Skip to main content

Cooperative Security in D2D Communications

  • Chapter
  • First Online:
Physical Layer Security in Wireless Cooperative Networks

Part of the book series: Wireless Networks ((WN))

  • 618 Accesses

Abstract

Device-to-Device (D2D) communication based storage offers a potential solution for traffic offloading from the cellular infrastructure, and mobile devices themselves can act as caching servers, i.e., content helpers [1]. The content requesters can ask for content items from the helpers among cellular peers without the help of eNodeB. However, the success of such content sharing via D2D links depends on physical conditions of the direct wireless links, which must be weighted against possibly additional security threats in D2D links. To realize the successful content sharing, the selected source node (i.e., content helper) must have the data for which the destination node (i.e., content requester) desires, and the physical link condition and user mobility also cannot be ignored. Thus, the social interaction between content helpers and content requesters is firstly investigated in this chapter. However, the direct transmission among mobile users also increases the risk of eavesdropping. Selecting D2D users (DUEs) to act as friendly jammers or relays can be regarded as an effective way to eliminate the risk of eavesdropping [2, 3]. However, it should be admitted that not all nodes are willing to serve as cooperative jammers or relays due to the different levels of altruistic cooperative behaviors of user nodes. Thus, social trust, which can be quantified by link stability or deduced by the trustiness of cooperative nodes, is also a critical factor for cooperative node selection [4, 5]. To improve link stability and system robustness, this chapter considers both physical links and social characteristics, which includes the social interaction and social trust. It focuses on the mechanism for selecting the best content helper and cooperative jamming partner to enhance the secrecy and transmission reliability of content sharing via D2D links against eavesdropping. Particularly, an optimization problem for joint source and cooperative jammer selection with power allocation is developed to maximize the secrecy rate of D2D links under individual and sum transmit power constraints. In addition to a common scenario in which the CSI of all the links can be accurately acquired, two more practical cases where only statistical CSI is available are also considered in this chapter.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. J. Pääkkönen, C. Hollanti, and O. Tirkkonen, “Device-to-device data storage for mobile cellular systems,” in Proc. 2013 IEEE Global Communications Conference Workshops (GLOBECOM Workshops), Atlanta, Georgia, USA, Dec. 2013, pp. 671–676.

    Google Scholar 

  2. L. Wang, C. Cao, and H. Wu, “Secure inter-cluster communications with cooperative jamming against social outcasts,” Computer Communications, vol. 63, no. 1, pp. 1–10, Jun. 2015.

    Google Scholar 

  3. L. Wang and H. Wu, “Jamming partner selection for maximising the worst D2D secrecy rate based on social trust,” IEEE Transactions on Emerging Telecommunications Technologies, vol. 28, no. 2, Feb. 2017.

    Google Scholar 

  4. X. Chen, B. Proulx, X. Gong, and J. Zhang, “Social trust and social reciprocity based cooperative D2D communications,” in Proc. 14th ACM International Symposium on Mobile Ad Hoc NETWORKING and Cumputing, Bangalore, India, Aug. 2013, pp. 187–196.

    Google Scholar 

  5. L. Wang, H. Wu, and G. L. Stüber, “Cooperative jamming aided secrecy enhancement in P2P communications with social interaction constraints,” IEEE Transactions on Vehicular Technology, vol. 66, no. 2, pp. 1144–1158, Feb. 2017.

    Article  Google Scholar 

  6. H. Hui, A. L. Swindlehurst, G. Li, and J. Liang, “Secure relay and jammer selection for physical layer security,” IEEE Signal Processing Letters, vol. 22, no. 8, pp. 1147–1151, Aug. 2015.

    Article  Google Scholar 

  7. Z. Ding and Y. Li, Blind Equalization and Identification, New York: Marcel Dekker, 2001.

    Google Scholar 

  8. A. K. Sadek, Z. Han, and K. J. R. Liu, “Distributed relay-assignment protocols for coverage expansion in cooperative wireless networks,” IEEE Transactions on Mobile Computing, vol. 9, no. 4, pp. 505–515, Apr. 2010.

