Remember Me
Or use your Academic/Social account:


Or use your Academic/Social account:


You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.


Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message


Verify Password:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Wang, Wenbo; Niyato, Dusit; Wang, Ping; Leshem, Amir (2018)
Languages: English
Types: Preprint
Subjects: Computer Science - Networking and Internet Architecture
Blockchains enables tamper-proof, ordered logging for transactional data in a decentralized manner over open-access, overlay peer-to-peer networks. In this paper, we propose a decentralized framework of proactive caching in a hierarchical wireless network based on blockchains. We employ the blockchain-based smart contracts to construct an autonomous content caching market. In the market, the cache helpers are able to autonomously adapt their caching strategies according to the market statistics obtained from the blockchain, and the truthfulness of trustless nodes are financially enforced by smart contract terms. Further, we propose an incentive-compatible consensus mechanism based on proof-of-stake to financially encourage the cache helpers to stay active in service. We model the interaction between the cache helpers and the content providers as a Chinese restaurant game. Based on the theoretical analysis regarding the Nash equilibrium of the game, we propose a decentralized strategy-searching algorithm using sequential best response. The simulation results demonstrate both the efficiency and reliability of the proposed equilibrium searching algorithm.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • [1] Cisco, “Cisco visual networking index: Global mobile data traffic forecast update, 2016-2021,” Tech. Rep., Mar. 2017.
    • [2] B. Chen, C. Yang, and A. F. Molisch, “Cache-enabled device-to-device communications: Offloading gain and energy cost,” IEEE Transactions on Wireless Communications, vol. 16, no. 7, pp. 4519-4536, Jul. 2017.
    • [3] J. Tadrous and A. Eryilmaz, “On optimal proactive caching for mobile networks with demand uncertainties,” IEEE/ACM Transactions on Networking, vol. 24, no. 5, pp. 2715-2727, Oct. 2016.
    • [4] M. Dehghan, B. Jiang, A. Seetharam, T. He, T. Salonidis, J. Kurose, D. Towsley, and R. Sitaraman, “On the complexity of optimal request routing and content caching in heterogeneous cache networks,” IEEE/ACM Transactions on Networking, vol. 25, no. 3, pp. 1635-1648, Jun. 2017.
    • [5] A.-M. K. Pathan and R. Buyya, “A taxonomy and survey of content delivery networks,” Grid Computing Distributed System Lab, University of Melbourne, Melbourne, Australia,, Tech. Rep., 2007.
    • [6] F. Tschorsch and B. Scheuermann, “Bitcoin and beyond: A technical survey on decentralized digital currencies,” IEEE Communications Surveys Tutorials, vol. 18, no. 3, pp. 2084-2123, third quarter 2016.
    • [7] G. Wood, “Ethereum: A secure decentralised generalised transaction ledger (eip-150 revision),” Ethereum Project Yellow Paper, vol. 151, 2017.
    • [8] A. Kiayias, A. Russell, B. David, and R. Oliynykov, “Ouroboros: A provably secure proof-of-stake blockchain protocol,” in CRYPTO 2017: 37th Annual International Cryptology Conference, Part I, Santa Barbara, CA, Aug. 2017, pp. 357-388.
    • [9] C. Y. Wang, Y. Chen, and K. J. R. Liu, “Chinese restaurant game,” IEEE Signal Processing Letters, vol. 19, no. 12, pp. 898-901, Dec. 2012.
    • [10] L. Breslau, P. Cao, L. Fan, G. Phillips, and S. Shenker, “Web caching and zipf-like distributions: evidence and implications,” in Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies, vol. 1, Mar. 1999, pp. 126-134 vol.1.
    • [11] “Solidity documentation, release 0.4.20,” Ethereum, Tech. Rep., Jan. 2018. [Online]. Available: http://solidity.readthedocs.io/en/latest/
    • [12] H. Kopp, D. Mdinger, F. Hauck, F. Kargl, and C. Bsch, “Design of a privacy-preserving decentralized file storage with financial incentives,” in 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS PW), Paris, France, Apr. 2017, pp. 14-22.
    • [13] S. Lasaulce and H. Tembine, Game theory and learning for wireless networks: fundamentals and applications. Academic Press, 2011.
  • No related research data.
  • No similar publications.

Share - Bookmark

Cite this article

Collected from