148 Hits in 9.2 sec

Investigating Network Services Abstraction in 5G Enabled Device-to-Device (D2D) Communications

Ed Kamya Kiyemba Edris, Mahdi Aiash, Jonathan Loo
2019 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI)  
With a social-aware NDN (sNDN) framework to accomplish efficient cooperative content retrieval is proposed. sNDN is constructed on named data networking value.  ...  Where a novel framework for content delivery in VSNs using D2D communication have been proposed to decrease on traffic load.  ... 
doi:10.1109/smartworld-uic-atc-scalcom-iop-sci.2019.00296 dblp:conf/uic/EdrisAL19 fatcat:k5ynt52pevemnpmmngvyveswli

Trust-Oriented Partner Selection in D2D Cooperative Communications

Junjie Yan, Dapeng Wu, Sunny Sanyal, Ruyan Wang
2017 IEEE Access  
INDEX TERMS D2D cooperative communications, trust evaluations, trust decisions, partner selection. 3444 2169-3536 2017 IEEE. Translations and content mining are permitted for academic research only.  ...  However, when D2D users transmit packets in the manner of cooperative communication, the cooperative users with non-cooperative behavior, such as the selfishness of user, may lead to a sharp decline in  ...  The work in [27] designed a green cooperative D2D communication for the users with non-cooperative behavior based on a social-aware cooperative D2D MAC protocol.  ... 
doi:10.1109/access.2017.2671404 fatcat:ilvic3vp6bfwfdkomccfge2i44

A Survey on Human-Centric Communications in Non-Cooperative Wireless Relay Networks

Behrouz Jedari, Feng Xia, Zhaolong Ning
2018 IEEE Communications Surveys and Tutorials  
The performance of data delivery in wireless relay networks (WRNs), such as delay-tolerant networks and device-to-device communications heavily relies on the cooperation of mobile nodes (i.e., users and  ...  In this paper, we present an in-depth survey on human-centric communication challenges and solutions in the non-cooperative WRNs that focuses on: (1) an overview of the non-cooperative WRNs and introduction  ...  The authors are grateful to the anonymous reviewers for their constructive comments and suggestions to improve the quality of the article.  ... 
doi:10.1109/comst.2018.2791428 fatcat:2v6odowj4rhx5ico7g2i4pk6ne

IEEE Access Special Section Editorial: Recent Advances in Socially-Aware Mobile Networking

Mugen Peng, Lei Yang, Junshan Zhang, Tao Chen, Ulrico Celentano, Juha Roning, Natalia Y. Ermolova, Olav Tirkkonen
2017 IEEE Access  
The paper entitled ''Social-Aware Incentivized Caching for D2D Communications'' by K.  ...  By developing a comprehensive proof-of-concept implementation, the paper proposes an information security protocol suite for secure and trusted social-aware D2D communications.  ... 
doi:10.1109/access.2017.2719138 fatcat:xjen4hlvzner7efxvjmlpjy75m

5G-EECC: Energy-Efficient Collaboration-Based Content Sharing Strategy in Device-to-Device Communication

Nauman Khan, Imran Ali Khan, Jawad Usman Arshed, Mehtab Afzal, Muhammad Masroor Ahmed, Muhammad Arif, Mamoun Alazab
2022 Security and Communication Networks  
Mobile device-to-device (D2D) communication has emerged as a solution to support the growing popularity of multimedia content for local service in next-generation 5G cellular networks.  ...  In this paper, we propose a novel energy-efficient content sharing scheme called Energy-Efficient Collaboration-based Content (EECC) sharing strategy in D2D communication that shares content equally across  ...  In addition, a social-aware K-means clustering method for D2D multicast communication was suggested, which comprised User Entity (UE) clustering and core user selection.  ... 
doi:10.1155/2022/1354238 fatcat:t6a3s5qxrnd2zg7ldxab7u6e3u

Dynamic Trust Associations Over Socially-Aware D2D Technology: A Practical Implementation Perspective

Aleksandr Ometov, Ekaterina Olshannikova, Pavel Masek, Thomas Olsson, Jiri Hosek, Sergey Andreev, Yevgeni Koucheryavy
2016 IEEE Access  
They call for a comprehensive investigation of user sociality and trust factors jointly with the appropriate technology enablers for secure and trusted D2D communications, especially in the situations  ...  In addition, we outline a research roadmap leveraging our technology-related findings to construct a holistic user perspective behind dynamic, social-aware, and trusted D2D applications and services.  ...  More broadly, the proposed socially-aware D2D PoC framework is only a first research step on social trust associations in proximity-based services.  ... 
doi:10.1109/access.2016.2617207 fatcat:5rawinpdhbfzxbirlur2blcqq4

Tag-assisted social-aware opportunistic device-to-device sharing for traffic offloading in mobile social networks

Xiaofei Wang, Zhengguo Sheng, Shusen Yang, Victor C. M. Leung
2016 IEEE wireless communications  
We propose Tag-Assisted Social-Aware D2D sharing framework, TASA, with corresponding optimization models, architecture design, and communication protocols.  ...  M (2016) Tag-assisted social-aware opportunistic device-to-device sharing for traffic offloading in mobile social networks.  ...  In this article, we propose a novel framework to offload cellular traffic via Tag-Assisted Social-Aware (TASA) opportunistic sharing by exploiting D2D communications in MSNs.  ... 
doi:10.1109/mwc.2016.7553027 fatcat:khliceg6j5ao5bbhlpvusspbpm

