Social D2D Communications Based on Fog Computing for IoT Applications (Englisch)

Wireless Algorithms, Systems, and Applications, WASA, International Conference on Wireless Algorithms, Systems, and Applications, 12
; 2017
  • Neue Suche nach:

To satisfy the rapidly growing requirements of wireless data services recently, fog computing which is as an extension of cloud computing is proposed for offloading the Internet of Things (IoT) data services and applications. It depends more on the collaboration of near-located devices, instead of sending the information to remote servers. In this paper, we conceive the idea of utilizing Device-to-Device (D2D) communications as the infrastructures for computation and communication. In particular, D2D communication technology is as one of the most important and innovative revolutions in the development of future cellular networks. In computation part, by analyzing the interest difference of users, a Virtual Fog Community (VFC) is established in this paper. In communication part, by perceiving the importance degrees of users and accordingly employing multi-dimensional network status parameters such as the local and global centralities, the best relay user can be reasonably selected based on the physical and social attributes of users. Simulation results show the proposed mechanism fully exploits the social relationship between users and effectively enhances the network operational efficiency at the cost of relatively low delay.

Wie erhalte ich diesen Titel?

Dokumentinformationen


Inhaltsverzeichnis Konferenzband

Das Inhaltsverzeichnis des Konferenzbandes wird automatisch erzeugt, daher kann es lückenhaft sein, obwohl alle Artikel in der TIB verfügbar sind.

1
Simultaneous Wireless Information and Power Transfer for Multi-hop Energy-Constrained Wireless Network
He, Shiming / Xie, Kun / Chen, Weiwei / Zhang, Dafang / Wen, Jigang | 2017
13
Leveraging Scheduling to Minimize the Tardiness of Video Packets Transmission in Maritime Wideband Communication
Yang, Tingting / Cui, Zhengqi / Wang, Rui / Su, Zhou / Wang, Ying | 2017
23
Optimal Power Scheduling for SIC-Based Uplink Wireless Networks with Guaranteed Real-Time Performance
Xu, Chaonong / Ma, Kaichi / Xu, Yida / Xu, Yongjun | 2017
37
A Novel Collision Analysis for Multiple-Subcarrier Frequency-Domain Contention
Zeng, Yu / Zhao, Qinglin | 2017
47
Wi-Dog: Monitoring School Violence with Commodity WiFi Devices
Zhou, Qizhen / Wu, Chenshu / Xing, Jianchun / Li, Juelong / Yang, Zheng / Yang, Qiliang | 2017
60
Energy-Efficient Contact Detection Model in Mobile Opportunistic Networks
Dou, Yueyue / Zeng, Feng / Li, Wenjia | 2017
71
Modeling of Random Dense CSMA Networks
Sun, Yuhong / Song, Tianyi / Jiang, Honglu / Zheng, Jianchao | 2017
83
Throughput Maximization in Multi-User Cooperative Cognitive Radio Networks
Lu, Lei / Li, Wei / Wang, Shengling / Bie, Rongfang / Zhang, Bowu | 2017
96
Load-Balancing Software-Defined Networking Through Hybrid Routing
Zhao, Gongming / Huang, Liusheng / Li, Ziqiang / Xu, Hongli | 2017
109
A New Greedy Algorithm for Constructing the Minimum Size Connected Dominating Sets in Wireless Networks
Luo, Chuanwen / Wang, Yongcai / Yu, Jiguo / Chen, Wenping / Li, Deying | 2017
115
Study on the Impulse Radio mmWave for 5G-Based Vehicle Position
Cui, Xuerong / Li, Juan | 2017
124
Detect SIP Flooding Attacks in VoLTE by Utilizing and Compressing Counting Bloom Filter
Wu, Mingli / Ruan, Na / Ma, Shiheng / Zhu, Haojin / Jia, Weijia / Xue, Qingshui / Wu, Songyang | 2017
136
On Enhancing Energy Efficiency via Elastic Cell-Zooming Algorithm in Three-Tier Heterogeneous Wireless Networks
Xiao, Zhu / Li, Shuangchun / Li, Tong / Wang, Dong | 2017
151
Cooperative Downlink Resource Allocation in 5G Wireless Backhaul Network
Gao, Yuan / Ao, Hong / Zhou, Quan / Zhou, Weigui / Li, Xiangyang / Sun, Yunchuan / Hu, Su / Li, Yi | 2017
161
Spectral Partitioning and Fuzzy C-Means Based Clustering Algorithm for Wireless Sensor Networks
Hu, Jianji / Guo, Songtao / Liu, Defang / Yang, Yuanyuan | 2017
175
Regionalization Compressive Sensing for Optimizing Lifetime of Sensor Networks
Yang, Hao / Xu, Hua / Wang, Xiwei | 2017
185
IEA: An Intermittent Energy Aware Platform for Ultra-Low Powered Energy Harvesting WSN
Zhang, Yang / Gao, Hong / Cheng, Siyao / Cai, Zhipeng / Li, Jianzhong | 2017
198
Scheduling for MU-MIMO Wireless Industrial Sensor Networks
Xia, Changqing / Jin, Xi / Wang, Jintao / Kong, Linghe / Zeng, Peng | 2017
210
Provably Secure Dual-Mode Publicly Verifiable Computation Protocol in Marine Wireless Sensor Networks
Zhang, Kai / Wei, Lifei / Li, Xiangxue / Qian, Haifeng | 2017
220
A Genetic Algorithm Based Mechanism for Scheduling Mobile Sensors in Hybrid WSNs Applications
Zhang, Yaqiang / Zhou, Zhangbing / Zhao, Deng / Sun, Yunchuan / Xue, Xiao | 2017
232
SSD: Signal-Based Signature Distance Estimation and Localization for Sensor Networks
Chen, Pengpeng / Yin, Yuqing / Gao, Shouwan / Niu, Qiang | 2017
244
An Adaptive MAC Protocol for Wireless Rechargeable Sensor Networks
Zhong, Ping / Zhang, Yiwen / Ma, Shuaihua / Gao, Jianliang / Chen, Yingwen | 2017
253
Fair Multi-influence Maximization in Competitive Social Networks
Yu, Ying / Jia, Jinglan / Li, Deying / Zhu, Yuqing | 2017
266
Communities Mining and Recommendation for Large-Scale Mobile Social Networks
Yu, Ruiguo / Wang, Jianrong / Xu, Tianyi / Gao, Jie / Cao, Kunyu / Yu, Mei | 2017
278
Community Verification with Topic Modeling
Wang, Feng / Orton, Ken | 2017
289
M2HAV: A Standardized ICN Naming Scheme for Wireless Devices in Internet of Things
Nour, Boubakr / Sharif, Kashif / Li, Fan / Moungla, Hassine / Liu, Yang | 2017
302
Multidimensional Trust-Based Anomaly Detection System in Internet of Things
Gai, Fangyu / Zhang, Jiexin / Zhu, Peidong / Jiang, Xinwen | 2017
314
Social D2D Communications Based on Fog Computing for IoT Applications
Yan, Junjie / Wu, Dapeng / Wang, Honggang / Wu, Dalei / Wang, Ruyan | 2017
326
Defense Against Advanced Persistent Threats with Expert System for Internet of Things
Hu, Qing / Lv, Shichao / Shi, Zhiqiang / Sun, Limin / Xiao, Liang | 2017
338
QoE Enhancement of Task Scheduling Algorithm for VANET Applications
Ding, Nan / Nie, Shuaihang / Si, Huaiwei / Gao, Huanbo | 2017
344
Ratee-Based Trust Management System for Internet of Vehicles
Gai, Fangyu / Zhang, Jiexin / Zhu, Peidong / Jiang, Xinwen | 2017
356
Achieving Secure and Seamless IP Communications for Group-Oriented Software Defined Vehicular Networks
Lai, Chengzhe / Lu, Rongxing / Zheng, Dong | 2017
369
An Efficient Distributed Randomized Data Replication Algorithm in VANETs
Zhu, Junyu / Huang, Chuanhe / Fan, Xiying / Fu, Bin | 2017
381
Preserving Privacy in Social Networks Against Label Pair Attacks
Liu, Chenyang / Yin, Dan / Li, Hao / Wang, Wei / Yang, Wu | 2017
393
Preserving Local Differential Privacy in Online Social Networks
Gao, Tianchong / Li, Feng / Chen, Yu / Zou, Xukai | 2017
406
Pricing Privacy Leakage in Location-Based Services
Li, Fenghua / Liu, Jiawen / Fang, Liang / Niu, Ben / Geng, Kui / Li, Hui | 2017
419
MAIS: Multiple Activity Identification System Using Channel State Information of WiFi Signals
Feng, Chunhai / Arshad, Sheheryar / Liu, Yonghe | 2017
433
Differentially Private Frequent Itemset Mining from Smart Devices in Local Setting
Zhang, Xinyuan / Huang, Liusheng / Fang, Peng / Wang, Shaowei / Zhu, Zhenyu / Xu, Hongli | 2017
445
3P Framework: Customizable Permission Architecture for Mobile Applications
Biswas, Sujit / Sharif, Kashif / Li, Fan / Liu, Yang | 2017
457
A Bitcoin Based Incentive Mechanism for Distributed P2P Applications
He, Yunhua / Li, Hong / Cheng, Xiuzhen / Liu, Yan / Sun, Limin | 2017
469
An Attribute-Based Secure and Scalable Scheme for Data Communications in Smart Grids
Hu, Chunqiang / Huo, Yan / Ma, Liran / Liu, Hang / Deng, Shaojiang / Feng, Liping | 2017
483
Space Power Synthesis-Based Cooperative Jamming for Unknown Channel State Information
Fan, Xin / Huang, Liang / Huo, Yan / Hu, Chunqiang / Tian, Yuqi / Qian, Jin | 2017
496
Breakdown by Rumors: Vulnerability of D2D Communications from Online Social Networks
Pan, Tianyi / Alim, Md Abdul / Li, Xiang / Thai, My T. | 2017
509
Security Enhancement via Dynamic Fountain Code for Wireless Multicast
Du, Qinghe / Li, Wanyu / Song, Houbing | 2017
522
Accurate Indoor Localization with Multiple Feature Fusion
Xiao, Yalong / Wang, Jianxin / Zhang, Shigeng / Wang, Haodong / Cao, Jiannong | 2017
534
A Power-Efficient Scheme for Outdoor Localization
Yao, Kang / Du, Hongwei / Ye, Qiang / Xu, Wen | 2017
546
Design and Realization of an Indoor Positioning Algorithm Based on Differential Positioning Method
Huang, Wei-Qing / Ding, Chang / Wang, Si-ye / Lin, Junyu / Zhu, Shao-yi / Cui, Yue | 2017
559
A Study on the Second Order Statistics of κ- μ Fading Channels
Chen, Changfang / Shu, Minglei / Wang, Yinglong / Wei, Nuo | 2017
572
Effective Influence Maximization Based on the Combination of Multiple Selectors
Shang, Jiaxing / Wu, Hongchun / Zhou, Shangbo / Liu, Lianchen / Tang, Hongbin | 2017
605
Wireless Image Relay: Prioritized QoE Scheduling with Simplified Space-Time Coding Mode Selection
He, Shuan / Wang, Wei | 2017
617
Software Defined Routing System
Gao, Xianming / Wang, Baosheng / Deng, Wenping | 2017
629
Towards Efficient Multimedia Data Disseminating in Mobile Opportunistic Networks
