Skip to main content
Log in

A novel approach for inhibiting misinformation propagation in human mobile opportunistic networks

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Mobile Opportunistic Networks (MONs) are effective solutions to uphold communications in the situations where traditional communication networks are unavailable. In MONs, messages can be disseminated among mobile nodes in an epidemic and delay-tolerant manner. However, MONs can be abused to disseminate misinformation causing undesirable effects in the general public, such as panic and misunderstanding. To deal with this issue, we first propose a formal model to formulate the process of misinformation propagation in MONs, considering human psychological behaviors. Secondly, we explore a general framework to describe the random node mobility, and derive a new contact rate between nodes, which is closely related to mobility properties of nodes. Thirdly, we propose a novel approach based on vaccination and treatment strategies for inhibiting misinformation propagation in human MONs. Moreover, a novel pulse control model of misinformation propagation is developed. Finally, through the derivation and stability analysis of a misinformation-free period solution of the proposed model, we obtain a threshold upon which misinformation dies out in a human MON. The extensive simulation results validate our theoretical analysis.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15
Fig. 16
Fig. 17
Fig. 18
Fig. 19
Fig. 20
Fig. 21
Fig. 22

Similar content being viewed by others

References

  1. Wang Y, Chuah MC, Chen Y (2014) Incentive based data sharing in delay tolerant mobile networks. IEEE Trans Wirel Commun 13(1):370–381

    Article  Google Scholar 

  2. Conti M, Giordano S (2014) Mobile ad hoc networking: milestones, challenges, and new research directions. IEEE Commun Mag 52(1):85–96

    Article  Google Scholar 

  3. Chen K, Shen H, Zhang H (2014) Leveraging social networks for P2P content-based file sharing in disconnected MANETs. IEEE Trans Mobile Comput 13(2):235–249

    Article  Google Scholar 

  4. Teng J, Zhang B, Li X, Bai X, Xuan D (2014) E-shadow: lubricating social interaction using mobile phones. IEEE Trans Comput 63(6):1422–1433

    Article  MathSciNet  Google Scholar 

  5. Chandrima C, Ananya B, Siuli R (2014) An observer-based distributed scheme for selfish-node detection in a post-disaster communication environment using delay tolerant network. In: Proceedings IEEE int’l conf. applications and innovations in mobile computing (AIMoC’14), pp 151–156

  6. Wu J, Wang Y (2014) Hypercube-based multipath social feature routing in human contact networks. IEEE Trans Comput 63(2):383–396

    Article  MathSciNet  Google Scholar 

  7. Kumar KK, Geethakumari G (2013) Information diffusion model for spread of misinformation in online social networks. In: Proceedings IEEE int’l conf. advances in computing, communications and informatics (ICACCI’13), pp 1172–1177

  8. Zhou L, Zhang D (2007) An ontology-supported misinformation model: toward a digital misinformation library. IEEE Trans Syst Man Cybern A 37(5):804–813

    Article  Google Scholar 

  9. Basso J (1997) How public relations professionals are managing the potential for sabotage, rumors, and misinformation disseminated via the internet by computer hackers. IEEE Trans Prof Commun 40(1):28–33

    Article  MathSciNet  Google Scholar 

  10. Ma CYT, Yau DKY, Lou X, Rao NSV (2013) Markov game analysis for attack-defense of power networks under possible misinformation. IEEE Trans Power Syst 28(2):1676–1686

    Article  Google Scholar 

  11. He Z, Cai Z, Wang X (2015) Modeling propagation dynamics and optimal countermeasures of the social network rumors The 35th IEEE international conference on distributed computing systems (ICDCS)

  12. Wang X, He Z, Zhao X, Chuang L, Pan Y, Cai Z (2013) Reaction-Diffusion modeling of malware propagation in mobile wireless sensor networks. Sci China Inf Sci 56(9):1–18

    Google Scholar 

  13. Wang X, Lin Y, Zhang S, Cai Z A social activity and physical contact based routing algorithm in mobile opportunistic networks for emergency response of sudden disasters. Enterprise Information Systems

  14. Wang X, Zhao Y, Liang Y, Cai Z (2015) A double pulse control strategy for misinformation propagation in human mobile opportunistic networks the 10th international conference on wireless algorithms, systems and applications (WASA), pp 571– 580

  15. Lewandowsky S, Ecker1 UKH, Seifert CM, Schwarz N, Cook J (2012) Misinformation and its correction: continued influence and successful debiasing”. Psychol Sci Publ Int 13(3):106– 131

