Abstract

This paper aims to explore the impact of user behavior on information diffusion in D2D (Device-to-Device) communications. A discrete dynamical model, which combines network metrics and user behaviors, including social relationship, user influence, and interest, is proposed and analyzed. Specifically, combined with social tie and user interest, the success rate of data dissemination between D2D users is described, and the interaction factor, user influence, and stability factor are also defined. Furthermore, the state transition process of user is depicted by a discrete-time Markov chain, and global stability analysis of the proposed model is also performed. Finally, some experiments are examined to illustrate the main results and effectiveness of the proposed model.

1. Introduction

The fast development of communication technologies, enhanced devices, and multimedia services will lead to a drastic change in the way of perceiving and interacting with the world around us [1]. The emerging 5G systems would transform current reality into a “connected reality”, in which objects and people are interconnected in a unified whole [2]. To realize this vision, the Long Term Evolution (LTE) radio technology is adopted as a lifeline for reality scenarios. As a result, future 5G systems require novel approaches in terms of network design and information dissemination and should provide low latencies and timely connectivity in case of information sharing such as disasters, concerts, and other timely situations [3].

As a key component of 5G systems, D2D communications are proposed as an effective paradigm to reduce information diffusion time [4]. Reference [5] provided a game theoretical formulation for energy minimization in cooperative networks, in which the Nash bargaining solution is derived to achieve a tradeoff between energy reduction and fairness. Indeed, the direct communication between two adjacent user devices is regarded as a promising technology in future 5G systems, which has advantages of coverage extension, high spectrum utilization, and low energy consumption [6, 7]. Obviously, when data must be sent to a group of users through reliable and low latency links, D2D communications are useful for information dissemination. Consequently, the study of information diffusion is of great significance in 5G systems.

In D2D communications, social network is an important carrier of information [8, 9]. Some previous work exploited social metrics to improve information dissemination performance. For instance, [10, 11] gave some extensive analysis of information diffusion approaches, and different quantification models with social relationship were proposed [1214]. Additionally, Zhang et al. [15] offloaded social network traffic through D2D links to improve the content dissemination time. With consideration of content interests and social network relations, [16] designed a social-aware data sharing strategy, whose effectiveness and functionality is verified through experimental analysis.

In social network, behavior characteristics of different users are crucial factors for information dissemination. Combined with proximity-based communication, rental work investigated the integration of communication and social domains based on user behaviors [17]. References [18, 19] exploited preference features, which indicate how much information the user needs to select seed users for sending information. Furthermore, user selfishness directly affected the share willingness and the success rate of establishing D2D links [2022]. Wang et al. [23] constructed a traffic offloading framework, in which a group of user devices were chosen as seeds based on their social influence. In [24], authors focused on maximizing cellular traffic offloading with D2D communications via content caching and users pairing. Reference [25] exploited the social tie and influence among individuals, which is modeled by Indian Buffet Process, to improve the performance and reduce the load on the wireless cellular system. Although the above-mentioned information diffusion approaches provide high data-rate and low latency, they cannot adequately characterize social interaction among users. Besides, they almost only describe the one-hop dissemination so that they fail to characterize the whole diffusion process in the network. In reality, information diffusion is a dynamic process, and its performance is not only affected by the network architecture, but by the social metrics of user as well.

Information diffusion process can be decomposed into multiple end-to-end information transmission cases; each case involves three entities, namely, sender, receiver, and content (see Figure 1). The impact factors of information diffusion include not only the attribute of sender and receiver, but also the content characteristic of information and the mutual relationship between users [2628]. To overcome the defect of conventional models and inspired by the idea of epidemic models (e.g., [2934]), this paper proposes a susceptible-infected-recovered (SIR) information diffusion model, which combines network metrics and user behaviors, including social relationship between users, user influence, and interest. Particularly, with consideration of social relationship and user interest, the success rate of data dissemination between D2D users is described, and the interaction factor, user influence, and stability factor are also defined. Additionally, combined with the discrete-time Markov chain, the state transition equation is established to describe the information diffusion process. Finally, global stability analysis and some experiments of the proposed model are also performed.

The subsequent materials of this paper are organized as follows: Section 2 describes mathematical framework. Model analysis and some experiments are examined in Sections 3 and 4, respectively. Finally, Section 5 outlines this work.

2. Mathematical Framework

In this paper, let a graph with nodes represent the information propagation network, where and denote the set of users and communication links between users, respectively. At any time, a node is in one of the following states.:(i) (susceptible): the user who does not receive the information.(ii) (infected): the user who has received the information and forwarded it.(iii) (recovered): the user who has received the information but never forwards it.

