Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (38)

Search Parameters:
Keywords = opportunistic social networks

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
22 pages, 3660 KiB  
Article
Context-Aware Trust Prediction for Optimal Routing in Opportunistic IoT Systems
by Abdulkadir Abdulahi Hasan, Xianwen Fang, Sohaib Latif and Adeel Iqbal
Sensors 2025, 25(12), 3672; https://doi.org/10.3390/s25123672 - 12 Jun 2025
Viewed by 565
Abstract
The Social Opportunistic Internet of Things (SO-IoT) is a rapidly emerging paradigm that enables mobile, ad-hoc device communication based on both physical and social interactions. In such networks, routing decisions heavily depend on the selection of intermediate nodes to ensure secure and efficient [...] Read more.
The Social Opportunistic Internet of Things (SO-IoT) is a rapidly emerging paradigm that enables mobile, ad-hoc device communication based on both physical and social interactions. In such networks, routing decisions heavily depend on the selection of intermediate nodes to ensure secure and efficient data dissemination. Traditional approaches relying solely on reliability or social interest fail to capture the multifaceted trustworthiness of nodes in dynamic SO-IoT environments. This paper proposes a trust-based route optimization framework that integrates social interest and behavioral reliability using Bayesian inference and Jeffrey’s conditioning. A composite trust level is computed for each intermediate node to determine its suitability for data forwarding. To validate the framework, we conduct a two-phase simulation-based analysis: a scenario-driven evaluation that demonstrates the model’s behavior in controlled settings, and a large-scale NS-3-based simulation comparing our method with benchmark routing schemes, including random, greedy, and AI-based protocols. Results confirm that our proposed model achieves up to an 88.9% delivery ratio with minimal energy consumption and the highest trust accuracy (86.5%), demonstrating its robustness and scalability in real-world-inspired IoT environments. Full article
(This article belongs to the Special Issue Data Engineering in the Internet of Things—Second Edition)
Show Figures

Figure 1

17 pages, 534 KiB  
Article
Improving Transmission in Integrated Unmanned Aerial Vehicle–Intelligent Connected Vehicle Networks with Selfish Nodes Using Opportunistic Approaches
by Meixin Ye, Zhenfeng Zhou, Lijun Zhu, Fanghui Huang, Tao Li, Dawei Wang, Yi Jin and Yixin He
Drones 2025, 9(1), 12; https://doi.org/10.3390/drones9010012 - 26 Dec 2024
Viewed by 813
Abstract
The integration of unmanned aerial vehicles (UAVs) into vehicular networks offers numerous advantages in enhancing communication and coverage performance. With the ability to move flexibly in three-dimensional space, UAVs can effectively bridge the communication gap between intelligent connected vehicles (ICVs) and infrastructure. However, [...] Read more.
The integration of unmanned aerial vehicles (UAVs) into vehicular networks offers numerous advantages in enhancing communication and coverage performance. With the ability to move flexibly in three-dimensional space, UAVs can effectively bridge the communication gap between intelligent connected vehicles (ICVs) and infrastructure. However, the rapid movement of UAVs and ICVs poses significant challenges to the stability and reliability of communication links. Motivated by these challenges, integrated UAV–ICV networks can be viewed as vehicular delay-tolerant networks (VDTNs), where data delivery is accomplished through the “store-carry-forward” transmission mechanism. Since VDTNs exhibit social attributes, this paper first investigates the opportunistic transmission problem in the presence of selfish nodes. Then, by enabling node cooperation, this paper proposes an opportunistic transmission scheme for integrated UAV–ICV networks. To address the issue of node selfishness in practical scenarios, the proposed scheme classifies the degree of cooperation and analyzes the encounter probability between nodes. Based on this, information is initially flooded, and the UAV is selected for data distribution by jointly considering the node centrality, energy consumption, and cache size. Finally, simulation results demonstrate that the proposed scheme can effectively improve the delivery ratio and reduce the average delivery delay compared to state-of-the-art schemes. Full article
(This article belongs to the Section Drone Communications)
Show Figures

