2017
DOI: 10.1016/j.adhoc.2016.11.008
|View full text |Cite
|
Sign up to set email alerts
|

Abstract: Abstract1 Device-to-Device (D2D) communication is expected to be a key feature supported by 5G networks, especially due to the proliferation of Mobile Edge Computing (MEC), which has a prominent role in reducing network stress by shifting computational tasks from the Internet to the mobile edge. Apart from being part of MEC, D2D can extend cellular coverage allowing users to communicate directly when telecommunication infrastructure is highly congested or absent. This significant departure from the typical cel… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
6
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
10

Relationship

3
7

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 46 publications
(62 reference statements)
0
6
0
Order By: Relevance
“…The authors of this article intend in future research work to enhance the herein-proposed protocol by either incorporating criteria based on well-known algorithms for energy efficiency [ 20 , 21 , 22 ], QoS [ 23 ] and security [ 24 ]. The convergence with game theoretic approaches [ 25 ], and the adaption of the proposed algorithm to standards for IPv6 routing in LLNs [ 26 ] are also under consideration.…”
Section: Discussionmentioning
confidence: 99%
“…The authors of this article intend in future research work to enhance the herein-proposed protocol by either incorporating criteria based on well-known algorithms for energy efficiency [ 20 , 21 , 22 ], QoS [ 23 ] and security [ 24 ]. The convergence with game theoretic approaches [ 25 ], and the adaption of the proposed algorithm to standards for IPv6 routing in LLNs [ 26 ] are also under consideration.…”
Section: Discussionmentioning
confidence: 99%
“…The path selection algorithm (Ahuja, et al 1993) and (Panaousis, et al 2017), determines the path that achieves near-optimum resource utilization for each path from its source to its destination. A path is the set of links and nodes traversed through the network.…”
Section: Path Selection Methodologymentioning
confidence: 99%
“…These papers deploy mathematical optimisation and game theory to derive optimal strategies for the defending (e.g., the manager of the infrastructure to be protected) and attacking agents (e.g., an adversary). Applying game theory to cyber security has been proposed by several works in the literature, e.g., [ 52 , 53 ].…”
Section: Related Workmentioning
confidence: 99%