2.1. Notations

(i): the influence degree of user at time , it is effected by the user’s relative weight in its neighbors.(ii): the success rate of data dissemination that user sends to user , whose impact factors include the interest degree, social tie of users and the physical structure of network.(iii): the social tie strength between users and , that indirectly characterize the link quality between users.(iv): the interest degree of user for the information.(v): the probability that user is in state at time , .(vi): the transition probability of user from state to state at time , .(vii): the element of adjacent matrix indicating whether users and are adjacent.(viii): the interaction factor of social tie between users and , referring to the historical interaction in a certain interval.(ix): the stability factor that manifests the numeric fluctuation of social tie between users and .

2.2. Model Assumptions

(A1)Only within the scope of D2D communications can users establish communication links to transmit information.(A2)Considering the interaction behavior which reflects the social relationship between users, and the latter determines the former in turn, an interaction factor is introduced to partly characterize the social relationship. Interaction factor reflects the subjective aspects to establish trustworthy feelings or experiences based on users’ historical interactions, and each interaction is judged by a numeric degree to signify the opinion of users. Then,where represents the evaluation value of social relationship for the -th interaction between users and and and are the numbers of total and negative interactions, respectively.Obviously, is the accumulation of historical interactions in a certain time interval and is affected by the number of total negative judgments. The social tie strength will be weakened with the increase of negative judgments. Furthermore, the interaction is bidirectional, so .(A3)Stability factor manifests the numeric fluctuation of social tie between users. Then, it can be calculated based on the time slice aggregation as follows:where denotes the -th time slice, is the social tie strength from to in the -th time slice, and indicates the average strength of social tie in all time slices.The reason for considering the interaction factor and stability factor is to adjust the scenario of this paper. In particular, information transmission over physical link requires reliability and stability to guarantee the successful rate. If the social tie between users is unstable, then the infection probability is accordingly decreased, which will lead to the failure of information transmission. On the contrary, strengthened and stable social tie indicates a reliable interaction and link status, resulting in an improvement of transmission efficiency.(A4)The social tie strength is jointly determined by the interaction and stability factors. Then, .(A5)The success rate of data dissemination is proportional to the social tie strength and interest degree of user. Then, it can be expressed aswhere can be adjusted according to the actual scenario.(A6)The state transition probability from to is determined by the user’s spreading ability. A stronger spreading ability corresponds to a longer survival time of information, and this time length is positively correlated to the user influence.Based on the fact that user influence decays over time and inspired by attenuation models [35, 36], especially the exponential model with a long tail characteristic, the influence of user at time is defined aswhere denotes the initial time, is the set of neighbors of user , and is the number of user neighbors.

2.3. Model Formulation

Before giving the mathematical expression of the model, let us first introduce some basic information diffusion rules.(R1)If a node is in state , it can only receive information from its neighbors at each moment, and once it receives the information, it will transform into state and never receive the same information from other neighbors. Then, , and .(R2)If a node is in state , it will forward the information according to its influence, and then will covert to state after the survival time of information.(R3)If a node is in state , it will always maintain state and will no longer receive and forward the same information. Then, .

Collecting the foregoing assumptions and information diffusion rules, the state transition diagram of user at time can be represented either by Figure 2 or the discrete-time Markov chain:

3. Model Analysis

The equilibrium and its stability of system (6) will be introduced in this section.

Theorem 1. Assume that , is the equilibrium of system (6). Then, , and .

Proof. According to the definition of equilibrium, one can getSolving system (7), one can obtain , and . Thus, the claimed result follows.

From assumption (A6) and rule (R2), the probability that user stays in state is positively correlated to its influence. So one might as well make . Then, , and system (6) can be rewritten as

Note that

Hence, it suffices to consider the following system:Besides, systems (10) and (8) have the same equilibrium .

DefineThen, . It follows from stability theory of autonomous linear systems [37] that the equilibrium of system (10) is globally asymptotically stable if .

Now, the main result of this paper can be derived as follows.

Theorem 2. The equilibrium , of system (6) is globally asymptotically stable if .

Remark 3. At the stable point, the number of users that have received information (users in state ) represents the transmission range. That is to say, a larger number of users in state correspond to a wider coverage of information. Obviously, the transmission range is affected by the interest degree, social tie, and other factors, which is reasonable in the actual situation.

4. Experiments

To validate the effectiveness of the proposed model, this section simulates the information diffusion process with MATLAB in a random network, in which each node represents a user. At each time point, users take the receiving or forwarding decision according to its own state and the system parameters. Meanwhile, the impact of user influence and information popularity on information diffusion is also illustrated. Here, let us introduce two important indexes in advance.

Max Infection Peak (). refers to the ratio of the maximum number of infected users to the total number of users. This index characterizes the information diffusion speed, and a larger means a wider coverage of information.

Average Influence (). is the average influence of all users in the network, and the influence degree of each user is derived from (4).

