Exploring the Dynamical Behavior of Information Diffusion in D2D Communication Environment

&is paper is dedicated to exploring the dynamical behavior of information diffusion in the Device-to-Device (D2D) communication environment for information security, so as to study how to accelerate the dissemination of beneficial information and curb the spread of malicious information. A mathematical model of information diffusion considering the combined impact of user awareness and social tie between users is proposed. &e equilibrium of the model and its stability are fully analyzed. Very importantly, there is a unique (viral) equilibrium that is globally asymptotically stable without any preconditions. &is means that the spread of malicious information in the D2D communication environment cannot be completely eliminated whatever measures are taken, but its diffusion scale can be controlled by adjusting the value of the equilibrium, and then the goal of pursuing the best control effect at the minimum cost can be achieved. In the same way, the dissemination scale of beneficial information can be expanded. Finally, the obtained main theoretical results are illustrated by some examples, and some suggestions are also given.


Introduction
e Device-to-Device (D2D) communication is a promising approach to address the growing demand for data transmission, which provides a high transmission rate, low latency, and low power consumption [1]. In recent years, combining social networks with D2D communications has become a hotspot in the field of D2D research [2,3]. With the explosive growth of information in social networks, higher requirements for efficiency and security of D2D communications are proposed [4]. Exploring information diffusion in the D2D communication environment will help solve these problems.
In the D2D communication environment, users interact frequently on social networks [5], thus derivating social attributes such as social tie and intimacy [6,7]. As the main descriptors of information, individuals and their social attributes are closely related to its diffusion. Some previous work has explored the influence of social attributes on information diffusion. Gan et al. [8] proposed a diffusion model affected by user behavior in D2D communications.
e results point out that the social attributes of users and information can improve the dissemination effect. Meng et al. [9] utilized the social tie to select peers for improving the performance of D2D link cooperative communication. Zhang et al. [10] considered that the social tie decay with time and the priority schemes are selected by maximizing the strength of social tie for improving the information transmission rate. e exploration of social attributes has effectively improved the efficiency of information dissemination in D2D communications. However, in the real life, all kinds of information including beneficial, malicious, and generic proliferate competitively on social networks [11][12][13]. For the information such as computer viruses [14,15], malware [16,17], and rumors [18,19], it is important to consider taking necessary measures to suppress their spread. Meanwhile, the dissemination of alerts [20], safety publicity, and emergencies are also expected to accelerate [21]. In addition, the user awareness plays an important role in the dissemination of different information. For example, when a user realizes the existence of malicious information, it will inform others about the information dissemination, and the user who knows the message can take measures to refuse to receive it. e classification of information has also considered by scholars. Wu et al. [22] proposed a random diffusion model to explore the minimization of the diffusion of nonsensitive information while suppressing the spread of sensitive information. Yang et al. [23] proposed a linear threshold model to explore how to suppress rumors by spreading positive information. Yang et al. [24] proposed an individual competition diffusion model, which discussed the influence of two spreading networks on the competition and diffusion of two conflicting messages.
In addition to the abovementioned work, epidemic models are often used to study information diffusion [25,26]. Lin et al. [27] proposed a susceptible-wanderinginfected-recovery (SWIR) model to describe the influence of individual psychological state change on the dissemination of fraud information and studied the control problem of fraud information with personal loss as a constraint. Sun et al. [28] proposed an improved SIR model to analyze the competitive diffusion of positive and negative information and analyzed the stability of diffusion infection-free equilibrium. Yi et al. [29] introduced the uncertain individual called hesitator in the SIR model and utilized the selfconfirmation mechanism to describe the influence of social tie strength on user-forwarding behavior. Although these studies have modeled and analyzed the information diffusion, most of them mainly consider the diffusion behavior in social networks and assumed that users are the main senders and receivers. In the D2D communication environment, social and D2D physical networks jointly influence the dissemination of information, and the existing models cannot accurately describe this process. Inspired by the above research studies, this paper explores the dynamical behavior of information diffusion in the D2D communication environment. Firstly, a mathematical model combined the effect of user awareness and social tie is proposed. Next, the global stability of equilibrium is analyzed, which shows that the spread of malicious information in the D2D communication environment cannot be completely eliminated, but the diffusion scale can be reduced to a certain level by adjusting the system parameters. Similarly, the beneficial information can also be expanded. Finally, the obtained main theoretical results are verified by some examples, and some directional suggestions are recommended to accelerate the dissemination of beneficial information or to curb the spread of malicious information.
e subsequent materials are organized as follows. Section 2 briefly describes the scenario of D2D communication environment. Sections 3 and 4 propose and analyze the mathematical model of information diffusion, respectively. Some discussions are made in Section 5. Finally, Section 6 summarizes this work.

