999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

Social-Aware Based Secure Relay Selection in Relay-Assisted D2D Communications

2019-02-28 07:08:58ShanshanYuJuLiuXiaoqingZhangandShangbinWu
Computers Materials&Continua 2019年2期

Shanshan Yu, Ju Liu, , Xiaoqing Zhang and Shangbin Wu

Abstract: Relay-assisted transmission could effectively enhance the performance of Device-to-Device (D2D) communications when D2D user equipments (UEs) are too far away from each other or the quality of D2D channel is not good enough for direct communications. Meanwhile, security is one of the major concerns for proximity services.The secure relay selection problem for D2D communications underlaying cellular network is studied in this paper. Firstly, we define a relay selection area and derive the closed-form of outage probability in D2D links using a Poisson Point Process (PPP)method. Next, in the defined relay selection area, we propose a secure relay selection scheme for the relay-assisted D2D communication system by exploiting the social relation as a security factor. Simulation results show that the scheme based on social relation can greatly improve the security performance of relay-assisted D2D communications.

Keywords: Device-to-device, social-aware, security, poisson point process.

1 Introduction

With the rapid development of mobile communication technologies, wireless spectrum resources have become unprecedentedly crowded. How to improve the spectrum utilization, the data transmission rate and system security has become a problem to be solved in the future wireless communications. D2D communication is a technology that can improve the spectrum efficiency and channel capacity of the system simultaneously,and thus has been widely studied and applied. Meanwhile, most research work on information security, such as cryptography, watermarking, steganography [Yang, Luo, Lu et al. (2018); Zhang, Qin, Zhang et al. (2018); Ma, Luo, Li et al. (2018)], etc. are the improvement and optimization of related protocols. The security research work in communication focuses more on the physical layer security independently in addition to upper layer protocols. However, most traditional solutions do not fully consider the security of the relay communication and the social relationships between users. To address the issue, D2D cooperative communication technology combined with social networks has emerged. This technology can overcome the shortcomings of traditional D2D cooperative communications and becomes the research hotspot. Additionally, most of related works have considered a relatively simple scenario (i.e., in most cases, a single-cell scenario containing only a single D2D pair was considered). Actually, the spatially distributed base stations (BSs) and cellular users (CUs) in practical scenarios would, to a large extent, impact the accumulated interference of the target users.

For the interference problems caused by D2D communications, the relaying auxiliary communication is an effective method. How to select an optimal relay node from the candidate relays is a major problem in relay-assisted D2D communications. In Ma et al.[Ma, Yin, Yu et al. (2012)], an effective relay selection algorithm was proposed by using the distributed algorithm to select the optimal one after eliminating the inappropriate relay nodes which cause the interferences to the CUs and the D2D users.

Furthermore, the terminal devices used by people constitute a mobile social network. A series of parameters in social networks including social relationships, centricity, and community can reflect the relationship among cellular network users, and utilizing the behavior of people in social networks can help to solve the problem of relay selection in D2D communications. The routing efficiency or total throughput can be improved by utilizing the characteristics of the social network through selecting relays. In order to more effectively improve the communication quality of D2D systems and the relay performance, some scholars have proposed the characteristics of social networks to improve the performance of the communication system.

Zhang et al. [Zhang, Chen and Zhang (2014)] presented a relay selection scheme based on social relations. The optimal relay node is selected by considering the social relationships between the candidate relays and the D2D users. A joint plan of two-step strategy including relay selection and resource allocation was proposed in Zhao et al.[Zhao, Gu, Wu et al. (2016)], and the optimal relay node is selected within the described candidate relay range. Zhao et al. [Zhao, Chai, Chen et al. (2016)] introduced a two-layer game model to discover the optimal relay node for cell-edge users. Chen et al. [Chen,Zhao and Shao (2014)] proposed a relay selection method to maximize the D2D relay link capacity and guarantee QoS for cellular users.

