Loading [MathJax]/jax/output/SVG/jax.js
Research article Special Issues

On the spread of charitable behavior in a social network: a model based on game theory

  • Many people worldwide depend on charitable donations to survive. Consider a social network engaged in charitable activities. Let this network be composed of individuals with heterogeneous donation behaviors: there are individuals that are influenced by the neighborhood activity and individuals that act by themselves. In this article, a model formulated in terms of a spatial iterated game is proposed to investigate the time evolution of the number of donors in this social network. In the proposed model, the population spatial structure is represented by a three-dimensional torus and the social interactions are represented by a payoff matrix. Here, the payoffs are a measure of the feeling of personal satisfaction for making (or not) a charitable contribution. Numerical simulations are performed in order to find out how the population size, the payoff for simultaneous donations, the probability of spontaneous donation, and the proportions of the distinct charitable behaviors affect the number of donors. The simulations reveal that an increase in the proportion of impure altruistic behavior improves the engagement in charitable projects if the donations motivated by pure altruism occur with low probability. The practical implications of this study can be especially relevant in times of economic crisis, like the one we are experiencing.

    Citation: A.C. Rocha, L.H.A. Monteiro. On the spread of charitable behavior in a social network: a model based on game theory[J]. Networks and Heterogeneous Media, 2023, 18(2): 842-854. doi: 10.3934/nhm.2023036

    Related Papers:

    [1] Yiqin Bao, Qiang Zhao, Jie Sun, Wenbin Xu, Hongbing Lu . An edge cloud and Fibonacci-Diffie-Hellman encryption scheme for secure printer data transmission. Mathematical Biosciences and Engineering, 2024, 21(1): 96-115. doi: 10.3934/mbe.2024005
    [2] Pengpeng Wang, Xu Wang, Yumin Shen, Jinlong Wang, Xiaoyun Xiong . PBFT optimization algorithm based on community contributions. Mathematical Biosciences and Engineering, 2023, 20(6): 10200-10222. doi: 10.3934/mbe.2023447
    [3] Peng Guan, Lincoln C. Wood, Jason X. Wang, Linh N. K. Duong . Barriers to blockchain adoption in the seaport industry: A fuzzy DEMATEL analysis. Mathematical Biosciences and Engineering, 2023, 20(12): 20995-21031. doi: 10.3934/mbe.2023929
    [4] Jiayuan Zhang, Rongxin Guo, Yifan Shi, Wanting Tang . An anti-impersonation attack electronic health record sharing scheme based on proxy re-encryption and blockchain. Mathematical Biosciences and Engineering, 2024, 21(6): 6167-6189. doi: 10.3934/mbe.2024271
    [5] Yongjun Ren, Yan Leng, Yaping Cheng, Jin Wang . Secure data storage based on blockchain and coding in edge computing. Mathematical Biosciences and Engineering, 2019, 16(4): 1874-1892. doi: 10.3934/mbe.2019091
    [6] Abdullah Lakhan, Mazhar Ali Dootio, Ali Hassan Sodhro, Sandeep Pirbhulal, Tor Morten Groenli, Muhammad Saddam Khokhar, Lei Wang . Cost-efficient service selection and execution and blockchain-enabled serverless network for internet of medical things. Mathematical Biosciences and Engineering, 2021, 18(6): 7344-7362. doi: 10.3934/mbe.2021363
    [7] Naila Naz, Muazzam A Khan, Suliman A. Alsuhibany, Muhammad Diyan, Zhiyuan Tan, Muhammad Almas Khan, Jawad Ahmad . Ensemble learning-based IDS for sensors telemetry data in IoT networks. Mathematical Biosciences and Engineering, 2022, 19(10): 10550-10580. doi: 10.3934/mbe.2022493
    [8] Jiahe Xu, Yuan Tian, Tinghuai Ma, Najla Al-Nabhan . Intelligent manufacturing security model based on improved blockchain. Mathematical Biosciences and Engineering, 2020, 17(5): 5633-5650. doi: 10.3934/mbe.2020303
    [9] Ch. Rupa, Divya Midhunchakkaravarthy, Mohammad Kamrul Hasan, Hesham Alhumyani, Rashid A. Saeed . Industry 5.0: Ethereum blockchain technology based DApp smart contract. Mathematical Biosciences and Engineering, 2021, 18(5): 7010-7027. doi: 10.3934/mbe.2021349
    [10] Xiao-Dong Yang, Ze-Fan Liao, Bin Shu, Ai-Jia Chen . Blockchain-based multi-authority revocable data sharing scheme in smart grid. Mathematical Biosciences and Engineering, 2023, 20(7): 11957-11977. doi: 10.3934/mbe.2023531
  • Many people worldwide depend on charitable donations to survive. Consider a social network engaged in charitable activities. Let this network be composed of individuals with heterogeneous donation behaviors: there are individuals that are influenced by the neighborhood activity and individuals that act by themselves. In this article, a model formulated in terms of a spatial iterated game is proposed to investigate the time evolution of the number of donors in this social network. In the proposed model, the population spatial structure is represented by a three-dimensional torus and the social interactions are represented by a payoff matrix. Here, the payoffs are a measure of the feeling of personal satisfaction for making (or not) a charitable contribution. Numerical simulations are performed in order to find out how the population size, the payoff for simultaneous donations, the probability of spontaneous donation, and the proportions of the distinct charitable behaviors affect the number of donors. The simulations reveal that an increase in the proportion of impure altruistic behavior improves the engagement in charitable projects if the donations motivated by pure altruism occur with low probability. The practical implications of this study can be especially relevant in times of economic crisis, like the one we are experiencing.



    As rapid development of internet of things (IoTs), a large number of devices in the IoTs and the volume of data generated make it further messy and huge. Further, there are high security risks while establishing an ecosystem containing all devices of the IoTs [1]. The blockchain is a decentralized ledger based on the consensus mechanism, cryptography and distributed storage in the intelligent transportation system. A perfect protocol and architecture design are essential to build a blockchain secure and reliable storage and trading network. In the field of IoT, blockchain can be used to provide security and privacy for user data in the network [2]. In the field of big data, blockchain can be used to improve data security and data quality [3]. In the field of healthcare domain Agbo et al. [4] made blockchain technology in healthcare: A systematic review. In the field of agri-food domain, Mirabelli [5] proposed a blockchain-based solution for agri-food supply chains. In the field of energy domain, Andoni et al. [6] proposed Blockchain technology in the energy sector: A systematic review of challenges and opportunities. In the field of Construction industry domain, Plevris et al. [7] proposed. Blockchain in civil engineering, architecture and construction industry: State of the art, evolution, challenges and opportunities. Bakogiannis et al. [8] proposed leveraging blockchain technology to break the cloud computing market monopoly in the field of cloud computing. In order to obtain data security, blockchain is also used in the field of fog computing and edge computing [9]. Khan et al. [10] pointed out that the scalability problem in the public blockchain hinders the provision of the best solution for enterprises and industries. Key management, encryption algorithm and smart contract are the core features of blockchain security [11]. Blockchain applications pay more attention to the core blockchain technologies and jointly provide a solid security cornerstone for blockchain applications from multiple dimensions such as security, data security, management security and application security [12], Bhat et al. [13] designed the agricultural food supply chain management system based on blockchain and IoT. Huh et al. [14] studied the blockchain consensus algorithm for feasible management of new and renewable energy. Astarita et al. [15] reviewed the application of blockchain in transportation system.

