2016 IEEE International Conference on Mobile Services (MS) 2016
DOI: 10.1109/mobserv.2016.41
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Social Trust Associations over D2D Communications: An Implementation Perspective

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
3

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 23 publications
0
2
0
Order By: Relevance
“…Jointly considering the selfish D2D-Txs and dynamic network states, some selfishness management schemes have been studied for efficient resource allocation in wireless networks. A dynamic social trust associations protocol was designed in [21] to deal with the presence of selfish D2D-Txs over D2D communications, while it just paid attention to the trust's aggregation based on the observation. Markov Decision Process (MDP) as one of the dynamic programming method, was employed in [22] to map D2D-Txs' discrete resource states onto its selfishness levels for D2D communications.…”
Section: Related Workmentioning
confidence: 99%
“…Jointly considering the selfish D2D-Txs and dynamic network states, some selfishness management schemes have been studied for efficient resource allocation in wireless networks. A dynamic social trust associations protocol was designed in [21] to deal with the presence of selfish D2D-Txs over D2D communications, while it just paid attention to the trust's aggregation based on the observation. Markov Decision Process (MDP) as one of the dynamic programming method, was employed in [22] to map D2D-Txs' discrete resource states onto its selfishness levels for D2D communications.…”
Section: Related Workmentioning
confidence: 99%
“…In a nutshell, the considered D2D system is built upon the advanced security protocols described in [24]. It is intended to be managed by the server operating inside the LTE infrastructure as well as previously described in our past work [25]. To this end, the mobile users may establish and utilize a direct link only if they have a reliable connection to the D2D server that is responsible for the key and connection management [26].…”
Section: Implementing a Secure D2d Frameworkmentioning
confidence: 99%