Scenario Description
is paper mainly explores the dynamical behavior of information diffusion in the D2D communication environment. Figure 1 briefly shows the information diffusion diagram. In a cellular network, there are traditional cellular users C � (C 1 , C 2 ) to communicate through the Base Station (BS). Since the devices d 1 and d 2 with D2D communication function can directly establish D2D peer-to-peer links, the D2D users D � (D 1 , . . . , D 7 ) can also directly establish peerto-peer sessions to send and receive the information. In particular, a single user can establish a peer-to-peer session with a single user, such as D 4 ⟶ D 5 , or can establish peerto-peer sessions with multiple users, such as Moreover, in some cases, a third-party relay user can perform multihop communication such as where R 1 acts as a relay. is is suitable for users who are relatively far away to communicate. Meanwhile, whether the D2D link can be successfully established is also related to the social tie between users, such as p 1 , p 2 , and p 3 . Next, this paper will establish a mathematical model based on this scenario to study the dynamical behavior of information diffusion.

Mathematical Formulation
Based on the scenario description, for any given information, all users in the D2D communication environment are in one of the following two states: Unknown (U) : the user does not know the information. Known (K) : the user knows the information through the other users or the corresponding devices. Once the corresponding devices receive the information, the user is sure to know the information.
According to whether the devices receive the information or not, all devices in the D2D communication environment are also in one of the two states: Infected (I) or Susceptible (S). Here, let us regard the user and the corresponding devices as a node; then, the node is in one of the following three states: US : the user does not know the information, and the corresponding devices have never received the information KS : the user knows the information through the other users, but the corresponding devices do not receive the information KI : the user knows the information, and the corresponding devices receive the information From the scenario and node sate description, Figure 2 gives the state transfer diagram, and the corresponding details are as follows: At any time, the establishing probabilities of a new D2D link between US, KS, and KI nodes are δ 1 , δ 2 , and δ 3 , respectively.
At any time, the break probability of D2D link between nodes is μ. Due to the effect of social tie between users, at any time, the probability that the US node obtains the message about information dissemination from the KS or KI node is β 1 or β 2 . At any time, a node in the US or KS state receives the information with probability α. Due to the impact of user awareness, at any time, a node in the KI state deletes the received information with probability c.
Let x(t), y(t), and z(t) represent the number of US, KS, and KI nodes at time t, respectively, and let N(t) stand for the total number of all nodes; then, N(t) � x(t) +y(t) + z(t). For brevity, x(t), y(t), z(t), and N(t) will be abbreviated as x, y, z, and N, respectively.

Security and Communication Networks
with the positively invariant region: In what follows, it suffices to study the dynamical behavior of system (4) with respect to Ω.

Model Analysis
Before proceeding to the next analysis of the model, let us first introduce some basic terminology concepts, which will help explain the motivation and main research content of this paper.
Dynamical behavior: the behavior of dynamical systems. Here, this paper discusses the stability of equilibrium of system (4). Equilibrium: it is a fixed point of a dynamical system. In this paper, it represents the possible final scale of information diffusion. e viral equilibrium means that the information diffusion component is not zero. Stability: the final motion trend of the orbit of a dynamical system. In this paper, the local stability and global stability of equilibrium of system (4) are both analyzed.

Equilibrium.
First of all, let us discuss the equilibrium of system (4).

Theorem 1.
ere is a unique (viral) equilibrium E * (y * , z * ) in system (4), where Proof. Suppose that (y, z) is an equilibrium of system (4). en, Solving the second equation of system (7), one can obtain Next, putting (8) into the first equation of system (7), it can calculate that y � y * . erefore, the proof is complete.

Local Stability.
Here, let us consider the local stability of E * of system (4).
e Jacobian matrix of system (4) at E * is where Furthermore, the corresponding characteristic equation is where From system (7), one can obtain us, As k 1 > 0, k 2 > 0, then it follows from the Hurwitz criterion that the real parts of both roots of the characteristic (11) are negative. erefore, the claimed result follows from Lyapunov stability theorem [31].

Global Stability
. Now, let us analyze the global stability of E * of system (4). e following two lemmas are helpful for addressing it.

