skip to main content
10.1145/3317549.3326309acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
poster

Privacy preserving distributed matching for device-to-device IoT communications: poster

Published: 15 May 2019 Publication History

Abstract

Device-to-device (D2D) communication enables machine-type devices (MTD) in Internet-of-Things (IoT) network communicate directly with each other and offload the cellular network. However, it may introduce interference as they share the same spectrum with the other devices that are directly connected to the base station. In this study, we look at the problem of assigning D2D communicating IoT pairs to the IoT devices that are directly connected to the base station such that the overall system throughput is not only maximized but also a stable matching is obtained. Different than previous work, we study many-to-one matching and propose a distributed privacy preserving stable matching process for efficient resource allocation without releasing location information.

References

[1]
Oladayo Bello and Sherali Zeadally. 2016. Intelligent device-to-device communication in the internet of things. IEEE Systems Journal 10, 3 (2016), 1172--1182.
[2]
Ismel Brito and Pedro Meseguer. 2005. Distributed stable matching problems. In CP. Springer, 152--166.
[3]
Eyuphan Bulut and Ismail Güvenç. 2018. Dynamically Shared Wide-Area Cellular Communication for Hyper-dense IoT Devices. In 2018 IEEE 43rd Conference on Local Computer Networks Workshops (LCN Workshops). IEEE, 64--69.
[4]
Yanjiao Chen and Xiaoyan Yin. 2017. Stable Job Assignment for Crowdsourcing. In GLOBECOM 2017--2017 IEEE Global Communications Conference. IEEE, 1--6.
[5]
Daquan Feng, Lu Lu, Yi Yuan-Wu, Geoffrey Ye Li, Gang Feng, and Shaoqian Li. 2013. Device-to-device communications underlaying cellular networks. IEEE Transactions on Communications 61, 8 (2013), 3541--3551.
[6]
D Gale and L Shapley. 1962. College Admissions and Stability of Marriage. American Mathematicas Monthly, 69, 9--15.
[7]
Yunan Gu, Yanru Zhang, Miao Pan, and Zhu Han. 2015. Matching and cheating in device to device communications underlying cellular networks. IEEE Journal on Selected Areas in Communications 33, 10 (2015), 2156--2166.
[8]
Yanxiang Jiang, Qiang Liu, Fuchun Zheng, Xiqi Gao, and Xiaohu You. 2016. Energy-efficient joint resource allocation and power control for D2D communications. IEEE Transactions on Vehicular Technology 65, 8 (2016), 6119--6127.
[9]
Xingqin Lin, Robert W Heath, and Jeffrey G Andrews. 2015. The interplay between massive MIMO and underlaid D2D networking. IEEE Transactions on Wireless Communications 14, 6 (2015), 3337--3351.
[10]
Lingyang Song, Dusit Niyato, Zhu Han, and Ekram Hossain. 2014. Game-theoretic resource allocation methods for device-to-device communication. IEEE Wireless Communications 21, 3 (2014), 136--144.
[11]
Fatih Yucel, Kemal Akkaya, and Eyuphan Bulut. 2018. Efficient and Privacy Preserving Supplier Matching for Electric Vehicle Charging. Ad Hoc Networks (2018).

Index Terms

  1. Privacy preserving distributed matching for device-to-device IoT communications: poster

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      WiSec '19: Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks
      May 2019
      359 pages
      ISBN:9781450367264
      DOI:10.1145/3317549
      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Sponsors

      In-Cooperation

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 15 May 2019

      Check for updates

      Author Tags

      1. device-to-device (D2D) communication
      2. internet-of-things (IoT)
      3. matching theory
      4. privacy

      Qualifiers

      • Poster

      Conference

      WiSec '19
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 98 of 338 submissions, 29%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 125
        Total Downloads
      • Downloads (Last 12 months)6
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 26 Dec 2024

      Other Metrics

      Citations

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media