Vulnerability of D2D Communications from Interconnected Social Networks

In this paper, we study how rumors in Online Social Networks (OSNs) may impact the performance of device-to-device (D2D) communication. As D2D is a new technology, people may choose not to use it when believed in rumors of its negative impacts. Thus, the cellular network with underlaying D2D is vulnerable to OSNs as rumors in OSNs may decrement the throughput of the cellular network in popular content delivery scenarios. To analyze the vulnerability, we introduce the problem of finding the most critical nodes in the OSN such that the throughput of a content delivery scenario is minimized when a rumor starts from those nodes. We then propose an efficient solution to the critical nodes detection problem. The severity of such vulnerability is supported by extensive experiments in various simulation settings, from which we observe up to $40\%$ reduction in network throughput.

[1]  Zhu Han,et al.  Energy-aware resource allocation for device-to-device underlay communication , 2013, 2013 IEEE International Conference on Communications (ICC).

[2]  Ashwin Sampath,et al.  Cell Association and Interference Coordination in Heterogeneous LTE-A Cellular Networks , 2010, IEEE Journal on Selected Areas in Communications.

[3]  Vijay V. Vazirani,et al.  Approximation Algorithms , 2001, Springer Berlin Heidelberg.

[4]  Wha Sook Jeon,et al.  Resource allocation scheme for device-to-device communication for maximizing spatial reuse , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).

[5]  Thang N. Dinh,et al.  Cost-aware Targeted Viral Marketing in billion-scale networks , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[6]  My T. Thai,et al.  Cheap, easy, and massively effective viral marketing in social networks: truth or fiction? , 2012, HT '12.

[7]  Nam P. Nguyen,et al.  Containment of misinformation spread in online social networks , 2012, WebSci '12.

[8]  Laks V. S. Lakshmanan,et al.  CELF++: optimizing the greedy algorithm for influence maximization in social networks , 2011, WWW.

[9]  Wei Chen,et al.  Efficient influence maximization in social networks , 2009, KDD.

[10]  Xu Chen,et al.  Exploiting Social Ties for Cooperative D2D Communications: A Mobile Social Networking Case , 2015, IEEE/ACM Transactions on Networking.

[11]  Tao Chen,et al.  Effective Interference Cancellation Scheme for Device-to-Device Communication Underlaying Cellular Networks , 2010, 2010 IEEE 72nd Vehicular Technology Conference - Fall.

[12]  My T. Thai,et al.  Cost-Effective Viral Marketing for Time-Critical Campaigns in Large-Scale Social Networks , 2014, IEEE/ACM Transactions on Networking.

[13]  Weili Wu,et al.  Least Cost Rumor Blocking in Social Networks , 2013, 2013 IEEE 33rd International Conference on Distributed Computing Systems.

[14]  Éva Tardos,et al.  Maximizing the Spread of Influence through a Social Network , 2015, Theory Comput..

[15]  Aravind Srinivasan,et al.  Mobile Data Offloading through Opportunistic Communications and Social Participation , 2012, IEEE Transactions on Mobile Computing.

[16]  Sami Hakola,et al.  The investigation of power control schemes for a device-to-device communication integrated into OFDMA cellular system , 2010, 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications.

[17]  Wei Chen,et al.  Scalable influence maximization for prevalent viral marketing in large-scale social networks , 2010, KDD.

[18]  Zaher Dawy,et al.  Social Network Aware Device-to-Device Communication in Wireless Networks , 2015, IEEE Transactions on Wireless Communications.

[19]  Stefan Parkvall,et al.  Design aspects of network assisted device-to-device communications , 2012, IEEE Communications Magazine.

[20]  Visa Koivunen,et al.  Interference-Aware Resource Allocation for Device-to-Device Radio Underlaying Cellular Networks , 2009, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference.

[21]  Xiaokui Xiao,et al.  Influence Maximization in Near-Linear Time: A Martingale Approach , 2015, SIGMOD Conference.

[22]  Yiyang Pei,et al.  Resource Allocation for Device-to-Device Communications Overlaying Two-Way Cellular Networks , 2013, IEEE Transactions on Wireless Communications.

[23]  Laks V. S. Lakshmanan,et al.  SIMPATH: An Efficient Algorithm for Influence Maximization under the Linear Threshold Model , 2011, 2011 IEEE 11th International Conference on Data Mining.

[24]  Xiaokui Xiao,et al.  Influence maximization: near-optimal time complexity meets practical efficiency , 2014, SIGMOD Conference.

[25]  Olav Tirkkonen,et al.  On the Performance of Device-to-Device Underlay Communication with Simple Power Control , 2009, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference.

[26]  Andreas Krause,et al.  Cost-effective outbreak detection in networks , 2007, KDD '07.

[27]  Xiang Cheng,et al.  Distributed resource allocation for device-to-device communications underlaying cellular networks , 2013, 2013 IEEE International Conference on Communications (ICC).

[28]  Sungsoo Park,et al.  Capacity Enhancement Using an Interference Limited Area for Device-to-Device Uplink Underlaying Cellular Networks , 2011, IEEE Transactions on Wireless Communications.

[29]  Xuemin Shen,et al.  Operator controlled device-to-device communications in LTE-advanced networks , 2012, IEEE Wireless Communications.

[30]  C.-H. Yu,et al.  Power Optimization of Device-to-Device Communication Underlaying Cellular Communication , 2009, 2009 IEEE International Conference on Communications.

[31]  Carl Wijting,et al.  Device-to-device communication as an underlay to LTE-advanced networks , 2009, IEEE Communications Magazine.

[32]  Zhu Han,et al.  Joint scheduling and resource allocation for device-to-device underlay communication , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).

[33]  Zhu Han,et al.  Optimal Base Station Scheduling for Device-to-Device Communication Underlaying Cellular Networks , 2016, IEEE Journal on Selected Areas in Communications.

[34]  Nam P. Nguyen,et al.  A novel method for worm containment on dynamic social networks , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.

[35]  Christian Borgs,et al.  Maximizing Social Influence in Nearly Optimal Time , 2012, SODA.

[36]  Jure Leskovec,et al.  Learning to Discover Social Circles in Ego Networks , 2012, NIPS.

[37]  Xiang Cheng,et al.  Efficiency Resource Allocation for Device-to-Device Underlay Communication Systems: A Reverse Iterative Combinatorial Auction Based Approach , 2012, IEEE Journal on Selected Areas in Communications.

[38]  Kyomin Jung,et al.  IRIE: Scalable and Robust Influence Maximization in Social Networks , 2011, 2012 IEEE 12th International Conference on Data Mining.

[39]  Walid Saad,et al.  Leveraging Social Communities for Optimizing Cellular Device-to-Device Communications , 2016, IEEE Transactions on Wireless Communications.

[40]  Olav Tirkkonen,et al.  Resource Sharing Optimization for Device-to-Device Communication Underlaying Cellular Networks , 2011, IEEE Transactions on Wireless Communications.

[41]  Nam P. Nguyen,et al.  Overlapping Community Structures and Their Detection on Social Networks , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.