    Message queue telemetry transmission (MQTT) is one of the common communication protocols for any platform in the IoTs. Whether from the perspective of overall security, equipment compatibility and resource consumption, MQTT protocol has certain advantages and is the most competitive communication protocol in the current IoT. However, the user password login form adopted by MQTT protocol has some security problems [16]. Diffie-Hellman (DH) key exchange algorithm is used to share public key and private key pairing for encryption and decryption in a secured manner. This algorithm is named after its inventor Diffie and Hellman [17], DH is not an encryption algorithm, but a secure key exchange algorithm, which is commonly used in cloud computing and blockchain systems [18]. Fibonacci sequence, also known as golden section sequence, is mathematically defined by recursive method: F(0) = 0, f(1) = 1, f(n) = f(n−1) + F(n−2) (n ≥ 2, n ∈ N) is used in many fields of physics and chemistry [19] and the third-order Fibonacci sequence is also used in the encryption and decryption applications [20].

    Aiming at the problems of complex system and difficulty in implementation of the application of blockchain in intelligent transportation system, this paper proposes a lightweight fuzzy decision blockchain scheme through MQTT and DH Fibonacci technologies. Through this, the blockchain service scheme is scalable and easy to implement. DH and Fibonacci transformation are adopted to form lightweight fuzzy decision blockchain (LF-BC), which enhances the security and ensures the sustainable safety of the intelligent transportation system. The main contributions of this paper include three aspects:

    ● DH and Fibonacci transform are combined to form the fuzzy practical Byzantine fault tolerance (DH-FIB) algorithm which is used to generate LF-BC and to enhance the security.

    ● Realize scalable blockchain service scale and realize reliable communication of blockchain through MQTT protocol.

    ● In LF-BC blockchain system, using F-PBFT consensus algorithm, both fault tolerance rate and the transmission efficiency are significantly improved.

    The paper is organized as follows. An extensive literature review on related technologies is undertaken in the second part. The third part proposes a lightweight fuzzy decision blockchain scheme. The fourth part compares and analyzes the experimental results. The fifth part summarizes the conclusion.

    In this paper, we implement a trusted lightweight blockchain scheme based on MQTT and Fibonacci, discuss the recent existing research on MQTT protocol, Fibonacci matrix, DH algorithm, blockchain technology and propose to apply DH-FIB algorithm to blockchain scheme.

    MQTT was originally developed by IBM as a communication protocol for telemedicine services. It is widely used in the IoTs because of its simplicity, specification, low overhead and easy implementation [21]. MQTT-publish based communication protocol, which creates and controls the hierarchy of topics, or subscribes to multiple topics. In March 2013, Oasis announced that MQTT was the preferred standard for the emerging IoTs messaging protocol. The model of MQTT protocol applied to the IoTs [22] is shown in Figure 1.

    Figure 1.  The data communication over MQTT protocol.

    MQTT protocol frame format is shown in Table 1:

    Table 1.  MQTT frame format.
    Control header Packet length Variable length header Payload
    1 Byte 1 to 4 Bytes 0–Y Bytes 0–X Bytes

     | Show Table
    DownLoad: CSV

    The type of MQTT protocol package [23], is shown in Table 2.

    Table 2.  MQTT packets type.
    Packets type Type value Details
    CONNECT 0x01 Client request to connect to server
    CONNACK 0x02 Connect acknowledgment
    PUBLISH 0x03 Publish message
    PUBACK 0x04 Publish acknowledgment
    PUBREC 0x05 Publish received (assured delivery part 1)
    PUBREL 0x06 Publish received (assured delivery part 2)
    PUBCOMP 0x07 Publish received (assured delivery part 3)
    SUBSCRIBE 0x08 Client subscribe request
    UNSUBSCRIBE 0x0a Unsubscribe request
    PINGREQ 0x0c PING request
    DISCONNECT 0x0e Client is disconnecting

     | Show Table
    DownLoad: CSV

    MQTT protocol only specifies the message format and does not limit the load content and format of users. Therefore, we can customize the load format. There are three options for load format: 1) Hexadecimal/Binary: In this, there is no readability, but the flow can be controlled to relatively small extent; 2) String: This is easy to read, but is still not the best choice; 3) JSON-key value pair: The hierarchy is concise and clear, which is easy to read and write. While implementing the blockchain scheme, considering the security of confidentiality, hexadecimal format is adopted along with Modbus to implement the monitoring and control of the terminal.

    MQTT protocol is simple, standardized and has certain advantages. It is the most competitive communication protocol in the current IoTs [24].

    Fibonacci, an Italian mathematician in the 13th century, introduced an interesting sequence (called as Fibonacci sequence) from the problem of rabbit reproduction, record as {Fn}. It is a second-order recursive sequence, F0 = 0, F1 = 1, Fn+1 = Fn + Fn−1, n = 1, 2, 3…, and we call each term of this sequence as Fibonacci number. Researchers are interested in Fibonacci sequence over years because of its unique properties and are widely using in computational mathematics, optimization theory, operations research and other fields [25,26].

    Reference [27] defines Fibonacci matrix T2, which corresponds to the second-order Fibonacci sequence {Fn} and is expressed as:

    (Fn+1FnFnFn - 1)=(1110)n=T2n,n=1,2,3 (1)

    Reference [28] defines the third-order Fibonacci matrix T3, which corresponds to the third-order Fibonacci sequence {Fn}−a third-order recursive sequence F0 = 1, F1 = 1, F2 = 2, Fn+1 = Fn + Fn−1 + Fn−2, n = 2, 3, 4…, and is expressed as:

    (FnFn+1FnFn1 Fn1 FnFn1 Fn2 Fn2 Fn1Fn2 Fn3)=(111100010)n=T3n,n=3,4,5 (2)

    Since the determinant |T3| = 1 corresponding to the third-order Fibonacci matrix, T3 is reversible.

    T3=(111100010)T13=(010001111) (3)

    Similarly, |T3n| = 1, so T3n is also reversible. The formulae for calculating T3n and (T3n)−1 are as follows:

    Since:

    (111100010)k1+k2=(111100010)k1(111100010)k2 (4)
    (010001111)k1+k2=(010001111)k1(010001111)k2 (5)

    So:

    T3n=(111100010)n(T3n)1=(010001111)n (6)

    For example, n = 5, T35 and (T35)−1 are calculated by formula (6):

    T35=(13117764432)(T53)1=(012223351) (7)

    We make Fn = T3n, Fn−1 = (T3n)−1, use the characteristics of the third-order Fibonacci matrix T3n reversible sum formula (6), take n as a parameter, and apply Fn and Fn−1 to the encryption process of LF-BC blockchain in this paper.

