing Chen,et al.  Influential Nodes Identification in Complex Networks via Information Entropy , 2020, Entropy.

[9]  Yong Deng,et al.  Degree centrality based on the weighted network , 2012, 2012 24th Chinese Control and Decision Conference (CCDC).

[10]  Jiming Chen,et al.  Experimental analysis of user mobility pattern in mobile social networks , 2011, 2011 IEEE Wireless Communications and Networking Conference.

[11]  Shuangyan Wang,et al.  Novel method for spreading information with fewer resources in scale-free networks , 2019, Physica A: Statistical Mechanics and its Applications.

[12]  Luis E. Ortiz,et al.  A Game-Theoretic Approach to Influence in Networks , 2011, AAAI.

[13]  Albrecht Schmidt,et al.  Supporting Mobile Service Usage through Physical Mobile Interaction , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).

[14]  Massimo Marchiori,et al.  Method to find community structures based on information centrality. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.

[15]  Krishna Chaitanya Devabhakthini,et al.  Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Network , 2015 .

[16]  Xiaodong Lin,et al.  SMART: A Secure Multilayer Credit-Based Incentive Scheme for Delay-Tolerant Networks , 2009, IEEE Transactions on Vehicular Technology.

[17]  Zaher Dawy,et al.  Energy-Aware Cooperative Content Distribution over Wireless Networks: Design Alternatives and Implementation Aspects , 2013, IEEE Communications Surveys & Tutorials.

[18]  Yong Deng,et al.  Identifying node importance based on evidence theory in complex networks , 2019, Physica A: Statistical Mechanics and its Applications.

[19]  Susana Sargento,et al.  Opportunistic routing based on daily routines , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).

[20]  Paolo Bellavista,et al.  Location-Based Services: Back to the Future , 2008, IEEE Pervasive Computing.

[21]  Uwe Baumgarten,et al.  Mobile Services Based on Client-Server or P2P Architectures facing Issues of Context-Awareness and Heterogeneous , 2007, PDPTA.

[22]  Pan Hui,et al.  Pocket switched networks and human mobility in conference environments , 2005, WDTN '05.

[23]  Carlo Piccardi,et al.  Finding and Testing Network Communities by Lumped Markov Chains , 2011, PloS one.

[24]  Ming Li,et al.  FindU: Privacy-preserving personal profile matching in mobile social networks , 2011, 2011 Proceedings IEEE INFOCOM.

[25]  Wenwu Yu,et al.  On pinning synchronization of complex dynamical networks , 2009, Autom..

[26]  Duanbing Chen,et al.  Identifying Influential Spreaders by Weighted LeaderRank , 2013, ArXiv.

[27]  Weiren Shi,et al.  Evaluating the importance of nodes in complex networks , 2016 .

[28]  Jiming Chen,et al.  Data Dissemination and Query in Mobile Social Networks , 2012, SpringerBriefs in Computer Science.

[29]  Ronald L. Graham,et al.  Bounds on Multiprocessing Timing Anomalies , 1969, SIAM Journal of Applied Mathematics.

[30]  José-Fernán Martínez,et al.  A Survey on Underwater Acoustic Sensor Network Routing Protocols , 2016, Sensors.

[31]  Yogesh Bhute,et al.  A Survey on Relay Selection Strategies in Cooperative Wireless Network for Capacity Enhancement , 2013 .

[32]  Lei Xiao,et al.  Efficient parallel algorithm for detecting influential nodes in large biological networks on the Graphics Processing Unit , 2020, Future Gener. Comput. Syst..

[33]  Kun-Qing Xie,et al.  An experimental study of large-scale mobile social network , 2009, WWW '09.

[34]  Xiaofei Wang,et al.  Content dissemination by pushing and sharing in mobile cellular networks: An analytical study , 2012, 2012 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012).

[35]  J. Al-Jaroodi,et al.  Security Challenges and Approaches in Online Social Networks: A Survey , 2011 .

