Data delivery in non-cooperative D2D communication
Existing data delivery protocols in D2D communications mainly assume that mobile nodes willingly participate in data delivery, share their resources with each other, and follow the rules of underlying networking protocols. Nevertheless, rational nodes in real-world scenarios have strategic interactions and may act selfishly for various reasons (such as resource limitations, the lack of interest in data, or social preferences). For example, if a node has limited battery resources or the cost of the network bandwidth delivered by mobile network operators is high, it would not willingly relay data for others until appropriate incentives are provided. Meanwhile, malicious nodes may attack the network in different ways to disturb the normal operation of the data transmission process. An adversary, for example, may drop received messages but produce forged routing metrics or false information with the aim of attracting more messages or decreasing its detection probability. This issue becomes more challenging when colluding attackers boost their metrics to deceive the attack detection systems. Dealing with non-cooperative mobile nodes is very challenging because of the distributed network model and intermittent access of nodes to central authorities.D2D applications
D2D Communications is used for # Local Services: In local service, user data is directly transmitted between the terminals and doesn't involves network side, e.g. social media apps, which are based on proximity service. # Emergency communications: In case of natural disasters like hurricanes, earthquakes etc., the traditional communication network may not work due to the damage caused. Ad hoc network can be established via D2D which could be used for such communication in such situations. # IoT Enhancement: By combining D2D withSee also
* Machine to machine * Peer-to-peerReferences
Wireless networking Telecommunications infrastructure {{telecom-stub