Papers
Topics
Authors
Recent
Search
2000 character limit reached

Designing Security-Aware Incentives for Computation Offloading via Device-to-Device Communication

Published 11 Nov 2016 in cs.GT and cs.NI | (1611.03841v2)

Abstract: Computation offloading via device-to-device (D2D) communication, or D2D offloading, has recently been proposed to enhance mobile computing performance by exploiting spare computing resources of nearby user devices. The success of D2D offloading relies on user participation in collaborative service provisioning, which incurs extra costs to users providing the service, thus mandating an incentive mechanism that can compensate for these costs. Although incentive mechanism design has been intensively studied in the literature, this paper considers a much more challenging yet less investigated problem in which selfish users are also facing interdependent security risks, such as infectious proximity-based attacks. Security cost is significantly different in nature from conventional service provisioning costs such as energy consumption, since security risks often depend on the collective behavior of all users. To this end, we build a novel mathematical framework by leveraging the combined power of game theory and epidemic theory to investigate the interplay between user incentives and interdependent security risks in D2D offloading, thereby enabling the design of security-aware incentive mechanisms. Our analysis discovers an interesting "less is more" phenomenon: although giving users more incentives promotes more participation, it may harm the network operator's utility. This is because too much participation may foster persistent security risks and as a result, the effective participation level does not improve. Our model and analysis shed new insights on the optimization of D2D offloading networks in the presence of interdependent security risks. Extensive simulations are carried out to verify our analytical conclusions.

Citations (32)

Summary

Paper to Video (Beta)

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Authors (4)

Collections

Sign up for free to add this paper to one or more collections.