[36]  Yu Wang,et al.  Influence Maximization on Large-Scale Mobile Social Network: A Divide-and-Conquer Method , 2015, IEEE Transactions on Parallel and Distributed Systems.

[37]  Mazen O. Hasna,et al.  Performance Analysis of Relay Assignment Schemes for Cooperative Networks with Multiple Source-Destination Pairs , 2012, IEEE Transactions on Wireless Communications.

[38]  Jian Ma,et al.  Local Optimization for Clique-Based Overlapping Community Detection in Complex Networks , 2020, IEEE Access.

[39]  Injong Rhee,et al.  On the levy-walk nature of human mobility , 2011, TNET.

[40]  Hosung Park,et al.  What is Twitter, a social network or a news media? , 2010, WWW '10.

[41]  Chang-Dong Wang,et al.  Community Detection Using Attribute Homogenous Motif , 2018, IEEE Access.

[42]  Stuart M. Allen,et al.  Uttering: social micro-blogging without the internet , 2010, MobiOpp '10.

[43]  Wei Huang,et al.  A deep learning based data forwarding algorithm in mobile social networks , 2019, Peer Peer Netw. Appl..

[44]  Wei Xiang,et al.  Radio resource allocation in LTE-advanced cellular networks with M2M communications , 2012, IEEE Communications Magazine.

[45]  Basavaraj Patil,et al.  IP in Wireless Networks , 2003 .

[46]  Sune Lehmann,et al.  Link communities reveal multiscale complexity in networks , 2009, Nature.

[47]  Yong Deng,et al.  Local immunization strategy based on the scores of nodes. , 2016, Chaos.

[48]  Romit Roy Choudhury,et al.  Micro-Blog: sharing and querying content through mobile phones and social participation , 2008, MobiSys '08.

[49]  Qing Wang,et al.  A Survey on Device-to-Device Communication in Cellular Networks , 2013, IEEE Communications Surveys & Tutorials.

[50]  Mark E. J. Newman A measure of betweenness centrality based on random walks , 2005, Soc. Networks.

[51]  Qinghua Li,et al.  Social-Based Cooperative Caching in DTNs: A Contact Duration Aware Approach , 2011, 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems.

[52]  Zunnun Narmawala,et al.  A comparative study of various community detection algorithms in the mobile social network , 2015, 2015 5th Nirma University International Conference on Engineering (NUiCONE).

[53]  Yong Deng,et al.  A new method to identify influential nodes based on combining of existing centrality measures , 2017 .

[54]  S. Fortunato,et al.  Resolution limit in community detection , 2006, Proceedings of the National Academy of Sciences.

[55]  B. Wellman Networks in the Global Village , 1998 .

[56]  Yicheng Zhang,et al.  Identifying influential nodes in complex networks , 2012 .

[57]  Xia Hu,et al.  Deep Representation Learning for Social Network Analysis , 2019, Front. Big Data.

[58]  Cecilia Mascolo,et al.  Track globally, deliver locally: improving content delivery networks by tracking geographic social cascades , 2011, WWW.

[59]  Hans-Peter Kriegel,et al.  Density-based community detection in social networks , 2011, 2011 IEEE 5th International Conference on Internet Multimedia Systems Architecture and Application.

[60]  Chen Zonghai,et al.  Reinforcement learning for mobile robot: From reaction to deliberation , 2012 .

[61]  Jie Wu,et al.  Community-Aware Opportunistic Routing in Mobile Social Networks , 2014, IEEE Transactions on Computers.

[62]  Albert-László Barabási,et al.  Understanding individual human mobility patterns , 2008, Nature.

[63]  Zhou Su,et al.  Content distribution over content centric mobile social networks in 5G , 2015, IEEE Communications Magazine.

[64]  Zhu Han,et al.  Social-Aware Data Dissemination via Device-to-Device Communications: Fusing Social and Mobile Networks with Incentive Constraints , 2019, IEEE Transactions on Services Computing.