  16. Trifunovic S, Kurant M, Hummela KA, Legendre F (2014) Preventing spam in opportunistic networks. Comput Commun 41(15):31–42

    Article  Google Scholar 

  17. Nguyen NP, Yan G, Thai MT (2013) Analysis of misinformation containment in online social networks. Comput Netw 57(10):2133–2146

    Article  Google Scholar 

  18. Li Y, Hui P, Jin D, Su L, Zeng L (2014) Optimal distributed malware defense in mobile networks with heterogeneous devices. IEEE Trans Mobile Comput 13(2):377–391

    Article  Google Scholar 

  19. Peng W, Li F, Zou X, Wu J (2014) Behavioral malware detection in delay tolerant networks. IEEE Trans Parall Distr 25(1):53– 63

    Article  Google Scholar 

  20. Liu X, Takeuchi Y, Iwami S (2008) SVIR epidemic models with vaccination strategies. J Theor Biol 253(1):1–11

    Article  MathSciNet  Google Scholar 

  21. He Y, Gao S, Xie D (2013) An SIR epidemic model with time-varying pulse control schemes and saturated infectious force. Appl Math Model 37(16):8131–8140

    Article  MathSciNet  Google Scholar 

  22. Yang Y (2015) Global stability of VEISV propagation modeling for network worm attack. Appl Math Model 39(2):776–780

    Article  MathSciNet  Google Scholar 

  23. Zhu Q, Yang X, Ren J (2012) Modeling and analysis of the spread of computer virus. Commun Nonlinear Sci Numer Simulat 17(12):5117–5124

    Article  MathSciNet  MATH  Google Scholar 

  24. Gan C, Yang X, Zhu Q, Jin J, He L (2013) The spread of computer virus under the effect of external computers. Nonlinear Dynam 73(3):1615–1620

    Article  MathSciNet  MATH  Google Scholar 

  25. Gan C, Yang X, Liu W, Zhu Q (2014) A propagation model of computer virus with nonlinear vaccination probability. Commun Nonlinear Sci Numer Simulat 19(1):92–100

    Article  MathSciNet  Google Scholar 

  26. Mishra BK, Saini DK (2010) SEIQRS model for the transmission of malicious objects in computer network. Appl Math Model 34(3):710–715

    Article  MathSciNet  MATH  Google Scholar 

  27. Ahn I, Ohb HC, Park J (2015) Investigation of the C-SEIRA model for controlling malicious code infection in computer networks. Appl Math Model. (online)

  28. Mishra BK, Pandey SK (2014) Dynamic model of worm propagation in computer network. Appl Math Model 38(7):2173– 2179

    Article  MathSciNet  Google Scholar 

  29. Feng L, Liao X, Han Q, Li H (2013) Dynamical analysis and control strategies on malware propagation model. Appl Math Model 37(16):8225–8236

    Article  MathSciNet  Google Scholar 

  30. Nie L, Tenga Z, Torres A (2012) Dynamic analysis of an SIR epidemic model with state dependent pulse vaccination. Nonlinear Anal RWA 13(4):1621–1629

    Article  MathSciNet  MATH  Google Scholar 

  31. Yang L, Yang X (2013) The pulse treatment of computer viruses: a modeling study. Comput Netw 76 (2):1379–1393

    MathSciNet  MATH  Google Scholar 

  32. Li Y, Hui P, Jin D, Sheng C (2015) Delay-tolerant network protocol testing and evaluation. IEEE Commun Mag 53(1):258–266

    Article  Google Scholar 

  33. Bettstetter C, Resta G, Santi P (2003) The node distribution of the random waypoint mobility model for wireless ad hoc networks. IEEE Trans Mobile Comput 2(3):257–269

    Article  Google Scholar 

  34. Lakshmikantham V, Bainov DD, Simeonov SP (1989) Theory of impulsive differential equations. World Scientific, Singapore

    Book  MATH  Google Scholar 

Download references

Acknowledgments

This work is supported by the National Natural Science Foundation of China (Grant Nos. 61373083, 61402273); the Fundamental Research Funds for the Central Universities of China (Grant No. GK201401002); the Program of Shaanxi Science and Technology Innovation Team of China (Grant No. 2014KTC-18); and the Natural Science Basis Research Plan in Shaanxi Province of China under Grant No. 2014JQ8353.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xiaoming Wang.

