96 research outputs found

    Device-to-device communications: a performance analysis in the context of social comparison-based relaying

    Get PDF
    Device-to-device (D2D) communications are recognized as a key enabler of future cellular networks which will help to drive improvements in spectral efficiency and assist with the offload of network traffic. Among the transmission modes of D2D communications are single-hop and relay assisted multi-hop transmission. Relay-assisted D2D communications will be essential when there is an extended distance between the source and destination or when the transmit power of D2D user equipments (UEs) is constrained below a certain level. Although a number of works on relay-assisted D2D communications have been presented in the literature, most of those assume that relay nodes cooperate unequivocally. In reality, this cannot be assumed since there is little incentive to cooperate without a guarantee of future reciprocal behavior. Cooperation is a social behavior that depends on various factors, such as peer comparison, incentives, the cost to the donor and the benefit to the recipient. To incorporate the social behavior of D2D relay nodes, we consider the decision to relay using the donation game based on social comparison and characterize the probability of cooperation in an evolutionary context. We then apply this within a stochastic geometric framework to evaluate the outage probability and transmission capacity of relay assisted D2D communications. Through numerical evaluations, we investigate the performance gap between the ideal case of 100% cooperation and practical scenarios with a lower cooperation probability. It shows that practical scenarios achieve lower transmission capacity and higher outage probability than idealistic network views which assume full cooperation. After a sufficient number of generations, however, the cooperation probability follows the natural rules of evolution and the transmission performance of practical scenarios approach that of the full cooperation case, indicating that all D2D relay nodes adopt the same dominant cooperative strategy based on social comparison, without the need for enforcement by an external authority

    Exploiting Trust Degree for Multiple-Antenna User Cooperation

    Full text link
    For a user cooperation system with multiple antennas, we consider a trust degree based cooperation techniques to explore the influence of the trustworthiness between users on the communication systems. For the system with two communication pairs, when one communication pair achieves its quality of service (QoS) requirement, they can help the transmission of the other communication pair according to the trust degree, which quantifies the trustworthiness between users in the cooperation. For given trust degree, we investigate the user cooperation strategies, which include the power allocation and precoder design for various antenna configurations. For SISO and MISO cases, we provide the optimal power allocation and beamformer design that maximize the expected achievable rates while guaranteeing the QoS requirement. For a SIMO case, we resort to semidefinite relaxation (SDR) technique and block coordinate update (BCU) method to solve the corresponding problem, and guarantee the rank-one solutions at each step. For a MIMO case, as MIMO is the generalization of MISO and SIMO, the similarities among their problem structures inspire us to combine the methods from MISO and SIMO together to efficiently tackle MIMO case. Simulation results show that the trust degree information has a great effect on the performance of the user cooperation in terms of the expected achievable rate, and the proposed user cooperation strategies achieve high achievable rates for given trust degree.Comment: 15 pages,9 figures, to appear in IEEE Transactions on Wireless communication

    Low-latency Data Uploading in D2D-enabled Cellular Networks

    Get PDF
    指導教員:姜 暁

    Security and Privacy in Mobile Computing: Challenges and Solutions

    Get PDF
    abstract: Mobile devices are penetrating everyday life. According to a recent Cisco report [10], the number of mobile connected devices such as smartphones, tablets, laptops, eReaders, and Machine-to-Machine (M2M) modules will hit 11.6 billion by 2021, exceeding the world's projected population at that time (7.8 billion). The rapid development of mobile devices has brought a number of emerging security and privacy issues in mobile computing. This dissertation aims to address a number of challenging security and privacy issues in mobile computing. This dissertation makes fivefold contributions. The first and second parts study the security and privacy issues in Device-to-Device communications. Specifically, the first part develops a novel scheme to enable a new way of trust relationship called spatiotemporal matching in a privacy-preserving and efficient fashion. To enhance the secure communication among mobile users, the second part proposes a game-theoretical framework to stimulate the cooperative shared secret key generation among mobile users. The third and fourth parts investigate the security and privacy issues in mobile crowdsourcing. In particular, the third part presents a secure and privacy-preserving mobile crowdsourcing system which strikes a good balance among object security, user privacy, and system efficiency. The fourth part demonstrates a differentially private distributed stream monitoring system via mobile crowdsourcing. Finally, the fifth part proposes VISIBLE, a novel video-assisted keystroke inference framework that allows an attacker to infer a tablet user's typed inputs on the touchscreen by recording and analyzing the video of the tablet backside during the user's input process. Besides, some potential countermeasures to this attack are also discussed. This dissertation sheds the light on the state-of-the-art security and privacy issues in mobile computing.Dissertation/ThesisDoctoral Dissertation Electrical Engineering 201

    Seed selection for data offloading based on social and interest graphs

    Full text link
    Copyright © 2018 Tech Science Press The explosive growth of mobile data demand is becoming an increasing burden on current cellular network. To address this issue, we propose a solution of opportunistic data offloading for alleviating overloaded cellular traffic. The principle behind it is to select a few important users as seeds for data sharing. The three critical steps are detailed as follows. We first explore individual interests of users by the construction of user profiles, on which an interest graph is built by Gaussian graphical modeling. We then apply the extreme value theory to threshold the encounter duration of user pairs. So, a contact graph is generated to indicate the social relationships of users. Moreover, a contact-interest graph is developed on the basis of the social ties and individual interests of users. Corresponding on different graphs, three strategies are finally proposed for seed selection in an aim to maximize overloaded cellular data. We evaluate the performance of our algorithms by the trace data of real-word mobility. It demonstrates the effectiveness of the strategy of taking social relationships and individual interests into account

    Cooperation Dynamics on Mobile Crowd Networks of Device-to-Device Communications

    Get PDF
    corecore