Li et al. [Li, Wu, Hui et al. (2014)] firstly introduced the use of social attributes to improve D2D performance. Authors in Li et al. [Li, Su and Chen (2015)] defined the concept of communication requirements and presented a set of social-aware resource allocation schemes. Zhang et al. [Zhang, Yang and Chen (2016); Cao, Jiang, Chen et al.(2016)] used the grouping idea in Li et al. [Li, Wu, Hui et al. (2014)] to divide users into several large groups to satisfy local services and multicast services, respectively. A concentration mechanism was proposed in Zhang et al. [Zhang, Li, Jin et al. (2015)] to assist D2D pair matching. Li et al. [Li, Giuseppe, Cao et al. (2015)] combined actual geographic factors and social information to present a composite grouping approach. A social awareness program including offline social layer and online social layer for optimizing D2D communication was presented in Zhang et al. [Zhang, Pan, Song et al.(2013)]. Wang et al. [Wang, Chen, Kwon et al. (2014)] proposed an innovative traffic download structure model based on social networks to effectively increase the user’s download capacity.

In this paper, we analyze the relay-assisted D2D communication system model and give the closed-form solution of the outage probability. Then using social relations as a security factor for relay forwarding, we design a social-aware based security relay selection scheme, and compare it with the distance-based relay selection schemes.

2 System model

2.1 Network model

In this section, Fig. 1 shows the network model, the pink triangle presents the base stations, and yellow five-pointed stars are the cellular UEs. The blue solid circles refer D2D transmitter and the red empty circles are the responding receivers. The relays are denoted by solid red square and the small empty black circles are idle UEs which can act as relays.

We assume that the BSs and the conventional CUs are spatially distributed within a given geographical area according to the classical homogeneous Poisson point process (PPP)and of intensities and , respectively. Without loss of generality, an orthogonal resource allocation is assumed to be performed among co-BS CUs for effectively mitigating the intra-cell interference. Furthermore, the D2D transmitters are also distributed according to a homogeneous PPPwith spatial density. Each D2D transmitter has an associated receiver that is randomly distributed around its D2D peer with an average distance.

Figure 1: Network model

When the distance of the D2D pair exceeds, a relay will be applied between the transmitter and the receiver to guarantee D2D link communication. The relays can be idle CUs, idleDUs or other relay devices with locations specified by a homogeneous PPP of intensity . Note that only when the relay is located in the shadow area as Fig. 2 showed,that is both the distances to the transmitter and receiver are less than, the relay will be effective and the relay communication will be established.

Figure 2: Relay selection region

2.2 Outage probability analysis of DUEs

2.2.1 SIR analysis for D2D links

We consider a D2D relay aided underlaying cellular network, the cellular network’s uplink resources are reused for implementing the D2D communications. Without loss of generality, orthogonal resource allocation is assumed to be performed among co-BS CUs.To model the cellular/D2D links as well as the interference links, both the large-scale power law propagation model and the small-scale (e.g., Rayleigh fading) model aretaken into account. Particularly, by considering the transmitter-to-receiver distance and transmit power, the signal power received at a receiver can be denoted by, which is the exponentially distributed fading coefficient between the transmitter i and the receiver j (i.e., Rayleigh fading is assumed), and the standard pathloss exponent. Furthermore, the i.i.d. links are assumed in the above-mentioned model, corresponding to

2.2.2 Interferences analysis for D2D links

The signal-to-interference ratio (SIR) of D2D links is

The interference from the other D2D transmitters is given as

2.2.3 Outage probabilities in DUEs

A SIR model is considered where a message can be successfully decoded at the tagged UE if and only if the SIR of the useful signal is greater than a certain threshold. If the SIR at the tagged UE does not exceed the threshold, the link experiences an outage (here after referred to as SIR outage).