Appendices

Appendix A Proof of Theorem 1

We first consider the existence of the misinformation-free solution of system (6), and then prove the globally asymptotically stability of this solution. From the second equation of system (7), considering the fact that the initial value of r(t) in a pulse period (k τ,(k+1)τ] is r(k τ +), we have

$$ r(t)=r(k\tau^{+})e^{-(\eta+\delta)(t-k\tau)}, k\tau<t\leq (k+1)t. $$
(12)

From equations (8) and (12), we have

$$ s(t)=1-r(k\tau^{+})e^{-(\eta+\delta)(t-k\tau)}, k\tau<t\leq (k+1)t. $$
(13)

Thus, s((k+1)τ)=1−r(k τ +)e −(η + δ)τ and r((k+1)τ) = r(k τ +)e −(η + δ)τ. Furthermore, s((k+1)τ +)=(1−σ 1)[1−r(k τ +)e −(η + δ)τ] and r((k+1)τ +) = r(k τ +)e −(η + δ)τ + σ 1[1−r(k τ +)e −(η + δ)τ]. Now, let y k = r(k τ +). Then, we have

$$ y_{k+1}=y_{k}e^{-(\eta+\delta)\tau}+\sigma_{1}\left[1-y_{k}e^{-(\eta+\delta)\tau}\right]. $$
(14)

For equation (14), let y k+1 = y k = y. Then, we have the only fixed point of equation (14) \(\widetilde {y}=\frac {\sigma _{1}}{1-(1-\sigma _{1})e^{-(\eta +\delta )\tau }}\). Thus, there exists the only τ-period solution of system (7) \((\widetilde {s}(t), \widetilde {r}(t))\), where \(\widetilde {r}(t)=\widetilde {y}e^{-(\eta +\delta )(t-k\tau )}, \widetilde {s}(t)=1-\widetilde {r}(t)=1-\widetilde {y}e^{-(\eta +\delta )(t-k\tau )}\), and k τ<t≤(k+1)t. Moreover, the solution \((\widetilde {s}(t), \widetilde {r}(t))\) is globally asymptotically stable [34].

Appendix B Proof of Theorem 2

Proof

We rewrite matrix J as follows:

$$J = \left( \begin{array}{cc} {A_{1} } & {B_{1} } \\ 0 & {A_{2} } \end{array}\right)\Phi (\tau ), $$

where

$$A_{1} = \left( \begin{array}{cc} { - \delta } & \eta \\ 0 & { - (\eta + \delta )} \end{array}\right), $$
$$B_{1}=\left( \begin{array}{cc} 0 & { - (\alpha + \beta + \gamma )\mu\tilde s(t)} \\ \theta & {\varepsilon + \gamma \mu\tilde s(t)} \end{array}\right), $$

and

$$A_{2} = \left( \begin{array}{cc} { - (\lambda + \theta + \delta )} & {\alpha \mu\tilde s(t)} \\ \lambda & {\beta \mu\tilde s(t) - \varepsilon - \delta } \end{array}\right). $$

Matrix W is rewritten as

$$J = \left( \begin{array}{cc} {W_{1} } & {B_{2} } \\ 0 & {W_{2} } \end{array}\right)\Phi (\tau ), $$

where \(W_{1} = \left (\begin {array}{cc} {1 - \sigma _{1} } & 0 \\ {\sigma _{1} } & 1 \end {array}\right )\), \(W_{2} = \left (\begin {array}{cc} 1 & 0 \\ 0 & {1 - \sigma _{2} } \end {array}\right )\), and \(B_{2} = \left (\begin {array}{cc} 0 & 0 \\ 0 & {\sigma _{2} } \end {array} \right )\). Obviously, W has four eigenvalues χ 1, χ 2, χ 3, and χ 4. According to the Fluoquet theory [34], the necessary and sufficient conditions that the misinformation-free τ-period solution of system (6) is locally asymptotically stable are |χ 1|<1, |χ 2|<1, |χ 3|<1, and |χ 4|<1. To check the above conditions, we integrate equation (10) in pulse period [0,τ] to obtain \(\Phi (\tau ) = e^{{\int }_{0}^{\tau } {J(t)dt} }\). Then we have