[65]  Craig Ross,et al.  Personality and motivations associated with Facebook use , 2009, Comput. Hum. Behav..

[66]  Julinda Stefa,et al.  SWIM: A Simple Model to Generate Small Mobile Worlds , 2008, IEEE INFOCOM 2009.

[67]  David A. Maltz,et al.  Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.

[68]  Han Zhao,et al.  Identifying influential nodes in complex networks with community structure , 2013, Knowl. Based Syst..

[69]  Driss Mammass,et al.  User-centric approach of detecting temporary community , 2015, 2015 Third World Conference on Complex Systems (WCCS).

[70]  Zhenfu Cao,et al.  SUCCESS: A Secure User-centric and Social-aware Reputation Based Incentive Scheme for DTNs , 2013, Ad Hoc Sens. Wirel. Networks.

[71]  Feng Xia,et al.  Safety Challenges and Solutions in Mobile Social Networks , 2013, IEEE Systems Journal.

[72]  Li-Der Chou,et al.  Mobile Social Network Services for Families With Children With Developmental Disabilities , 2011, IEEE Transactions on Information Technology in Biomedicine.

[73]  Song Guo,et al.  Reliable Bulk-Data Dissemination in Delay Tolerant Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.

[74]  Christophe Diot,et al.  Dissemination in opportunistic social networks: the role of temporal communities , 2012, MobiHoc '12.

[75]  Xiaohui Liang,et al.  Enabling Trustworthy Service Evaluation in Service-oriented Mobile Social Networks , 2022 .

[76]  Markus Endler,et al.  Evolutionary and efficient context management in heterogeneous environments , 2005, MPAC '05.

[77]  Jeffrey G. Andrews,et al.  What Will 5G Be? , 2014, IEEE Journal on Selected Areas in Communications.

[78]  Pan Hui,et al.  Distributed community detection in delay tolerant networks , 2007, MobiArch '07.

[79]  Feng Xia,et al.  A Survey on Routing and Data Dissemination in Opportunistic Mobile Social Networks , 2013, ArXiv.

[80]  Yang Yu,et al.  IEEE 802.16J relay-based wireless access networks: an overview , 2008, IEEE Wireless Communications.

[81]  Gheorghe Tecuci,et al.  Toward cognitive assistants for complex decision making under uncertainty , 2014, Intell. Decis. Technol..

[82]  M. Rahman,et al.  Fourth generation (4G) mobile networks - features, technologies & issues , 2005 .

[83]  Massimo Marchiori,et al.  Error and attacktolerance of complex network s , 2004 .

[84]  D S Callaway,et al.  Network robustness and fragility: percolation on random graphs. , 2000, Physical review letters.

[85]  Anne-Marie Kermarrec,et al.  Offline social networks: stepping away from the internet , 2012, SNS '12.

[86]  Sangwook Kim,et al.  Identifying and ranking influential spreaders in complex networks by neighborhood coreness , 2014 .

[87]  Xiaowei Xu,et al.  SCAN: a structural clustering algorithm for networks , 2007, KDD '07.

[88]  John R. Williams,et al.  Pervasive RFID and Near Field Communication Technology , 2007, IEEE Pervasive Computing.

[89]  DongBack Seo Evolution and Standardization of Mobile Communications Technology , 2013 .

[90]  Timur Friedman,et al.  Fixed point opportunistic routing in delay tolerant networks , 2008, IEEE Journal on Selected Areas in Communications.

[91]  Qinghua Zheng,et al.  Towards Information Diffusion in Mobile Social Networks , 2016, IEEE Transactions on Mobile Computing.

[92]  Jinfu Zhu,et al.  A measure of identifying influential waypoints in air route networks , 2018, PloS one.

[93]  Yong Deng,et al.  Local structure entropy of complex networks , 2014, ArXiv.

[94]  Lev Muchnik,et al.  Identifying influential spreaders in complex networks , 2010, 1001.5285.