Example 4. Consider system (8) with system parameters b=0.6, y=0.4. Meanwhile, take a network with 100 total nodes and 10 seed nodes as the propagation network. Figures 3, 4, 5, 6, and 9 show the model analysis under this condition.

Figure 3 presents the number of users in each state over time. It can be seen that the total number of users at each time point is equal to 100, and the user number in state is zero at initial time. This is because only the seed users hold the information at initial time, so other users are in state . Meanwhile, the system converges to a stable state, which is consistent with the theory analysis (i.e., Theorems 1 and 2), and the convergence speed is determined by some parameters, such as the network topology (the adjacent matrix), social tie, and user influence.

Figure 4 illustrates the users state in different time points at t=2, 10, 18, respectively, in which the red, blue, and black circles indicate users in S, I, R state, respectively. It is obvious that the varying number of users in each state of (a), (b), and (c) is consistent with the theoretical analysis.

Figure 5 compares the percentage of each state user between awareness and no awareness. Figures 5(a), 5(b), and 5(c) show the number of susceptible, infected, and recovered users, respectively. It can be observed that the percentage of infected user under the proposed model is larger than that of the model without consideration of social attribute of users and information. This is because the proposed model considers the social tie and user influence, resulting in the fact that information is transmitted with a relative higher successful rate and a wider coverage as shown in Figure 5(c). In addition, it can be found that the model without awareness has higher users in state R over a major part of the time scale. This is because the diffusion model without awareness ignores the impact of influential users, so that the recovery rate is faster than that of the proposed model.

Figure 6 displays the impact of user influence on the number of users in each state. By comparing Figures 6(a), 6(b), and 6(c), it can be concluded that the rate of user transforming from state to increases with the AIN of user. The reason is that the average influence of users is larger, and the interaction between users will be stronger, so that user is more likely to become infected. Meanwhile, user influence is closely associated with the survival time of information, and a larger can extend the length of this time. Therefore, more influential user can expand the diffusion range of information. In addition, with the increase of user influence, the time point that users reach to peak of state is earlier, so that system converges to a stable state with a fast speed.

Example 5. Consider system (8) with system parameters b=0.6, y=0.4 and 10 initial seed nodes. Figures 7 and 8 illustrate the diffusion model with total nodes 60, 70, and 100, respectively.

Figures 7 and 8 show the evolution of infected and recovered users under different destinations. With the increase of destinations, there is a slightly delay in the time that reaches to peak point of infected users. However, the time delay is quite limited although increasing the number of destinations of almost 67% (from 60 to 100). Furthermore, it should be noted that after almost users are infected, a parallel increase in the number of recovered users is met till all users become recovered, which manifests that a higher number of destinations imply a faster recovery process.

Figure 9 demonstrates a comparison of between awareness and no awareness models. Obviously, the increasing with the information popularity is independent of model. The reason is that the information popularity is derived from the user interest degree, and a higher interest degree corresponds to a larger popularity. That is to say, if the information is enjoyed by a higher popularity, the transmission probability will increase accordingly, leading to a greater diffusion speed. In this case, most users are in state before going to state . Additionally, the of the proposed model is higher than that of the model without consideration of social attribute of users. The reason is that the proposed model takes the social tie and user interest degree into account, so that the role of authority user is fully played to expand the diffusion range.

5. Conclusions and Future Work

In this paper, with joint consideration of social tie, user influence, and user interest, a user behavior based information diffusion model for 5G systems has been proposed. By characterizing the state transition probability of each user, a discrete-time Markov chain system has been formulated. Furthermore, the global stability of the system has been proved. Finally, some experiments have been performed to illustrate the main results and effectiveness of the proposed model.

The provided insights can guide the development of information diffusion and D2D communications. The discovery of social attributes of user and information improves the effect of information diffusion, which is relevant to advertising, public opinion monitoring, and other scenarios.

In further work, the study can be continued in several directions. On the one hand, we shall apply the theory of discrete dynamics (e.g., [3740]) to study dynamical behavior of information diffusion and then to study the discrete nonautonomous propagation model. On the other hand, the diffusion model should be improved with consideration of user sentiment analysis [41, 42], user mobility, and multitopic scenario.

Data Availability

The data used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest

The authors declare that there are no conflicts of interest regarding the publication of this paper.

Acknowledgments

This work is supported by Natural Science Foundation of China (Grants nos. 61702066 and 11747125), Scientific and Technological Research Program of Chongqing Municipal Education Commission (Grant no. KJ1704080), Chongqing Research Program of Basic Research and Frontier Technology (Grants nos. cstc2017jcyjAX0256 and cstc2018jcyjAX0154), and Research Innovation Program for Postgraduate of Chongqing (Grants nos. CYS17217 and CYS18238).