    Cryptography is the most important part of the blockchain system and the basic technology to realize the blockchain [29]. DH is an asymmetric encryption algorithm, which is commonly used in blockchain encryption schemes. It is also a public key algorithm [30]. Each communication party generates a private key and a public key, where the private key is not public. After the public key is publicly exchanged, the communication parties can calculate the shared key, and the shared key calculated by both parties is the same. Therefore, both parties can encrypt and decrypt the message [31,32] through the shared key, so as to realize the encrypted transmission of the message. DH negotiates a shared key through unreliable channels. In many industrial security protocols, such as SSL/TLS, SSH, Kerberos, ISO-9798-3, just fast key and PKI key distribution are widely used.

    Alice sends the encrypted transmission process of plaintext M to Bob, as shown in Figure 2.

    Figure 2.  DH encryption process flow diagram.

    Encryption process (Alice)

    Step 1: First agree two parameters g, N with Bob;

    Step2: Randomly generates own private key x, and calculate X = gx mod N, X as the public key;

    Step3: Select the public key Y = gy mod N, is sent by Bob and calculate the key: K = Yx mod N = gxy mod N, K as the shared key with Bob;

    Step 4: Calculate the encrypted data Cm = Ek1(M);

    Step5: Discloses sending Cm to Bob.

    Decryption process (Bob)

    Step1: First agree two parameters g, n with Alice;

    Step2: Randomly generates own private key y, and calculates Y = gy mod N, Y as the public key;

    Step3: Select the public key X = gx mod N sent by the sender and calculate the key, G = Xy mod N = gx ymod N, G as the shared key with Alice;

    Step4: Publicly receives cm and decrypts data, DG(Cm) = DG(EK(M)) = M;

    Step5: Finally obtains m from the slave.

    DH is the basis of authentication key exchange (AKE) scheme in the post quantum computing era [33]. It combines DH and Fibonacci transformation to form LF-BC blockchain, which is a specific application of DH in vehicle intelligent transportation system.

    Blockchain technology was originally applied in the field of Internet finance to solve the trust problem of the third-party central institutions and provide a trust mechanism for decentralized transactions. The central idea of blockchain technology comes from the Bitcoin project released and implemented in 2009. The core technologies involved in the project mainly include cryptography, incentive mechanism, workload proof mechanism, P2P network, distributed database [34] and other technologies. It has four key characteristics.

    ● Decentralized network

    The essence of blockchain is a decentralized distributed database, which is composed of a series of blocks generated by cryptography. The blocks contain data information that cannot be tampered within a certain period of time. Block contains data record, current block root hash, previous block root hash, time stamp and other information. Each user node in the network is both a client and a server. Each node has a complete backup of the whole database, and all nodes insert data through a specific consensus algorithm [35,36].

    ● Trusted blockchain structure

    A blockchain consists of a block header and a block body as shown in Figure 3.

    Figure 3.  One block structure.

    In Figure 3, block hash represents the hash value of the block header, pre-hash represents the hash value of the previous block, Merkel hash represents the Merkel hash value generated by the transaction number Tx_id, transaction number represents the number of transaction orders, time stamp represents the time stamp of the generated block, public key represents the public key of the generated block, and signature represents that the private key encrypts and signs of the user information. Policy header represents the permission control header of the block body [37], Transaction_i (i = 1...n) represents several transaction orders of the block body.

    ● Smart contract

    Smart contracts are programmable protocols that allow the execution of the contract terms and agreements. The concept was first proposed by Szabo, who defined a smart contract as "a computerized transaction protocol that executes the terms of a contract". Thus, smart contracts can be deployed to a blockchain database and users can develop computer codes based on contractual clauses [38].

    ● Consensus algorithm

    Practical byzantine fault tolerance (PBFT) algorithm is a consensus algorithm proposed by Miguel Castro and Arbara Liskov in 1999. PBFT is an algorithm to solve the consistency of state machine replicas in distributed scenarios [39]. The implementation of PBFT is divided into five steps: (1) Request, (2) Pre-prepare, (3) Prepare, (4) Commit, (5) Reply [40].

    The process of PBFT algorithm is shown in Figure 4.

    Figure 4.  PBFT algorithm process.

    PBFT is a state machine replication algorithm. State machines replicate in different nodes of the distributed system. The copy of each state machine not only saves the state of the service, but also realizes the operation of the service. For convenience of description, assuming that n is the total number of cluster nodes, the security and consistency of the consensus cluster can be guaranteed when the failed nodes do not exceed (n−1)/3. Therefore, the fault-tolerance rate of PBFT is:

    F1=(n1)/3 (8)

    In other words, as long as the nodes exceeding (n−1)−F1 = 2*(n−1)/3 are honest, the validity of blockchain data can be guaranteed.

    The lightweight fuzzy decision blockchain scheme mainly includes four parts: client, terminal, blockchain system and cloud plan work. 1) The client is the user's operating software, which can be a web client or APP; 2) The terminal mainly realizes GPS positioning, signal processing and control, and then realizes communication with the cloud platform; 3) Blockchain system is a service system responsible for data security, which refers to MQTT broker; 4) Cloud platform is a network platform responsible for remote communication and data management. The system architecture is shown in Figure 5, the communication between client, terminal, blockchain system and cloud platform is carried out through the publish and subscription (Pub/Sub) topic of MQTT. there is implementation process in Section 3.5.

    Figure 5.  Lightweight fuzzy decision blockchain system architecture.

    Based on MQTT and Fibonacci fuzzy decision blockchain scheme, due to the use of LF-BC blockchain in the architecture, the security problem of the traditional centralized architecture has been effectively solved. When the system is implemented, it mainly includes two transactions: 1) User registration and 2) Data transmission, as shown in Figure 6.

    Figure 6.  Data flow of LF-BC blockchain transactions.

    In the user registration stage, the user inputs the user information to form a transaction order, and the registration information is encrypted and stored on the nodes of the blockchain through cryptographic technology and consensus algorithm F-PBFT; while in the data transmissionstage, the data message forms a transaction order. Through cryptography and consensus algorithm F-PBFT, the data message is stored in the blockchain and the information is transmitted to the terminal.

    The basic principle of generating DH-FIB algorithm from Fibonacci matrix to DH encryption algorithm is as follows: 1) The sender and the receiver generate their own private key vectors, such as x = (x1, x2, x3), and generate their own public key vectors X and Y. 2) After X and y are exchanged, generate shared key vectors K and G, and calculate that the values of K and G are equal. 3) The sender's original m is encrypted into ciphertext Cm through K, and C is multiplied by Fibonacci matrix Fn to generate ciphertext vector Em = C*Fn, Em = {E1, E2, E3}, Em and sends it to the receiver. 4) The receiver multiplies the received em by the Fibonacci inverse matrix Fn−1, Em*Fn−1 = Cm*Fn*Fn−1 = Cm, finally decrypts Cm through the key vector G to obtain the original vector Em = (M1, M2, M3), and finally compares M1, M2, M3 through the voting algorithm to obtain the original M.

    DH-FIB is called fuzzy decision encryption algorithm. Since the encryption key is random and Fibonacci transformed, the ciphertext generated each time is different. For example, the ciphertext obtained by the middleman is ambiguous. Secondly, due to the use of key vector, it is necessary to make decision on the result to achieve the purpose of fault tolerance, reliability and sustainability.

