Security-Aware Incentives Design for Mobile Device-to-Device Offloading

Jie Xu, Lixing Chen

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

Device-to-Device (D2D) computation offloading, or D2D offloading, exploits spare computing resources of nearby user devices to enhance mobile computing performance. Its success relies on user participation in costly collaborative service provisioning, thus mandating an incentive mechanism that can compensate for these costs. Although incentive mechanism design has been studied extensively in the literature, this paper considers a more challenging yet less investigated problem in which selfish users are also facing interdependent security risks that depend on the collective behavior of all users. To this end, we build a novel mathematical framework by combining the power of game theory and epidemic theory to investigate the interplay between user incentives and interdependent security risks in D2D offloading, thereby enabling the design of security-aware incentive mechanisms. Our analysis discovers an interesting “less is more” phenomenon: although giving users more incentives promotes more participation, it may harm the network operator’s utility. This is because too much participation may foster persistent security risks and as a result, the effective participation level does not improve.

Original languageEnglish (US)
Title of host publicationAdvances in Information Security
PublisherSpringer New York LLC
Pages85-114
Number of pages30
DOIs
StatePublished - Jan 1 2019

Publication series

NameAdvances in Information Security
Volume74
ISSN (Print)1568-2633

ASJC Scopus subject areas

  • Information Systems
  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'Security-Aware Incentives Design for Mobile Device-to-Device Offloading'. Together they form a unique fingerprint.

  • Cite this

    Xu, J., & Chen, L. (2019). Security-Aware Incentives Design for Mobile Device-to-Device Offloading. In Advances in Information Security (pp. 85-114). (Advances in Information Security; Vol. 74). Springer New York LLC. https://doi.org/10.1007/978-3-030-10597-6_4