Motivating Content Sharing and Trustworthiness in Mobile Social Networks

Mobile social networks (MSNs) enable users to discover and share contents with each other, especially at ephemeral events such as exhibitions and conferences where users could be strangers. Nevertheless, the incentive of users to actively share their contents in MSNs may be lacking if the corresponding cost is high. Besides, as users in MSN share contents in an impromptu way as they move, it makes them vulnerable to malicious users who may want to disseminate false contents. This is because users may not have knowledge about the peers they are socially connecting with in the network. In this paper, we propose MCoST, a mechanism that motivates content sharing in MSN and ensures that only trustworthy contents are shared. The mechanism is built on users’ collective bidding, content cost sharing, and trust evaluation while guaranteeing individual rationality. MCoST enables content providers to share contents with multiple users simultaneously by utilizing the broadcast nature of wireless transmission. The cost of the content is collectively compensated by the content receivers through the content bidding mechanism in MCoST. In ensuring that users can establish the trustworthiness of their encounters’ contents, MCoST incorporates a robust trust evaluation framework that guarantees that content reviews are immutable and tamper-proof, resistive to sybil, and rejection attacks, and that users cannot have multiple and fake identities in the network or reject negative reviews about their contents. This is achieved by integrating a distributed cryptographic hash-chained content review mechanism in the design of MCoST. Performance evaluation shows that the proposed mechanism efficiently evaluates contents’ trustworthiness by detecting and discriminating review-chains under sybil or rejection attacks and reduces the time and cost to collect the desired contents by 86% and 40%, respectively, and improves network utilization by 50%.

[1]  Alvin Chin,et al.  Mobile Social Networking: An Innovative Approach , 2013 .

[2]  Kate Ching-Ju Lin,et al.  Preference-aware content dissemination in opportunistic mobile social networks , 2012, 2012 Proceedings IEEE INFOCOM.

[3]  Song Guo,et al.  A Game Theoretical Incentive Scheme for Relay Selection Services in Mobile Social Networks , 2016, IEEE Transactions on Vehicular Technology.

[4]  Roman Beck,et al.  Blockchain - the Gateway to Trust-Free Cryptographic Transactions , 2016, ECIS.

[5]  David K. Y. Yau,et al.  A game theoretic approach to provide incentive and service differentiation in P2P networks , 2004, SIGMETRICS '04/Performance '04.

[6]  Kemal Bicakci,et al.  Infinite length hash chains and their applications , 2002, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.

[7]  Zhu Han,et al.  Self-Interest-Driven incentives for ad dissemination in autonomous mobile social networks , 2013, 2013 Proceedings IEEE INFOCOM.

[8]  Laurence T. Yang,et al.  MobiFuzzyTrust: An Efficient Fuzzy Trust Inference Mechanism in Mobile Social Networks , 2014, IEEE Transactions on Parallel and Distributed Systems.

[9]  John Kelley,et al.  WhozThat? evolving an ecosystem for context-aware mobile social networks , 2008, IEEE Network.

[10]  Mihaela van der Schaar,et al.  A Game Theoretic Analysis of Incentives in Content Production and Sharing Over Peer-to-Peer Networks , 2009, IEEE Journal of Selected Topics in Signal Processing.

[11]  Cécile Paris,et al.  A survey of trust in social networks , 2013, CSUR.

[12]  Kyriakos Mouratidis,et al.  Authenticating the query results of text search engines , 2008, Proc. VLDB Endow..

[13]  Hongyi Wu,et al.  Incentive Mechanisms for Data Dissemination in Autonomous Mobile Social Networks , 2017, IEEE Transactions on Mobile Computing.

[14]  Wei Gao,et al.  Authentication of outsourced linear function query with efficient updates , 2017, Cluster Computing.

[15]  Yin Zhang,et al.  Secure friend discovery in mobile social networks , 2011, 2011 Proceedings IEEE INFOCOM.

[16]  Jie Wu,et al.  Understanding Graph-Based Trust Evaluation in Online Social Networks , 2016, ACM Comput. Surv..

[17]  Feng Xia,et al.  Safety Challenges and Solutions in Mobile Social Networks , 2013, IEEE Systems Journal.

[18]  Daniele Quercia,et al.  Sybil Attacks Against Mobile Users: Friends and Foes to the Rescue , 2010, 2010 Proceedings IEEE INFOCOM.

[19]  Gene Tsudik,et al.  Authentication of Outsourced Databases Using Signature Aggregation and Chaining , 2006, DASFAA.

[20]  Franck Legendre,et al.  Social Trust in Opportunistic Networks , 2010, 2010 INFOCOM IEEE Conference on Computer Communications Workshops.

[21]  Chih-Yu Wang,et al.  Motivating content sharing in mobile social network through collective bidding , 2018, 2018 IEEE Wireless Communications and Networking Conference (WCNC).

[22]  Christophe Diot,et al.  Dissemination in opportunistic social networks: the role of temporal communities , 2012, MobiHoc '12.

[23]  Hwee Pink Tan,et al.  Profit-maximizing incentive for participatory sensing , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[24]  Xiaohui Liang,et al.  Enabling Trustworthy Service Evaluation in Service-oriented Mobile Social Networks , 2022 .

[25]  W. Bolt Bitcoin and Cryptocurrency Technologies : A Comprehensive Introduction , 2017 .

[26]  Charu C. Aggarwal,et al.  An Introduction to Social Network Data Analytics , 2011, Social Network Data Analytics.

[27]  Aiping Huang,et al.  Device-to-Device Offloading with Proactive Caching in Mobile Cellular Networks , 2014, GLOBECOM 2014.

[28]  Kun Yang,et al.  Mobile social networks: Design requirements, architecture, and state-of-the-art technology , 2017, Comput. Commun..

[29]  Yongdong Wu,et al.  Incentive Mechanism Design for Heterogeneous Peer-to-Peer Networks: A Stackelberg Game Approach , 2014, IEEE Transactions on Mobile Computing.

[30]  Pan Hui,et al.  Pocket switched networks and human mobility in conference environments , 2005, WDTN '05.

[31]  Ming Li,et al.  FindU: Privacy-preserving personal profile matching in mobile social networks , 2011, 2011 Proceedings IEEE INFOCOM.

[32]  Lei Chen,et al.  Free Market of Crowdsourcing: Incentive Mechanism Design for Mobile Sensing , 2014, IEEE Transactions on Parallel and Distributed Systems.

[33]  Audun Jøsang,et al.  AIS Electronic Library (AISeL) , 2017 .

[34]  Guihai Chen,et al.  EndorTrust: An Endorsement-Based Reputation System for Trustworthy and Heterogeneous Crowdsourcing , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).

[35]  Laurent Massoulié,et al.  The diameter of opportunistic mobile networks , 2007, CoNEXT '07.

[36]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .