World Wide Web

, Volume 21, Issue 2, pp 241–260 | Cite as

A game-theoretic approach to advertisement dissemination in ephemeral networks

  • Lihua Yin
  • Yunchuan Guo
  • Fenghua Li
  • Yanwei Sun
  • Junyan Qian
  • Athanasios Vasilakos
Article
  • 230 Downloads

Abstract

In ephemeral networks, disseminating advertisements faces two dilemmatic problems: on the one hand, disseminators own the limited resources and have privacy concerns, thus, often preferring to avoid disseminating advertisements without enough incentives; Even if advertisements are disseminated, their dissemination accuracy is lower. On the other hand, false advertisements may flood in ephemeral networks if too many incentives but no punishments are given. Thus, it is a challenge to design an effective scheme to guarantee rational disseminators have sufficient impetus to forward true advertisements to the interested consumers and report false advertisements, despite facing the limitation of resources and the risk of privacy leakage. To solve this problem, in this paper, a bargaining-based scheme is proposed to motive disseminators to forward the true advertisements to the interested node and a semi-grim policy is designed for punishing the disseminators who releases and disseminates false advertisements. Acknowledging the assumption of incomplete information, a repeated dissemination game is proposed to help disseminators to decide whether to forward advertisements or report false advertisements. Simulation results demonstrate that our scheme not only provides disseminators a strong impetus to disseminate the advertisements with higher dissemination accuracy, but also effectively prevents disseminators from forwarding false advertisements.

Keywords

Ephemeral networks Information dissemination Games 

Notes

Acknowledgments

This work was supported by the Strategic Priority Research Program of the Chinese Academy of Sciences (XDA06030200), the National key research and development program of China (2016YFB0800700), the National Natural Science Foundation of China (U1401251, 61502489).