Figure 1

28 pages, 8697 KiB  
Article
Efficient Privacy-Aware Forwarding for Enhanced Communication Privacy in Opportunistic Mobile Social Networks
by Azizah Assiri and Hassen Sallay
Future Internet 2024, 16(2), 48; https://doi.org/10.3390/fi16020048 - 31 Jan 2024
Cited by 2 | Viewed by 2084
Abstract
Opportunistic mobile social networks (OMSNs) have become increasingly popular in recent years due to the rise of social media and smartphones. However, message forwarding and sharing social information through intermediary nodes on OMSNs raises privacy concerns as personal data and activities become more [...] Read more.
Opportunistic mobile social networks (OMSNs) have become increasingly popular in recent years due to the rise of social media and smartphones. However, message forwarding and sharing social information through intermediary nodes on OMSNs raises privacy concerns as personal data and activities become more exposed. Therefore, maintaining privacy without limiting efficient social interaction is a challenging task. This paper addresses this specific problem of safeguarding user privacy during message forwarding by integrating a privacy layer on the state-of-the-art OMSN routing decision models that empowers users to control their message dissemination. Mainly, we present three user-centric privacy-aware forwarding modes guiding the selection of the next hop in the forwarding path based on social metrics such as common friends and exchanged messages between OMSN nodes. More specifically, we define different social relationship strengths approximating real-world scenarios (familiar, weak tie, stranger) and trust thresholds to give users choices on trust levels for different social contexts and guide the routing decisions. We evaluate the privacy enhancement and network performance through extensive simulations using ONE simulator for several routing schemes (Epidemic, Prophet, and Spray and Wait) and different movement models (random way, bus, and working day). We demonstrate that our modes can enhance privacy by up to 45% in various network scenarios, as measured by the reduction in the likelihood of unintended message propagation, while keeping the message-delivery process effective and efficient. Full article
(This article belongs to the Special Issue Information and Future Internet Security, Trust and Privacy II)
Show Figures

Figure 1

32 pages, 5429 KiB  
Article
Efficient Data Transfer by Evaluating Closeness Centrality for Dynamic Social Complex Network-Inspired Routing
by Manuel A. López-Rourich and Francisco J. Rodríguez-Pérez
Appl. Sci. 2023, 13(19), 10766; https://doi.org/10.3390/app131910766 - 27 Sep 2023
Cited by 3 | Viewed by 1712
Abstract
Social Complex Networks in communication networks are pivotal for comprehending the impact of human-like interactions on information flow and communication efficiency. These networks replicate social behavior patterns in the digital realm by modeling device interactions, considering friendship, influence, and information-sharing frequency. A key [...] Read more.
Social Complex Networks in communication networks are pivotal for comprehending the impact of human-like interactions on information flow and communication efficiency. These networks replicate social behavior patterns in the digital realm by modeling device interactions, considering friendship, influence, and information-sharing frequency. A key challenge in communication networks is their dynamic topologies, driven by dynamic user behaviors, fluctuating traffic patterns, and scalability needs. Analyzing these changes is essential for optimizing routing and enhancing the user experience. This paper introduces a network model tailored for Opportunistic Networks, characterized by intermittent device connections and disconnections, resulting in sporadic connectivity. The model analyzes node behavior, extracts vital properties, and ranks nodes by influence. Furthermore, it explores the evolution of node connections over time, gaining insights into changing roles and their impact on data exchange. Real-world datasets validate the model’s effectiveness. Applying it enables the development of refined routing protocols based on dynamic influence rankings. This approach fosters more efficient, adaptive communication systems that dynamically respond to evolving network conditions and user behaviors. Full article
(This article belongs to the Special Issue Artificial Intelligence in Complex Networks)
Show Figures