[95]  Kwang-Cheng Chen,et al.  Optimal caching time for epidemic content dissemination in mobile social networks , 2016, 2016 IEEE International Conference on Communications (ICC).

[96]  Frank Schaich,et al.  5GNOW: non-orthogonal, asynchronous waveforms for future mobile applications , 2014, IEEE Communications Magazine.

[97]  Shaojie Tang,et al.  Relationship classification in large scale online social networks and its impact on information propagation , 2011, 2011 Proceedings IEEE INFOCOM.

[98]  Cheng Zhu,et al.  Ranking the invasions of cheaters in structured populations , 2020, Scientific Reports.

[99]  Josef Hallberg,et al.  Challenges for Mobile Social Networking Applications , 2009, EuropeComm.

[100]  M E J Newman,et al.  Community structure in social and biological networks , 2001, Proceedings of the National Academy of Sciences of the United States of America.

[101]  Zhi-Dan Zhao,et al.  Identifying a set of influential spreaders in complex networks , 2016, Scientific Reports.

[102]  S. S. Iyengar,et al.  Identifying Influential Spreaders in a Social Network (While Preserving Privacy) , 2020, Proc. Priv. Enhancing Technol..

[103]  Albert-László Barabási,et al.  Error and attack tolerance of complex networks , 2000, Nature.

[104]  James Zijun Wang,et al.  Self-Stabilizing Selection of Influential Users in Social Networks , 2014, 2014 IEEE 17th International Conference on Computational Science and Engineering.

[105]  Nader Mohamed,et al.  Middleware for Mobile Social Networks: A Survey , 2012, 2012 45th Hawaii International Conference on System Sciences.

[106]  Gerhard Fettweis,et al.  Relay-based deployment concepts for wireless and mobile broadband radio , 2004, IEEE Communications Magazine.

[107]  S. Feld Why Your Friends Have More Friends Than You Do , 1991, American Journal of Sociology.

[108]  David Kotz,et al.  Evaluating opportunistic routing protocols with large realistic contact traces , 2007, CHANTS '07.

[109]  Wing Cheong Lau,et al.  Social relationship classification based on interaction data from smartphones , 2013, 2013 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).

[110]  Anjali Agarwal,et al.  Applications architectures and protocol design issues for cognitive radio networks: a survey , 2014, Int. J. Wirel. Mob. Comput..

[111]  Albrecht Schmidt,et al.  Perci: Pervasive Service Interaction with the Internet of Things , 2009, IEEE Internet Computing.

[112]  Cliff Lampe,et al.  A face(book) in the crowd: social Searching vs. social browsing , 2006, CSCW '06.

[113]  Xing Wang,et al.  Identifying Key Nodes in Complex Networks Based on Global Structure , 2020, IEEE Access.

[114]  Anass Benjebbour,et al.  Design considerations for a 5G network architecture , 2014, IEEE Communications Magazine.

[115]  Ronghui Hou,et al.  Cluster head selection method for content-centric mobile social network in 5G , 2018, IET Commun..

[116]  Christos V. Verikoukis,et al.  Multi-Player Game Theoretic MAC Strategies for Energy Efficient Data Dissemination , 2014, IEEE Transactions on Wireless Communications.

[117]  Qinghua Li,et al.  Routing in Socially Selfish Delay Tolerant Networks , 2010, 2010 Proceedings IEEE INFOCOM.

[118]  Yong Deng,et al.  SELF-SIMILARITY IN COMPLEX NETWORKS: FROM THE VIEW OF THE HUB REPULSION , 2013 .

[119]  Victor C. M. Leung,et al.  Analytical Modeling of Contention-Based Bandwidth Request Mechanism in IEEE 802.16 Wireless Networks , 2008, IEEE Transactions on Vehicular Technology.

[120]  Stratis Ioannidis,et al.  Optimal and scalable distribution of content updates over a mobile social network , 2009, IEEE INFOCOM 2009.