Lemma 2. System (4) has no periodic orbit on the boundary of Ω.
Proof. Assume that (y, z) is an arbitrary point on the boundary of Ω. en, let us consider the following three cases.
Case 2: when y � 0, 0< z < N * , then Case 3: when y + z � N * , y ≠ 0, z ≠ 0, then us, the above analysis indicates that there are no periodic orbits that pass through (y, z) for system (4) on the boundary of Ω. e proof is complete.
According to eorem 1, Lemmas 1 and 2, and combined with the generalized Poincare-Bendixson theorem [31], it can demonstrate the global stability of E * of system (4). e main result is as follows.
Theorem 3. E * is globally asymptotically stable with respect to Ω.

Discussions
To verify the obtained main theoretical, the following examples are given.
is is consistent with eorem 3. e final information diffusion scale in the D2D communication environment is not affected by the initial condition. Besides, it can be found that the amount of US nodes rapidly drops to a low level and does not increase again. is is because the known users will no longer become the unknown state under the influence of user awareness, which is in line with reality.
Example 2. Illustrate the impact of different system parameters c on the number of KS and KI nodes with α � 0.0002, β 1 � 0.0002, β 2 � 0.00015, μ � 0.004, δ 1 � 0.6, δ 2 � 0.5, and δ 3 � 0.4 and the initial condition (x(0), y (0), z(0)) � (400, 95, 5). Figure 4 illustrates the effect of different c on the number of KS and KI nodes. It can be seen that the increase of c will reduce the number of infected nodes and can reach a lower level. is is because c represents the probability of the user deleting the information. Although the information is Security and Communication Networks deleted from the device, the user knows the information, which means that the information has been diffused. For malicious information, the rapid deletion of information can avoid secondary diffusion, so the security awareness of users and the necessary protection of the device are particularly important.
In addition, eorem 3 reveals that the information will be persist in the D2D communication environment, and if the information is malicious, it cannot be completely eliminated whatever measures are taken. So, it is essential to study how to control the spread of malicious information. From eorem 1, one can observe that the value of the equilibrium can be adjusted by changing the system parameters, and then the following result is obtained.
where w 0 has been given in (6).
Proof. From (6), one can obtain en, By a calculation, the claimed result follows. eorem 4 shows that the diffusion scale of malicious information can be controlled by adjusting the value of the equilibrium, and then the goal of pursuing the best control effect at the minimum cost can be achieved. In the same way, the dissemination scale of beneficial information can be expanded.
Example 3. Illustrate the information diffusion scale that can be achieved by adjusting system parameters. Taking the number of KI nodes as an indicator, in the case of ensuring (20) and U < 500, the following two sets of conditions are made.
Condition 1: c � 0.01, α � 0.0002, β 1 � 0.0002, β 2 � 0.00015, μ � 0.004, δ 1 � 0.6, δ 2 � 0.5, and δ 3 � 0.4 Condition 2: c � 0.07, α � 0.0001, β 1 � 0.0002, β 2 � 0.00015, μ � 0.005, δ 1 � 0.6, δ 2 � 0.5, and δ 3 � 0.4 Figure 5 displays that, by adjusting the system parameters, the proportion of KI nodes can reach more than 90%, and in the same way the proportion of KI nodes can reach an extremely low level. is also implies that the diffusion range of information can reach more than 90%, and it can also be suppressed to a level that tends to disappear by means of the corresponding method. Furthermore, the related suggestions are as follows: Use the core network in the D2D communication environment as a relay to broadcast the beneficial information Increase mutual authentication of users in the D2D communication environment to improve connection reliability Enhance the user safety awareness and install protection software in D2D devices Allow user permissions in the D2D communication environment to be revoked, and timely revoke user permissions or break the D2D link when the user is malicious

Conclusions
In this paper, a mathematical model of information diffusion in the D2D communication environment with the combined impact of user awareness and social tie between users has been developed for information security. e equilibrium of the model and its stability have been fully analyzed. Very importantly, there is a unique (viral) equilibrium that is globally asymptotically stable without any preconditions.
rough the theoretical analysis, adjusting the system parameters can accelerate the dissemination of beneficial information or curb the spread of malicious information. Finally, some examples and suggestions have been given.
Although this paper does theoretical analysis of D2D communications and gives some practical measures, the established model is still relatively simple and lacks the support of actual data. In the next step, we can build a more complex information dissemination model, and it is best to separate people and equipment to consider the mutual influence of each other. In addition, since it involves real data issues, we will consider applying big data, deep learning, blockchain, and other technologies [32][33][34] to information dissemination research.

Data Availability
Data sharing is not applicable to this article as no datasets were generated.  Security and Communication Networks 7