2014
DOI: 10.1145/2581555.2581560
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive role switching for fair and efficient battery usage in device-to-device communication

Abstract: By leveraging device-to-device communication, opportunistic networks promise to complement infrastructure-based networks, by enabling communication in remote areas or during disaster and emergency situations, as well as by giving rise to novel applications, such as location-based sharing. Yet, to become feasible in practice and accepted by users, it is crucial that opportunistic communication be energy-efficient. Through extensive and detailed measurements and analysis, we show in this paper, that al… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2015
2015
2017
2017

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 18 publications
(13 citation statements)
references
References 16 publications
0
13
0
Order By: Relevance
“…To discover communication opportunities without the aid of an infrastructure, the mobile devices need to continuously advertise their presence in the network. With the available technologies, this operation is too power-hungry for the limited battery capacity of modern smartphones [5].…”
Section: Introductionmentioning
confidence: 99%
“…To discover communication opportunities without the aid of an infrastructure, the mobile devices need to continuously advertise their presence in the network. With the available technologies, this operation is too power-hungry for the limited battery capacity of modern smartphones [5].…”
Section: Introductionmentioning
confidence: 99%
“…In its reduced form, DiscoverFriends' model can be simplified as target nodes do not serve as intermediary nodes for other target nodes as shown in Figure 2. However, during prolonged application usage, it may be energy efficient [14,15] to pass group ownership to a target node (i.e., x1) once the secure environment has been set up. This sets the need for an efficient key management scheme specifically designed for MANETs.…”
Section: Digital Signature and Key Managementmentioning
confidence: 99%
“…While Bluetooth is not the main technology used in the thesis, we provide few references to interesting studies [67,84,155,183,242]. These can be used to add Bluetooth models to EnergyBox.…”
Section: Bluetoothmentioning
confidence: 99%
“…Mobile device clusters are often formed using WiFi software access points (SoftAP) or other technologies such as Bluetooth, and thus comparing the energy footprint of the different technologies used for D2D is important [155,242]. Improving the energy efficiency of the device that creates the SoftAPs has been studied by researchers [41,94,117,228].…”
Section: Network Level Techniquesmentioning
confidence: 99%