$$\Phi (\tau ) = \left( \begin{array}{cc} {e^{{\int}_{0}^{\tau} {A_{1} dt} } } & {e^{{\int}_{0}^{\tau} {A_{1} dt} }e^{{\int}_{0}^{\tau} {B_{1} dt} } } \\ 0 & {e^{{\int}_{0}^{\tau} {A_{2} dt} } } \end{array}\right)\overset{\Delta}{= } \left( \begin{array}{cc} {\Phi_{11} } & {\Phi_{12} } \\ 0 & {\Phi_{22} } \end{array}\right), $$

where \(e^{{\int }_{0}^{\tau } {A_{1} dt} } = \left (\begin {array}{cc} {e^{- \delta \tau } } & {\eta \tau e^{- \delta \tau } } \\ 0 & {e^{- (\delta + \eta )\tau } } \end {array}\right )\overset {\Delta }{=} \Phi _{11}\). As a result, we have

$$\begin{array}{@{}rcl@{}} &&W = \left( \begin{array}{cc} {W_{1} } & {B_{2} } \\ 0 & {W_{2} } \end{array}\right)\left( \begin{array}{cc} {\Phi_{11} } & {\Phi_{12} } \\ 0 & {\Phi_{22} } \end{array}\right)\\ &&= \left( \begin{array}{cc} {W_{1} \Phi_{11} } & {W_{1} \Phi_{12} + B_{2} \Phi_{22} } \\ 0 & {W_{2} \Phi_{22} } \end{array}\right). \end{array} $$

Hence, χ 1 and χ 2 are the eigenvalues of W 1Φ11, and χ 3 and χ 4 are the eigenvalues of W 2Φ22. In fact, χ 1 and χ 2 are the solutions of the following equation

$$ |\chi U-W_{1}\Phi_{11}|=0, $$
(15)

where U is a unit matrix. We have

$$\begin{array}{@{}rcl@{}} &&W_{1} \Phi_{11} = \left( \begin{array}{cc} {1 - \sigma_{1} } & 0 \\ {\sigma_{1} } & 1 \end{array}\right)\left( \begin{array}{cc} {e^{- \delta \tau } } & {\eta \tau e^{- \delta \tau } } \\ 0 & {e^{- (\delta + \eta )\tau } } \end{array}\right)\\ &&\qquad= e^{- \delta \tau } \left( \begin{array}{cc} 1 - \sigma_{1} & (1 - \sigma_{1} )\eta \tau\\ \sigma_{1} & \sigma_{1} \eta \tau + e^{\eta \tau } \end{array}\right). \end{array} $$

From equation (15), we obtain the following equation

$$ \chi^{2}-(1-\sigma_{1}+\sigma_{1}\eta\tau+e^{-\eta\tau})e^{-\delta\tau}\chi+(1-\sigma_{1})e^{-(\eta\tau+2\delta\tau)}=0. $$
(16)

Through solving equation (16), we obtain

$$ \chi_{1,2}=\frac{(1-\sigma_{1}+\sigma_{1}\eta\tau+e^{-\eta\tau}\pm \sqrt{C})e^{-\delta\tau}}{2}, $$
(17)

where C=(1−σ 1 + σ 1 η τ + e ητ)2−4(1−σ 1)e ητ. Obviously, we have |χ 1|<1 and |χ 2|<1. Next, let ψ= max{|χ 3|,|χ 4|}. Then, we say that the misinformation-free τ-period solution of system (6), denoted as \((\widetilde {s}(t),0,0,\widetilde {r}(t))\), is locally asymptotically stable when ψ<1.

Appendix C Proof of Theorem 4

Proof

From the first equation and the fourth equation of system (6), we obtain

$$\left\{ \begin{array}{l} \frac{ds(t)}{dt} > \delta + \eta r(t) - \delta s(t)\\ \frac{dr(t)}{dt} > - (\eta + \delta )r(t) \end{array}. \right. $$

Let \(X = W_{2} e^{{\int }_{0}^{\tau } {Zdt} }\), where \(Z = \left (\begin {array}{ll} - \lambda + \theta + \delta & \alpha \mu (\tilde s(t) + \varepsilon _{1} )\\ \lambda & \beta \mu (\tilde s(t) + \varepsilon _{1} ) - \varepsilon - \delta \end {array}\right )\), and ε 1 is a sufficiently small positive number. Obviously, there exist two eigenvalues of matrix X which are χ 5 and χ 6. Let χ= max{|χ 5|,|χ 6|}. From the condition of the locally asymptotically stability of solution \((\widetilde {s}(t),0,0,\widetilde {r}(t))\) to system (6) |ψ|<1, we can find a sufficiently small ε 1 such that χ<1. Now, we construct the following differential pulse system

