An advertisement dissemination strategy with maximal influence for Internet-of-Vehicles

The recent advances in computation and communication technologies have led to the emergence of Internet-of-Vehicles where vehicles are connected to each other through sensors so that they can exchange information to improve driving safety, efficiency, and comfort. Internet-of-Vehicle has attracted attention from both academia and industry, as it promises huge commercial and research value. This article studies an advertisement dissemination problem in Internet-of-Vehicle with an aim to maximize the profit (number of vehicles to receive advertisements) given a limited budget. In this problem, advertisements will be first sent to a selected set of seed vehicles, then forwarded to neighboring vehicles. To find the influential set of vehicles, we examine the probability of interaction between vehicles by exploiting their mobility. In particular, we present the computation of node marginal gain in four cases by examining vehicle connectivity and topology. Simulation results demonstrate that the proposed algorithm outperforms existing methods for influence maximization by running time and deliver ratio under different traffic scenarios.

[1]  John B. Kenney,et al.  Dedicated Short-Range Communications (DSRC) Standards in the United States , 2011, Proceedings of the IEEE.

[2]  Thang N. Dinh,et al.  Cost-aware Targeted Viral Marketing in billion-scale networks , 2016, IEEE INFOCOM 2016 - The 35th Annual IEEE International Conference on Computer Communications.

[3]  Xiaokui Xiao,et al.  Influence maximization: near-optimal time complexity meets practical efficiency , 2014, SIGMOD Conference.

[4]  Shangguang Wang,et al.  An overview of Internet of Vehicles , 2014, China Communications.

[5]  Shahid Mumtaz,et al.  Social Big-Data-Based Content Dissemination in Internet of Vehicles , 2018, IEEE Transactions on Industrial Informatics.

[6]  Lei Yang,et al.  Sample Selected Extreme Learning Machine Based Intrusion Detection in Fog Computing and MEC , 2018, Wirel. Commun. Mob. Comput..

[7]  P. Saxena,et al.  Man-in-the-browser-cache: Persisting HTTPS attacks via browser cache poisoning , 2015, Comput. Secur..

[8]  Éva Tardos,et al.  Maximizing the Spread of Influence through a Social Network , 2015, Theory Comput..

[9]  Xiang Li,et al.  Why approximate when you can get the exact? Optimal targeted viral marketing at scale , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[10]  Xiuzhen Cheng,et al.  Jamming Strategies for Physical Layer Security , 2018, IEEE Wireless Communications.

[11]  Mianxiong Dong,et al.  Fog-Computing-Enabled Cognitive Network Function Virtualization for an Information-Centric Future Internet , 2019, IEEE Communications Magazine.

[12]  Kate Ching-Ju Lin,et al.  Cellular traffic offloading through community-based opportunistic dissemination , 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC).

[13]  M. L. Fisher,et al.  An analysis of approximations for maximizing submodular set functions—I , 1978, Math. Program..

[14]  Wei Dong,et al.  Coalition Game-Based Secure and Effective Clustering Communication in Vehicular Cyber-Physical System (VCPS) , 2017, Sensors.

[15]  Yanfei Lu,et al.  Re-ADP: Real-Time Data Aggregation with Adaptive ω-Event Differential Privacy for Fog Computing , 2018, Wirel. Commun. Mob. Comput..

[16]  Shangguang Wang,et al.  An overview of Internet of Vehicles , 2014 .

[17]  Kai Wang,et al.  Enabling Collaborative Edge Computing for Software Defined Vehicular Networks , 2018, IEEE Network.

[18]  Zhao Zhang,et al.  Viral marketing with positive influence , 2017, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.

[19]  Ilsun You,et al.  A Novel Utility Based Resource Management Scheme in Vehicular Social Edge Computing , 2018, IEEE Access.

[20]  Xiaodong Lin,et al.  SPRING: A Social-based Privacy-preserving Packet Forwarding Protocol for Vehicular Delay Tolerant Networks , 2009, 2010 Proceedings IEEE INFOCOM.

[21]  Ke Zhang,et al.  Mobile-Edge Computing for Vehicular Networks: A Promising Network Paradigm with Predictive Off-Loading , 2017, IEEE Veh. Technol. Mag..

[22]  Jun Wu,et al.  Making Knowledge Tradable in Edge-AI Enabled IoT: A Consortium Blockchain-Based Efficient and Incentive Approach , 2019, IEEE Transactions on Industrial Informatics.

[23]  Michele Nogueira Lima,et al.  Offloading cellular networks through V2V communications — How to select the seed-vehicles? , 2016, 2016 IEEE International Conference on Communications (ICC).

[24]  Kim-Kwang Raymond Choo,et al.  Fair Resource Allocation in an Intrusion-Detection System for Edge Computing: Ensuring the Security of Internet of Things Devices , 2018, IEEE Consumer Electronics Magazine.

[25]  Wei Chen,et al.  Scalable influence maximization for prevalent viral marketing in large-scale social networks , 2010, KDD.

[26]  Wei Chen,et al.  Efficient influence maximization in social networks , 2009, KDD.

[27]  Zhen Li,et al.  An optimal multiple stopping rule–based cooperative downloading scheme in vehicular cyber-physical systems , 2017, Int. J. Distributed Sens. Networks.

[28]  Nan Cheng,et al.  Cooperative vehicular content distribution in edge computing assisted 5G-VANET , 2018, China Communications.

[29]  Donghyun Kim,et al.  A New Comprehensive RSU Installation Strategy for Cost-Efficient VANET Deployment , 2017, IEEE Transactions on Vehicular Technology.

[30]  Zhenkai Liang,et al.  Detecting Malicious Behaviors in JavaScript Applications , 2018, IEEE Access.

[31]  Chunqiang Hu,et al.  LoDPD: A Location Difference-Based Proximity Detection Protocol for Fog Computing , 2017, IEEE Internet of Things Journal.

[32]  Xin Fan,et al.  A novel secure relay selection strategy for energy-harvesting-enabled Internet of things , 2018, EURASIP J. Wirel. Commun. Netw..

[33]  Wei Zhou,et al.  A coalition formation game based relay selection scheme for cooperative cognitive radio networks , 2017, Wirel. Networks.

[34]  Christian Borgs,et al.  Maximizing Social Influence in Nearly Optimal Time , 2012, SODA.

[35]  Shengli Xie,et al.  Blockchain for Secure and Efficient Data Sharing in Vehicular Edge Computing and Networks , 2019, IEEE Internet of Things Journal.

[36]  Zhihong Zhou,et al.  Understanding structure-based social network de-anonymization techniques via empirical analysis , 2018, EURASIP J. Wirel. Commun. Netw..

[37]  Ondrej Rysavý,et al.  Identification of Threats and Security Risk Assessments for Recursive Internet Architecture , 2018, IEEE Systems Journal.

[38]  Laks V. S. Lakshmanan,et al.  CELF++: optimizing the greedy algorithm for influence maximization in social networks , 2011, WWW.