TUTCRIS - Tampereen teknillinen yliopisto

TUTCRIS

Dynamic Trust Associations over Socially-Aware D2D Technology: A Practical Implementation Perspective.

Tutkimustuotosvertaisarvioitu

Standard

Dynamic Trust Associations over Socially-Aware D2D Technology: A Practical Implementation Perspective. / Ometov, Aleksandr; Olshannikova, Ekaterina; Masek, Pavel; Olsson, Thomas; Hosek, Jiri; Andreev, Sergey; Koucheryavy, Yevgeni.

julkaisussa: IEEE Access, Vuosikerta 4, 20.10.2016, s. 7692-7702.

Tutkimustuotosvertaisarvioitu

Harvard

APA

Vancouver

Author

Ometov, Aleksandr ; Olshannikova, Ekaterina ; Masek, Pavel ; Olsson, Thomas ; Hosek, Jiri ; Andreev, Sergey ; Koucheryavy, Yevgeni. / Dynamic Trust Associations over Socially-Aware D2D Technology: A Practical Implementation Perspective. Julkaisussa: IEEE Access. 2016 ; Vuosikerta 4. Sivut 7692-7702.

Bibtex - Lataa

@article{d4d918497bc646b584bdcea3c1a01f9a,
title = "Dynamic Trust Associations over Socially-Aware D2D Technology: A Practical Implementation Perspective.",
abstract = "Today, direct contacts between users are being facilitated by the network-assisted device-to-device (D2D) technology, which employs the omnipresent cellular infrastructure for the purposes of control to facilitate advanced mobile social applications. Together with its undisputed benefits, this novel type of connectivity creates new challenges in constructing meaningful proximity-based services with high levels of user adoption. They call for a comprehensive investigation of user sociality and trust factors jointly with the appropriate technology enablers for secure and trusted D2D communications, especially in the situations where cellular control is not available or reliable at all times. In this article, we study the crucial aspects of social trust associations over proximity-based direct communications technology, with a primary focus on developing a comprehensive proof-of-concept implementation. Our recently-developed prototype delivers rich functionality for dynamic management of security functions in proximate devices, whenever a new device joins a secure group of users or an existing one leaves it. To characterize the behavior of our implemented demonstrator, we evaluate its practical performance in terms of computation and transmission delays from the user perspective. In addition, we outline a research roadmap leveraging our technology-related findings to construct a holistic user perspective behind dynamic, social-aware, and trusted D2D applications and services.",
keywords = "Device-to-device communication, Mobile computing, Mobile communication, Cellular networks, Network security, technology social factors, cryptographic protocols, social network services",
author = "Aleksandr Ometov and Ekaterina Olshannikova and Pavel Masek and Thomas Olsson and Jiri Hosek and Sergey Andreev and Yevgeni Koucheryavy",
year = "2016",
month = "10",
day = "20",
doi = "10.1109/ACCESS.2016.2617207",
language = "English",
volume = "4",
pages = "7692--7702",
journal = "IEEE Access",
issn = "2169-3536",
publisher = "Institute of Electrical and Electronics Engineers",

}

RIS (suitable for import to EndNote) - Lataa

TY - JOUR

T1 - Dynamic Trust Associations over Socially-Aware D2D Technology: A Practical Implementation Perspective.

AU - Ometov, Aleksandr

AU - Olshannikova, Ekaterina

AU - Masek, Pavel

AU - Olsson, Thomas

AU - Hosek, Jiri

AU - Andreev, Sergey

AU - Koucheryavy, Yevgeni

PY - 2016/10/20

Y1 - 2016/10/20

N2 - Today, direct contacts between users are being facilitated by the network-assisted device-to-device (D2D) technology, which employs the omnipresent cellular infrastructure for the purposes of control to facilitate advanced mobile social applications. Together with its undisputed benefits, this novel type of connectivity creates new challenges in constructing meaningful proximity-based services with high levels of user adoption. They call for a comprehensive investigation of user sociality and trust factors jointly with the appropriate technology enablers for secure and trusted D2D communications, especially in the situations where cellular control is not available or reliable at all times. In this article, we study the crucial aspects of social trust associations over proximity-based direct communications technology, with a primary focus on developing a comprehensive proof-of-concept implementation. Our recently-developed prototype delivers rich functionality for dynamic management of security functions in proximate devices, whenever a new device joins a secure group of users or an existing one leaves it. To characterize the behavior of our implemented demonstrator, we evaluate its practical performance in terms of computation and transmission delays from the user perspective. In addition, we outline a research roadmap leveraging our technology-related findings to construct a holistic user perspective behind dynamic, social-aware, and trusted D2D applications and services.

AB - Today, direct contacts between users are being facilitated by the network-assisted device-to-device (D2D) technology, which employs the omnipresent cellular infrastructure for the purposes of control to facilitate advanced mobile social applications. Together with its undisputed benefits, this novel type of connectivity creates new challenges in constructing meaningful proximity-based services with high levels of user adoption. They call for a comprehensive investigation of user sociality and trust factors jointly with the appropriate technology enablers for secure and trusted D2D communications, especially in the situations where cellular control is not available or reliable at all times. In this article, we study the crucial aspects of social trust associations over proximity-based direct communications technology, with a primary focus on developing a comprehensive proof-of-concept implementation. Our recently-developed prototype delivers rich functionality for dynamic management of security functions in proximate devices, whenever a new device joins a secure group of users or an existing one leaves it. To characterize the behavior of our implemented demonstrator, we evaluate its practical performance in terms of computation and transmission delays from the user perspective. In addition, we outline a research roadmap leveraging our technology-related findings to construct a holistic user perspective behind dynamic, social-aware, and trusted D2D applications and services.

KW - Device-to-device communication

KW - Mobile computing

KW - Mobile communication

KW - Cellular networks

KW - Network security

KW - technology social factors

KW - cryptographic protocols

KW - social network services

U2 - 10.1109/ACCESS.2016.2617207

DO - 10.1109/ACCESS.2016.2617207

M3 - Article

VL - 4

SP - 7692

EP - 7702

JO - IEEE Access

JF - IEEE Access

SN - 2169-3536

ER -