منابع مشابه
Coded Caching Clusters with Device-to-Device Communications
We consider a geographically constrained caching community where popular data files are cached on mobile terminals and distributed through Device-to-Device (D2D) communications. Further, to ensure availability, data files are protected against user mobility, or churn, with erasure coding. Communication and storage costs (in units of energy) are considered. We focus on finding the coding method ...
متن کاملOptimizing MDS Coded Caching in Wireless Networks with Device-to-Device Communication
We consider the caching of content in the mobile devices in a wireless network using maximum distance separable (MDS) codes. We focus on a small cell, served by a base station (BS), where mobile devices arrive and depart according to a Poisson birth-death process. Users requesting a particular file download coded symbols from caching devices using device-todevice communication. If additional sy...
متن کاملCooperative Caching Placement in Cognitive Device-to-Device Networks
—Cognitive radio is regarded as a key technique in the fifth generation communication system. We consider that the popular contents can be cached in cognitive mobile users who compose a cognitive Device-to-Device (D2D) network. Cached
متن کاملA Mobile and Fog-based Computing Method to Execute Smart Device Applications in a Secure Environment
With the rapid growth of smart device and Internet of things applications, the volume of communication and data in networks have increased. Due to the network lag and massive demands, centralized and traditional cloud computing architecture are not accountable to the high users' demands and not proper for execution of delay-sensitive and real time applications. To resolve these challenges, we p...
متن کاملEvidently secure device associations
A key problem in mobile and ubiquitous computing is that of setting up an association between a pair of devices so that they may communicate securely over a wireless network. It is particularly important to be able to solve this problem for spontaneous associations, which must not depend on preexisting security values such as certificates, and when the only means of identifying the target devic...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Information Forensics and Security
سال: 2020
ISSN: 1556-6013,1556-6021
DOI: 10.1109/tifs.2019.2940885