999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Social-Aware Based Secure Relay Selection in Relay-Assisted D2D Communications

2019-02-28 07:08:58ShanshanYuJuLiuXiaoqingZhangandShangbinWu
Computers Materials&Continua 2019年2期

Shanshan Yu, Ju Liu, , Xiaoqing Zhang and Shangbin Wu

Abstract: Relay-assisted transmission could effectively enhance the performance of Device-to-Device (D2D) communications when D2D user equipments (UEs) are too far away from each other or the quality of D2D channel is not good enough for direct communications. Meanwhile, security is one of the major concerns for proximity services.The secure relay selection problem for D2D communications underlaying cellular network is studied in this paper. Firstly, we define a relay selection area and derive the closed-form of outage probability in D2D links using a Poisson Point Process (PPP)method. Next, in the defined relay selection area, we propose a secure relay selection scheme for the relay-assisted D2D communication system by exploiting the social relation as a security factor. Simulation results show that the scheme based on social relation can greatly improve the security performance of relay-assisted D2D communications.

Keywords: Device-to-device, social-aware, security, poisson point process.

1 Introduction

With the rapid development of mobile communication technologies, wireless spectrum resources have become unprecedentedly crowded. How to improve the spectrum utilization, the data transmission rate and system security has become a problem to be solved in the future wireless communications. D2D communication is a technology that can improve the spectrum efficiency and channel capacity of the system simultaneously,and thus has been widely studied and applied. Meanwhile, most research work on information security, such as cryptography, watermarking, steganography [Yang, Luo, Lu et al. (2018); Zhang, Qin, Zhang et al. (2018); Ma, Luo, Li et al. (2018)], etc. are the improvement and optimization of related protocols. The security research work in communication focuses more on the physical layer security independently in addition to upper layer protocols. However, most traditional solutions do not fully consider the security of the relay communication and the social relationships between users. To address the issue, D2D cooperative communication technology combined with social networks has emerged. This technology can overcome the shortcomings of traditional D2D cooperative communications and becomes the research hotspot. Additionally, most of related works have considered a relatively simple scenario (i.e., in most cases, a single-cell scenario containing only a single D2D pair was considered). Actually, the spatially distributed base stations (BSs) and cellular users (CUs) in practical scenarios would, to a large extent, impact the accumulated interference of the target users.

For the interference problems caused by D2D communications, the relaying auxiliary communication is an effective method. How to select an optimal relay node from the candidate relays is a major problem in relay-assisted D2D communications. In Ma et al.[Ma, Yin, Yu et al. (2012)], an effective relay selection algorithm was proposed by using the distributed algorithm to select the optimal one after eliminating the inappropriate relay nodes which cause the interferences to the CUs and the D2D users.

Furthermore, the terminal devices used by people constitute a mobile social network. A series of parameters in social networks including social relationships, centricity, and community can reflect the relationship among cellular network users, and utilizing the behavior of people in social networks can help to solve the problem of relay selection in D2D communications. The routing efficiency or total throughput can be improved by utilizing the characteristics of the social network through selecting relays. In order to more effectively improve the communication quality of D2D systems and the relay performance, some scholars have proposed the characteristics of social networks to improve the performance of the communication system.

Zhang et al. [Zhang, Chen and Zhang (2014)] presented a relay selection scheme based on social relations. The optimal relay node is selected by considering the social relationships between the candidate relays and the D2D users. A joint plan of two-step strategy including relay selection and resource allocation was proposed in Zhao et al.[Zhao, Gu, Wu et al. (2016)], and the optimal relay node is selected within the described candidate relay range. Zhao et al. [Zhao, Chai, Chen et al. (2016)] introduced a two-layer game model to discover the optimal relay node for cell-edge users. Chen et al. [Chen,Zhao and Shao (2014)] proposed a relay selection method to maximize the D2D relay link capacity and guarantee QoS for cellular users.