Successful transmission probability of the D2D Links is given as

Because the positions of CUE and DUE obey twomutually independent spatially homogeneous PPP, the Laplace transforms of and can be expressed as [Lee and Haenggi (2012)]:

Therefore, we get the upper bound outage probability of the DUEs when they communicate without any relay:

According to the above derivation, the probability of D2D direct communication outage has been deduced, and the outage probability of D2D aided communication will be derived below. It is assumed that when performing cooperative communication, a typical transmission opportunity selects an idle user as a relay in the surroundings, because D2D is a communication that occurs in a short distance range, so an overlapping area shown in Fig. 2 is selected as a selective area of the relay in this paper. In addition, we adopt the decode-and-forward (DF) relaying scheme.

It is also assumed that the space of the entire system model is A, and there is a selectionareas A (Selection Area, ) according to maximum distance of D2D communicationas shown in Fig. 2, Only idle UEs in the SA may be selected as relay nodes of the D2D communication pair.

Since the location of the idle UEs obeys the spatially homogeneous PPP, we can get the outage probability of the relay-assisted communication by Feng et al. [Feng, Wang, Xu et al. (2014)]:

Since all D2D source nodes transmit in even slots, while D2D relay nodes transmit in odd slots, the interference received at a relay node is from all the co-channel source nodes of other D2D pairs and all the co-channel CUEs that are transmitting in the same radio resources, while interference received at a D2D destination is from all other co-channel relay nodes and all co-channel CUEs.

Substituting (9) into (7), we obtain the average outage probability of a dual-hop D2D link:

3 Social-aware secure relay selection

The communication security that we will discuss is not physical layer security, but the security based on social relations. In the relay cooperative communication, the most secure relay node is selected for data forwarding based on the consideration of security.The stronger the social relationship between users is, the larger the security of data forwarding is.

In this section, a social-aware based secure D2D cooperative communication relaying scheme is proposed. A distance-based scheme is also introduced in this section for the security performance comparison.

3.1 Social relations

The emergence of mobile social networks has subverted the existing network architecture and added a social layer network architecture based on social relations on the basis of the original physical layer architecture. The relay selection model of the D2D communication system is shown in Fig. 3. The communication model is composed of a two-layer structure of a social layer and a physical layer, and there is a one-to-one relationship between users in the social layer and devices in the physical layer. The presence or absence of a path between users is not related to the physical link of the physical layer,but is determined by the social relationship between users. The social relationship between users is determined by a number of factors, including the relatives and friends among the users, the history of encounters, and the geographical location of the social relationships.

Figure 3: The mapping relationship between the social layer and the physical layer

In this work, we consider that the weight of social-relation is determined by the contact history defined as follows [Feng, Wang, Chu et al. (2015)]:

3.2 Distance-based relay selection

In this part, distance-based relay selection (DRS) strategy is proposed. We have derived the relay region in Section 2. In this relay region, there may be more or less idle UEs, so we will select the most appropriate UE as the final relay. Considering the large-scale fading, we look for the minimum sum of the distances from the D2D transmitter to the relay and the receiver to the relay respectively. The detailed process of DRS is shown in Algorithm 1.

?

3.3 Social-aware based secure relay selection

In this part, social-aware based secure relay Selection (SSRS) mechanism is discussed. In DRS strategy, the optimal relay is not necessarily the safest. In other words, the social relation factors between the relay and the transmitter or the receiver may not high.Therefore, we use the social relationship coefficient as the security factor, and use the product of the security factor of the relay to the transmitter and to the receiver respectively as the evaluation standard. The UE relay that has most strong-relation will be selected as finally relay. The detail relay selection procedure of SSRS is presented in Algorithm 2.

?

4 Simulation results

Table 1: Simulation parameters

Fig. 4 illustrates the security communication factor of different relay selection schemes versus relay selection constraint as well as maximum D2D communication radiusAs mentioned in Li et al. [Li, Wu, Li et al. (2012)], social relations of users obey thedistribution. The physical meaning is that within a certain area, most of the social relationships between users are relatively weak. Only a small part of the users have strong social relations. Thus, we can observe that asincreases, the average security of DRS increases slowly while SSRS increases fast. The reason is that at the beginning a smallresults in a limited number of idle UEs to select where it is hard to find relays;Asincrease, more idle UEs becomes available and relay with strong social relation can be selected, so the average security factor of SSRS becomes higher, but that of DRS still keep smaller than 0.1. The dotted line in Fig. 4 represents the lower idle UEs densitycondition. The same reason for little change of DRS and larger decrease of SSRS.