Liu, Peng / Ding, Yue / Xu, Jia / Fu, Tingting | 2017
641
Job Scheduling Under Differential Pricing: Hardness and Approximation Algorithms
Huang, Qiuyuan / Zhao, Jing / Du, Haohua / Hou, Jiahui / Li, Xiang-Yang | 2017
653
Distributing Negative Messages in VANET Based on Meet-Table and Cloud Computing
Huang, Baohua / Cheng, Wei | 2017
665
CacheRascal: Defending the Flush-Reload Side-Channel Attack in PaaS Clouds
Zhang, Weijuan / Jia, Xiaoqi / Tai, Jianwei / Wang, Mingsheng | 2017
678
Measuring the Declared SDK Versions and Their Consistency with API Calls in Android Apps
Wu, Daoyuan / Liu, Ximing / Xu, Jiayun / Lo, David / Gao, Debin | 2017
691
Employing Smartwatch for Enhanced Password Authentication
Chang, Bing / Liu, Ximing / Li, Yingjiu / Wang, Pingjian / Zhu, Wen-Tao / Wang, Zhan | 2017
704
AIS: An Inaudible Guider in Your Smartphone
Zhou, Xing / Huang, Liusheng / Xu, Yang / Yang, Wei | 2017
716
A Case Study of Usable Security: Usability Testing of Android Privacy Enhancing Keyboard
Ling, Zhen / Borgeest, Melanie / Sano, Chuta / Lin, Sirong / Fadl, Mogahid / Yu, Wei / Fu, Xinwen / Zhao, Wei | 2017
729
Detecting Flooding DDoS Under Flash Crowds Based on Mondrian Forest
Sun, Degang / Yang, Kun / Shi, Zhixin / Wang, Yan | 2017
741
A 3-Layer Method for Analysis of Cooperative Behaviors of Physical Devices in Cyber-Physical Systems
Ren, Gang / Deng, Pan / Yang, Chao | 2017
755
A User Incentive-Based Scheme Against Dishonest Reporting in Privacy-Preserving Mobile Crowdsensing Systems
Yang, Xinyu / Zhao, Cong / Yu, Wei / Yao, Xianghua / Fu, Xinwen | 2017
768
You Can Charge over the Road: Optimizing Charging Tour in Urban Area
Rao, Xunpeng / Yang, Panlong / Yan, Yubo | 2017
780
A HCI Motion Recognition System Based on Channel State Information with Fine Granularity
Yang, Hao / Zhu, Licai / Lv, Weipeng | 2017
791
Broadband Communications for High Speed Trains via NDN Wireless Mesh Network
Wu, Fan / Yang, Wang / Chen, Runtong / Xie, Xinfang | 2017
804
Phishing Website Detection Based on Effective CSS Features of Web Pages
Mao, Jian / Tian, Wenqian / Li, Pei / Wei, Tao / Liang, Zhenkai | 2017
816
A Neural Network Model Based Adaptive Flight Control System
Liang, Jiaqi / Du, Wenwen / Xing, Kai / Zhong, Chunlin | 2017
829
Supporting Producer Mobility via Named Data Networking in Space-Terrestrial Integrated Networks
Liu, Di / Huang, Chuanhe / Chen, Xi / Jia, Xiaohua | 2017
842
Development and Performance Evaluation of Filterbank Multicarrier Systems
Hu, Su / Huang, Yixuan / Jin, Chuanxue / Luo, Qu / Zhang, Jin / Gao, Yuan / Li, Xiangyang | 2017
854
A Location Prediction-based Physical Layer Security Scheme for Suspicious Eavesdroppers
Tian, Yuqi / Huo, Yan / Hu, Chunqiang / Gao, Qinghe / Jing, Tao | 2017
860
Structural Holes Theory-Based Influence Maximization in Social Network
Zhu, Jinghua / Yin, Xuming / Wang, Yake / Li, Jinbao / Zhong, Yingli / Li, Yingshu | 2017
865
Layout Optimization for a Long Distance Wireless Mesh Network: An Industrial Case Study
Wang, Jintao / Jin, Xi / Zeng, Peng / Wang, Zhaowei / Xia, Changqing | 2017
871
Mobility Intention-Based Relationship Inference from Spatiotemporal Data
Yi, Feng / Li, Hong / Wang, Hongtao / Wen, Hui / Sun, Limin | 2017
877
TACD: A Three-Stage Auction Scheme for Cloudlet Deployment in Wireless Access Network
Zhou, Gangqiang / Wu, Jigang / Chen, Long | 2017
883
Recognition of Electro-Magnetic Information Leakage of Computer Based on Multi-image Blind Deconvolution
Yang, Shanjing / Hu, Jianlin / Huang, Weiqing | 2017
890
A Novel On-Line Association Algorithm in Multiple-AP Wireless LAN
Sun, Liang / Wang, Lei / Qin, Zhenquan / Ma, Zehao / Yuan, Zhuxiu | 2017
903
Near-Field Localization Algorithm Based on Sparse Reconstruction of the Fractional Lower Order Correlation Vector
Li, Sen / Lin, Bin / Li, Bing / He, Rongxi | 2017

Ähnliche Titel