Figure 1

22 pages, 2470 KiB  
Article
Realizing the “Outwardly Regal” Vision in the Midst of Political Inactivity: A Study of the Epistolary Networks of Li Gang 李綱 (1083–1140) and Sun Di 孫覿 (1081–1169)
by Ming-Kin Chu
Religions 2023, 14(3), 389; https://doi.org/10.3390/rel14030389 - 14 Mar 2023
Viewed by 2019
Abstract
How did politically inactive members of the Song literati attempt to realize the Confucian “outwardly regal” vision by putting their political ideal into practice? To what extent did their social networks play a role in this process? This paper aims to examine these [...] Read more.
How did politically inactive members of the Song literati attempt to realize the Confucian “outwardly regal” vision by putting their political ideal into practice? To what extent did their social networks play a role in this process? This paper aims to examine these questions via a comprehensive investigation of the writings of two prominent political and literary figures who experienced the Northern–Southern Song transition, Sun Di 孫覿 (1081–1169) and Li Gang 李綱 (1083–1140). A close examination of the letters written to senior court officials by these figures during their periods of political inactivity reveals not only these writers’ political agendas but also their attempts to exert influence in the political arena—a manifestation of the “outwardly regal” notion—via their epistolary networks. Despite the fact that Li has been highly praised while Sun has been widely condemned by posterity, the two men employed similar strategies to curry favor with senior court officials, who turned out to be potential patrons and facilitated the subsequent political rehabilitations of these two men. Sun Di’s and Li Gang’s eagerness to resume public service indicates the opportunistic motives underlying their epistolary exchanges and the ungenuine claims of disinterest in the politics expressed therein. Such claims, I would argue, are rhetorical conventions that the two men employed to present themselves as virtuous Confucian gentlemen who continued to cultivate “a sage inside” even when they lacked the opportunity to exercise the “outwardly regal” vision. Full article
(This article belongs to the Special Issue Historical Network Analysis in the Study of Chinese Religion)
Show Figures

Figure 1

19 pages, 1486 KiB  
Article
Identifying and Classifying Urban Data Sources for Machine Learning-Based Sustainable Urban Planning and Decision Support Systems Development
by Stéphane C. K. Tékouabou, Jérôme Chenal, Rida Azmi, Hamza Toulni, El Bachir Diop and Anastasija Nikiforova
Data 2022, 7(12), 170; https://doi.org/10.3390/data7120170 - 28 Nov 2022
Cited by 10 | Viewed by 5002
Abstract
With the increase in the amount and variety of data that are constantly produced, collected, and exchanged between systems, the efficiency and accuracy of solutions/services that use data as input may suffer if an inappropriate or inaccurate technique, method, or tool is chosen [...] Read more.
With the increase in the amount and variety of data that are constantly produced, collected, and exchanged between systems, the efficiency and accuracy of solutions/services that use data as input may suffer if an inappropriate or inaccurate technique, method, or tool is chosen to deal with them. This paper presents a global overview of urban data sources and structures used to train machine learning (ML) algorithms integrated into urban planning decision support systems (DSS). It contributes to a common understanding of choosing the right urban data for a given urban planning issue, i.e., their type, source and structure, for more efficient use in training ML models. For the purpose of this study, we conduct a systematic literature review (SLR) of all relevant peer-reviewed studies available in the Scopus database. More precisely, 248 papers were found to be relevant with their further analysis using a text-mining approach to determine (a) the main urban data sources used for ML modeling, (b) the most popular approaches used in relevant urban planning and urban problem-solving studies and their relationship to the type of data source used, and (c) the problems commonly encountered in their use. After classifying them, we identified the strengths and weaknesses of data sources depending on several predefined factors. We found that the data mainly come from two main categories of sources, namely (1) sensors and (2) statistical surveys, including social network data. They can be classified as (a) opportunistic or (b) non-opportunistic depending on the process of data acquisition, collection, and storage. Data sources are closely correlated with their structure and potential urban planning issues to be addressed. Almost all urban data have an indexed structure and, in particular, either attribute tables for statistical survey data and data from simple sensors (e.g., climate and pollution sensors) or vectors, mostly obtained from satellite images after large-scale spatio-temporal analysis. The paper also provides a discussion of the potential opportunities, emerging issues, and challenges that urban data sources face and should overcome to better catalyze intelligent/smart planning. This should contribute to the general understanding of the data, their sources and the challenges to be faced and overcome by those seeking data and integrating them into smart applications and urban-planning processes. Full article
(This article belongs to the Special Issue Data-Driven Approach on Urban Planning and Smart Cities)
Show Figures

