VehiCaching: Embracing user request on vehicle route with proactive data transportation

Wonkwang Shin, Byoung Yoon Min, Dong Ku Kim

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)


Due to the mobile networks experiencing heterogeneity and intricacy, many studies with efficient data off-loading have been considered. In this paper, we address the benefits of deploying movable caching nodes (e.g. mobile users, vehicles), namely VehiCaching (VC), in cellular networks. We classify the role of VC into two issues: 1) considering multiple access schemes between macrocell and VC for fair and aggressive data off-loading (at the user-side), and 2) developing the file placement strategy with the concept of storage range which relates vehicles' route to embracing user request (at the VC-side). Compared with conventional priority-based caching and non-caching cellular networks, we evaluate the performance gains with respect to the average data throughputs versus storage range, outage probabilities versus target data-rate, and probabilistic distributions of outage probability to capture changed environments by mobility.

Original languageEnglish
Title of host publication2015 IEEE 81st Vehicular Technology Conference, VTC Spring 2015 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781479980888
Publication statusPublished - 2015 Jul 1
Event81st IEEE Vehicular Technology Conference, VTC Spring 2015 - Glasgow, United Kingdom
Duration: 2015 May 112015 May 14

Publication series

NameIEEE Vehicular Technology Conference
ISSN (Print)1550-2252


Other81st IEEE Vehicular Technology Conference, VTC Spring 2015
Country/TerritoryUnited Kingdom

Bibliographical note

Publisher Copyright:
© 2015 IEEE.

All Science Journal Classification (ASJC) codes

  • Computer Science Applications
  • Electrical and Electronic Engineering
  • Applied Mathematics


Dive into the research topics of 'VehiCaching: Embracing user request on vehicle route with proactive data transportation'. Together they form a unique fingerprint.

Cite this