2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC) 2017
DOI: 10.1109/iwcmc.2017.7986287
|View full text |Cite
|
Sign up to set email alerts
|

Mobility-assisted device to device communications for Content Transmission

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
7

Relationship

4
3

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 23 publications
0
7
0
Order By: Relevance
“…Particularly, the problem of multi-copy data dissemination with probabilistic delay constraint in opportunistic D2D communication is more challenging problem [71]. The multi-copy content dissemination can be reduced to a single content dissemination to figure out the effect of mobility in D2D communication [196], [197]. The mobility factors comprise of user interaction depending on time and location.…”
Section: E Mobility-aware D2d Content Disseminationmentioning
confidence: 99%
“…Particularly, the problem of multi-copy data dissemination with probabilistic delay constraint in opportunistic D2D communication is more challenging problem [71]. The multi-copy content dissemination can be reduced to a single content dissemination to figure out the effect of mobility in D2D communication [196], [197]. The mobility factors comprise of user interaction depending on time and location.…”
Section: E Mobility-aware D2d Content Disseminationmentioning
confidence: 99%
“…However, the fog nodes are assumed to be constant during interactions with mobile nodes. Moreover, the interactions between mobile node N i , ∀i ∈ N , and fog node F j , ∀j ∈ F are based on inter-contact time, contact rate, and contact duration which is defined as the following definitions [83], [84].…”
Section: A Preliminariesmentioning
confidence: 99%
“…The mobility factors quantify the measurements that capture the level of physical proximity between F j and N i [83], [84]. In result, our simulation is considered on a series of quantities directing to define the similarity in mobility patterns of mobile users.…”
Section: B Mobility Factorsmentioning
confidence: 99%
“…. (6) According to [37], the optimal key generation rate between D2D pair without the involvement of relay nodes is defined as the mutual information (MI) I ( h 1,d1 ; h 1,d2 ) scaled by the channel coherence time T c…”
Section: B System Model and Problem Formulationmentioning
confidence: 99%
“…Therefore, D2D communication is an enabling technology to assist overburdened cellular networks by improving spectrum efficiency, throughput, network coverage and delay [3]. Most of the studies have focused on various technical problems in D2D communication, including mode selection [4], resource allocation [5], [6] and interference management [7]. However, D2D security under the PLS technique in term of key generation, and by leveraging social ties that can unify security solutions is not yet matured [8].…”
Section: Introductionmentioning
confidence: 99%