$$ \left\{ \begin{array}{l} \left. \begin{array}{l} \frac{dx(t)}{dt} = \delta + \eta y - \delta x(t) \\ \frac{dy(t)}{dt} = - (\eta + \delta )y(t) \end{array} \right\} t \ne k\tau ,\\ \left. \begin{array}{l} x(t^ + ) = (1 - \sigma_{1} )x(t) \\ y(t^ + ) = y(t) + \sigma_{1} x(t) \end{array} \right\}t = k\tau , \\ x(0^ + ) = s(0^ + ) = s_{0} , \\ y(0^ + ) = r(0^ + ) = r_{0} . \end{array} \right. $$
(18)

From Theorem 1, we see that there exists a globally asymptotically stable τ-period solution of system (18), denoted as \((\widetilde {x}(t), \widetilde {y}(t))\), and \((\widetilde {x}(t), \widetilde {y}(t))\rightarrow (\widetilde {s}(t), \widetilde {r}(t))\) when t. Thus, for any ε 1>0, t 1>0 such that \(\widetilde {y}(t)>\widetilde {r}(t)-\varepsilon _{1}\) when t>t 1. According to the comparison theorem of the pulse differential equation, we have

$$ r(t)\geq y(t)>\widetilde{r}(t)-\varepsilon_{1}. $$
(19)

For simplicity, we assume that equation (19) holds for any time t. From the second equation of system (6) and equation (4), we have \(\frac {dl(t)}{dt}=\alpha \mu s(t)i(t)-(\lambda +\theta +\delta )l(t)=\alpha \mu (1-l(t)-i(t)-r(t))i(t)-(\lambda +\theta +\delta )l(t) \leq \alpha \mu (1-l(t)-i(t)-\widetilde {r}(t)+\varepsilon _{1})i(t)-(\lambda +\theta +\delta )l(t)\leq \alpha \mu (\widetilde {s}(t)+\varepsilon _{1})i(t)-(\lambda +\theta +\delta )l(t)\). Similarly, from the third equation of system (6), we have \(\frac {di(t)}{dt}\leq \lambda l(t)+\beta \mu (\widetilde {s}(t)+\varepsilon _{1})i(t)-(\varepsilon +\delta )i(t)\). Next, we construct the following system

$$ \left\{ \begin{array}{l} \left. \begin{array}{l} \frac{du(t)}{dt} = \alpha\mu (\tilde s(t) + \varepsilon_{1} )v(t) - (\lambda + \theta + \delta )u(t) \\ \frac{dv(t)}{dt} = \lambda u(t) + (\beta \mu(\tilde s(t) + \varepsilon_{1} ) - \varepsilon - \delta )v(t) \end{array} \right\}t \ne k\tau , \\ \left. \begin{array}{l} u(t^ + ) = u(t) \\ v(t^ + ) = (1 - \sigma_{2} )v(t) \end{array} \right\}t = k\tau , \\ u(0^ + ) = l(0^ + ) = l_{0} , \\ v(0^ + ) = i(0^ + ) = i_{0} . \end{array} \right. $$
(20)

We can rewrite equation (20) as

$$ \left\{ \begin{array}{l} \frac{d}{dt}\left( \begin{array}{c} {u(t)} \\ {v(t)} \end{array}\right) = Z\left( \begin{array}{c} {u(t)} \\ {v(t)} \end{array}\right),t \ne k\tau , \\ \left( \begin{array}{c} {u(t^ + )} \\ {v(t^ + )} \end{array}\right) = \left( \begin{array}{cc} 1 & 0 \\ 0 & {1 - \sigma_{2} } \end{array}\right)\left( \begin{array}{c} u(t) \\ v(t) \end{array}\right),t = k\tau. \end{array} \right. $$
(21)

Let \(G(t) = \left (\begin {array}{c} u(t) \\v(t) \end {array}\right )\). Then, we can rewrite equation (21) as

$$ \left\{ \begin{array}{l} \frac{dG(t)}{dt} = ZG(t),t \ne k\tau , \\ G(t^ + ) = W_{2} G(t),t = k\tau , \\ G(0) = \left( \begin{array}{c} l_{0} \\ i_{0} \end{array}\right). \end{array} \right. $$
(22)

Solving equation (22), we have \(G(t) = G(0)e^{{{\int }_{0}^{t}} {Z(t)dt} }\) when 0<tτ. Thus, for any time t∈(k τ,(k+1)τ], we have \(G(t) = G(0)X^{k} e^{{\int }_{k\tau }^{t} {Z(t)dt}}\), where k is a non-negative integer. As X<1, we have G(t)→0 when t. This implies that we have (l(t),i(t))→(0,0) when t.