5G Optimized Caching and Downlink Resource Sharing for Smart Cities

Nguyen-Son Vo, Trung Q. Duong, Mohsen Guizani, Ayse Kortun
2018 IEEE Access  
In [6] , caching has been extended from MBSs to MUs using a social group utility maximization game that exploits the social trust and physical reciprocity of the MUs.  ...  This way, the social group cost, i.e., the incentive to cache in the MUs for D2D communications, is minimized. By jointly caching in the FBSs (or MBSs) and MUs, Jiang et al.  ... 
doi:10.1109/access.2018.2839669 fatcat:3dmwkouak5efdbxkx5244rbvhu

A Sidelink-Aided Approach for Secure Multicast Service Delivery: From Human-Oriented Multimedia Traffic to Machine Type Communications

Sara Pizzi, Chiara Suraci, Antonio Iera, Antonella Molinaro, Giuseppe Araniti
2020 IEEE transactions on broadcasting  
In addition, cyber security and social trustworthiness mechanisms are exploited to secure D2D communications.  ...  To date, group-oriented communications have been mainly exploited for delivering multimedia services in human-oriented communications while, in future fifth generation (5G) cellular networks, objects will  ...  10 meaningful performance improvement it can bring, future research work will be tailored to the definition of a more accurate and realistic model for evaluating nodes' reliability.  ... 
doi:10.1109/tbc.2020.2977512 fatcat:mnxbzdydwfdifbwvxrqx6yid5e

Social-Aware D2D Video Delivery Method based on Mobility Similarity Measurement in 5G Ultra-Dense Network

Ruiling Zhang, Shijie Jia, Youzhong Ma, Changqiao Xu
2020 IEEE Access  
In this paper, we propose a novel Social-Aware D2D Video Delivery Method based on Rapid Sample-Efficient Measurement of Mobility Similarity in 5G Ultra-Dense Network (DMSEM).  ...  INDEX TERMS Social-aware, video delivery, mobility similarity, 5G ultra-dense network, traffic offloading.  ...  Chen et al. proposed a social-trust-aided D2D communication framework by making use of the social trust to promote performance of D2D communication [26] .  ... 
doi:10.1109/access.2020.2980865 fatcat:x4d47is425eodj2g7vgdhrmvsm

Device-to-Device Communications for 5G Internet of Things

L. Militano, G. Araniti, M. Condoluci, I. Farris, A. Iera
2015 EAI Endorsed Transactions on Internet of Things  
In this paper, we thoroughly discuss the added-value features introduced by cellular/noncellular D2D communications and its potential in efficiently fulfilling IoT requirements in 5G networks.  ...  State-of-the-art solutions, enabling radio technologies, and current standardization activities for D2D communications are surveyed and their pros and cons with reference to manifold IoT use cases pointed  ...  Similarly, the higher data rate over D2D links is used for multimedia content dissemination in [41] [42] , and for social-aware video multicasting in [43] .  ... 
doi:10.4108/eai.26-10-2015.150598 fatcat:ulueehvhqndtjjfxj44ec26cca

Recent Advances on Cellular D2D Communications

Boon-Chong Seet, Syed Hasan, Peter Chong
2018 Future Internet  
The authors thank Dario Di Giacomo for his work to optimize the algorithm. Author Contributions: All the authors contributed equally to the paper. R.  ...  Acknowledgments: This work has been supported by a PhD Fee and Stipend Scholarship for Asim Anwar from Acknowledgments: This work was partially supported by the project "GAUChO" funded by Progetti di Ricerca  ...  The Social-Aware Trust Model In our scenario the eNodeB acts as a trusted third party that implements the coalition formation model based on social-aware trustworthiness.  ... 
doi:10.3390/fi10010010 fatcat:hizax5tiazegjovg6p2z3ywt2y

Relay-Assisted D2D Underlay Cellular Network Analysis using Stochastic Geometry: Overview and Future Directions

Oluwatosin Ahmed Amodu, Mohamed Othman, Nor Kamariah Noordin, Idawaty Ahmad
2019 IEEE Access  
Device-to-Device (D2D) communication is one of the enabling technologies for meeting the capacity requirements of the fifth-generation wireless systems (5G).  ...  This motivates the presentation of this paper which in addition to the aforementioned, gives elaborate discussions on promising areas for future research with respect to the recent advancements in D2D  ...  SOCIALLY-AWARE RELAYING From our survey, we discovered that only [161] studied socially-aware relay-assisted D2D communication using SG.  ... 
doi:10.1109/access.2019.2933915 fatcat:pblaggrvdbb5jkwdfb2c63uzwu

Wireless Social Networks: A Survey of Recent Advances, Applications and Challenges

Furqan Jameel, Shurjeel Wyne, Dushantha Nalin K. Jayakody, Georges Kaddoum, Richard O'Kennedy
2018 IEEE Access  
The potential challenges in communication network design are also highlighted, for a successful implementation of social networking strategies.  ...  In fact, the social networking concepts of centrality and community have been investigated for an efficient realization of novel wireless network architectures.  ...  Social relationships and trust are exploited by Social-aware video multiCast (SoCast) [132] to propose a social-aware video multicast system for D2D communications.  ... 
doi:10.1109/access.2018.2872686 fatcat:xgasj62jprfcbldo5uyhf63niq

A Survey on Mobile Edge Networks: Convergence of Computing, Caching and Communications

Shuo Wang, Xing Zhang, Yan Zhang, Lin Wang, Juwo YANG, Wenbo Wang
2017 IEEE Access  
In this survey, we make an exhaustive review on the state-of-the-art research efforts on mobile edge networks.  ...  Next, a comprehensive survey of issues on computing, caching and communication techniques at the network edge is presented respectively.  ...  ACKNOWLEDGMENT The authors would like to thank the editor and the anonymous reviewers for their constructive comments and suggestions, which improve the quality of this paper.  ... 
doi:10.1109/access.2017.2685434 fatcat:omhcphk735czrnmjnwkoory6hq
« Previous Showing results 1 — 15 out of 148 results