NB-IoT for D2D-Enhanced Content Uploading with Social Trustworthiness in 5G Systems

Future fifth-generation (5G) cellular systems are set to give a strong boost to the large-scale deployment of Internet of things (IoT). In the view of a future converged 5G-IoT infrastructure, cellular IoT solutions such as narrowband IoT (NB-IoT) and device-to-device (D2D) communications are key technologies for supporting IoT scenarios and applications. However, some open issues still need careful investigation. An example is the risk of threats to privacy and security when IoT mobile services rely on D2D communications. To guarantee efficient and secure connections to IoT services involving exchange of sensitive data, reputation-based mechanisms to identify and avoid malicious devices are fast gaining ground. In order to tackle the presence of malicious nodes in the network, this paper introduces reliability and reputation notions to model the level of trust among devices engaged in an opportunistic hop-by-hop D2D-based content uploading scheme. To this end, social awareness of devices is considered as a means to enhance the identification of trustworthy nodes. A performance evaluation study shows that the negative effects due to malicious nodes can be drastically reduced by adopting the proposed solution. The performance metrics that proved to benefit from the proposed solution are data loss, energy consumption, and content uploading time.

[1]  Aleksandr Ometov,et al.  Toward trusted, social-aware D2D connectivity: bridging across the technology and sociality realms , 2016, IEEE Wireless Communications.

[2]  Christos V. Verikoukis,et al.  Multi-Player Game Theoretic MAC Strategies for Energy Efficient Data Dissemination , 2014, IEEE Transactions on Wireless Communications.

[3]  Haitian Pang,et al.  Propagation- and Mobility-Aware D2D Social Content Replication , 2017, IEEE Transactions on Mobile Computing.

[4]  Luigi Atzori,et al.  Trustworthiness Management in the Social Internet of Things , 2014, IEEE Transactions on Knowledge and Data Engineering.

[5]  Jiangzhou Wang,et al.  On Consideration of Content Preference and Sharing Willingness in D2D Assisted Offloading , 2017, IEEE Journal on Selected Areas in Communications.

[6]  Christos V. Verikoukis,et al.  Green Cooperative Device–to–Device Communication: a Social–Aware Perspective , 2016, IEEE Access.

[7]  Rodrigo Roman,et al.  Securing the Internet of Things , 2017, Smart Cards, Tokens, Security and Applications, 2nd Ed..

[8]  Sanjeev Jain,et al.  A survey on device-to-device (D2D) communication: Architecture and security issues , 2017, J. Netw. Comput. Appl..

[9]  Hsiao-Hwa Chen,et al.  Intracluster Device-to-Device Relay Algorithm With Optimal Resource Utilization , 2013, IEEE Transactions on Vehicular Technology.

[10]  Antonio Iera,et al.  The Social Internet of Things (SIoT) - When social networks meet the Internet of Things: Concept, architecture and network characterization , 2012, Comput. Networks.

[11]  Olga Galinina,et al.  Understanding the IoT connectivity landscape: a contemporary M2M radio technology roadmap , 2015, IEEE Communications Magazine.

[12]  Christos V. Verikoukis,et al.  Game theoretic D2D content dissemination in 4G cellular networks , 2014, IEEE Communications Magazine.

[13]  Capillary networks – a smart way to get things connected , 2014 .

[14]  Antonio Manzalini,et al.  Horizon 2020 and Beyond: On the 5G Operating System for a True Digital Society , 2015, IEEE Vehicular Technology Magazine.

[15]  Nizar Zorba,et al.  Cross-Network Performance Analysis of Network Coding Aided Cooperative Outband D2D Communications , 2017, IEEE Transactions on Wireless Communications.

[16]  Robert W. Heath,et al.  Five disruptive technology directions for 5G , 2013, IEEE Communications Magazine.

[17]  Tara Ali-Yahiya,et al.  Interference mitigation by dynamic self-power control in femtocell scenarios in LTE networks , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[18]  Luigi Alfredo Grieco,et al.  Security, privacy and trust in Internet of Things: The road ahead , 2015, Comput. Networks.

[19]  Yueming Cai,et al.  Social-Aware Rate Based Content Sharing Mode Selection for D2D Content Sharing Scenarios , 2017, IEEE Transactions on Multimedia.

[20]  Shangguang Wang,et al.  An overview of Internet of Vehicles , 2014, China Communications.

[21]  Hui Tian,et al.  Social-Aware Resource Allocation for Content Dissemination Networks: An Evolutionary Game Approach , 2017, IEEE Access.

[22]  Antonio Iera,et al.  A Constrained Coalition Formation Game for Multihop D2D Content Uploading , 2016, IEEE Transactions on Wireless Communications.

[23]  Romano Fantacci,et al.  A network architecture solution for efficient IOT WSN backhauling: challenges and opportunities , 2014, IEEE Wireless Communications.

[24]  Morris Sloman,et al.  Trust Management Tools for Internet Applications , 2003, iTrust.

[25]  Sherali Zeadally,et al.  Intelligent Device-to-Device Communication in the Internet of Things , 2016, IEEE Systems Journal.

[26]  Antonio Iera,et al.  Trusted D2D-based data uploading in in-band narrowband-IoT with social awareness , 2016, 2016 IEEE 27th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[27]  Antonio Iera,et al.  Device-to-Device Communications for 5G Internet of Things , 2015, IOT 2015.

[28]  M. Nitti,et al.  Exploiting Social Internet of Things Features in Cognitive Radio , 2016, IEEE Access.

[29]  Aleksandr Ometov,et al.  Dynamic Trust Associations Over Socially-Aware D2D Technology: A Practical Implementation Perspective , 2016, IEEE Access.