Li et al. [Li, Wu, Hui et al. (2014)] firstly introduced the use of social attributes to improve D2D performance. Authors in Li et al. [Li, Su and Chen (2015)] defined the concept of communication requirements and presented a set of social-aware resource allocation schemes. Zhang et al. [Zhang, Yang and Chen (2016); Cao, Jiang, Chen et al.(2016)] used the grouping idea in Li et al. [Li, Wu, Hui et al. (2014)] to divide users into several large groups to satisfy local services and multicast services, respectively. A concentration mechanism was proposed in Zhang et al. [Zhang, Li, Jin et al. (2015)] to assist D2D pair matching. Li et al. [Li, Giuseppe, Cao et al. (2015)] combined actual geographic factors and social information to present a composite grouping approach. A social awareness program including offline social layer and online social layer for optimizing D2D communication was presented in Zhang et al. [Zhang, Pan, Song et al.(2013)]. Wang et al. [Wang, Chen, Kwon et al. (2014)] proposed an innovative traffic download structure model based on social networks to effectively increase the user’s download capacity.

In this paper, we analyze the relay-assisted D2D communication system model and give the closed-form solution of the outage probability. Then using social relations as a security factor for relay forwarding, we design a social-aware based security relay selection scheme, and compare it with the distance-based relay selection schemes.

2 System model

2.1 Network model

In this section, Fig. 1 shows the network model, the pink triangle presents the base stations, and yellow five-pointed stars are the cellular UEs. The blue solid circles refer D2D transmitter and the red empty circles are the responding receivers. The relays are denoted by solid red square and the small empty black circles are idle UEs which can act as relays.

We assume that the BSs and the conventional CUs are spatially distributed within a given geographical area according to the classical homogeneous Poisson point process (PPP)and of intensities and , respectively. Without loss of generality, an orthogonal resource allocation is assumed to be performed among co-BS CUs for effectively mitigating the intra-cell interference. Furthermore, the D2D transmitters are also distributed according to a homogeneous PPPwith spatial density. Each D2D transmitter has an associated receiver that is randomly distributed around its D2D peer with an average distance.

Figure 1: Network model

When the distance of the D2D pair exceeds, a relay will be applied between the transmitter and the receiver to guarantee D2D link communication. The relays can be idle CUs, idleDUs or other relay devices with locations specified by a homogeneous PPP of intensity . Note that only when the relay is located in the shadow area as Fig. 2 showed,that is both the distances to the transmitter and receiver are less than, the relay will be effective and the relay communication will be established.

Figure 2: Relay selection region

2.2 Outage probability analysis of DUEs

2.2.1 SIR analysis for D2D links

We consider a D2D relay aided underlaying cellular network, the cellular network’s uplink resources are reused for implementing the D2D communications. Without loss of generality, orthogonal resource allocation is assumed to be performed among co-BS CUs.To model the cellular/D2D links as well as the interference links, both the large-scale power law propagation model and the small-scale (e.g., Rayleigh fading) model aretaken into account. Particularly, by considering the transmitter-to-receiver distance and transmit power, the signal power received at a receiver can be denoted by, which is the exponentially distributed fading coefficient between the transmitter i and the receiver j (i.e., Rayleigh fading is assumed), and the standard pathloss exponent. Furthermore, the i.i.d. links are assumed in the above-mentioned model, corresponding to

2.2.2 Interferences analysis for D2D links

The signal-to-interference ratio (SIR) of D2D links is

The interference from the other D2D transmitters is given as

2.2.3 Outage probabilities in DUEs

A SIR model is considered where a message can be successfully decoded at the tagged UE if and only if the SIR of the useful signal is greater than a certain threshold. If the SIR at the tagged UE does not exceed the threshold, the link experiences an outage (here after referred to as SIR outage).

