Maintaining Integrity and Reputation in Content Offloading

被引:0
|
作者
Zimmermann, Torsten [1 ]
Rueth, Jan [1 ]
Wirtz, Hanno [1 ]
Wehrle, Klaus [1 ]
机构
[1] Rhein Westfal TH Aachen, Chair Commun & Distributed Syst, Aachen, Germany
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The growing demand for mobile content has increased the burden on cellular network providers. To this end, mobile content offloading approaches aim to offer a relief of overloaded cellular network infrastructures via local content exchanges between mobile devices. A core assumption of proposed approaches is the voluntary, honest, and altruistic participation of devices or their owners. This dependency offers malicious participants an avenue of mounting denial-of-service attacks by lying about the content they have or by providing forged content, thereby negating the principal advantages of mobile offloading. Furthermore, without mutual authentication between the participants, there are no means of identification and thereby no chance to report or to stop abuse. In this paper, we thus propose MIRCO, an approach that adds integrity protection to the offloaded content, authentication for participants, and a commitment to the exchange of content between devices. We embed the aforementioned techniques into the offloading process and implement and evaluate our approach using Android smartphones with regard to time and energy overhead. Our results show that MIRCO only adds negligible overhead to content exchanges, thus enabling a feasible and accountable content offloading approach.
引用
收藏
页码:25 / 32
页数:8
相关论文
共 50 条
  • [31] Parallel execution of transaction and integrity rules for maintaining database integrity
    Ibrahim, H
    8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL IX, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING: I, 2004, : 223 - 228
  • [32] Maintaining User Interface Integrity on Android
    AlJarrah, Abeer
    Shehab, Mohamed
    PROCEEDINGS 2016 IEEE 40TH ANNUAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE WORKSHOPS, VOL 1, 2016, : 449 - 458
  • [33] Enforcing integrity while maintaining secrecy
    Marks, DG
    RESEARCH ADVANCES IN DATABASE AND INFORMATION SYSTEMS SECURITY, 2000, 43 : 237 - 251
  • [34] MAINTAINING INTEGRITY AND COMPETENCE OF LEGAL PROFESSION
    WECKSTEIN, DT
    TEXAS LAW REVIEW, 1970, 48 (02) : 267 - 284
  • [35] Role of zinc in maintaining endothelial integrity
    Hennig, B
    Connell, P
    Toborek, M
    Barve, S
    McClain, CJ
    TRACE ELEMENTS IN MAN AND ANIMALS - 9, 1997, : 224 - 228
  • [36] Maintaining treatment integrity with sexual abusers
    Pithers, WD
    CRIMINAL JUSTICE AND BEHAVIOR, 1997, 24 (01) : 34 - 51
  • [37] Strategies for maintaining integrity of a behavioral intervention
    Whitmer, X
    Sweeney, C
    Slivjak, A
    Sumner, C
    Barsevick, A
    WESTERN JOURNAL OF NURSING RESEARCH, 2005, 27 (03) : 338 - 345
  • [38] ROLE OF TEARS IN MAINTAINING CORNEAL INTEGRITY
    TIFFANY, JM
    BRON, AJ
    TRANSACTIONS OF THE OPHTHALMOLOGICAL SOCIETIES OF THE UNITED KINGDOM, 1978, 98 (SEP): : 335 - 338
  • [39] STEM CELLS Maintaining genomic integrity
    Burgess, Darren J.
    NATURE REVIEWS GENETICS, 2013, 14 (08) : 3536 - 3536
  • [40] Maintaining integrity through clinical supervision
    de Raeve, L
    NURSING ETHICS, 1998, 5 (06) : 486 - 496