[121]  Marie-Claude Boily,et al.  Dynamical systems to define centrality in social networks , 2000, Soc. Networks.

[122]  Julinda Stefa,et al.  Give2Get: Forwarding in Social Mobile Wireless Networks of Selfish Individuals , 2012, IEEE Trans. Dependable Secur. Comput..

[123]  Jie Wu,et al.  A Survey on Intrusion Detection in Mobile Ad Hoc Networks , 2007 .

[124]  Dong Liu,et al.  Identifying influential nodes in complex networks based on expansion factor , 2016 .

[125]  Jie Wu,et al.  Opportunistic Mobile Social Networks , 2014 .

[126]  C. Dangalchev Residual closeness in networks , 2006 .

[127]  Marco Conti,et al.  Opportunistic networking: data forwarding in disconnected mobile ad hoc networks , 2006, IEEE Communications Magazine.

[128]  Hayder Radha,et al.  Identifying Influential Nodes in Online Social Networks Using Principal Component Centrality , 2011, 2011 IEEE International Conference on Communications (ICC).

[129]  Xiaohui Liang,et al.  Morality-Driven Data Forwarding With Privacy Preservation in Mobile Social Networks , 2012, IEEE Transactions on Vehicular Technology.

[130]  Aravind Srinivasan,et al.  eDiscovery: Energy efficient device discovery for mobile opportunistic communications , 2012, 2012 20th IEEE International Conference on Network Protocols (ICNP).

[131]  Ronghui Hou,et al.  Vital nodes extracting method based on user's behavior in 5G mobile social networks , 2019, J. Netw. Comput. Appl..

[132]  Jianqiang Tang,et al.  Efficient source mobility support in content-centric networking , 2014, J. High Speed Networks.

[133]  Aravind Srinivasan,et al.  Your Friends Have More Friends Than You Do: Identifying Influential Mobile Users Through Random-Walk Sampling , 2014, IEEE/ACM Transactions on Networking.

[134]  Yuan-Chih Yu A mobile social networking service for urban community disaster response , 2015, Proceedings of the 2015 IEEE 9th International Conference on Semantic Computing (IEEE ICSC 2015).

[135]  Steven Bergren,et al.  Design Considerations for a 5G Network Architecture , 2017, ArXiv.

[136]  Yun Zhou,et al.  Identifying vital nodes in complex networks by adjacency information entropy , 2020, Scientific Reports.

[137]  Shi An,et al.  Critical Nodes Identification in Complex Networks , 2020, Symmetry.

[138]  Rabeb Mizouni,et al.  Opportunistic mobile social networks: Challenges survey and application in smart campus , 2016, 2016 IEEE 12th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob).

[139]  Yonggang Wen,et al.  Information diffusion in mobile social networks: The speed perspective , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[140]  Xiaoying Gan,et al.  Analytical model with a novel selfishness division of mobile nodes to participate cooperation , 2016, Peer-to-Peer Netw. Appl..

[141]  Dusit Niyato,et al.  Applications, Architectures, and Protocol Design Issues for Mobile Social Networks: A Survey , 2011, Proceedings of the IEEE.

[142]  Jitendra Malik,et al.  Normalized Cuts and Image Segmentation , 2000, IEEE Trans. Pattern Anal. Mach. Intell..

[143]  Olav Tirkkonen,et al.  Resource Sharing Optimization for Device-to-Device Communication Underlaying Cellular Networks , 2011, IEEE Transactions on Wireless Communications.

[144]  Salvatore Cuomo,et al.  A network-based method with privacy-preserving for identifying influential providers in large healthcare service systems , 2020, Future Generation Computer Systems.

[145]  Santo Fortunato,et al.  Community detection in graphs , 2009, ArXiv.

[146]  Wanggen Wan,et al.  Identification of Key Nodes in Microblog Networks , 2016 .

