Heuristic-Learning-Based Network Architecture for Device-to-Device User Access Control

被引:7
|
作者
Lin, Di [1 ]
Hu, Su [2 ]
Gao, Yuan [4 ,5 ]
Tang, Wanbin [3 ]
机构
[1] Univ Elect Sci & Technol China, Shanghai, Peoples R China
[2] Univ Elect Sci & Technol China, Natl Key Lab Commun, Shanghai, Peoples R China
[3] Univ Elect Sci & Technol China, Elect Engn, Shanghai, Peoples R China
[4] Acad Mil Sci PLA, Beijing, Peoples R China
[5] Tsinghua Univ, Dept Elect Engn, Beijing, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
OPTIMIZATION;
D O I
10.1109/MCOM.001.1800862
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
D2D networks have been employed in various mobile applications. Due to the limited wireless resource, a network cannot meet the data transmission requirements of all the users, especially in a data-intensive application. In such a scenario, a few users must temporarily disconnect from a network to guarantee the normal operation of the network. In a D2D network, the user access control strategy depends on the authenticity of CSI, since a user can be allocated more wireless resource and be allowed to stay in the network with a higher probability if the user has a higher CSI value. In this article, we investigate a heuristic learning method in which each user's CSI needs to be verified, and the users advocating a larger CSI are detected to be frauds. The results indicate that a dramatic increase of network performance can be captured by the proposed algorithm.
引用
收藏
页码:96 / 101
页数:6
相关论文
共 50 条
  • [1] Modeling and Analysis on Access Control for Device-to-Device Communications in Cellular Network: A Network-Calculus-Based Approach
    Huang, Jun
    Sun, Yi
    Xiong, Zi
    Duan, Qiang
    Zhao, Yanxiao
    Cao, Xianghui
    Wang, Wei
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (03) : 1615 - 1626
  • [2] Access control method for device-to-device communications based on stochastic geometry
    Sun P.
    Chen Y.
    Zhou N.
    Wu X.
    Zhang L.
    [J]. Guofang Keji Daxue Xuebao/Journal of National University of Defense Technology, 2019, 41 (03): : 25 - 30
  • [3] Device-to-device and mobile user communication with queuing in NOMA-based network
    Balyan, Vipin
    Gupta, Dhiraj
    [J]. INTERNATIONAL JOURNAL ON SMART SENSING AND INTELLIGENT SYSTEMS, 2021, 14 (01):
  • [4] Distributed Ledger Technology Based Architecture for Decentralized Device-to-Device Communication Network
    Lu, Shu-Ping
    Lei, Chin-Laung
    Ho, Cheng-Yun
    Hwang, Shy-Shang
    Chen, Hsin-Chen
    [J]. IEEE ACCESS, 2022, 10 : 92006 - 92022
  • [5] A Priority-Based Access Control Model for Device-to-Device Communications Underlaying Cellular Network Using Network Calculus
    Huang, Jun
    Xiong, Zi
    Li, Jibi
    Chen, Qianbin
    Duan, Qiang
    Zhao, Yanxiao
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2014, 2014, 8491 : 613 - 623
  • [6] Device-to-Device assisted user clustering for Multiple Access in MIMO WLAN
    Zhao Hongyi
    Wu Weimin
    Lu Li
    Liu Yingzhuang
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (07): : 2972 - 2991
  • [7] Architecture and Implementation of An Information-Centric Device-to-Device Network
    Wu, Yu
    Barnard, Matthew
    Ying, Lei
    [J]. 2015 53RD ANNUAL ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING (ALLERTON), 2015, : 763 - 771
  • [8] Game theory-based device-to-device network access algorithm for heterogeneous networks
    Xibiao Cai
    Xiaoling Liu
    Zhi Qu
    [J]. The Journal of Supercomputing, 2019, 75 : 2423 - 2435
  • [9] Game theory-based device-to-device network access algorithm for heterogeneous networks
    Cai, Xibiao
    Liu, Xiaoling
    Qu, Zhi
    [J]. JOURNAL OF SUPERCOMPUTING, 2019, 75 (05): : 2423 - 2435
  • [10] Distributed Channel Access for Device-to-Device Communications: A Hypergraph-Based Learning Solution
    Sun, Youming
    Wu, Qihui
    Xu, Yuhua
    Zhang, Yuli
    Sun, Fenggang
    Wang, Jinlong
    [J]. IEEE COMMUNICATIONS LETTERS, 2017, 21 (01) : 180 - 183