Successful transmission probability of the D2D Links is given as

Because the positions of CUE and DUE obey twomutually independent spatially homogeneous PPP, the Laplace transforms of and can be expressed as [Lee and Haenggi (2012)]:

Therefore, we get the upper bound outage probability of the DUEs when they communicate without any relay:

According to the above derivation, the probability of D2D direct communication outage has been deduced, and the outage probability of D2D aided communication will be derived below. It is assumed that when performing cooperative communication, a typical transmission opportunity selects an idle user as a relay in the surroundings, because D2D is a communication that occurs in a short distance range, so an overlapping area shown in Fig. 2 is selected as a selective area of the relay in this paper. In addition, we adopt the decode-and-forward (DF) relaying scheme.

It is also assumed that the space of the entire system model is A, and there is a selectionareas A (Selection Area, ) according to maximum distance of D2D communicationas shown in Fig. 2, Only idle UEs in the SA may be selected as relay nodes of the D2D communication pair.

Since the location of the idle UEs obeys the spatially homogeneous PPP, we can get the outage probability of the relay-assisted communication by Feng et al. [Feng, Wang, Xu et al. (2014)]:

Since all D2D source nodes transmit in even slots, while D2D relay nodes transmit in odd slots, the interference received at a relay node is from all the co-channel source nodes of other D2D pairs and all the co-channel CUEs that are transmitting in the same radio resources, while interference received at a D2D destination is from all other co-channel relay nodes and all co-channel CUEs.

Substituting (9) into (7), we obtain the average outage probability of a dual-hop D2D link:

3 Social-aware secure relay selection

The communication security that we will discuss is not physical layer security, but the security based on social relations. In the relay cooperative communication, the most secure relay node is selected for data forwarding based on the consideration of security.The stronger the social relationship between users is, the larger the security of data forwarding is.

In this section, a social-aware based secure D2D cooperative communication relaying scheme is proposed. A distance-based scheme is also introduced in this section for the security performance comparison.

3.1 Social relations

The emergence of mobile social networks has subverted the existing network architecture and added a social layer network architecture based on social relations on the basis of the original physical layer architecture. The relay selection model of the D2D communication system is shown in Fig. 3. The communication model is composed of a two-layer structure of a social layer and a physical layer, and there is a one-to-one relationship between users in the social layer and devices in the physical layer. The presence or absence of a path between users is not related to the physical link of the physical layer,but is determined by the social relationship between users. The social relationship between users is determined by a number of factors, including the relatives and friends among the users, the history of encounters, and the geographical location of the social relationships.

Figure 3: The mapping relationship between the social layer and the physical layer

In this work, we consider that the weight of social-relation is determined by the contact history defined as follows [Feng, Wang, Chu et al. (2015)]:

3.2 Distance-based relay selection

In this part, distance-based relay selection (DRS) strategy is proposed. We have derived the relay region in Section 2. In this relay region, there may be more or less idle UEs, so we will select the most appropriate UE as the final relay. Considering the large-scale fading, we look for the minimum sum of the distances from the D2D transmitter to the relay and the receiver to the relay respectively. The detailed process of DRS is shown in Algorithm 1.

?

3.3 Social-aware based secure relay selection

In this part, social-aware based secure relay Selection (SSRS) mechanism is discussed. In DRS strategy, the optimal relay is not necessarily the safest. In other words, the social relation factors between the relay and the transmitter or the receiver may not high.Therefore, we use the social relationship coefficient as the security factor, and use the product of the security factor of the relay to the transmitter and to the receiver respectively as the evaluation standard. The UE relay that has most strong-relation will be selected as finally relay. The detail relay selection procedure of SSRS is presented in Algorithm 2.

?

4 Simulation results

Table 1: Simulation parameters

Fig. 4 illustrates the security communication factor of different relay selection schemes versus relay selection constraint as well as maximum D2D communication radiusAs mentioned in Li et al. [Li, Wu, Li et al. (2012)], social relations of users obey thedistribution. The physical meaning is that within a certain area, most of the social relationships between users are relatively weak. Only a small part of the users have strong social relations. Thus, we can observe that asincreases, the average security of DRS increases slowly while SSRS increases fast. The reason is that at the beginning a smallresults in a limited number of idle UEs to select where it is hard to find relays;Asincrease, more idle UEs becomes available and relay with strong social relation can be selected, so the average security factor of SSRS becomes higher, but that of DRS still keep smaller than 0.1. The dotted line in Fig. 4 represents the lower idle UEs densitycondition. The same reason for little change of DRS and larger decrease of SSRS.