Figure 4: The different average security communication factor of two relay selection schemes vs. maximum D2D communication radius

5 Conclusion

In this paper, we analyzed relay-assisted D2D communications and gave the closed-form solution of the outage probability. We also proposed a relay selection region simultaneously. Based on this, two relay selection schemes, i.e. DRS and SSRS, were proposed. Using social relations as a security factor for relay forwarding, we analyzed the performance of them. Simulation results reveal that the distance and the social relation play a significant role in the cooperated D2D communication, hence SSRS outperforms DRS in most of the cases. Besides, it was observed that the relay selection region should be set appropriately, i.e., it should be large enough to contain sufficient strong relation idle UEs, while not overlarge to waste time in the selection process.

Acknowledgement:This work is supported by the National Natural Science Foundation of China under Grant No. 61371188, and the National Key R&D Plan under Grant No.2017YFC0803403.

主站蜘蛛池模板: 亚洲人成电影在线播放| 久久人与动人物A级毛片| 亚洲国产综合精品中文第一| 免费一级无码在线网站| 国产精品色婷婷在线观看| 波多野结衣爽到高潮漏水大喷| 国产成人调教在线视频| 亚洲制服丝袜第一页| 91无码人妻精品一区二区蜜桃| 日本免费精品| 国产色婷婷| 国产精品成人第一区| 国产成人无码久久久久毛片| 伊伊人成亚洲综合人网7777| 激情综合五月网| 91在线精品麻豆欧美在线| 国产日韩欧美视频| 六月婷婷激情综合| 亚洲色欲色欲www在线观看| 亚洲黄色片免费看| 在线亚洲精品福利网址导航| 久久6免费视频| 尤物亚洲最大AV无码网站| www.亚洲一区二区三区| 精品欧美一区二区三区久久久| 国产精品浪潮Av| 亚洲天堂日本| 亚洲AV无码精品无码久久蜜桃| 一级毛片在线免费看| 国产裸舞福利在线视频合集| www.av男人.com| 亚洲天堂网在线播放| 亚洲人成成无码网WWW| 91精品免费久久久| 无码粉嫩虎白一线天在线观看| 日韩成人免费网站| 91福利在线观看视频| 国产成人精品视频一区视频二区| 天天视频在线91频| 久久人搡人人玩人妻精品| 福利视频一区| 亚洲第一区欧美国产综合| 高清免费毛片| 亚洲水蜜桃久久综合网站 | 一区二区理伦视频| 欧美黑人欧美精品刺激| 在线观看视频一区二区| 日韩在线永久免费播放| 欲色天天综合网| 99热这里只有精品久久免费| 欧美一级在线| 本亚洲精品网站| 无码网站免费观看| 国产成人综合亚洲网址| 永久成人无码激情视频免费| 国产极品美女在线播放| 久久一本精品久久久ー99| jijzzizz老师出水喷水喷出| 亚洲中文精品久久久久久不卡| 欧美另类一区| 精品国产电影久久九九| 尤物精品视频一区二区三区| 国产香蕉一区二区在线网站| 美女视频黄频a免费高清不卡| 精品人妻一区无码视频| 欧美日韩午夜| 国产欧美视频一区二区三区| 日本免费一区视频| 4虎影视国产在线观看精品| 色偷偷av男人的天堂不卡| 久久精品人人做人人综合试看| 亚洲一区二区三区在线视频| 在线观看免费AV网| 这里只有精品免费视频| 国产精品永久不卡免费视频| 成人免费一级片| 久久精品一品道久久精品| 熟妇无码人妻| 欧美成人精品一级在线观看| 黄色a一级视频| 亚洲精品动漫| 无码aaa视频|