    The encryption process of user sending plaintext m to Terminal is shown in Figure 7.

    Figure 7.  DH-FIB encryption process flow diagram.

    ● Encryption process (user)

    Step 1: First agree three parameters g, N, n of Fn with terminal;

    Step 2: Randomly generate private key vector x = (x1, x2, x3) and calculate public key vector: X = (gx1 mod N, gx2mod N, gx3mod N);

    Step3: Select terminal's public key vector Y = (gy1 mod N, gy2 mod N, gy3 mod N) and calculate: K = Yx = (gx1*y1mod N, gx2*y2mod N, gx3*y3mod N); K is defined as (K1, K2, K3), and is used as the shared key with terminal;

    Step 4: Calculate the encrypted data C, for example, the original file m has 5 bytes;

    M = (M1, M2, M3, M4, M5) (even for n bytes, the principle remains the same), calculate encryption matrix: Cm = Ek(M).

    Cm=(C11C12C13C21C22C23C31C32C33C41C42C43C51C52C53) (9)

    Step 5: Select the third-order Fibonacci matrix Fn, see formula (6);

    Step 6: Calculate the encryption matrix Em by formulas (9) and (6);

    Em=CmF=(E11E12E13E21E22E23E31E32E33E41E42E43E51E52E53) (10)

    Step 7: Convert Em to encrypted vector;

    Em={E1,E2,E3} (11)

    Step 8: Publicly send Em to terminal.

    Decryption process (terminal)

    Step 1: First agree three parameters g, N, n of Fn with user;

    Step 2: Randomly generate their own private key vector y = (y1, y2, y3) and calculate public key vector: Y = (gy1 mod N, gy2 mod N, gy3 mod N);

    Step 3: Select user's public key vector X = (gx1 mod N, gx2mod N, gx3mod N), and calculate: G = Xy = −(gx1*y1mod N, gx2*y2mod N, gx3*y3mod N), G is defined as (G1, G2, G3), and is used as the shared key with user;

    Step 4: Publicly accept T, T = {E1, E2, E3};

    Step 5: Select the third-order Fibonacci inverse matrixFn1, see formula (6);

    Step6: The decryption transformation matrix Cm is calculated by formulae (10) and (6). Cm = E*Fn−1 mod N;

    Since:

    FnF1n=(100010001) (12)

    So:

    Cm=(C11C12C13C21C22C23C31C32C33C41C42C43C51C52C53) (13)

    Step 7: The decryption matrix is calculated by G and formula (13).

    Mn=DG(Cm)=(M11M12M13M21M22M23M31M32M33M41M42M43M51M52M53) (14)

    Set:

    Mn={M1,M2,M3} (15)

    From formula (14), M1, M2, M3 should be equal;

    Step 8: The original text is obtained from the decryption Matrix Mn through the voting algorithm.

    The DH-FIB algorithm is applied to the blockchain system, and the generated blockchain is called lightweight fuzzy decision blockchain (LF-BC). Corresponding to a specific application, such as the remote monitoring system, the client in the system monitors the terminal through MQTT. We define the remote terminal as RTU, the control message adopts MQTT frame format, and the domain in MQTT frame format adopts DH-FIB blockchain structure, as shown in Figure 8. A blockchain includes a block header and a block body. The block body includes a policy header and several transaction orders. The transaction order is defined as a Modbus message.

    Figure 8.  LF-BC blockchain and MQTT frame format.

    The block header is used to ensure the security and integrity of blockchain. Police header is used for permission control and is the basis of blockchain data structure. The authorizer is a single entity user or multiple user groups [41].

    LF-BC blockchain has three main functions:

    ● Authority management

    Authority management completes permission control through police control header, which includes record number (No), authorizer, RTU_id, active and state. RTU authority management function is a very important part of LF-BC blockchain system, which is directly related to the security of application system.

    ● Storage management

    Storage management is mainly used to manage the transactions. The transaction includes: transaction number (Tx_id) and Modbus message. Modbus protocol is the basic protocol commonly used in industrial automation system [42], which is also widely used in intelligent transportation system. The Modbus format is shown in Table 3.

    Table 3.  Modbus protocol format.
    RTU_id Function Data_Adress DATA CRC

     | Show Table
    DownLoad: CSV

    ● DH-FIB encryption and fault tolerance management

    LF-BC blockchain adopts encryption fault-tolerant management for transactions. An example used in this paper is the remote monitoring system. Communication messages need to be encrypted to prevent man in the middle attack and eavesdropping.

    As shown in Figure 9, Modbus messages generate encryption vectors Em = {E1, E2, E3} through DH-FIB encryption algorithm. See formula (11), E1, E2 and E3 is used as three transactions of the blockchain respectively. After receiving the blockchain, the receiver decrypts it through DH-FIB algorithm to form three new transactions Mn = {M1, M2, M3}, as shown in formula (14), and finally restores it to Modbus message through fault-tolerant voting algorithm.

    Figure 9.  Encryption and decryption process of Modbus message transaction.

    Ordinary blockchain schemes use PBFT consensus algorithm. A complete PBFT consensus needs to be completed twice communication, the complexity is O(n2), and its fault tolerance rate is F1 = (n−1)/3, see formula (9). This paper defines the consensus algorithm of the LF-BC blockchain scheme as F-PBFT. Through DH-FIB encryption algorithm, a complete message forms a consensus node. The consensus node contains three transaction orders Mn = {M1, M2, m3}. See formula (15). Take {M1, M2, m3} as a group with a fault tolerance of F2 = 1/3. Vote in the group to reach consensus. Therefore, A complete F-PBFT consensus needs to be completed twicecommunication, the complexity is O(n2/3), which greatly reduces the complexity of the communication.

    Since one message generates three transaction orders and PBFT voting algorithm is adopted at the same time, the fault tolerance rate of F-PBFT is:

    F3=(n1)(1F1)(1F2)=(n1)(11/3)(1(n1)/3)=5(n1)/9 (16)

    The composition of the system is shown in Figure 5, and the subscription topic definition of its components is shown in Table 4:

    Table 4.  Definition of subscrip topic.
    Component Subscrip topic
    MQTT-1, MQTT-2, ..., MQTT-n MQTT_topic
    Cloud Platform Cloud_topic
    Client Client_topic
    Terminal Terminal_topic

     | Show Table
    DownLoad: CSV

    MQTT communication process:

    The process that the client sends data to the terminal through MQTT is as follows:

    ● The client sends information to the cloud platform by publish topic (Cloud_topic);

    ● The cloud platform receives the information and sends information to MQTT-1, MQTT-2, ..., MQTT-n by publish topic (MQTT_topic);

    ● After receiving the information, MQTT-1, MQTT-2, ..., MQTT-n performs the consensus algorithm and sends information to the cloud platform by publish topic (Cloud_topic);

    ● The cloud platform receives three groups of information. The cloud platform sends a group of information to the terminal through the voting algorithm by publish topic (Terminal_topic).

    The implementation process of LF-BC blockchain security scheme realizes the security of communication messages through the system without leakage. It mainly involves: encryption method, MQTT transmission, consensus algorithm, blockchain authentication, etc., mainly including: 1) User registration process and 2) data transmission process.

    ● User registration process

    The flow chart of user registration (registered user name and password) in the system is shown in Figure 10.

    Figure 10.  User registration flow chart of user.

    Step 1: User sets three parameters g, N, n of Fn, randomly generates x = (x1, x2, x3), and calculates X and Fn. X = (gx1 mod N, gx2mod N, gx3mod N);

    Step 2: User sends g, N, n, X to cloud platform; U = > P:{g, N, n, X};

    Step 3: Cloud platform generates y = (y1, y2, y3) and calculates Y and G; Y = (gy1 mod N, gy2mod N, gy3mod N); G = Xy = (gx1*y1mod N, gx2*y2mod N, gx3*y3mod N);

    Step 4: Cloud platform sends Y to user; P = > U:{Y};

    Step 5: User calculates K; K = Yx = (gx1*y1mod N, gx2*y2mod N, gx3*y3mod N);

    Step 6: User inputs ID and PW, calculates: Em = Ek (ID, PW)* Fn; U = > P:{ID, Em};

    Step 7: Cloud platform decrypts Em, calculates:

    a) ID, PW = DG(Em*Fn-1);

    b) Judge whether the ID and PW are equal to those in the database;

    c) Calculate user id: Uid = H(ID, PW);

    d) Calculate digital signature: S = sign(id, G).

    Step 8: Cloud platform sends Uid to user; P = > U:{Uid};

    Step 9: Cloud platform sends Uid, timestamp T, public key; P, S and blockB_hashto blockchain system; P = > B:{Uid, T, Y, P, B_hash};

    Step 10: Blockchain system forms a blockchain and vote the transaction through the F-PBFT consensus algorithm and saves it to each blockchain node.

    ● Data transmission process

    The security of data transmission is the most critical part of LF-BC blockchain scheme, which realizes the encryption and integrity of data. The data transmission flow chart is shown in Figure 11.

    Figure 11.  Blockchain data transmission flow chart of user.

    Step 1: User input Uid, RTU_addr, Modbus packet M_data; U = > P:{Uid, RTU_addr, M_data};

    Step 2: Cloud platform checks whether the Uid is equal to the Uid of the database, and makes digital signature: S = sign(Uaddr, G);

    Step 3: Cloud platform sends the address Uid, T, P, S and blockB_hash to blockchain system; P = > B:{Uid, T, P, S, B_hash};

    Step 4: Blockchain system forms ablockclaim transaction and vote the transaction through the F-PBFT consensus algorithm, saves it to each block node;

    Step 5: Blockchain system sends Police_head and transaction to cloud platform; B = > P:{Police_head, Transaction}

    Step 6: Cloud platform sends Transaction to RTU; P = > RTU:{Transaction};

    Step 7: RTU checks whether the RTU_addr is consistent with its own, parse packet M_data from the transaction;

    Step 8: RTU checks whether the CRC is correct and executes Modbus command P_data;

    Step 9: RTU sends Ack-data to Cloud platform; RTU = > P:{Ack-data};

    Step 10: Cloud platform sends Ack-data to user. P = > U:{Ack-data}.

    This section takes the vehicle intelligent transportation system as an example to realize the specific application. First, establish a LF-BC blockchain through MQTT broker. Only authorized nodes can read blocks, execute smart contracts and verify new blocks in this blockchain. Secondly, the pre approved nodes agree and verify the blockchain through F-PBFT. The authorized nodes include data load terminal, cloud platform, MQTT broker and client.

    The application block diagram of vehicle intelligent transportation system is shown in Figure 12. After the load terminal completes the monitoring, it encapsulates the monitoring data to be uploaded (such as equipment type, position, voltage, power, switch, monitoring time, etc.), then digitally signs these data in blockchain, and sends the signed data to cloud platform and blockchain system through MQTT. Finally, The client remotely monitors and controls the device through MQTT.

    Figure 12.  Application block diagram of intelligent transportation system.

    The following two sections emphasize the performance index analysis to illustrate the implementation effect of the system and verify the feasibility of this scheme.

    The lightweight blockchain scheme suggested in this paper is significantly different from the existing centralized monitoring system and analyzes the security of the blockchain scheme from the following three aspects.

    ● Decentralization: The decentralized network architecture is adopted in which the transaction information is verified by all nodes, and finally a trusted blockchain is formed. Even if some nodes fail or are attacked by hackers, the failed nodes can still return to normal. The centralized system architecture however, is vulnerable to attacks (such as DDoS attacks, SQL injection attacks, etc.).

    ● Non tamperability: Digital signature can resist forgery attack under random key, so it can not be easily tampered. The fault tolerance performance is improved and the success rate of tampering and modification will be very low in the adoption of DH-FIB encryption algorithm and F-PBFT consensu.

    ● Traceability: The consensus node will verify the authenticity of the transaction. Each F-PBFT block has the hash value of the previous block, which can be traced back to the source Modbus message. When a malicious node deletes or modifies the content of a block, the system can easily restore and trace all transaction data.

    The collection was verified using three methods: the first was manual checking (MAC); the second one was common checking system (CMC)-referred as reading data through a single meter reading software and then checking data through a single image recognition software (such as Baidu cloud recognition) when the data could not be read; and the third one was the Petri parallel system, which was a parallel system of data acquisition and image recognition based on PN.

    The higher the fault tolerance rate of the system, the higher is the transmission efficiency and the lower the fault tolerance rate, the lower is the transmission efficiency. The fault tolerance rates of the three schemes are compared below:

    ● Fault tolerance rate of the data redundancy: Centralized architecture often collects data. For example, a message is transmitted redundantly for three times, and the minority obeys the majority voting is adopted, so the fault tolerance rate is 1/3.

    ● PBFT fault tolerance rate: The common blockchain architecture adopts that if malicious nodes are evenly distributed on each blockchain, when the number of nodes does not exceed 1/3 of the total number of nodes, the consensus result is correct and has no impact on the system output result. The fault tolerance ability of the system is (n−1)/ 3, so the fault tolerance rate is 1/3.

    ● F-PBFT fault tolerance rate: The lightweight blockchain architecture in this paper adopts the F-PBFT consensus algorithm. One message generates three transaction orders, as shown in formula 16. The total fault tolerance is 5*(n−1)/9. Therefore, the fault tolerance is 5/9.

    On comparing the fault tolerance rates of the three schemes in the histogram in Figure 13, it is observed that the fault tolerance rate of F-PBFT has increased by 22.3%.

    Figure 13.  Comparison of fault tolerance of three schemes.

    Three architectures are compared by testing the data transmission time overhead on the load equipment monitoring system with wireless interference namely, 1) Centralized Architecture (CT-A), 2) Ordinary blockchain Architecture (BC-A); 3) Lightweight fuzzy decision blockchain Architecture (LF-BC-A). In the experiment, each Modbus message data contains 20 bytes, and the error code of one byte is randomly set in every three messages. The transmission time is calculated for the number of messages. B10 represents 10 messages, B20 represents 20 messages, and so on. B100 represents 100 messages. Communication parameters: 9600: 8: n: 1 (rate 9600 bps, 8-bit data bits, no parity check, 1-bit stop bit). Test under the same environment. The results are shown in Table 5.

    Table 5.  Time cost of transmitting encrypted data messages (s).
    Architecture B10 B20 B30 B40 B50 B60 B70 B80 B90 B100
    CT-A 1.2 2.2 3.5 4.5 5.6 7.2 9.0 10.0 12.1 14.2
    BC-A 1.1 2.5 3.8 4.8 5.9 8.0 9.5 11.2 13.4 15.0
    LF-BC-A 1.1 2.0 3.1 4.2 5.1 6.3 7.2 8.3 9.1 10.5

     | Show Table
    DownLoad: CSV

    The comparison curve based on Table 5 is shown in Figure 14, which intuitively reflects the time overhead of encrypted data transmission. X-axis represents the number of messages to be transmitted, and y-axis represents the time of message transmission.

    Figure 14.  Time cost curve of transmitting encrypted messages.

    Following observations are made from Figure 14. 1) In the centralized architecture, when the message is found to have error code (the error code can be judged by the check code in the message), the message needs to be retransmitted, so the transmission time of encrypted data is lower than that of the ordinary blockchain and lightweight blockchain in this paper; 2) On the other hand, in case of the PBFT fault tolerance algorithm, the ordinary blockchain architecture is more efficient than the centralized architecture; 3) whereas, in the F-PBFT fault tolerance algorithm, the LF-BC blockchain architecture has lower data transmission time overhead and the highest efficiency. Both theory and experiment prove that the LF-BC blockchain scheme in this paper has high transmission efficiency in the case of wireless interference.

    This sub-section compares the performance of the three architectures by testing on the vehicle intelligent transportation system, combined with six performance indexes: 1) Data flow, 2) Complexity, 3) Fault tolerance, 4) Security, 5) Reliability, 6) Maintainability. The analysis results are shown in Table 6. The inferences are as follows:

    Table 6.  Comparison of three architecture performance indexes.
    Performance index Centralized architecture (CT-A) Blockchain architecture (BC-A) Lightweight blockchain architecture (LF-BC-A)
    Data flow Small Big Medium
    Complexity Small Big Medium
    Fault tolerance Bad Good Best
    Security Bad Good Good
    Reliability Bad Good Good
    Maintainability Easy Not easy Easy

     | Show Table
    DownLoad: CSV

    ● Compared with the ordinary blockchain architecture, the LF-BC blockchain architecture in this paper has smaller scale, easier implementation and less complexity, but the data flow is obviously larger than the centralized architecture.

    ● Further due to the addition of Fibonacci transform on the basis of HD, its security and encryption performance are better.

    ● The above analysis infers that the fault tolerance and reliability of this scheme have significantly improved.

    ● Τhe scheme of this paper is lightweight blockchain, which has small scale and is easier to maintain.

    Based on the above characteristics, the LF-BC blockchain architecture has certain scalability and can be applied to similar industries, such as agricultural food supply chain system, smart grid system, etc.

    This paper proposes a lightweight fuzzy decision blockchain LF-BC scheme based on MQTT and Fibonacci. Through this scheme, the major problem of complex and difficult deployment of blockchain is solved. The reliable communication of the blockchain is realized through MQTT, the LF-BC blockchain is formed by HD algorithm and Fibonacci matrix, which enhances both the security and the fault-tolerance rate by F-PBFT consensus algorithm. Moreover, from the realization of the case under consideration and its comparative analysis of the performance demonstrate the feasibility of this scheme and ensures the sustainable safety of the intelligent transportation system.

    This blockchain LF-BC scheme is a lightweight scheme, which has not been verified in a large-scale system. It has only been applied in an urban on-board intelligent transportation system, and has certain limitations. It is envisaged in future research to expand the application of blockchain based on the combination of HD algorithm and Fibonacci matrix, which not only can be applied to the blockchain scheme of intelligent transportation system, but also useful in other aspects.

    This study was supported by the Natural Science Foundation Project of China (61976118), the Natural Science Foundation Project of Jiangsu Province (BK20180142), and the key topics of the "13th five-year plan" for Education Science in Jiangsu Province (B-b /2020/01/18).

    All authors declare no conflicts of interest in this paper.



    [1] R. J. Barro, J. F. Ursúa, J. Weng, Macroeconomics of the great influenza pandemic, 1918-1920, Res. Econ., 76 (2022), 21–29. https://doi.org/10.1016/j.rie.2022.01.001 doi: 10.1016/j.rie.2022.01.001
    [2] A. K. Chakravarty, Humanitarian response to hurricane disasters: Coordinating flood-risk mitigation with fundraising and relief operations, Nav. Res. Logist., 65 (2018), 275–288. https://doi.org/10.1002/nav.21801 doi: 10.1002/nav.21801
    [3] S. Garry, F. Checchi, Armed conflict and public health: Into the 21st century, J. Public Health, 42 (2020), E287–E297. https://doi.org/10.1093/pubmed/fdz095 doi: 10.1093/pubmed/fdz095
    [4] D. S. Landes, The Wealth and Poverty of Nations: Why Some Are So Rich and Some So Poor, New York: WW Norton, 1999.
    [5] K. Fiscella, P. Franks, Poverty or income inequality as predictor of mortality: Longitudinal cohort study, Br. Med. J., 314 (1997), 1724–1727. https://doi.org/10.1136/bmj.314.7096.1724 doi: 10.1136/bmj.314.7096.1724
    [6] Food and Agriculture Organization of the United Nations (FAO-UN), The state of food security and nutrition in the world 2021, FAO-UN, Rome, 2021. Available from: https://www.fao.org/3/cb4474en/cb4474en.pdf
    [7] C. Lakner, D. G. Mahler, M. Negre, E. B. Prydz, How much does reducing inequality matter for global poverty?, J. Econ. Inequal. , 20 (2022), 559–585. https://doi.org/10.1007/s10888-021-09510-w. doi: 10.1007/s10888-021-09510-w
    [8] R. Bekkers, P. Wiepking, A literature review of empirical studies of philanthropy: Eight mechanisms that drive charitable giving, Nonprof. Volunt. Sec. Q. , 40 (2011), 924–973. https://doi.org/10.1177/0899764010380927 doi: 10.1177/0899764010380927
    [9] R. H. Bremner, Giving: Charity and Philanthropy in History, New York: Routledge, 2017.
    [10] A. Komter, The evolutionary origins of human generosity, Int. Sociol., 25 (2010), 443–464. https://doi.org/10.1177/0268580909360301 doi: 10.1177/0268580909360301
    [11] D. Cohen, O. Lewin-Epstein, M. W. Feldman, Y. Ram, Non-vertical cultural transmission, assortment and the evolution of cooperation, Proc. R. Soc. B, 288 (2021), 20203162. https://doi.org/10.1098/rspb.2020.3162 doi: 10.1098/rspb.2020.3162
    [12] R. Cooper, D. V. DeJong, R. Forsythe, T. W. Ross, Cooperation without reputation: Experimental evidence from prisoner's dilemma games, Game. Econ. Behav., 12 (1996), 187–218. https://doi.org/10.1006/game.1996.0013 doi: 10.1006/game.1996.0013
    [13] S. Buchner, G. Coricelli, B. Greiner, Self-centered and other-regarding behavior in the solidarity game, J. Econ. Behav. Organ., 62 (2007), 293–303. https://doi.org/10.1016/j.jebo.2004.12.006 doi: 10.1016/j.jebo.2004.12.006
    [14] Y. X. Li, X. G. Jin, X. C. Su, F. S. Kong, C. B. Peng, Cooperation and charity in spatial public goods game under different strategy update rules, Physica A, 389 (2010), 1090–1098. https://doi.org/10.1016/j.physa.2009.11.010 doi: 10.1016/j.physa.2009.11.010
    [15] P. H. T. Schimit, L. H. A. Monteiro, A vaccination game based on public health actions and personal decisions, Ecol. Model., 222 (2011), 1651–1655. https://doi.org/10.1016/j.ecolmodel.2011.02.019 doi: 10.1016/j.ecolmodel.2011.02.019
    [16] Y. L. Chuang, T. Chou, M. R. D'Orsogna, A network model of immigration: Enclave formation vs. cultural integration, Netw. Heterog. Media, 14 (2019), 53–77. https://doi.org/10.3934/nhm.2019004 doi: 10.3934/nhm.2019004
    [17] L. B. V. Alves, L. H. A. Monteiro, A spatial evolutionary version of the ultimatum game as a toy model of income distribution, Commun. Nonlinear Sci. Numer. Simul., 76 (2019), 132–137. https://doi.org/10.1016/j.cnsns.2019.02.020 doi: 10.1016/j.cnsns.2019.02.020
    [18] P. Kollock, Social dilemmas: The anatomy of cooperation, Annu. Rev. Sociol., 24 (1998), 183–214. https://doi.org/10.1146/annurev.soc.24.1.183 doi: 10.1146/annurev.soc.24.1.183
    [19] N. M. Gotts, J. G. Polhill, A. N. R. Law, Agent-based simulation in the study of social dilemmas, Artif. Intell. Rev., 19 (2003), 3–92. https://doi.org/10.1023/A:1022120928602 doi: 10.1023/A:1022120928602
    [20] G. Szabó, G. Fáth, Evolutionary games on graphs, Phys. Rep., 446 (2007), 97–216. https://doi.org/10.1016/j.physrep.2007.04.004
    [21] S. Schecter, H. Gintis, Game Theory in Action: an Introduction to Classical and Evolutionary Models, Princeton: Princeton University Press, 2016.
    [22] M. A. Nowak, A. Sasaki, C. Taylor, D. Fudenberg, Emergence of cooperation and evolutionary stability in finite populations, Nature, 428 (2004), 646–650. https://doi.org/10.1038/nature02414 doi: 10.1038/nature02414
    [23] T. Pfeiffer, C. Rutte, T. Killingback, M. Taborsky, S. Bonhoeffer, Evolution of cooperation by generalized reciprocity, Proc. R. Soc. B, 272 (2005), 1115–1120. https://doi.org/10.1098/rspb.2004.2988 doi: 10.1098/rspb.2004.2988
    [24] C. Luo, X. L. Zhang, Y. J. Zheng, Chaotic evolution of prisoner's dilemma game with volunteering on interdependent networks, Commun. Nonlinear Sci. Numer. Simul., 47 (2017), 407–415. https://doi.org/10.1016/j.cnsns.2016.12.004 doi: 10.1016/j.cnsns.2016.12.004
    [25] X. J. Wang, R. Ding, J. H. Zhao, W. M. Chen, The rise and fall of donation behavior through reputation, Chaos Solitons Fractals, 152 (2021), 111405. https://doi.org/10.1016/j.chaos.2021.111405 doi: 10.1016/j.chaos.2021.111405
    [26] C. D. Batson, T. Moran, Empathy-induced altruism in a prisoner's dilemma, Eur. J. Soc. Psychol., 29 (1999), 909–924. https://doi.org/10.1002/(SICI)1099-0992(199911)29:7<909::AID-EJSP965>3.0.CO;2-L doi: 10.1002/(SICI)1099-0992(199911)29:7<909::AID-EJSP965>3.0.CO;2-L
    [27] D. Ariely, Predictably Irrational, Revised and Expanded Edition: the Hidden Forces that Shape our Decisions, New York: Harper Collins, 2010.
    [28] F. C. Brodbeck, K. G. Kugler, J. A. M. Reif, M. A. Maier, Morals matter in economic games, PLoS One, 8 (2013), e81558. https://doi.org/10.1371/journal.pone.0081558 doi: 10.1371/journal.pone.0081558
    [29] S. Kanazawa, L. Fontaine, Intelligent people defect more in a one-shot prisoner's dilemma game, J. Neurosci. Psychol. Econ., 6 (2013), 201–213. https://psycnet.apa.org/doi/10.1037/npe0000010
    [30] G. Spadaro, C. Graf, S. X. Jin, S. Arai, Y. Inoue, et al., Cross-cultural variation in cooperation: a meta-analysis, J. Pers. Soc. Psychol., 123 (2022), 1024–1088, https://doi.org/10.1037/pspi0000389. doi: 10.1037/pspi0000389
    [31] R. Axelrod, The Evolution of Cooperation, New York: Basic Books, 1984.
    [32] M. A. Nowak, R. M. May, Evolutionary chaos and spatial games, Nature, 359 (1992), 826–829. https://doi.org/10.1038/359826a0 doi: 10.1038/359826a0
    [33] D. G. Rand, H. Ohtsuki, M. A. Nowak, Direct reciprocity with costly punishment: generous tit-for-tat prevails, J. Theor. Biol., 256 (2009), 45–57. https://doi.org/10.1016/j.jtbi.2008.09.015 doi: 10.1016/j.jtbi.2008.09.015
