Journal Home > Volume 25 , Issue 6

Social network services can not only help people form relationships and make new friends and partners, but also assist in processing personal information, sharing knowledge, and managing social relationships. Social networks achieve valuable communication and collaboration, bring additional business opportunities, and have great social value. Research on social network problems is effective by using assumption, definition, analysis, modeling, and optimization strategies. In this paper, we survey the existing problems of game theory applied to social networks and classify their application scenarios into four categories: information diffusion, behavior analysis, community detection, and information security. Readers can clearly master knowledge application in every category. Finally, we discuss certain limitations of game theory on the basis of research in recent years and propose future directions of social network research.


menu
Abstract
Full text
Outline
About this article

A Survey of Game Theory as Applied to Social Networks

Show Author's information Xinfang SongWei Jiang( )Xiaohui LiuHui Lu( )Zhihong TianXiaojiang Du
Beijing Information Technology College, Beijing 100015, China.
Chinese Academy of Cyberspace Studies, Beijing 100010, China.
Guangzhou University, Guangzhou 510006, China.
Department of Computer and Information Sciences, Temple University, Philadelphia, AZ 19122, USA.

Abstract

Social network services can not only help people form relationships and make new friends and partners, but also assist in processing personal information, sharing knowledge, and managing social relationships. Social networks achieve valuable communication and collaboration, bring additional business opportunities, and have great social value. Research on social network problems is effective by using assumption, definition, analysis, modeling, and optimization strategies. In this paper, we survey the existing problems of game theory applied to social networks and classify their application scenarios into four categories: information diffusion, behavior analysis, community detection, and information security. Readers can clearly master knowledge application in every category. Finally, we discuss certain limitations of game theory on the basis of research in recent years and propose future directions of social network research.

Keywords: social network, social value, application scenarios, game theory

References(36)

