Exploiting Social Ties for Cooperative D2D Communications: A Mobile Social Networking Case

Thanks to the convergence of pervasive mobile communications and fast-growing online social networking, mobile social networking is penetrating into our everyday life. Aiming to develop a systematic understanding of mobile social networks, in this paper we exploit social ties in human social networks to enhance cooperative device-to-device (D2D) communications. Specifically, as handheld devices are carried by human beings, we leverage two key social phenomena, namely social trust and social reciprocity, to promote efficient cooperation among devices. With this insight, we develop a coalitional game-theoretic framework to devise social-tie-based cooperation strategies for D2D communications. We also develop a network-assisted relay selection mechanism to implement the coalitional game solution, and show that the mechanism is immune to group deviations, individually rational, truthful, and computationally efficient. We evaluate the performance of the mechanism by using real social data traces. Simulation results corroborate that the proposed mechanism can achieve significant performance gain over the case without D2D cooperation.

[1]  Guanding Yu,et al.  A distributed relay selection method for relay assisted Device-to-Device communication system , 2012, 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC).

[2]  Sheng Zhong,et al.  Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[3]  R. Srikant,et al.  Achieving cooperation in multihop wireless networks of selfish nodes , 2006, GameNets '06.

[4]  Ravi S. Sandhu,et al.  Social-Networks Connect Services , 2010, Computer.

[5]  Cong Xiong,et al.  Energy-efficient wireless communications: tutorial, survey, and open issues , 2011, IEEE Wireless Communications.

[6]  S H Strogatz,et al.  Random graph models of social networks , 2002, Proceedings of the National Academy of Sciences of the United States of America.

[7]  Anand Srinivasan,et al.  Efficient resource allocation for device-to-device communication underlaying LTE network , 2010, 2010 IEEE 6th International Conference on Wireless and Mobile Computing, Networking and Communications.

[8]  Aravind Srinivasan,et al.  Mobile Data Offloading through Opportunistic Communications and Social Participation , 2012, IEEE Transactions on Mobile Computing.

[9]  Sanjay Kumar Madria,et al.  Dynamic social grouping based routing in a Mobile Ad-Hoc network , 2010, 2010 International Conference on High Performance Computing.

[10]  Roger B. Myerson,et al.  Game theory - Analysis of Conflict , 1991 .

[11]  Olav Tirkkonen,et al.  On the Performance of Device-to-Device Underlay Communication with Simple Power Control , 2009, VTC Spring 2009 - IEEE 69th Vehicular Technology Conference.

[12]  Theodore S. Rappaport,et al.  Wireless communications - principles and practice , 1996 .

[13]  C.-H. Yu,et al.  Power Optimization of Device-to-Device Communication Underlaying Cellular Communication , 2009, 2009 IEEE International Conference on Communications.

[14]  Guanhua Yan,et al.  Privacy-Preserving Profile Matching for Proximity-Based Mobile Social Networking , 2013, IEEE Journal on Selected Areas in Communications.

[15]  Dawn Xiaodong Song,et al.  Privacy-Preserving Set Operations , 2005, CRYPTO.

[16]  Raviraj S. Adve,et al.  Improving amplify-and-forward relay networks: optimal power allocation versus selection , 2006, IEEE Transactions on Wireless Communications.

[17]  Donghoon Lee,et al.  Performance of multihop decode-and-forward relaying assisted device-to-device communication underlaying cellular networks , 2012, 2012 International Symposium on Information Theory and its Applications.

[18]  V. Koivunen,et al.  Interference-avoiding MIMO schemes for device-to-device radio underlaying cellular networks , 2009, 2009 IEEE 20th International Symposium on Personal, Indoor and Mobile Radio Communications.

[19]  H. Gintis Strong reciprocity and human sociality. , 2000, Journal of theoretical biology.

[20]  Cecilia Mascolo,et al.  Socially-aware routing for publish-subscribe in delay-tolerant mobile ad hoc networks , 2008, IEEE Journal on Selected Areas in Communications.

[21]  K. J. Ray Liu,et al.  Cooperation stimulation in cooperative communications: An indirect reciprocity game , 2012, 2012 IEEE International Conference on Communications (ICC).

[22]  Pan Hui,et al.  BUBBLE Rap: Social-Based Forwarding in Delay-Tolerant Networks , 2008, IEEE Transactions on Mobile Computing.

[23]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[24]  Xiaohui Liang,et al.  Morality-Driven Data Forwarding With Privacy Preservation in Mobile Social Networks , 2012, IEEE Transactions on Vehicular Technology.

[25]  Tao Deng,et al.  System Architecture for a Cellular Network with Cooperative Mobile Relay , 2011, 2011 IEEE Vehicular Technology Conference (VTC Fall).

[26]  Dusit Niyato,et al.  Applications, Architectures, and Protocol Design Issues for Mobile Social Networks: A Survey , 2011, Proceedings of the IEEE.

[27]  Ming Li,et al.  FindU: Privacy-preserving personal profile matching in mobile social networks , 2011, 2011 Proceedings IEEE INFOCOM.

[28]  L. Shapley,et al.  On cores and indivisibility , 1974 .

[29]  Brian,et al.  VENETA: Serverless Friend-of-Friend Detection in Mobile Social Networking , 2008 .

[30]  Qinghua Li,et al.  Multicasting in delay tolerant networks: a social network perspective , 2009, MobiHoc '09.

[31]  Michael J. Neely Optimal pricing in a free market wireless network , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[32]  Peter Marbach,et al.  Cooperation in wireless ad hoc networks: a market-based approach , 2005, IEEE/ACM Transactions on Networking.

[33]  Tayfun Sönmez,et al.  Core in a simple coalition formation game , 2001, Soc. Choice Welf..

[34]  Anders Høst-Madsen,et al.  Capacity bounds and power allocation for wireless relay channels , 2005, IEEE Transactions on Information Theory.

[35]  C. R. Snyder,et al.  Social Cognitive Psychology: History and Current Domains , 1997 .

[36]  Xu Chen,et al.  Social trust and social reciprocity based cooperative D2D communications , 2013, MobiHoc.

[37]  Marco Conti,et al.  ContentPlace: social-aware data dissemination in opportunistic networks , 2008, MSWiM '08.

[38]  Guanhua Yan,et al.  Fine-grained private matching for proximity-based mobile social networking , 2012, 2012 Proceedings IEEE INFOCOM.

[39]  Stefan Parkvall,et al.  Design aspects of network assisted device-to-device communications , 2012, IEEE Communications Magazine.

[40]  T. Govier Social trust and human communities , 1997 .