[147]  Yong Deng,et al.  A new measure of identifying influential nodes: Efficiency centrality , 2017, Commun. Nonlinear Sci. Numer. Simul..

[148]  Sujatha Yeruva,et al.  Selection of influential spreaders in complex networks using Pareto Shell decomposition , 2016 .

[149]  Lieguang Zeng,et al.  Energy-Efficient Optimal Opportunistic Forwarding for Delay-Tolerant Networks , 2010, IEEE Transactions on Vehicular Technology.

[150]  Giuseppe Lugano,et al.  Mobile Social Networking in Theory and Practice , 2008, First Monday.

[151]  Sanjay P. Ahuja,et al.  An Introduction to RFID Technology , 2010, Commun. Netw..

[152]  A. Vespignani,et al.  The architecture of complex weighted networks. , 2003, Proceedings of the National Academy of Sciences of the United States of America.

[153]  Radha Poovendran,et al.  Maximizing Influence in Competitive Environments: A Game-Theoretic Approach , 2011, GameSec.

[154]  Dino Pedreschi,et al.  Human mobility, social ties, and link prediction , 2011, KDD.

[155]  M E J Newman,et al.  Finding and evaluating community structure in networks. , 2003, Physical review. E, Statistical, nonlinear, and soft matter physics.

[156]  Gang Liu,et al.  Cooperative relay assignment in wireless networks , 2011, 2011 International Conference on Multimedia Technology.

[157]  Tian Kou,et al.  A novel method to evaluate node importance in complex networks , 2019, Physica A: Statistical Mechanics and its Applications.

[158]  Ioannis N. Kriaras,et al.  Third-generation mobile network architectures for the universal mobile telecommunications system (UMTS) , 1997, Bell Labs Technical Journal.

[159]  Mirco Musolesi,et al.  Sensing meets mobile social networks: the design, implementation and evaluation of the CenceMe application , 2008, SenSys '08.

[160]  Roberto Zarama,et al.  Benchmarking seeding strategies for spreading processes in social networks: an interplay between influencers, topologies and sizes , 2020, Scientific Reports.

[161]  Jon M. Kleinberg,et al.  Automatic Resource Compilation by Analyzing Hyperlink Structure and Associated Text , 1998, Comput. Networks.

[162]  David R. Reichman,et al.  An edge density definition of overlapping and weighted graph communities , 2013, ArXiv.

[163]  Mohd Murtadha Mohamad,et al.  Greedy Routing in Underwater Acoustic Sensor Networks: A Survey , 2013, Int. J. Distributed Sens. Networks.

[164]  Victor C. M. Leung,et al.  A Survey on Mobile Social Networks: Applications, Platforms, System Architectures, and Future Research Directions , 2015, IEEE Communications Surveys & Tutorials.

[165]  Pablo Rodriguez,et al.  I tube, you tube, everybody tubes: analyzing the world's largest user generated content video system , 2007, IMC '07.

[166]  P. Bonacich Factoring and weighting approaches to status scores and clique identification , 1972 .

[167]  Wei Song,et al.  Survey on Social-Aware Data Dissemination Over Mobile Wireless Networks , 2017, IEEE Access.

[168]  Pinyi Ren,et al.  Epidemic Information Dissemination in Mobile Social Networks With Opportunistic Links , 2015, IEEE Transactions on Emerging Topics in Computing.

[169]  Salil S. Kanhere,et al.  A survey on privacy in mobile participatory sensing applications , 2011, J. Syst. Softw..

[170]  Nesrine Chakchouk,et al.  A Survey on Opportunistic Routing in Wireless Communication Networks , 2015, IEEE Communications Surveys & Tutorials.

[171]  Kun Yang,et al.  Mobile social networks: Design requirements, architecture, and state-of-the-art technology , 2017, Comput. Commun..

[172]  Xiaoge Zhang,et al.  An amoeboid algorithm for shortest path in fuzzy weighted networks , 2012, 2012 24th Chinese Control and Decision Conference (CCDC).

