Security-Aware Incentives Design for Mobile Device-to-Device Offloading

Device-to-Device (D2D) computation offloading, or D2D offloading, exploits spare computing resources of nearby user devices to enhance mobile computing performance. Its success relies on user participation in costly collaborative service provisioning, thus mandating an incentive mechanism that can compensate for these costs. Although incentive mechanism design has been studied extensively in the literature, this paper considers a more challenging yet less investigated problem in which selfish users are also facing interdependent security risks that depend on the collective behavior of all users. To this end, we build a novel mathematical framework by combining the power of game theory and epidemic theory to investigate the interplay between user incentives and interdependent security risks in D2D offloading, thereby enabling the design of security-aware incentive mechanisms. Our analysis discovers an interesting “less is more” phenomenon: although giving users more incentives promotes more participation, it may harm the network operator’s utility. This is because too much participation may foster persistent security risks and as a result, the effective participation level does not improve.

[1]  Lei Sun,et al.  Exploring device-to-device communication for mobile cloud computing , 2014, 2014 IEEE International Conference on Communications (ICC).

[2]  Mihaela van der Schaar,et al.  Token System Design for Autonomic Wireless Relay Networks , 2013, IEEE Transactions on Communications.

[3]  Min Chen,et al.  On the computation offloading at ad hoc cloudlet: architecture and service modes , 2015, IEEE Communications Magazine.

[4]  Kenji Doya,et al.  Reinforcement Learning in Continuous Time and Space , 2000, Neural Computation.

[5]  Song Guo,et al.  Incentive mechanisms for device-to-device communications , 2015, IEEE Network.

[6]  Paramvir Bahl,et al.  The Case for VM-Based Cloudlets in Mobile Computing , 2009, IEEE Pervasive Computing.

[7]  Dusit Niyato,et al.  A Dynamic Offloading Algorithm for Mobile Computing , 2012, IEEE Transactions on Wireless Communications.

[8]  Caijun Zhong,et al.  Joint Spectrum and Power Allocation for D2D Communications Underlaying Cellular Networks , 2016, IEEE Transactions on Vehicular Technology.

[9]  Mihaela van der Schaar,et al.  To Relay or Not to Relay: Learning Device-to-Device Relaying Strategies in Cellular Networks , 2013, IEEE Transactions on Mobile Computing.

[10]  Wenye Wang,et al.  Can mobile cloudlets support mobile applications? , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[11]  Chonho Lee,et al.  A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..

[12]  Dongman Lee,et al.  A virtual cloud computing provider for mobile devices , 2010, MCS '10.

[13]  Pan Hui,et al.  Have you asked your neighbors? A Hidden Market approach for device-to-device offloading , 2016, 2016 IEEE 17th International Symposium on A World of Wireless, Mobile and Multimedia Networks (WoWMoM).

[14]  Sanjay Shakkottai,et al.  FlashLinQ: A synchronous distributed scheduler for peer-to-peer ad hoc networks , 2010, 2010 48th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[15]  Tapani Ristaniemi,et al.  Collaborative Mobile Clouds: An Energy Efficient Paradigm for Content Sharing , 2018, IEEE Wireless Communications.

[16]  Walid Saad,et al.  Contract-Based Incentive Mechanisms for Device-to-Device Communications in Cellular Networks , 2015, IEEE Journal on Selected Areas in Communications.

[17]  Jeffrey G. Andrews,et al.  An Overview on 3GPP Device-to-Device Proximity Services , 2013, 1310.0116.

[18]  K. B. Letaief,et al.  A Survey on Mobile Edge Computing: The Communication Perspective , 2017, IEEE Communications Surveys & Tutorials.

[19]  G. Mailath,et al.  Repeated Games and Reputations , 2006 .

[20]  P. Van Mieghem,et al.  Virus Spread in Networks , 2009, IEEE/ACM Transactions on Networking.

[21]  Christos Faloutsos,et al.  Epidemic spreading in real networks: an eigenvalue viewpoint , 2003, 22nd International Symposium on Reliable Distributed Systems, 2003. Proceedings..

[22]  Eugene Marinelli,et al.  Hyrax: Cloud Computing on Mobile Devices using MapReduce , 2009 .

[23]  W. O. Kermack,et al.  A contribution to the mathematical theory of epidemics , 1927 .

[24]  Jörg Ott,et al.  Security and Privacy in Device-to-Device (D2D) Communication: A Review , 2017, IEEE Communications Surveys & Tutorials.

[25]  Zhuo Lu,et al.  How can botnets cause storms? Understanding the evolution and impact of mobile botnets , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[26]  Khaled A. Harras,et al.  Friend or Foe? Detecting and Isolating Malicious Nodes in Mobile Edge Computing Platforms , 2015, 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom).

[27]  Tao Zhang,et al.  Fog and IoT: An Overview of Research Opportunities , 2016, IEEE Internet of Things Journal.

[28]  Ellen W. Zegura,et al.  Serendipity: enabling remote computing among intermittently connected mobile devices , 2012, MobiHoc '12.

[29]  Jeffrey O. Kephart,et al.  Directed-graph epidemiological models of computer viruses , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.

[30]  J. Wenny Rahayu,et al.  Mobile cloud computing: A survey , 2013, Future Gener. Comput. Syst..

[31]  G. Mailath,et al.  Repeated Games and Reputations: Long-Run Relationships , 2006 .

[32]  Zhu Han,et al.  Joint scheduling and resource allocation for device-to-device underlay communication , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).

[33]  Qing Wang,et al.  A Survey on Device-to-Device Communication in Cellular Networks , 2013, IEEE Communications Surveys & Tutorials.