    [34] H. Brandt, C. Hauert, K. Sigmund, Punishment and reputation in spatial public goods games, Proc. R. Soc. B, 270 (2003), 1099–1104. https://doi.org/10.1098/rspb.2003.2336 doi: 10.1098/rspb.2003.2336
    [35] J. H. Miller, The coevolution of automata in the repeated prisoner's dilemma, J. Econ. Behav. Organ., 29 (1996), 87–112. https://doi.org/10.1016/0167-2681(95)00052-6 doi: 10.1016/0167-2681(95)00052-6
    [36] W. B. Du, X. B. Cao, L. Zhao, M. B. Hu, Evolutionary games on scale-free networks with a preferential selection mechanism, Physica A, 388 (2009), 4509–4514. https://doi.org/10.1016/j.physa.2009.07.012 doi: 10.1016/j.physa.2009.07.012
    [37] H. L. Wang, C. L. Qian, Corporate philanthropy and corporate financial performance: the roles of stakeholder response and political access, Acad. Manage. J., 54 (2011), 1159–1181. https://doi.org/10.5465/amj.2009.0548 doi: 10.5465/amj.2009.0548
    [38] S. Zulfiqar, Link between corporate philanthropy and corporate financial performance: evidence from Pakistani textile sector, Int. J. Eng. Manage. Sci., 1 (2016), 1–12. https://doi.org/10.21791/IJEMS.2016.1.47 doi: 10.21791/IJEMS.2016.1.47
    [39] J. Lu, X. Liang, H. Wang, Geographical influences on the relationship between corporate philanthropy and corporate financial performance, Reg. Stud., 54 (2020), 660–676. https://doi.org/10.1080/00343404.2019.1668551 doi: 10.1080/00343404.2019.1668551
    [40] D. Reinstein, G. Riener, Reputation and influence in charitable giving: an experiment, Theory Decis., 72 (2012), 221–243. https://doi.org/10.1007/s11238-011-9245-8 doi: 10.1007/s11238-011-9245-8
    [41] S. Konrath, F. Handy, The development and validation of the motives to donate scale, Nonprofit Volunt. Sect. Q., 47 (2018), 347–375. https://doi.org/10.1177/0899764017744894 doi: 10.1177/0899764017744894
    [42] F. Maciel Cardoso, S. Meloni, C. Gracia-Lázaro, A. Antonioni, J. A. Cuesta, A. Sánchez, et al., Framing in multiple public goods games and donation to charities, R. Soc. Open. Sci., 8 (2021), 202117. https://doi.org/10.1098/rsos.202117 doi: 10.1098/rsos.202117
    [43] A. Glazer, K. Konrad, A signaling explanation for charity, Am. Econ. Rev., 86 (1996), 1019–1028. https://www.jstor.org/stable/2118317
    [44] W. T. Harbaugh, The prestige motive for making charitable transfers, Am. Econ. Rev., 88 (1998), 277–282. https://www.jstor.org/stable/116933
    [45] D. C. Ribar, M. O. Wilhelm, Altruistic and joy-of-giving motivations in charitable behavior, J. Polit. Econ., 110 (2002), 425–457. https://doi.org/10.1086/338750 doi: 10.1086/338750
    [46] C. Topalov, Power and charity in New York city during the progressive era: a network analysis, J. Interdiscip. Hist., 50 (2020), 383–425. https://doi.org/10.1162/jinh_a_01447 doi: 10.1162/jinh_a_01447
    [47] M. Omrani, Z. Naji-Azimi, A. Pooya, M. Salari, Optimal location of electronic charity boxes in charity NGOs by proposing a combined mathematical model, Rairo Oper. Res., 55 (2021), 1523–1540. https://doi.org/10.1051/ro/2021071 doi: 10.1051/ro/2021071
    [48] H. Golrang, E. Safari, Applying gamification design to a donation-based crowdfunding platform for improving user engagement, Entertain. Comput., 38 (2021), 100425. https://doi.org/10.1016/j.entcom.2021.100425 doi: 10.1016/j.entcom.2021.100425
    [49] S. Q. Li, X. L. Liu, J. B. Li, The contagion of donation behaviors changes along with the abatement of the COVID-19 pandemic: An intertemporal survey experiment, Front. Psychol., 12 (2021), 585128. https://doi.org/10.3389/fpsyg.2021.585128 doi: 10.3389/fpsyg.2021.585128
    [50] G. Grimalda, N. R. Buchan, O. D. Ozturk, A. C. Pinate, G. Urso, M. B. Brewer, Exposure to COVID-19 is associated with increased altruism, particularly at the local level, Sci. Rep., 11 (2021), 18950. https://doi.org/10.1038/s41598-021-97234-2 doi: 10.1038/s41598-021-97234-2
    [51] S. A. Bin-Nashwan, M. Al-Daihani, H. Abdul-Jabbar, L. H. A. Al-Ttaffi, Social solidarity amid the COVID-19 outbreak: Fundraising campaigns and donors' attitudes, Int. J. Sociol. Soc. Policy, 42 (2022), 232–247. https://doi.org/10.1108/IJSSP-05-2020-0173 doi: 10.1108/IJSSP-05-2020-0173
    [52] S. Wolfram, Cellular Automata and Complexity: Collected Papers, New York: Westview Press, 1994.
    [53] P. P. Wang, X. Q. Zheng, H. Y. Liu, Simulation and forecasting models of COVID-19 taking into account spatio-temporal dynamic characteristics: a review, Front. Public Health, 10 (2022), 1033432. https://doi.org/10.3389/fpubh.2022.1033432 doi: 10.3389/fpubh.2022.1033432
    [54] D. M. Mao, X. Y. Li, D. J. Mu, D. J. Liu, C. Chu, Separated interactive behaviors promote cooperation in the spatial prisoner's dilemma game, Eur. Phys. J. B, 94 (2021), 148. https://doi.org/10.1140/epjb/s10051-021-00118-7 doi: 10.1140/epjb/s10051-021-00118-7
    [55] D. Y. Charcon, L. H. A. Monteiro, A multi-agent system to predict the outcome of a two-round election. Appl. Math. Comput., 386 (2020), 125481. https://doi.org/10.1016/j.amc.2020.125481
    [56] Y. D. Liu, T. N. Zheng, Y. H. Li, Y. Dai, Does the conformity save us when information advantage fails?, Physica A, 549 (2020), 124499. https://doi.org/10.1016/j.physa.2020.124499 doi: 10.1016/j.physa.2020.124499
    [57] F. Vega-Redondo, The evolution of Walrasian behavior, Econometrica, 65 (1997), 375–384. https://doi.org/10.2307/2171898 doi: 10.2307/2171898
    [58] S. Huck, H. T. Normann, J. Oechssler, Learning in Cournot oligopoly-an experiment, Econ. J., 109 (1999), 80–95. https://doi.org/10.1111/1468-0297.00418 doi: 10.1111/1468-0297.00418
    [59] J. Wolberg, Data Analysis Using the Method of Least Squares: Extracting the Most Information from Experiments, Berlin: Springer, 2005.
    [60] H. Rachlin, M. Locey, A behavioral analysis of altruism, Behav. Processes, 87 (2011), 25–33. https://doi.org/10.1016/j.beproc.2010.12.004 doi: 10.1016/j.beproc.2010.12.004
  • This article has been cited by:

    1. B. Sathish, T. P. Anithaashri, 2024, 3193, 0094-243X, 020195, 10.1063/5.0233252
    2. Ali Mohammad Norouzzadeh Gilmolk, Mohammad Reza Aref, Lightweight Image Encryption Using a Novel Chaotic Technique for the Safe Internet of Things, 2024, 17, 1875-6883, 10.1007/s44196-024-00535-3
    3. Jong Hyuk Park, Editorial: Artificial Intelligence-based Security Applications and Services for Smart Cities, 2024, 21, 1551-0018, 7012, 10.3934/mbe.2024307
    4. Yiqin Bao, Qiang Zhao, Jie Sun, Wenbin Xu, Hongbing Lu, An edge cloud and Fibonacci-Diffie-Hellman encryption scheme for secure printer data transmission, 2023, 21, 1551-0018, 96, 10.3934/mbe.2024005
    5. P.S. Akshatha, S.M. Dilip Kumar, MQTT and blockchain sharding: An approach to user-controlled data access with improved security and efficiency, 2023, 4, 20967209, 100158, 10.1016/j.bcra.2023.100158
  • Reader Comments
  • © 2023 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(1778) PDF downloads(70) Cited by(1)

Figures and Tables

Figures(7)  /  Tables(1)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog