Toward trusted, social-aware D2D connectivity: bridging across the technology and sociality realms

Driven by the unprecedented increase of mobile data traffic, D2D communications technology is rapidly moving into the mainstream of the 5G networking landscape. While D2D connectivity originally emerged as a technology enabler for public safety services, it is likely to remain at the heart of the 5G ecosystem by spawning a wide diversity of proximate applications and services. In this work, we argue that the widespread adoption of the direct communications paradigm is unlikely without embracing the concepts of trust and social-aware cooperation between end users and network operators. However, such adoption remains conditional on identifying adequate incentives that engage humans and their connected devices in a plethora of collective activities. To this end, the mission of our research is to advance the vision of social-aware and trusted D2D connectivity, as well as to facilitate its further adoption. We begin by reviewing the various types of underlying incentives with the emphasis on sociality and trust, discuss these factors specifically for humans and for networked devices (machines), and also propose a novel framework allowing construction of much needed incentive-aware D2D applications. Our supportive system-level performance evaluations suggest that trusted and social-aware direct connectivity has the potential to decisively augment network performance. We conclude by outlining the future perspectives of its development across the research and standardization sectors.

[1]  Abdulmotaleb El-Saddik,et al.  Toward Social Internet of Vehicles: Concept, Architecture, and Applications , 2015, IEEE Access.

[2]  Qing Wang,et al.  A Survey on Device-to-Device Communication in Cellular Networks , 2013, IEEE Communications Surveys & Tutorials.

[3]  Satu Jumisko-Pyykkö,et al.  Framing the Context of Use for Mobile HCI , 2010, Int. J. Mob. Hum. Comput. Interact..

[4]  Antonio Iera,et al.  A Constrained Coalition Formation Game for Multihop D2D Content Uploading , 2016, IEEE Transactions on Wireless Communications.

[5]  T. Geisel,et al.  The scaling laws of human travel , 2006, Nature.

[6]  Halim Yanikomeroglu,et al.  User-in-the-loop for hethetnets with backhaul capacity constraints , 2015, IEEE Wireless Communications.

[7]  Zhu Han,et al.  Social-Aware Peer Discovery for D2D Communications Underlaying Cellular Networks , 2015, IEEE Transactions on Wireless Communications.

[8]  Zaher Dawy,et al.  Social Network Aware Device-to-Device Communication in Wireless Networks , 2015, IEEE Transactions on Wireless Communications.

[9]  Luigi Atzori,et al.  Trustworthiness Management in the Social Internet of Things , 2014, IEEE Transactions on Knowledge and Data Engineering.

[10]  S. Parkvall,et al.  LTE release 12 and beyond [Accepted From Open Call] , 2013, IEEE Communications Magazine.

[11]  Andrea Abrardo,et al.  Network coding schemes for D2D communications based relaying for cellular coverage extension , 2017, Trans. Emerg. Telecommun. Technol..

[12]  Sergey D. Andreev,et al.  Securing Network-Assisted Direct Communication: The Case of Unreliable Cellular Connectivity , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.

[13]  Antonio Iera,et al.  The Social Internet of Things (SIoT) - When social networks meet the Internet of Things: Concept, architecture and network characterization , 2012, Comput. Networks.

[14]  Junyi Li,et al.  Network densification: the dominant theme for wireless evolution into 5G , 2014, IEEE Communications Magazine.