Figure 4: The different average security communication factor of two relay selection schemes vs. maximum D2D communication radius

5 Conclusion

In this paper, we analyzed relay-assisted D2D communications and gave the closed-form solution of the outage probability. We also proposed a relay selection region simultaneously. Based on this, two relay selection schemes, i.e. DRS and SSRS, were proposed. Using social relations as a security factor for relay forwarding, we analyzed the performance of them. Simulation results reveal that the distance and the social relation play a significant role in the cooperated D2D communication, hence SSRS outperforms DRS in most of the cases. Besides, it was observed that the relay selection region should be set appropriately, i.e., it should be large enough to contain sufficient strong relation idle UEs, while not overlarge to waste time in the selection process.

Acknowledgement:This work is supported by the National Natural Science Foundation of China under Grant No. 61371188, and the National Key R&D Plan under Grant No.2017YFC0803403.

主站蜘蛛池模板: 久久久久久午夜精品| 国产亚洲精品资源在线26u| 毛片网站在线播放| www.91在线播放| 国产婬乱a一级毛片多女| 最新亚洲人成网站在线观看| 国产精品免费入口视频| 无码专区在线观看| 2021国产v亚洲v天堂无码| 久青草网站| 国产sm重味一区二区三区| 在线日本国产成人免费的| 麻豆国产在线观看一区二区| 人人爽人人爽人人片| 亚洲第一黄片大全| 久久久久亚洲精品成人网| 一本色道久久88综合日韩精品| 1769国产精品视频免费观看| 日韩在线观看网站| 国产在线观看91精品| 国产新AV天堂| 无码精品福利一区二区三区 | 国产主播一区二区三区| 国产高清毛片| 97综合久久| 丝袜高跟美脚国产1区| 六月婷婷综合| 毛片免费观看视频| 国产免费自拍视频| 孕妇高潮太爽了在线观看免费| 亚洲毛片在线看| 91久久偷偷做嫩草影院| 免费可以看的无遮挡av无码| 欧美中文字幕在线视频| 亚洲人在线| 91精品国产一区自在线拍| 国产后式a一视频| 国产成人亚洲综合A∨在线播放| 日韩欧美中文| 国产主播福利在线观看| 久久国产拍爱| 国产亚洲精品97AA片在线播放| 亚洲电影天堂在线国语对白| 久久精品欧美一区二区| 国产精品自在在线午夜区app| 亚洲乱伦视频| 刘亦菲一区二区在线观看| 欧美特级AAAAAA视频免费观看| 99在线视频免费观看| 国产靠逼视频| 乱码国产乱码精品精在线播放| 国产精品成| 国产专区综合另类日韩一区| 久久综合九九亚洲一区| 成·人免费午夜无码视频在线观看| 青青青亚洲精品国产| 伊人色天堂| 色天天综合久久久久综合片| 欧美国产日产一区二区| 国产亚洲精久久久久久无码AV | 91毛片网| 国产亚洲欧美日韩在线一区二区三区| 一级福利视频| 婷婷色在线视频| 精品无码国产一区二区三区AV| 亚洲综合九九| 国产大片喷水在线在线视频| 3D动漫精品啪啪一区二区下载| 国产毛片高清一级国语| 欧美一级视频免费| 国内精品自在自线视频香蕉| 日韩精品欧美国产在线| 91网红精品在线观看| 超碰aⅴ人人做人人爽欧美| 国产一级二级三级毛片| 亚洲福利一区二区三区| 久久免费看片| 欧洲极品无码一区二区三区| 国产呦精品一区二区三区下载| 久久久久免费精品国产| 老司国产精品视频91| 亚洲成人精品久久|