D2D Opportunistic Local Content Dissemination Sans Location Sharing

In this paper, we consider the problem of local content dissemination among mobile users via decentralized device-to-device (D2D) communication, where the concerned contents have relevance only within a geographic span centered at their respective location of creation. This has several potential applications, for example, advertising and sharing contents specific to an event. To this end, we propose a scheme for locality-bounded content and information dissemination (LUCID) leveraging opportunistic D2D communications. Unlike other existing works, LUCID innovates by not requiring users to share locations of the centers of localities and, thereby, provides a natural defense against possible location privacy attacks. In this paper, we theoretically characterize the behavior of LUCID for different locality sizes. Moreover, we investigate the extent to which an individual user can attempt to infer the location of a center of a locality, and discuss why that is difficult to achieve. Finally, we also consider an alternative version of LUCID where locations are partially shared. Results of simulation-based performance evaluation indicate that, when compared to an optimal scheme, LUCID can deliver contents to about two-third of the relevant users without requiring any location sharing.

[1]  Vasilis Friderikos,et al.  MOCA: Multiobjective Cell Association for Device-to-Device Communications , 2017, IEEE Transactions on Vehicular Technology.

[2]  Jan Rüth,et al.  Interest-based cloud-facilitated opportunistic networking , 2013, CHANTS '13.

[3]  Srinivasan Seshan,et al.  802.11 user fingerprinting , 2007, MobiCom '07.

[4]  John C. McEachen,et al.  On Location Privacy in LTE Networks , 2017, IEEE Transactions on Information Forensics and Security.

[5]  Chadi Assi,et al.  Disruption-Tolerant Networking: A Comprehensive Survey on Recent Developments and Persisting Challenges , 2012, IEEE Communications Surveys & Tutorials.

[6]  Lawrence Wai-Choong Wong,et al.  An Analysis Framework for Interuser Interference in IEEE 802.15.6 Body Sensor Networks: A Stochastic Geometry Approach , 2016, IEEE Transactions on Vehicular Technology.

[7]  Jiahao Dai,et al.  Analytical Modeling of Resource Allocation in D2D Overlaying Multihop Multichannel Uplink Cellular Networks , 2017, IEEE Transactions on Vehicular Technology.

[8]  Christos V. Verikoukis,et al.  Game theoretic D2D content dissemination in 4G cellular networks , 2014, IEEE Communications Magazine.

[9]  Derya Malak,et al.  Optimal caching for device-to-device content distribution in 5G networks , 2014, 2014 IEEE Globecom Workshops (GC Wkshps).

[10]  Jianwei Huang,et al.  Energy-Aware Cooperative Traffic Offloading via Device-to-Device Cooperations: An Analytical Approach , 2017, IEEE Transactions on Mobile Computing.

[11]  Jiajia Liu,et al.  Smart Attacks against Intelligent Wearables in People-Centric Internet of Things , 2016, IEEE Communications Magazine.

[12]  Halim Yanikomeroglu,et al.  Device-to-device communication in 5G cellular networks: challenges, solutions, and future directions , 2014, IEEE Communications Magazine.

[13]  Robin Kravets,et al.  Locus: a location-based data overlay for disruption-tolerant networks , 2010, CHANTS '10.

[14]  Nei Kato,et al.  On the Outage Probability of Device-to-Device-Communication-Enabled Multichannel Cellular Networks: An RSS-Threshold-Based Perspective , 2016, IEEE Journal on Selected Areas in Communications.

[15]  Sudip Misra,et al.  SeeR: Simulated Annealing-Based Routing in Opportunistic Mobile Networks , 2017, IEEE Transactions on Mobile Computing.

[16]  Tetsuya Takine,et al.  Probabilistic store-carry-forward message delivery based on node density estimation , 2014, 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC).

[17]  Laura Galluccio,et al.  Sociality-Aided New Adaptive Infection Recovery Schemes for Multicast DTNs , 2016, IEEE Transactions on Vehicular Technology.

[18]  Nei Kato,et al.  Device-to-Device Communication in LTE-Advanced Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.

[19]  Abbas Jamalipour,et al.  Stochastic Geometry Study on Device-to-Device Communication as a Disaster Relief Solution , 2016, IEEE Transactions on Vehicular Technology.

[20]  Injong Rhee,et al.  On the levy-walk nature of human mobility , 2011, TNET.

[21]  Chen-Khong Tham,et al.  A spatio-temporal incentive scheme with consumer demand awareness for participatory sensing , 2015, ICC.

[22]  Bharat K. Bhargava,et al.  Secure Dissemination of Video Data in Vehicle-to-Vehicle Systems , 2015, 2015 IEEE 34th Symposium on Reliable Distributed Systems Workshop (SRDSW).

[23]  Nei Kato,et al.  Device-to-Device Communication Overlaying Two-Hop Multi-Channel Uplink Cellular Networks , 2015, MobiHoc.

[24]  Sudip Misra,et al.  Opportunistic Mobile Networks: Advances and Applications , 2016 .

[25]  Sudip Misra,et al.  Named Content Searching in Opportunistic Mobile Networks , 2016, IEEE Communications Letters.

[26]  Nancy A. Lynch,et al.  Virtual Mobile Nodes for Mobile Ad Hoc Networks , 2004, DISC.

[27]  Jörg Ott,et al.  The ONE simulator for DTN protocol evaluation , 2009, SimuTools.

[28]  Milena Radenkovic,et al.  Efficient Location Privacy-Aware Forwarding in Opportunistic Mobile Networks , 2014, IEEE Transactions on Vehicular Technology.

[29]  Gang Qu,et al.  Pass and run: A privacy preserving delay tolerant network communication protocol for CyberVehicles , 2013, 2013 International Conference on Connected Vehicles and Expo (ICCVE).

[30]  Qinghua Li,et al.  Enhancing privacy through caching in location-based services , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[31]  Nei Kato,et al.  Device-to-device communications achieve efficient load balancing in LTE-advanced networks , 2014, IEEE Wireless Communications.

[32]  Jörg Ott,et al.  Floating content: Information sharing in urban areas , 2011, 2011 IEEE International Conference on Pervasive Computing and Communications (PerCom).

[33]  Ravi Mathey,et al.  Content Sharing over Smartphone-Based Delay-Tolerant Networks , 2014 .

[34]  Rachid Guerraoui Distributed Computing: 18th International Conference, DISC 2004, Amsterdam, The Netherlands, October 4-8, 2004. Proceedings (Lecture Notes in Computer Science) , 2004 .

[35]  Zhengguo Sheng Tag-assisted social-aware opportunistic device-to-device sharing for traffic offloading in mobile social networks , 2016, IEEE Wireless Communications.

[36]  Nei Kato,et al.  Replication Control for Ensuring Reliability of Convergecast Message Delivery in Infrastructure-Aided DTNs , 2014, IEEE Transactions on Vehicular Technology.

[37]  Sudip Misra,et al.  Utility-Based Exploration for Performance Enhancement in Opportunistic Mobile Networks , 2016, IEEE Transactions on Computers.

[38]  Marco Fiore,et al.  Temporal connectivity of vehicular networks: The power of store-carry-and-forward , 2015, 2015 IEEE Vehicular Networking Conference (VNC).

[39]  K. Cumanan,et al.  Limited Feedback Scheme for Device-to-Device Communications in 5G Cellular Networks with Reliability and Cellular Secrecy Outage Constraints , 2017, IEEE Transactions on Vehicular Technology.

[40]  Pierangela Samarati,et al.  Location privacy in pervasive computing , 2008 .