Abstract
Device-to-Device (D2D) communication based storage offers a potential solution for traffic offloading from the cellular infrastructure, and mobile devices themselves can act as caching servers, i.e., content helpers [1]. The content requesters can ask for content items from the helpers among cellular peers without the help of eNodeB. However, the success of such content sharing via D2D links depends on physical conditions of the direct wireless links, which must be weighted against possibly additional security threats in D2D links. To realize the successful content sharing, the selected source node (i.e., content helper) must have the data for which the destination node (i.e., content requester) desires, and the physical link condition and user mobility also cannot be ignored. Thus, the social interaction between content helpers and content requesters is firstly investigated in this chapter. However, the direct transmission among mobile users also increases the risk of eavesdropping. Selecting D2D users (DUEs) to act as friendly jammers or relays can be regarded as an effective way to eliminate the risk of eavesdropping [2, 3]. However, it should be admitted that not all nodes are willing to serve as cooperative jammers or relays due to the different levels of altruistic cooperative behaviors of user nodes. Thus, social trust, which can be quantified by link stability or deduced by the trustiness of cooperative nodes, is also a critical factor for cooperative node selection [4, 5]. To improve link stability and system robustness, this chapter considers both physical links and social characteristics, which includes the social interaction and social trust. It focuses on the mechanism for selecting the best content helper and cooperative jamming partner to enhance the secrecy and transmission reliability of content sharing via D2D links against eavesdropping. Particularly, an optimization problem for joint source and cooperative jammer selection with power allocation is developed to maximize the secrecy rate of D2D links under individual and sum transmit power constraints. In addition to a common scenario in which the CSI of all the links can be accurately acquired, two more practical cases where only statistical CSI is available are also considered in this chapter.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
J. Pääkkönen, C. Hollanti, and O. Tirkkonen, “Device-to-device data storage for mobile cellular systems,” in Proc. 2013 IEEE Global Communications Conference Workshops (GLOBECOM Workshops), Atlanta, Georgia, USA, Dec. 2013, pp. 671–676.
L. Wang, C. Cao, and H. Wu, “Secure inter-cluster communications with cooperative jamming against social outcasts,” Computer Communications, vol. 63, no. 1, pp. 1–10, Jun. 2015.
L. Wang and H. Wu, “Jamming partner selection for maximising the worst D2D secrecy rate based on social trust,” IEEE Transactions on Emerging Telecommunications Technologies, vol. 28, no. 2, Feb. 2017.
X. Chen, B. Proulx, X. Gong, and J. Zhang, “Social trust and social reciprocity based cooperative D2D communications,” in Proc. 14th ACM International Symposium on Mobile Ad Hoc NETWORKING and Cumputing, Bangalore, India, Aug. 2013, pp. 187–196.
L. Wang, H. Wu, and G. L. Stüber, “Cooperative jamming aided secrecy enhancement in P2P communications with social interaction constraints,” IEEE Transactions on Vehicular Technology, vol. 66, no. 2, pp. 1144–1158, Feb. 2017.
H. Hui, A. L. Swindlehurst, G. Li, and J. Liang, “Secure relay and jammer selection for physical layer security,” IEEE Signal Processing Letters, vol. 22, no. 8, pp. 1147–1151, Aug. 2015.
Z. Ding and Y. Li, Blind Equalization and Identification, New York: Marcel Dekker, 2001.
A. K. Sadek, Z. Han, and K. J. R. Liu, “Distributed relay-assignment protocols for coverage expansion in cooperative wireless networks,” IEEE Transactions on Mobile Computing, vol. 9, no. 4, pp. 505–515, Apr. 2010.
L. Wang, H. Tang, and M. Čierny, “Device-to-device link admission policy based on social interaction information,” IEEE Transactions on Vehicular Technology, vol. 64, no. 9, pp. 4180–4186, Sept. 2015.
D. Bertsimas and J. Tsitsiklis, “Simulated Annealing,” Statistical Science, vol. 8, no. 1, pp. 10–15, Feb. 1993.
V. Granville, M. Kr̆ivánek, and J.-P. Rasson, “Simulated annealing: A proof of convergence,” IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 16, no. 6, pp. 652–656, Jun. 1994.
T. D. Hoang, L. B. Le, and T. L.-Ngoc, “Energy-efficient resource allocation for D2D communications in cellular networks,” IEEE Transactions on Vehicular Technology, vol. 65, no. 9, pp. 6972–6986, Sept. 2015.
H. Min, J. Lee, S. Park, and D. Hong, “Capacity enhancement using an interference limited area for device-to-device uplink underlaying cellular networks,” IEEE Transactions on Wireless Communications, vol. 10, no. 12, pp. 3995–4000, Dec. 2011.
S. Boyd and L. Vandenberghe, Convex Optimization, Cambridge University Press, 2004.
A. I. Barros, J. B. G. Frenk, S. Schaible, and S. Zhang, “A new algorithm for generalized fractional programs,” Mathematical Programming, vol. 72, no. 2, pp. 147–175, Feb. 1996.
J. P. Crouzeix, J. A. Ferland, and S. Schaible, “An algorithm for generalized fractional programs,” Journal of Optimization Theory and Applications, vol. 47, no. 1, pp. 35–49, Sept. 1985.
R. G. Ródenas, M. L. López, and D. Verastegui, “Extensions of Dinkelbach’s algorithm for solving non-linear fractional programming problems,” vol. 7, no. 1, pp. 33–70, Jun. 1999.
M.-S. Alouini and A. J. Goldsmith, “Capacity of rayleigh fading channels under different adaptive transmission and diversity-combining techniques,” IEEE Transactions on Vehicular Technology, vol. 48, no. 4, pp. 1165–1181, Jul. 1999.
M. Geller and E. W. Ng, “A table of integrals of the exponential integral,” Journal of reserach of the national bureau of standards - B. Mathematics and Mathematical Science, vol. 73, no. 3, pp. 191–210, Jul.-Sept. 1969.
A. Erdélyi, W. Magnus, F. Oberhettinger, and F. G. Tricomi, Tables of Integral Transforms, McGraw Hill, 1954.
P. Guo, X. Wang, and Y. Han, “The enhanced genetic algorithm for the optimization design,” in Proc. 3rd International Conference on Biomedical Engineering and Informatics, Yantai, China, Oct. 2010, pp. 2990–2994.
L. Davis, Ed., Handbook of Genetic Algorithm, Van Nostrand Reinhold, 1991.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this chapter
Cite this chapter
Wang, L. (2018). Cooperative Security in D2D Communications. In: Physical Layer Security in Wireless Cooperative Networks. Wireless Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-61863-0_5
Download citation
DOI: https://doi.org/10.1007/978-3-319-61863-0_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-61862-3
Online ISBN: 978-3-319-61863-0
eBook Packages: EngineeringEngineering (R0)