2020
DOI: 10.1109/access.2020.2979135
|View full text |Cite
|
Sign up to set email alerts
|

Applying Blockchain Technology for User Incentivization in mmWave-Based Mesh Networks

Abstract: Wireless traffic produced by modern mobile devices displays high temporal and spatial dynamics as users spontaneously engage in collective applications where a significant portion of generated data remains localized. As a result, conventional service provisioning approaches may no longer be sufficient in beyond fifth generation (B5G) systems. The challenge of increased dynamics on the access networks can be mitigated with moving cells. However, the deployment time of these temporary serving entities may lag be… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8

Relationship

5
3

Authors

Journals

citations
Cited by 16 publications
(8 citation statements)
references
References 47 publications
0
8
0
Order By: Relevance
“…The last group is the main focus of this work. The blockchain technology is a potential enabler for different applications executed on personal handheld devices including infrastructure and resource sharing [6,7], exchange of data in untrusted environments [8,9], user incentivization [10][11][12], security and access control [13,14] beyond others.…”
Section: Discussionmentioning
confidence: 99%
“…The last group is the main focus of this work. The blockchain technology is a potential enabler for different applications executed on personal handheld devices including infrastructure and resource sharing [6,7], exchange of data in untrusted environments [8,9], user incentivization [10][11][12], security and access control [13,14] beyond others.…”
Section: Discussionmentioning
confidence: 99%
“…Finally, the limited spectrum becomes one of the drivers for applying underlying Blockchain technology to incentivize mobile users and operators to share underused li-censed spectrum [58] and/or their computational resources to other nodes in need [78]. Those concepts are expected to find their niche on the Edge and Fog paradigms.…”
Section: Internet Of Thingsmentioning
confidence: 99%
“…User incentivization IoT, DA [58], [78] Attracting new users to share limited resources [48] Overcoming barriers between network environments Scalability IoT, DA, GA [11], [38], [79] An increase in the load on the centralized node occurs with an increase in traffic or the number of users All DLT methods, DAG, vDLT, Sharding, Sidechain, and cross-chain Creation of applications, where data exchange is based on the distributed registry principles Identity, security, and data management IoT, IR, GA [28], [45] The identification of an organization's assets (including people, buildings, cars, systems, and information assets) DLT design in system functionality GA [52], [30] Depending on the chosen design, the system may have certain functions.…”
Section: Dlt-based Technical Conceptmentioning
confidence: 99%
“…By changing variables and conditions in the implemented simulation model, researchers can make predictions about the behavior of the simulated system without the need for the actual implementation of the entire system. A computer simulation is commonly used when it is a complicated task to accomplish the system emulation and for emulating the blockchain system as part of more complex environments [ 38 ].…”
Section: Background and Motivationmentioning
confidence: 99%