[1]
J. Qiu, L. Du, D. Zhang, S. Su, and Z. Tian, Nei-TTE: Intelligent traffic time estimation based on fine-grained time derivation of road segments for smart city, IEEE Transactions on Industrial Informatics, .
[2]
L. Yin, X. Luo, C. Zhu, L. Wang, Z. Xu, and H. Lu, ConnSpoiler: Disrupting C&C communication of IoT-based botnet through fast detection of anomalous domain queries, IEEE Transactions on Industrial Informatics, .
[3]
W. Jiang, M. Gao, X. Wang, and X. Wu, A new evaluation algorithm for the influence of user in social network, China Communications, no. 2, pp. 200-206, 2016.
[4]
B. Grofman and G. Owen, A game theoretic approach to measuring degree of centrality in social networks, Social Networks, vol. 4, no. 3, pp. 213-224. 1982.
[5]
A. Reiffers-Masson, Y. Hayel, and E. Altman, Game theory approach for modeling competition over visibility on social networks, in Proc. of Sixth International Conference on Communication Systems & Networks, Bangalore, India, 2014, pp. 1-6.
DOI
[6]
J. Huang, C. Wang, and H. Wei, Strategic information diffusion through online social networks, in Proc. of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies, Barcelona, Spain, 2011, pp. 26-29.
DOI
[7]
W. Jiang, B. Fang, Z. Tian, and H. Zhang, Research on defense strategies selection based on attack-defense stochastic game model, Journal of Computer Research and Development, vol. 47, no. 10, pp. 1714-1723, 2010.
[8]
W. Jiang, B. Fang, Z. Tian, and H. Zhang, Evaluating network security and optimal active defense based on attack-defense game model, Chinese Journal of Computers, vol. 32, no. 4, pp. 817-827, 2009.
[9]
Z. Tian, X. Gao, S. Su, and J. Qiu, Vcash: A novel reputation framework for identifying denial of traffic service in internet of connected vehicles, IEEE Internet of Things Journal, .
[10]
Z. Tian, C. Luo, J. Qiu, X. Du, and M. Guizani, A distributed deep learning system for web attack detection on edge devices, IEEE Transactions on Industrial Informatics, vol. 16, no. 3, pp. 1963-1971, 2019.
[11]
C. Jiang, Y. Chen, and K. Liu, Evolutionary social information diffusion analysis, in Proc. 2014 IEEE Global Communications Conference, Austin, TX, USA, 2014, pp. 2911-2916.
DOI
[12]
R. Lung, C. Chira, and A. Andreica, Game theory and extremal optimization for community detection in complex dynamic networks, PloS One, vol. 9, no. 2, p. e86891, 2014.
[13]
M. Shokmezhad and S. Khorsandi, Joint power control and channel assignment in uplink to network: A noncooperative game and auction based approach, Computer Communications, vol. 118, no. 3, pp. 1-13, 2018.
[14]
Z. Tian, C. Luo, J. Qiu, X. Du, and M. Guizani, A distributed deep learning system for web attack detection on edge devices, IEEE Transactions on Industrial Informatics, .
[15]
L. Xiao, Y. Li, X. Huang, and X. Du, Cloud-based malware detection game for mobile devices with offloading, IEEE Transactions on Mobile Computing, vol. 16, no. 10, pp. 2742-2750, 2017.
[16]
Z. Tian, W. Shi, Y. Wang, C. Zhu, X. Du, S. Su, Y. Sun, and N. Guizani, Real time lateral movement detection based on evidence reasoning network for edge computing environment, IEEE Transactions on Industrial Informatics, vol. 15, no. 7, pp. 4285-4294, 2019.
[17]
F. Jiang and J. Xu, Dynamic community detection based on game theory in social networks, in Proc. of 2015 IEEE International Conference on Big Data, Santa Clara, CA, USA, 2015, pp. 2368-2373.
DOI
[18]
T. Chakraborty, S. Srinivasan, N. Ganguly, A. Mukherjee, and S. Bhowmick, On the permanence of vertices in network communities, in Proc. of the 20th ACM International Conference on Knowledge Discovery and Data Mining, New York, NY, USA, pp. 1396-1405, 2014.
DOI
[19]
X. Chen, X. Du, J. Yu, J. Guo, Z. Cui, and L. Fu, Research of community mining in signed social network based on game theory, International Journal of Innovative Computing, Information and Control, vol. 10, no. 6, pp. 2221-2235, 2014.
[20]
J. Yu, Y. Wang, X. Jin, and X. Chen, Identifying interaction groups in social network using a game-theoretic approach, in Proc. of the 2014 IEEE/WIC/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technologies, Washington, DC, USA, 2014, pp. 511-518.
DOI
[21]
A. Yang, Y. Tang, J. Wang, and J. Chen, Covert nodes mining in social networks based on games theory, in Proc. of the 2014 IEEE 18th International Conference on Computer Supported Cooperative Work in Design, Hsinchu, China, 2014, pp. 541-545.
DOI
[22]
K. Aadithya and B. Ravindran, Game theoretic network centrality: Exact formulas and efficient algorithms, in Proc. of the 9th International Conference on Autonomous Agents and Multiagent Systems, Toronto, Canada, 2010, pp. 1459-1460.
[23]
M. Irfan and L. Ortiz, A game-theoretic approach to influence in networks, in Proc. of the Twenty-Fifth AAAI Conference on Artificial Intelligence, San Francisco, CA, USA, 2011, pp. 688-694.
[24]
Z. Yang and W. Chen, A game theoretic model for the formation of navigable small-world networks, in Proc. of the 24th International Conference on World Wide Web, Florence, Italy, 2015, pp. 1329-1339.
DOI
[25]
S. Rajtmajer, C. Griffin, D. Mikesell, and A. Squicciarin, An evolutionary game model for the spread of non-cooperative behavior in online social networks, in Proc. of the 30th Annual ACM Symposium on Applied Computing, New York, NY, USA, 2015, pp. 1154-1159.
DOI
[26]
M. Kearns, M. Littman, and S. Singh, Graphical models for game theory, in Proc. of the Seventeenth Conference on Uncertainty in Artificial Intelligence, San Francisco, CA, USA, 2001, pp. 253-260.
[27]
J. White, J. Park, C. Kamhoua, and K. Kwiat, Game theoretic attack analysis in online social network (OSN) services, in Proc. of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, Niagara, Canada, 2013, pp. 1012-1019.
DOI
[28]
J. Chen, M. Brust, A. Kiremire, and V. Phoha, Modeling privacy settings of an online social network from a gametheoretical perspective, in Proc. of the 9th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing, Austin, TX, USA, 2013, pp. 213-220.
DOI
[29]
A. Squicciarini, C. Griffin, and S. Sundareswaran, Towards a game theoretical model for identity validation in social network sites, in Proc. of the 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing, Boston, MA, USA, 2011, pp. 1081-1088.
DOI
[30]
W. Lin, H. Zhao, and K. Liu, Game-theoretic strategies and equilibriums in multimedia fingerprinting social networks, IEEE Transactions on Multimedia, vol. 13, no. 2, pp. 191-205, 2011.
[31]
H. Hu, G. J. Ahn, Z. Zhao, and D. Yang, Game theoretic analysis of multiparty access control in online social networks, in Proc. of the 19th ACM Symposium on Access Control Models and Technologies, London, Canada, 2014, pp, 93-102.
DOI
[32]
M. Azadjalal, P. Moradi, and A. Abdollahpouri, Application of game theory techniques for improving trust-based recommender systems in social networks, in Proc. of 4th International Conference on Computer and Knowledge Engineering, Mashhad, Iran, 2014, pp. 261-266.
DOI
[33]
M. Shen, B. Ma, L. Zhu, R. Mijumbi, X. Du, and J. Hu, Cloud-based approximate constrained shortest distance queries over encrypted graphs with privacy protection, IEEE Transactions on Information Forensics & Security, vol. 13, no. 4, pp. 940-953, 2018.
[34]
P. Dong, X. Du, H. Zhang, and T. Xu, A detection method for a novel DDoS attack against SDN controllers by vast new low-traffic flows, in Proc. of IEEE International Conference on Communications, Kuala Lumpur, Malaysia, 2016, pp. 1-6.
DOI
[35]
L. Xiao, X. Wan, C. Dai, X. Du, X. Chen, and M. Guizani, Security in mobile edge caching with reinforcement learning, IEEE Wireless Communications, vol. 25, no. 3, pp. 116-122, 2018.
[36]
L. Wu, X. Du, W. Wang, and B. Lin, An out-of-band authentication scheme for internet of things using blockchain technology, in Proc. of 2018 International Conference on Computing, Networking and Communications, Maui, HI, USA, 2018, pp. 769-773.
DOI
Publication history
Copyright
Acknowledgements
Rights and permissions

Publication history

Received: 27 January 2020
Accepted: 05 February 2020
Published: 07 May 2020
Issue date: December 2020

Copyright

© The author(s) 2020

Acknowledgements

The paper was supported by the Natural Science Foundation of Beijing (No. 4172006), the Guangdong Province Key Area R&D Program of China (No. 2019B010137004), the National Natural Science Foundation of China (Nos. U1636215, 61972108, and 61871140), the National Key Research and Development Plan (No. 2018YFB0803504), and Guangdong Province Universities and Colleges Pearl River Scholar Funded Scheme (2019).

Rights and permissions

The articles published in this open access journal are distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/).

Return