29
Views
0
CrossRef citations to date
0
Altmetric
Research Article

D2D Self Organization in IOT via Triple Modular Redundancy Based MDS Code

, , &

References

  • X. Chen, C. Xu, M. Wang, T. Cao, L. Zhong, and G. M. Muntean, “Optimal coded caching in 5G information-centric device-to-device communications,” in 2018 IEEE Global Communications Conference (GLOBECOM), Abu Dhabi: IEEE, pp. 1–7, 2018.
  • G. Wang, X. Dong, and J. Wu, “Throughput analysis of the cache-enabled device-to-device communication and small base stations assisting in cellular networks,” in 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Exeter: IEEE, pp. 414–21, 2017.
  • M. Nitti, G. A. Stelea, V. Popescu, and M. Fadda, “When social networks meet D2D communications: A survey,” Sensors, Vol. 19, no. 2, pp. 396, 2019.
  • G. Chen, J. Tang, and J. P. Coon, “Optimal routing for multihop social-based D2D communications in the Internet of Things,” IEEE Internet Things J., Vol. 5, no. 3, pp. 1880–9, 2018.
  • R. Wang, J. Yan, D. Wu, H. Wang, and Q. Yang, “Knowledge-centric edge computing based on virtualized D2D communication systems,” IEEE Commun. Mag., Vol. 56, no. 5, pp. 32–8, 2018.
  • Y. Li, Z. Zhang, H. Wang, and Q. Yang, “SERS: Social-aware energy-efficient relay selection in D2D communications,” IEEE Trans. Veh. Technol., Vol. 67, no. 6, pp. 5331–45, 2018.
  • Y. Wang, and L. Wang, “Matching theory-based cooperative secure transmission strategy for social-aware D2D communications,” IEEE Trans. Veh. Technol., Vol. 68, no. 10, pp. 10289–94, 2019.
  • R. Gupta, S. Tanwar, and N. Kumar, “B-IoMV: Blockchain-based onion routing protocol for D2D communication in an IoMV environment beyond 5G,” Veh. Commun., Vol. 33, pp. 100401, 2022.
  • Y. Sun, J. Cao, M. Ma, H. Li, B. Niu, and F. Li, “Privacy-preserving device discovery and authentication scheme for D2D communication in 3GPP 5G HetNet,” in 2019 International Conference on Computing, Networking and Communications (ICNC), Honolulu, HI: IEEE, pp. 425–31, 2019.
  • A. Asadi, Q. Wang, and V. Mancuso, “A survey on device-to-device communication in cellular networks,” IEEE Commun. Surv. Tutorials., Vol. 16, no. 4, pp. 1801–19, 2014.
  • L. Wang, H. Wu, and Z. Han, “Wireless distributed storage in socially enabled D2D communications,” IEEE. Access., Vol. 4, pp. 1971–84, 2016.
  • J. Li, S. Gu, Y. Wang, and Q. Zhang, “Double replication MDS codes for wireless D2D distributed storage networks,” in 2018 10th International Conference on Wireless Communications and Signal Processing (WCSP), Hangzhou: IEEE, pp. 1–6, 2018.
  • Y. Li, S. Gu, Y. Wang, J. Li, and Q. Zhang, “Repairable fountain codes with unequal repairing locality in D2D storage system,” in International Conference on Ad Hoc Networks, St. Malo: Springer, pp. 272–81. 2018.
  • Z. Zhang, X. Guo, and Y. Lin, “Trust management method of D2D communication based on RF fingerprint identification,” IEEE. Access., Vol. 6, pp. 66082–7, 2018.
  • X. Chen, Y. Zhao, Y. Li, X. Chen, N. Ge, and S. Chen, “Social trust aided D2D communications: Performance bound and implementation mechanism,” IEEE J. Sel. Areas Commun., Vol. 36, no. 7, pp. 1593–608, 2018.
  • Y. He, C. Liang, F. R. Yu, and Z. Han, “Trust-based social networks with computing, caching and communications: A deep reinforcement learning approach,” IEEE Trans. Network Sci. Eng., Vol. 7, no. 1, pp. 66–79, 2018.
  • J. Yuan, and X. Li, “A broker-guided trust calculation model for mobile devices of D2D communications,” in 2018 IEEE Symposium on Computers and Communications (ISCC), Natal: IEEE, pp. 1–6. 2018.
  • M. Amanullakhan, M. Usha, and S. Ramesh, “Intrusion detection architecture (IDA) in IOT based security system,” Inter. J. Comput. Eng. Optim., Vol. 01, no. 01, pp. 33–42, 2023.
  • F. Han, X. Wang, and S. Zhao, “Channel-aware D2D-assisted wireless distributed storage systems,” IEEE Internet Things J., Vol. 6, no. 6, pp. 10305–17, 2019.
  • L. Weifeng, Z. Mingqi, X. Jia, C. Siguang, Y. Lijun, and X. Jian, “Cooperative caching game based on social trust for D2D communication networks,” Int. J. Commun. Syst., Vol. 33, no. 9, pp. e4380, 2020.
  • A. P. G. Lopes, and P. R. Gondim, “Low-cost authentication protocol for D2D communication in m-Health with trust evaluation,” Wireless Commun. Mobile Comput. 2020.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.