2020
DOI: 10.1109/tii.2019.2951009
|View full text |Cite
|
Sign up to set email alerts
|

Social-Aware Incentive Mechanisms for D2D Resource Sharing in IIoT

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
14
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 60 publications
(14 citation statements)
references
References 27 publications
0
14
0
Order By: Relevance
“…The efficient security algorithm for constrained IoT devices would be useful in aiding such low cost client side encryption and secure provisioning of these devices to the cloud. On another front, resources sharing mechanism in the IoT domain where resource constrained IoT devices can offload computationally intensive resources to resource-rich ones in order to achieve high quality of experience is encouraged in [15]. Accordingly, more complex scenarios of the use case of the proposed power efficient algorithm can be explored to leverage these efforts, and use the algorithm for resource constrained devices while adapting to the standard algorithm for the resource rich scenarios.…”
Section: Discussion and Conclusion A Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…The efficient security algorithm for constrained IoT devices would be useful in aiding such low cost client side encryption and secure provisioning of these devices to the cloud. On another front, resources sharing mechanism in the IoT domain where resource constrained IoT devices can offload computationally intensive resources to resource-rich ones in order to achieve high quality of experience is encouraged in [15]. Accordingly, more complex scenarios of the use case of the proposed power efficient algorithm can be explored to leverage these efforts, and use the algorithm for resource constrained devices while adapting to the standard algorithm for the resource rich scenarios.…”
Section: Discussion and Conclusion A Discussionmentioning
confidence: 99%
“…The projection of the Internet of Things (IoT) technology is to give every real object a virtual reality, bringing about an unprecedented connectivity of things more than ever before. In the years ahead, the Internet of Things will have major impact on business models [3]- [7], agriculture [8], [9], transportation [10]- [12], automated industrial processes [13]- [15], homes [16], [17], infrastructure, security, trade standards, and much more. However, as interesting and promising as the projection of the complete actualization of the IoT technology sounds, this advancement is going to be closely accompanied by myriads of challenges -including security.…”
mentioning
confidence: 99%
“…The sets of workers that have provided computing services for the MSP P i and recommender r are denoted as Γ (P i ) and Γ (r), respectively. Then, b i→r is expressed as [26]…”
Section: Worker Selection Based On Reputation Model and Coalition Gamementioning
confidence: 99%
“…Fortunately, the e-healthcare system integrated with the mobile social internet of things (MSIoTs) [9], [10] is envisioned to realize resource-constrained targeted vaccination. Mobile users' health data collected by the e-healthcare system can be analyzed to track the outbreak of an infectious disease.…”
Section: Introductionmentioning
confidence: 99%