In the following, we prove that \(r(t)\rightarrow \widetilde {r}(t)\) and \(s(t)\rightarrow \widetilde {s}(t)\) as t. We have, for any 0<ε 2<(η + δ)γ μ, t 2>0 such that 0<l(t)<ε 2 and 0<i(t)<ε 2 when t>t 2. Without loss of generality, we assume 0<l(t)<ε 2 and 0<i(t)<ε 2 for any time t>0. Then, we have \(-(\eta +\delta )r(t)<\frac {r(t)}{dt}<\varepsilon \varepsilon _{2}+\theta \varepsilon _{2}-\gamma \mu (1-2\varepsilon _{2}-r(t)) \varepsilon _{2}-\eta r(t)-\delta r(t)=\varepsilon \varepsilon _{2}+\theta \varepsilon _{2}-\gamma \mu (1-2\varepsilon _{2}) \varepsilon _{2}-(\eta +\delta -\gamma \mu \varepsilon _{2})r(t)=(\varepsilon +\theta -\gamma \mu )\varepsilon _{2}+2{\gamma \mu \varepsilon _{2}^{2}}-(\eta +\delta -\gamma \mu \varepsilon _{2})r(t) \triangleq \varepsilon _{3}-(\eta +\delta -\gamma \mu \varepsilon _{2})r(t)\), where \(\varepsilon _{3}=(\varepsilon +\theta -\gamma \mu )\varepsilon _{2}+2{\gamma \mu \varepsilon _{2}^{2}}\). Next, we construct the following system

$$ \left\{\begin{array}{l} \frac{dz(t)}{dt} = \varepsilon_{3} - (\eta + \delta - \gamma \mu\varepsilon_{2} )z(t),t \ne k\tau ,\\ z(t^ + ) = (1 - \sigma_{1} )z(t) + (1 - 2\varepsilon_{2} )\sigma_{1} + \varepsilon_{2} \sigma_{2} ,t = k\tau , \\ z(0^ + ) = r_{0}. \end{array} \right. $$
(23)

Obviously, system (23) has a globally asymptotically stable τ-period solution:

$$\widetilde{z}(t)=\frac{\varepsilon}{\eta+\delta-\gamma\mu\varepsilon_{2}}+\left( \widetilde{z}^{\ast}-\frac{\varepsilon_{2}} {\eta+\delta-\gamma\mu\varepsilon_{2}}\right)e^{-(\eta+\delta-\gamma\mu\varepsilon_{2})(t-k\tau)}, $$

where \(\widetilde {z}^{\ast }=\frac {\frac {(1-\sigma _{1})\varepsilon _{3}}{F}(1-e^{-F\tau })+(1-2\varepsilon _{2})\sigma _{1}+\varepsilon _{2}\sigma _{2}} {1-(1-\sigma _{1})e^{-F\tau }}\), and F = η + δγ μ ε 2. Thus, for any ε 4>0, there exists a time t 3 such that \(\widetilde {r}^(t)-\varepsilon _{4}<r(t)<\widetilde {z}^(t)+\varepsilon _{4}\) when t>t 3. When ε 2→0 and t, we have \(\widetilde {r}(t)-\varepsilon _{4}<r(t)<\widetilde {r}(t)+\varepsilon _{4}\). Thus, we obtain \(r(t)\rightarrow \widetilde {r}(t)\). Furthermore, \(s(t)\rightarrow \widetilde {s}(t)\) when t. This implies that the misinformation-free τ-period solution of system (6) \((\widetilde {s}(t), 0, 0, \widetilde {r}(t))\) is globally attractive.

As the misinformation-free τ-period solution of system (6) is both locally asymptotically stable and globally attractive, it is globally asymptotically stable.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, X., Lin, Y., Zhao, Y. et al. A novel approach for inhibiting misinformation propagation in human mobile opportunistic networks. Peer-to-Peer Netw. Appl. 10, 377–394 (2017). https://doi.org/10.1007/s12083-016-0438-3

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-016-0438-3

Keywords

Navigation