Figure 1

16 pages, 1783 KiB  
Article
Improving Delivery Probability in Mobile Opportunistic Networks with Social-Based Routing
by Manuel Jesús-Azabal, José García-Alonso, Vasco N. G. J. Soares and Jaime Galán-Jiménez
Electronics 2022, 11(13), 2084; https://doi.org/10.3390/electronics11132084 - 2 Jul 2022
Cited by 12 | Viewed by 2968
Abstract
There are contexts where TCP/IP is not suitable for performing data transmission due to long delays, timeouts, network partitioning, and interruptions. In these scenarios, mobile opportunistic networks (MONs) are a valid option, providing asynchronous transmissions in dynamic topologies. These architectures exploit physical encounters [...] Read more.
There are contexts where TCP/IP is not suitable for performing data transmission due to long delays, timeouts, network partitioning, and interruptions. In these scenarios, mobile opportunistic networks (MONs) are a valid option, providing asynchronous transmissions in dynamic topologies. These architectures exploit physical encounters and persistent storage to communicate nodes that lack a continuous end-to-end path. In recent years, many routing algorithms have been based on social interactions. Smartphones and wearables are in vogue, applying social information to optimize paths between nodes. This work proposes Refine Social Broadcast (RSB), a social routing algorithm. RSB uses social behavior and node interests to refine the message broadcast in the network, improving the delivery probability while reducing redundant data duplication. The proposal combines the identification of the most influential nodes to carry the information toward the destination with interest-based routing. To evaluate the performance, RSB is applied to a simulated case of use based on a realistic loneliness detection methodology in elderly adults. The obtained delivery probability, latency, overhead, and hops are compared with the most popular social-based routers, namely, EpSoc, SimBet, and BubbleRap. RSB manifests a successful delivery probability, exceeding the second-best result (SimBet) by 17% and reducing the highest overhead (EpSoc) by 97%. Full article
(This article belongs to the Special Issue Emerging Trends, Issues and Challenges in Smart Cities)
Show Figures

Figure 1

23 pages, 4032 KiB  
Article
Improving Traffic Load Distribution Fairness in Mobile Social Networks
by Bambang Soelistijanto and Vittalis Ayu
Algorithms 2022, 15(7), 222; https://doi.org/10.3390/a15070222 - 22 Jun 2022
Cited by 1 | Viewed by 2511
Abstract
Mobile social networks suffer from an unbalanced traffic load distribution due to the heterogeneity in mobility of nodes (humans) in the network. A few nodes in these networks are highly mobile, and the proposed social-based routing algorithms are likely to choose these most [...] Read more.
Mobile social networks suffer from an unbalanced traffic load distribution due to the heterogeneity in mobility of nodes (humans) in the network. A few nodes in these networks are highly mobile, and the proposed social-based routing algorithms are likely to choose these most “social” nodes as the best message relays. Finally, this could lead to inequitable traffic load distribution and resource utilisation, such as faster battery drain and/or storage consumption of the most (socially) popular nodes. We propose a framework called Traffic Load Distribution Aware (TraLDA) to improve traffic load balancing across network nodes. We present a novel method for calculating node popularity which takes into account both node inherent and social-relations popularity. The former is purely determined by the node’s sociability level in the network, and in TraLDA is computed using the Kalman prediction which considers the node’s periodicity behaviour. However, the latter takes the benefit of interactions with more popular neighbours (acquaintances) to boost the popularity of lower (social) level nodes. Using extensive simulations in the Opportunistic Network Environment (ONE) driven by real human mobility scenarios, we show that our proposed strategy enhances the traffic load distribution fairness of the classical, yet popular social-aware routing algorithms BubbleRap and SimBet without negatively impacting the overall delivery performance. Full article
(This article belongs to the Special Issue Algorithms for Communication Networks)
Show Figures

Figure 1

27 pages, 4891 KiB  
Article
Node Screening Method Based on Federated Learning with IoT in Opportunistic Social Networks
by Yedong Shen, Fangfang Gou and Jia Wu
Mathematics 2022, 10(10), 1669; https://doi.org/10.3390/math10101669 - 13 May 2022
Cited by 25 | Viewed by 3330
Abstract
With the advent of the 5G era, the number of Internet of Things (IoT) devices has surged, and the population’s demand for information and bandwidth is increasing. The mobile device networks in IoT can be regarded as independent “social nodes”, and a large [...] Read more.
With the advent of the 5G era, the number of Internet of Things (IoT) devices has surged, and the population’s demand for information and bandwidth is increasing. The mobile device networks in IoT can be regarded as independent “social nodes”, and a large number of social nodes are combined to form a new “opportunistic social network”. In this network, a large amount of data will be transmitted and the efficiency of data transmission is low. At the same time, the existence of “malicious nodes” in the opportunistic social network will cause problems of unstable data transmission and leakage of user privacy. In the information society, these problems will have a great impact on data transmission and data security; therefore, in order to solve the above problems, this paper first divides the nodes into “community divisions”, and then proposes a more effective node selection algorithm, i.e., the FL node selection algorithm based on Distributed Proximal Policy Optimization in IoT (FABD) algorithm, based on Federated Learning (FL). The algorithm is mainly divided into two processes: multi-threaded interaction and a global network update. The device node selection problem in federated learning is constructed as a Markov decision process. It takes into account the training quality and efficiency of heterogeneous nodes and optimizes it according to the distributed near-end strategy. At the same time, malicious nodes are screened to ensure the reliability of data, prevent data loss, and alleviate the problem of user privacy leakage. Through experimental simulation, compared with other algorithms, the FABD algorithm has a higher delivery rate and lower data transmission delay and significantly improves the reliability of data transmission. Full article
(This article belongs to the Special Issue Complex Network Modeling: Theory and Applications)
Show Figures

Figure 1

16 pages, 5089 KiB  
Article
A Routing Query Algorithm Based on Time-Varying Relationship Group in Opportunistic Social Networks
by Yihan Dong, Liu Chang, Jingwen Luo and Jia Wu
Electronics 2021, 10(13), 1595; https://doi.org/10.3390/electronics10131595 - 2 Jul 2021
Cited by 14 | Viewed by 2586
Abstract
With the fast development of IoT and 5G technologies, opportunity social networks composed of portable mobile devices have become a hot research topic in recent years. However, arbitrary node movement in opportunity networks and the absence of end-to-end pathways make node communication unstable. [...] Read more.
With the fast development of IoT and 5G technologies, opportunity social networks composed of portable mobile devices have become a hot research topic in recent years. However, arbitrary node movement in opportunity networks and the absence of end-to-end pathways make node communication unstable. At the same time, the problem of ignoring human social preferences and relying on wrong message relay nodes lead to a low data transmission rate and high network overhead. Based on the above issues, we propose a time-varying relationship groups-based routing query algorithm for mobile opportunity networks (Time-varying Relationship Groups, TVRGs). Firstly, we construct the relationship groups based on the time-varying characteristics according to the intimacy between users. Secondly, we calculate the importance of nodes by their connectivity time and communication frequency. Finally, we find the suitable message relay nodes according to the similarity of node weights and their action trajectories and design the routing query algorithm accordingly. The simulation results show that the algorithm can vastly improve the message query success rate, effectively improve the data transmission efficiency, and reduce the average delay and system overhead compared with the existing routing algorithms. Full article
(This article belongs to the Section Networks)
Show Figures