References

  1. 1.
    Cai, Y., Fan, Y., Wen, D.: An incentive-compatible routing protocol for two-hop delay-tolerant networks. IEEE Trans. Veh. Technol. 65(1), 266–277 (2016)CrossRefGoogle Scholar
  2. 2.
    Chen, H., Lou, W., Wang, Z., Wang, Q.: A secure credit-based incentive mechanism for message forwarding in noncooperative dtns. IEEE Trans. Veh. Technol. 65(8), 6377–6388 (2016)CrossRefGoogle Scholar
  3. 3.
    Chen, T., Zhu, L., Wu, F., Zhong, S.: Stimulating cooperation in vehicular ad hoc networks: a coalitional game theoretic approach. IEEE Trans. Veh. Technol. 60 (2), 566–579 (2011)CrossRefGoogle Scholar
  4. 4.
    Chuang, I., Lin, T., Lo, C., Kuo, Y.: Time-sensitive data dissemination in opportunistic networks. In: IEEE Conference on Wireless Communications and Networking Conference, pp. 2420–2425 (2014)Google Scholar
  5. 5.
    Ford, J.L., David, K., Wei, P.: Information and ambiguity: Herd and contrarian behaviour in financial markets. Theor. Decis. 75(1), 1–15 (2013)MathSciNetCrossRefMATHGoogle Scholar
  6. 6.
    Guo, Y., Yin, L., Liu, L., Fang, B.: Utility-Based Cooperative Decision in Cooperative Authentication IEEE Conference on Computer Communications, Pp. 1006–1014. 1 (2014)Google Scholar
  7. 7.
    Hargittai, E., Litt, E.: The tweet smell of celebrity success: Explaining variation in twitter adoption among a diverse group of young adults. New Media Soc. 13(5), 824–842 (2011)CrossRefGoogle Scholar
  8. 8.
    Hassan, K.H.: E-Commerce and Consumer Protection in Malaysia: Advertisement and False Description ACM Conference on Economics and Finance Research IPEDR, vol. 32 (2012)Google Scholar
  9. 9.
    Huang, H., Rui, L., Zheng, W., Niu, D., Xiong, Y., Zhang, P., Qiu, X.: Incentive Mechanism for Cooperative Content Discovery in Mobile Wireless Networks: a Repeated Cooperative Game-Theoretic Approach IEEE Symposium on Computers and Communication, pp 727–731 (2015)Google Scholar
  10. 10.
    Hussain, R., Kim, S., Oh, H.: Traffic information dissemination system: Extending cooperative awareness among smart vehicles with only single-hop beacons in vanet. Wirel. Pers. Commun. 88(2), 151–172 (2016)CrossRefGoogle Scholar
  11. 11.
    Kim, J., Lee, H.: Vada: Wi-fi Direct Based Voluntary Advertisement Dissemination Algorithm for Social Commerce Service Vehicular Technology Conference, pp 1–6 (2015)Google Scholar
  12. 12.
    Li, Q., Cao, G.: Providing privacy-aware incentives in mobile sensing systems. IEEE Trans. Mob. Comput. 15(6), 1485–1498 (2016)CrossRefGoogle Scholar
  13. 13.
    Motani, M., Srinivasan, V., Nuggehalli, P.S.: Peoplenet: Engineering a Wireless Virtual Social Network Conference on Mobile Computing and Networking, pp 243–257 (2005)Google Scholar
  14. 14.
    Nath, S.: Madscope: Characterizing Mobile In-App Targeted Ads ACM Conference on Mobile Systems, Applications, and Services, pp 59–73 (2015)Google Scholar
  15. 15.
    Ning, T., Yang, Z., Wu, H., Han, Z.: Self-Interest-Driven Incentives for Ad Dissemination in Autonomous Mobile Social Networks IEEE Conference on Computer Communications, pp 2310–2318 (2013)Google Scholar
  16. 16.
    Palmer, A., Koenig-Lewis, N.: An experiential, social network-based approach to direct marketing. Direct Mark. Int. J. 3(3), 162–176 (2009)CrossRefGoogle Scholar
  17. 17.
    Reidt, S., Srivatsa, M., Balfe, S.: The Fable of the Bees: Incentivizing Robust Revocation Decision Making in Ad Hoc Networks ACM Conference on Computer and Communications Security, pp 291–302 (2009)Google Scholar
  18. 18.
    Sobin, C., Raychoudhury, V., Marfia, G., Singla, A.: A survey of routing and data dissemination in delay tolerant networks. J. Netw. Comput. Appl. 67, 128–146 (2016)CrossRefGoogle Scholar
  19. 19.
    Stango, V., Zinman, J.: What do consumers really pay on their checking and credit card accounts? explicit, implicit, and avoidable costs. Am. Econ. Rev. 99(2), 424–29 (2009)CrossRefGoogle Scholar
  20. 20.
    Surana, A., Kiran, R.U., Reddy, P.K.: Selecting a Right Interestingness Measure for Rare Association Rules International Conference on Management of Data, pp 115–124 (2010)Google Scholar
  21. 21.
    Tang, B., Ye, B., Guo, S., Lu, S., Wu, D.O.: Order-optimal information dissemination in manets via network coding. IEEE Trans. Parallel Distrib. Syst. 25(7), 1841–1851 (2014)CrossRefGoogle Scholar
  22. 22.
    Teng, J., Zhang, B., Bai, X., Yang, Z., Xuan, D.: Incentive-driven and privacy-preserving message dissemination in large-scale mobile networks. IEEE Trans. Parallel Distrib. Syst. 25(11), 2909–2919 (2014)CrossRefGoogle Scholar
  23. 23.
    Wang, W., Yang, L., Liao, Q., Zhu, X., Zhang, Q.: Tisa: Time-Dependent Social Network Advertising Proc. of IEEE International Conference on Communications, pp 1188–1193 (2015)Google Scholar
  24. 24.
    Wei, L., Zhu, H., Cao, Z., Shen, X.: Success: a secure user-centric and social-aware reputation based incentive scheme for dtns. Ad Hoc Sens. Wirel. Netw 19 (1-2), 95–118 (2013)Google Scholar
  25. 25.
    Xie, H., Lui, J.C., Towsley, D.: Incentive and Reputation Mechanisms for Online Crowdsourcing Systems IEEE Symposium on Quality of Service, pp 207–212 (2015)Google Scholar
  26. 26.
    Xu, Q., Su, Z., Zhang, K., Ren, P., Shen, X.S.: Epidemic information dissemination in mobile social networks with opportunistic links. IEEE Trans. Emerg. Topics Comput. 3(3), 399–409 (2015)CrossRefGoogle Scholar
  27. 27.
    Yin, L., Guo, Y., Sun, Y., Qian, J., Vasilakos, A.: Ad Dissemination Game in Ephemeral Networks Springer Asia-Pacific Web Conference, pp 610–622 (2015)Google Scholar
  28. 28.
    Zeng, D., Guo, S., Hu, J.: Reliable bulk-data dissemination in delay tolerant networks. IEEE Trans. Parallel Distrib. Syst. 25(8), 2180–2189 (2014)CrossRefGoogle Scholar
  29. 29.
    Zhang, X., Yang, Z., Sun, W., Liu, Y., Tang, S., Xing, K., Mao, X.: Incentives for mobile crowd sensing: a survey. IEEE Commun. Surv. Tutorials 18(1), 54–67 (2016)CrossRefGoogle Scholar
  30. 30.
    Zhang, Y., van der Schaar, M.: Reputation-Based Incentive Protocols in Crowdsourcing Applications IEEE Conference on Computer Communications, pp 2140–2148 (2012)Google Scholar

Copyright information

© Springer Science+Business Media New York 2017

Authors and Affiliations

  • Lihua Yin
    • 1
  • Yunchuan Guo
    • 1
  • Fenghua Li
    • 1
  • Yanwei Sun
    • 1
  • Junyan Qian
    • 2
    • 3
  • Athanasios Vasilakos
    • 4
  1. 1.State Key Laboratory of Information Security, Institute of Information EngineeringChinese Academy of SciencesBeijingChina
  2. 2.Guangxi Key Laboratory of Trusted SoftwareGuilin University of Electronic TechnologyGuilinChina
  3. 3.National University of Defense TechnologyChangshaChina
  4. 4.Lulea University of TechnologyLuleaSweden

Personalised recommendations