Trust Evaluation and Covert Communication-Based Secure Content Delivery for D2D Networks: A Hierarchical Matching Approach

被引:11
|
作者
Shi, Xin [1 ]
Wu, Dan [1 ]
Wan, Cheng [1 ]
Wang, Meng [1 ]
Zhang, Yu [1 ,2 ]
机构
[1] Army Engn Univ PLA, Coll Commun Engn, Nanjing 210007, Peoples R China
[2] Natl Univ Def Technol, Res Inst 63, Nanjing 210007, Peoples R China
基金
中国国家自然科学基金;
关键词
Device-to-device communication; Mobile handsets; Resource management; Security; Optimization; Measurement; Cellular networks; Trust evaluation; covert communication; mode selection; resource management; hierarchical matching; TO-DEVICE COMMUNICATIONS; RESOURCE-ALLOCATION; MODE SELECTION; RELAY; POWER;
D O I
10.1109/ACCESS.2019.2942214
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we investigate the secure content delivery issue for device-to-device networks based on the trust evaluation mechanism and covert communication model. Specifically, in order to stimulate the lasting and rational cooperation among mobile devices, we propose a trust evaluation mechanism, where the trust degree between two mobile devices can be obtained through historical assessed values. Simultaneously, a covert communication model is introduced to guarantee the undetectability of content delivery, which helps to stop malicious wardens adopting some coming external attacks. In this way, the availability and dependability of content sharing, as well the confidentiality and integrity of transmitted contents cam be guaranteed. Then, combining security-aware metrics, in terms of trust degree and covert rate, with physical layer transmission performances, in terms of achievable rate and successful delivery probability, we propose the definition of secrecy-aware effective rate to serve as a guidance on the joint optimization issue of content delivery mode selection and resource management, which is formulated as a social welfare maximization problem. To solve the complex problem tactfully, it is decoupled into two subproblems, i.e., mode selection which is a many-to-one matching problem, and resource management which is a one-to-one matching problem. By analyzing the interaction between two issues, a novel hierarchical stable matching algorithm is proposed to obtain three-dimension stable matching results. Its properties, such as stability, convergence, optimality, and complexity, are theoretically analyzed and proved. Finally, extensive numerical results are provided to demonstrate the advantages of our proposed algorithms.
引用
收藏
页码:134838 / 134853
页数:16
相关论文
共 50 条
  • [21] Secure D2D Communication Underlying Cellular Networks: Artificial Noise Assisted
    Kang Xiaolei
    Ji Xinsheng
    Huang Kaizhi
    Zhong Zhou
    2016 IEEE 84TH VEHICULAR TECHNOLOGY CONFERENCE (VTC FALL), 2016,
  • [22] Gamified Approach on Participatory D2D Communication in Cellular Networks
    Nakayama, Yu
    Onodera, Masaru
    Tobe, Yoshito
    2020 IEEE 92ND VEHICULAR TECHNOLOGY CONFERENCE (VTC2020-FALL), 2020,
  • [23] An artificial noise scheme for secure communication in heterogeneous D2D and cellular networks
    2016, Institute of Electrical and Electronics Engineers Inc., United States (00):
  • [24] Content Delivery in Mobility-Aware D2D Caching Networks
    Gabr, Badiaa
    Hosny, Sameh
    Nafie, Mohammed
    2018 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2018,
  • [25] Optimal caching policy for wireless content delivery in D2D networks
    Ali, Ahmed S.
    Mahmoud, Korany R.
    Naguib, Khaled M.
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 150
  • [26] Hierarchical federated learning based on wireless D2D networks
    Liu C.-H.
    Yu G.-D.
    Liu S.-L.
    Zhejiang Daxue Xuebao (Gongxue Ban)/Journal of Zhejiang University (Engineering Science), 2023, 57 (05): : 892 - 899
  • [27] Content Caching and Sharing in D2D Networks based on Content Topology
    Song, Jiongjiong
    Sheng, Min
    Wang, Xijun
    Xu, Chao
    GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 2017,
  • [28] Latency Limits for Content Delivery in a Fog-RAN with D2D Communication
    Karasik, Roy
    Simeone, Osvaldo
    Shamai , Shlomo
    2019 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2019, : 1467 - 1471
  • [29] Securing Large-Scale D2D Networks Using Covert Communication and Friendly Jamming
    Feng, Shaohan
    Lu, Xiao
    Sun, Sumei
    Niyato, Dusit
    Hossain, Ekram
    arXiv, 2022,
  • [30] Securing Large-Scale D2D Networks Using Covert Communication and Friendly Jamming
    Feng, Shaohan
    Lu, Xiao
    Sun, Sumei
    Niyato, Dusit
    Hossain, Ekram
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2024, 23 (01) : 592 - 606