Figure 1

20 pages, 4811 KiB  
Article
Routing Algorithm Based on User Adaptive Data Transmission Scheme in Opportunistic Social Networks
by Yu Lu, Liu Chang, Jingwen Luo and Jia Wu
Electronics 2021, 10(10), 1138; https://doi.org/10.3390/electronics10101138 - 11 May 2021
Cited by 22 | Viewed by 2867
Abstract
With the rapid popularization of 5G communication and internet of things technologies, the amount of information has increased significantly in opportunistic social networks, and the types of messages have become more and more complex. More and more mobile devices join the network as [...] Read more.
With the rapid popularization of 5G communication and internet of things technologies, the amount of information has increased significantly in opportunistic social networks, and the types of messages have become more and more complex. More and more mobile devices join the network as nodes, making the network scale increase sharply, and the tremendous amount of datatransmission brings a more significant burden to the network. Traditional opportunistic social network routing algorithms lack effective message copy management and relay node selection methods, which will cause problems such as high network delay and insufficient cache space. Thus, we propose an opportunistic social network routing algorithm based on user-adaptive data transmission. The algorithm will combine the similarity factor, communication factor, and transmission factor of the nodes in the opportunistic social network and use information entropy theory to adaptively assign the weights of decision feature attributes in response to network changes. Also, edge nodes are effectively used, and the nodes are divided into multiple communities to reconstruct the community structure. The simulation results show that the algorithm demonstrates good performance in improving the information transmission’s success rate, reducing network delay, and caching overhead. Full article
(This article belongs to the Section Networks)
Show Figures

Figure 1

23 pages, 2362 KiB  
Article
Opportunistic Network Algorithms for Internet Traffic Offloading in Music Festival Scenarios
by Aida-Ștefania Manole, Radu-Ioan Ciobanu, Ciprian Dobre and Raluca Purnichescu-Purtan
Sensors 2021, 21(10), 3315; https://doi.org/10.3390/s21103315 - 11 May 2021
Cited by 3 | Viewed by 2533
Abstract
Constant Internet connectivity has become a necessity in our lives. Hence, music festival organizers allocate part of their budget for temporary Wi-Fi equipment in order to sustain the high network traffic generated in such a small geographical area, but this naturally leads to [...] Read more.
Constant Internet connectivity has become a necessity in our lives. Hence, music festival organizers allocate part of their budget for temporary Wi-Fi equipment in order to sustain the high network traffic generated in such a small geographical area, but this naturally leads to high costs that need to be decreased. Thus, in this paper, we propose a solution that can help offload some of that traffic to an opportunistic network created with the attendees’ smartphones, therefore minimizing the costs of the temporary network infrastructure. Using a music festival-based mobility model that we propose and analyze, we introduce two routing algorithms which can enable end-to-end message delivery between participants. The key factors for high performance are social metrics and limiting the number of message copies at any given time. We show that the proposed solutions are able to offer high delivery rates and low delivery delays for various scenarios at a music festival. Full article
(This article belongs to the Special Issue Device to Device (D2D) Communication)
Show Figures

Figure 1

18 pages, 4379 KiB  
Article
A Data Transmission Algorithm Based on Triangle Link Structure Prediction in Opportunistic Social Networks
by Zhiyuan Fang, Liu Chang, Jingwen Luo and Jia Wu
Electronics 2021, 10(9), 1128; https://doi.org/10.3390/electronics10091128 - 10 May 2021
Cited by 19 | Viewed by 2972
Abstract
With the popularization of 5G communications, the scale of social networks has grown rapidly, and the types of messages have become increasingly complex. The rapid increases in the number of access nodes and the amount of data have put a greater burden on [...] Read more.
With the popularization of 5G communications, the scale of social networks has grown rapidly, and the types of messages have become increasingly complex. The rapid increases in the number of access nodes and the amount of data have put a greater burden on the transmission of information in the networks. However, when transferring data from a large number of users, the performance of traditional opportunistic network routing algorithms is insufficient, which often leads to problems such as high energy consumption, network congestion, and data packet loss. The way in which to improve this transmission environment has become a difficult task. Therefore, in order to ensure the effective transmission of data and reduce network congestion, this paper proposed a link prediction model based on triangular relationships in opportunistic social networks (LPMBT). In the topological structure of the social network, the algorithm scores links based on the frequency of use and selects the optimal relay node based on the score. It can also efficiently track the target node and reconstruct the sub-community. The simulation experimental results showed that the algorithm had excellent performance, effectively reduced overhead, reduced the end-to-end delay, and greatly improved the data transfer rate in the opportunistic network. Full article
(This article belongs to the Section Networks)
Show Figures

