Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3317549.3326309acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
poster

Privacy preserving distributed matching for device-to-device IoT communications: poster

Published: 15 May 2019 Publication History
  • Get Citation Alerts
  • Abstract

    Device-to-device (D2D) communication enables machine-type devices (MTD) in Internet-of-Things (IoT) network communicate directly with each other and offload the cellular network. However, it may introduce interference as they share the same spectrum with the other devices that are directly connected to the base station. In this study, we look at the problem of assigning D2D communicating IoT pairs to the IoT devices that are directly connected to the base station such that the overall system throughput is not only maximized but also a stable matching is obtained. Different than previous work, we study many-to-one matching and propose a distributed privacy preserving stable matching process for efficient resource allocation without releasing location information.

    References

    [1]
    Oladayo Bello and Sherali Zeadally. 2016. Intelligent device-to-device communication in the internet of things. IEEE Systems Journal 10, 3 (2016), 1172--1182.
    [2]
    Ismel Brito and Pedro Meseguer. 2005. Distributed stable matching problems. In CP. Springer, 152--166.
    [3]
    Eyuphan Bulut and Ismail Güvenç. 2018. Dynamically Shared Wide-Area Cellular Communication for Hyper-dense IoT Devices. In 2018 IEEE 43rd Conference on Local Computer Networks Workshops (LCN Workshops). IEEE, 64--69.
    [4]
    Yanjiao Chen and Xiaoyan Yin. 2017. Stable Job Assignment for Crowdsourcing. In GLOBECOM 2017--2017 IEEE Global Communications Conference. IEEE, 1--6.
    [5]
    Daquan Feng, Lu Lu, Yi Yuan-Wu, Geoffrey Ye Li, Gang Feng, and Shaoqian Li. 2013. Device-to-device communications underlaying cellular networks. IEEE Transactions on Communications 61, 8 (2013), 3541--3551.
    [6]
    D Gale and L Shapley. 1962. College Admissions and Stability of Marriage. American Mathematicas Monthly, 69, 9--15.
    [7]
    Yunan Gu, Yanru Zhang, Miao Pan, and Zhu Han. 2015. Matching and cheating in device to device communications underlying cellular networks. IEEE Journal on Selected Areas in Communications 33, 10 (2015), 2156--2166.
    [8]
    Yanxiang Jiang, Qiang Liu, Fuchun Zheng, Xiqi Gao, and Xiaohu You. 2016. Energy-efficient joint resource allocation and power control for D2D communications. IEEE Transactions on Vehicular Technology 65, 8 (2016), 6119--6127.
    [9]
    Xingqin Lin, Robert W Heath, and Jeffrey G Andrews. 2015. The interplay between massive MIMO and underlaid D2D networking. IEEE Transactions on Wireless Communications 14, 6 (2015), 3337--3351.
    [10]
    Lingyang Song, Dusit Niyato, Zhu Han, and Ekram Hossain. 2014. Game-theoretic resource allocation methods for device-to-device communication. IEEE Wireless Communications 21, 3 (2014), 136--144.
    [11]
    Fatih Yucel, Kemal Akkaya, and Eyuphan Bulut. 2018. Efficient and Privacy Preserving Supplier Matching for Electric Vehicle Charging. Ad Hoc Networks (2018).

    Index Terms

    1. Privacy preserving distributed matching for device-to-device IoT communications: poster

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        WiSec '19: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks
        May 2019
        359 pages
        ISBN:9781450367264
        DOI:10.1145/3317549
        Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

        Sponsors

        In-Cooperation

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 15 May 2019

        Check for updates

        Author Tags

        1. device-to-device (D2D) communication
        2. internet-of-things (IoT)
        3. matching theory
        4. privacy

        Qualifiers

        • Poster

        Conference

        WiSec '19
        Sponsor:

        Acceptance Rates

        Overall Acceptance Rate 98 of 338 submissions, 29%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • 0
          Total Citations
        • 125
          Total Downloads
        • Downloads (Last 12 months)6
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 09 Aug 2024

        Other Metrics

        Citations

        View Options

        Get Access

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media