    Article  Google Scholar 

  9. L. Wang, H. Tang, and M. Čierny, “Device-to-device link admission policy based on social interaction information,” IEEE Transactions on Vehicular Technology, vol. 64, no. 9, pp. 4180–4186, Sept. 2015.

    Article  Google Scholar 

  10. D. Bertsimas and J. Tsitsiklis, “Simulated Annealing,” Statistical Science, vol. 8, no. 1, pp. 10–15, Feb. 1993.

    Article  MATH  Google Scholar 

  11. V. Granville, M. Kr̆ivánek, and J.-P. Rasson, “Simulated annealing: A proof of convergence,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 16, no. 6, pp. 652–656, Jun. 1994.

    Google Scholar 

  12. T. D. Hoang, L. B. Le, and T. L.-Ngoc, “Energy-efficient resource allocation for D2D communications in cellular networks,” IEEE Transactions on Vehicular Technology, vol. 65, no. 9, pp. 6972–6986, Sept. 2015.

    Google Scholar 

  13. H. Min, J. Lee, S. Park, and D. Hong, “Capacity enhancement using an interference limited area for device-to-device uplink underlaying cellular networks,” IEEE Transactions on Wireless Communications, vol. 10, no. 12, pp. 3995–4000, Dec. 2011.

    Article  Google Scholar 

  14. S. Boyd and L. Vandenberghe, Convex Optimization, Cambridge University Press, 2004.

    Google Scholar 

  15. A. I. Barros, J. B. G. Frenk, S. Schaible, and S. Zhang, “A new algorithm for generalized fractional programs,” Mathematical Programming, vol. 72, no. 2, pp. 147–175, Feb. 1996.

    Article  MathSciNet  MATH  Google Scholar 

  16. J. P. Crouzeix, J. A. Ferland, and S. Schaible, “An algorithm for generalized fractional programs,” Journal of Optimization Theory and Applications, vol. 47, no. 1, pp. 35–49, Sept. 1985.

    Article  MathSciNet  MATH  Google Scholar 

  17. R. G. Ródenas, M. L. López, and D. Verastegui, “Extensions of Dinkelbach’s algorithm for solving non-linear fractional programming problems,” vol. 7, no. 1, pp. 33–70, Jun. 1999.

    Google Scholar 

  18. M.-S. Alouini and A. J. Goldsmith, “Capacity of rayleigh fading channels under different adaptive transmission and diversity-combining techniques,” IEEE Transactions on Vehicular Technology, vol. 48, no. 4, pp. 1165–1181, Jul. 1999.

    Article  Google Scholar 

  19. M. Geller and E. W. Ng, “A table of integrals of the exponential integral,” Journal of reserach of the national bureau of standards - B. Mathematics and Mathematical Science, vol. 73, no. 3, pp. 191–210, Jul.-Sept. 1969.

    MathSciNet  MATH  Google Scholar 

  20. A. Erdélyi, W. Magnus, F. Oberhettinger, and F. G. Tricomi, Tables of Integral Transforms, McGraw Hill, 1954.

    Google Scholar 

  21. P. Guo, X. Wang, and Y. Han, “The enhanced genetic algorithm for the optimization design,” in Proc. 3rd International Conference on Biomedical Engineering and Informatics, Yantai, China, Oct. 2010, pp. 2990–2994.

    Google Scholar 

  22. L. Davis, Ed., Handbook of Genetic Algorithm, Van Nostrand Reinhold, 1991.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this chapter

Cite this chapter

Wang, L. (2018). Cooperative Security in D2D Communications. In: Physical Layer Security in Wireless Cooperative Networks. Wireless Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-61863-0_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-61863-0_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-61862-3

  • Online ISBN: 978-3-319-61863-0

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics