Trust Evaluation and Covert Communication-Based Secure Content Delivery for D2D Networks: A Hierarchical Matching Approach

被引:11
|
作者
Shi, Xin [1 ]
Wu, Dan [1 ]
Wan, Cheng [1 ]
Wang, Meng [1 ]
Zhang, Yu [1 ,2 ]
机构
[1] Army Engn Univ PLA, Coll Commun Engn, Nanjing 210007, Peoples R China
[2] Natl Univ Def Technol, Res Inst 63, Nanjing 210007, Peoples R China
基金
中国国家自然科学基金;
关键词
Device-to-device communication; Mobile handsets; Resource management; Security; Optimization; Measurement; Cellular networks; Trust evaluation; covert communication; mode selection; resource management; hierarchical matching; TO-DEVICE COMMUNICATIONS; RESOURCE-ALLOCATION; MODE SELECTION; RELAY; POWER;
D O I
10.1109/ACCESS.2019.2942214
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we investigate the secure content delivery issue for device-to-device networks based on the trust evaluation mechanism and covert communication model. Specifically, in order to stimulate the lasting and rational cooperation among mobile devices, we propose a trust evaluation mechanism, where the trust degree between two mobile devices can be obtained through historical assessed values. Simultaneously, a covert communication model is introduced to guarantee the undetectability of content delivery, which helps to stop malicious wardens adopting some coming external attacks. In this way, the availability and dependability of content sharing, as well the confidentiality and integrity of transmitted contents cam be guaranteed. Then, combining security-aware metrics, in terms of trust degree and covert rate, with physical layer transmission performances, in terms of achievable rate and successful delivery probability, we propose the definition of secrecy-aware effective rate to serve as a guidance on the joint optimization issue of content delivery mode selection and resource management, which is formulated as a social welfare maximization problem. To solve the complex problem tactfully, it is decoupled into two subproblems, i.e., mode selection which is a many-to-one matching problem, and resource management which is a one-to-one matching problem. By analyzing the interaction between two issues, a novel hierarchical stable matching algorithm is proposed to obtain three-dimension stable matching results. Its properties, such as stability, convergence, optimality, and complexity, are theoretically analyzed and proved. Finally, extensive numerical results are provided to demonstrate the advantages of our proposed algorithms.
引用
收藏
页码:134838 / 134853
页数:16
相关论文
共 50 条
  • [1] Resource Allocation for Covert Communication in D2D Content Sharing: A Matching Game Approach
    Shi, Xin
    Wu, Dan
    Yue, Chao
    Wan, Cheng
    Guan, Xinrong
    IEEE ACCESS, 2019, 7 : 72835 - 72849
  • [2] Secure Content Sharing Protocol for D2D Users Based on Profile Matching in Social Networks
    Wang, Lei
    Li, Zhonglei
    Chen, Mingkai
    Zhang, Aiqing
    Cui, JingWu
    Zheng, Baoyu
    2017 9TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2017,
  • [3] Semantic Communication-Based Dynamic Resource Allocation in D2D Vehicular Networks
    Su, Jiawei
    Liu, Zhixin
    Xie, Yuan-ai
    Ma, Kai
    Du, Hongyang
    Kang, Jiawen
    Niyato, Dusit
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2023, 72 (08) : 10784 - 10796
  • [4] Covert Communication with Power Uncertainty for D2D Content Sharing
    Wan, Cheng
    Wu, Dan
    Wang, Meng
    Shi, Xin
    Guan, Xinrong
    2019 11TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2019,
  • [5] D2D Communication-Based Salvage Transmission Scheme for Communication Disturbance in 5G Networks
    Saito, Megumi
    Jiang, Liu
    Pan Zhenni
    Shimamoto, Shigeru
    2023 IEEE 20TH CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE, CCNC, 2023,
  • [6] Channel Assignment for D2D communication : A Regret Matching Based Approach
    Lhazmir, Safae
    Kobbane, Abdellatif
    Ben-Othman, Jalel
    2018 14TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2018, : 322 - 327
  • [7] Cooperative caching game based on social trust for D2D communication networks
    Lu Weifeng
    Zhu Mingqi
    Xu Jia
    Chen Siguang
    Yang Lijun
    Xu Jian
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2020, 33 (09)
  • [8] Fundamental Limits of Caching in D2D Networks With Secure Delivery
    Awan, Zohaib Hassan
    Sezgin, Aydin
    2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION WORKSHOP (ICCW), 2015, : 464 - 469
  • [9] Cooperative D2D for content delivery in heterogeneous networks
    Zhao, Xiaoyan
    Yuan, Peiyan
    Chen, Yajun
    Chen, Pei
    2017 3RD INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING AND COMMUNICATIONS (BIGCOM), 2017, : 265 - 271
  • [10] Secure green D2D communication in OFDMA based networks with imperfect channel knowledge
    Arian, Fateme
    Javan, Mohammad Reza
    Yamchi, Nader Mokari
    WIRELESS NETWORKS, 2021, 27 (05) : 3147 - 3164