Abstract
Device-to-Device (D2D) content delivery is a new approach to directly exchange content between mobile devices, which allows to offload traffic from infrastructure-based networks and thus reduces the risk of congestion. While centralized D2D approaches rely on the mobile operator to discover nearby devices and initiate a content transfer, in decentralized D2D the devices autonomously and opportunistically organize themselves to deliver content to each other. The latter approach is more flexible as it does not depend on a single operator, however, it typically requires more energy for scanning other devices. Another issue is privacy, since the decentralized approach reveals a user’s interest for content to all devices in proximity. Therefore, this paper sketches an new approach towards decentralized energy- and privacy-aware D2D content delivery. The proposed approach addresses the energy loss that occurs when constantly and spontaneously scanning multiple unknown devices for content. Furthermore, the paper identifies privacy requirements and proposes first steps towards a privacy-aware D2D solution.
Chapter PDF
Similar content being viewed by others
Keywords
References
Bao, X., Lee, U., Rimac, I., Choudhury, R.R.: DataSpotting: Offloading Cellular Traffic via Managed Device-to-Device Data Transfer at Data Spots. SIGMOBILE 14(3), 37–39 (2010)
Bao, X., Lin, Y., Lee, U., Rimac, I., Choudhury, R.R.: DataSpotting: Exploiting Naturally Clustered Mobile Devices to Offload Cellular Traffic. In: IEEE INFOCOM, pp. 420–424 (2013)
Boldrini, C., Conti, M., Passarella, A.: ContentPlace: Social-Aware Data Dissemination in Opportunistic Networks. In: MSWiM, pp. 203–210 (2008)
Choi, B.J., Shen, X.: Adaptive Asynchronous Sleep Scheduling Protocols for Delay Tolerant Networks. IEEE Transactions on Mobile Computing 10(9), 1283–1296 (2011)
Drula, C., Amza, C., Rousseau, F., Duda, A.: Adaptive Energy Conserving Algorithms for Neighbor Discovery in Opportunistic Bluetooth Networks. IEEE Journal on Selected Areas in Communications 25(1), 96–107 (2007)
Golrezaei, N., Dimakis, A., Molisch, A., Caire, G.: Wireless Video Content Delivery through Distributed Caching and Peer-to-Peer Gossiping. In: ASILOMAR, pp. 1177–1180 (2011)
IEEE Computer Society: IEEE Standard for Information Technology – Telecommunications and Information Exchange between Systems – Local and Metropolitan Area Networks – Specific Requirements – Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. IEEE Std 802.11-2012 (2012)
Jiang, J.R., Tseng, Y.C., Hsu, C.S., Lai, T.H.: Quorum-based Asynchronous Power-Saving Protocols for IEEE 802.11 Ad Hoc Networks. Mobile Networks and Applications 10(1-2), 169–181 (2005)
Lilien, L., Kamal, Z.H., Bhuse, V., Gupta, A.: Opportunistic Networks: The Concept and Research Challenges in Privacy and Security. In: WSPWN, pp. 134–147 (2006)
Ma, Y., Jamalipour, A.: A Cooperative Cache-based Content Delivery Framework for Intermittently Connected Mobile Ad Hoc Networks. IEEE Transactions on Wireless Communications 9(1), 366–373 (2010)
Shikfa, A., Onen, M., Molva, R.: Privacy in Content-based Opportunistic Networks. In: WAINA, pp. 832–837 (2009)
Wang, W., Motani, M., Srinivasan, V.: Opportunistic Energy-efficient Contact Probing in Delay-Tolerant Applications. IEEE/ACM Transactions on Networking 17(5), 1592–1605 (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 International Federation for Information Processing
About this paper
Cite this paper
Nobach, L., Hausheer, D. (2014). Towards Decentralized, Energy- and Privacy-Aware Device-to-Device Content Delivery. In: Sperotto, A., Doyen, G., Latré, S., Charalambides, M., Stiller, B. (eds) Monitoring and Securing Virtualized Networks and Services. AIMS 2014. Lecture Notes in Computer Science, vol 8508. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43862-6_16
Download citation
DOI: https://doi.org/10.1007/978-3-662-43862-6_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-43861-9
Online ISBN: 978-3-662-43862-6
eBook Packages: Computer ScienceComputer Science (R0)