[173]  Cheng Huang,et al.  A Machine Learning Based Framework for Identifying Influential Nodes in Complex Networks , 2020, IEEE Access.

[174]  Zhu Han,et al.  Distributed Relay-Assignment Protocols for Coverage Expansion in Cooperative Wireless Networks , 2010, IEEE Transactions on Mobile Computing.

[175]  Guoliang Xue,et al.  Checking in without worries: Location privacy in location based social networks , 2013, 2013 Proceedings IEEE INFOCOM.

[176]  Jon Kleinberg,et al.  Maximizing the spread of influence through a social network , 2003, KDD '03.

[177]  Zhu Han,et al.  Coalitional game theory for communication networks , 2009, IEEE Signal Processing Magazine.

[178]  Ben Y. Zhao,et al.  Preserving Location Privacy in Geosocial Applications , 2014, IEEE Transactions on Mobile Computing.

[179]  Yong Wang,et al.  Energy-efficient computing for wildlife tracking: design tradeoffs and early experiences with ZebraNet , 2002, ASPLOS X.

[180]  Xiaofei Wang,et al.  TASA: traffic offloading by tag-assisted social-aware opportunistic sharing in mobile social networks , 2015, The 21st IEEE International Workshop on Local and Metropolitan Area Networks.

[181]  Cliff Lampe,et al.  The Benefits of Facebook "Friends: " Social Capital and College Students' Use of Online Social Network Sites , 2007, J. Comput. Mediat. Commun..

[182]  Chen-Nee Chuah,et al.  Knowledge-based opportunistic forwarding in vehicular wireless ad hoc networks , 2005, 2005 IEEE 61st Vehicular Technology Conference.

[183]  Jure Leskovec,et al.  Friendship and mobility: user movement in location-based social networks , 2011, KDD.

[184]  Ronghui Hou,et al.  Finding important nodes based on community structure and degree of neighbor nodes to disseminate information in complex networks , 2017, 2017 3rd IEEE International Conference on Computer and Communications (ICCC).

[185]  Xiaofei Wang,et al.  TOSS: Traffic offloading by social network service-based opportunistic sharing in mobile social networks , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[186]  Dave Evans,et al.  How the Next Evolution of the Internet Is Changing Everything , 2011 .

[187]  Abdullah Bamatraf,et al.  Pressure Based Routing Protocol for Underwater Wireless Sensor Network: A Survey , 2015, KSII Trans. Internet Inf. Syst..

[188]  Jiadong Ren,et al.  CDA: A Clustering Degree Based Influential Spreader Identification Algorithm in Weighted Complex Network , 2018, IEEE Access.

[189]  Ratul Mahajan,et al.  Sustaining cooperation in multi-hop wireless networks , 2005, NSDI.

[190]  Kun Yang,et al.  Mobile Social Networks: Architectures, Social Properties, and Key Research Challenges , 2013, IEEE Communications Surveys & Tutorials.

[191]  Aravind Srinivasan,et al.  Mobile Data Offloading through Opportunistic Communications and Social Participation , 2012, IEEE Transactions on Mobile Computing.

[192]  Jean-Yves Le Boudec,et al.  Traps and pitfalls of using contact traces in performance studies of opportunistic networks , 2012, 2012 Proceedings IEEE INFOCOM.

[193]  L. Freeman Centrality in social networks conceptual clarification , 1978 .

[194]  Kate Ching-Ju Lin,et al.  Source Selection and Content Dissemination for Preference-Aware Traffic Offloading , 2015, IEEE Transactions on Parallel and Distributed Systems.

[195]  Bin Jiang,et al.  Characterizing the human mobility pattern in a large street network. , 2009, Physical review. E, Statistical, nonlinear, and soft matter physics.

[196]  Navdeep Kaur AN INTRODUCTION TO WIRELESS MOBILE SOCIAL NETWORKING IN OPPORTUNISTIC COMMUNICATION , 2013 .