Figure 1

25 pages, 1575 KiB  
Article
A Universal Routing Algorithm Based on Intuitionistic Fuzzy Multi-Attribute Decision-Making in Opportunistic Social Networks
by Yao Yu, Jiong Yu, Zhigang Chen, Jia Wu and Yeqing Yan
Symmetry 2021, 13(4), 664; https://doi.org/10.3390/sym13040664 - 12 Apr 2021
Cited by 3 | Viewed by 1923
Abstract
With the vigorous development of big data and the 5G era, in the process of communication, the number of information that needs to be forwarded is increasing. The traditional end-to-end communication mode has long been unable to meet the communication needs of modern [...] Read more.
With the vigorous development of big data and the 5G era, in the process of communication, the number of information that needs to be forwarded is increasing. The traditional end-to-end communication mode has long been unable to meet the communication needs of modern people. Therefore, it is particularly important to improve the success rate of information forwarding under limited network resources. One method to improve the success rate of information forwarding in opportunistic social networks is to select appropriate relay nodes so as to reduce the number of hops and save network resources. However, the existing routing algorithms only consider how to select a more suitable relay node, but do not exclude untrusted nodes before choosing a suitable relay node. To select a more suitable relay node under the premise of saving network resources, a routing algorithm based on intuitionistic fuzzy decision-making model is proposed. By analyzing the real social scene, the algorithm innovatively proposes two universal measurement indexes of node attributes and quantifies the support degree and opposition degree of node social attributes to help node forward by constructing intuitionistic fuzzy decision-making matrix. The relay nodes are determined more accurately by using the multi-attribute decision-making method. Simulation results show that, in the best case, the forwarding success rate of IFMD algorithm is 0.93, and the average end-to-end delay, network load, and energy consumption are the lowest compared with Epidemic algorithm, Spray and Wait algorithm, NSFRE algorithm, and FCNS algorithm. Full article
Show Figures

Figure 1

21 pages, 1845 KiB  
Article
On the Retrial-Queuing Model for Strategic Access and Equilibrium-Joining Strategies of Cognitive Users in Cognitive-Radio Networks with Energy Harvesting
by Kalpana Devarajan and Muthukrishnan Senthilkumar
Energies 2021, 14(8), 2088; https://doi.org/10.3390/en14082088 - 9 Apr 2021
Cited by 7 | Viewed by 2317
Abstract
This article studies the strategic access of single-server retrial queue with two types of customers, where priority is given according to their category. On the basis of this concept, a cognitive-radio network was developed as retrial queue with energy harvesting. Cognitive radio allows [...] Read more.
This article studies the strategic access of single-server retrial queue with two types of customers, where priority is given according to their category. On the basis of this concept, a cognitive-radio network was developed as retrial queue with energy harvesting. Cognitive radio allows for a secondary user to opportunistically access the idle spectrum of a primary user (PU). Upon arrival of a primary user, the service given to the secondary user by the cognitive radio is interrupted, and the PU band is available for the primary user. After completion of service for the primary user, the PU band is again available to secondary users. Performance metrics are derived to study the equilibrium strategies of secondary users. A Stackelberg game was formulated and Nash equilibrium was derived for the noncooperative strategy of the secondary user. Game-theory concepts are incorporated with queuing theory ideas to obtain the net benefit for the noncooperative strategy and social benefit for cooperative strategy. Lastly, analytical results are verified with numerical examples, and the effects of energy-harvesting rate are discussed. Full article
Show Figures

Figure 1

Back to TopTop