The University of Southampton
University of Southampton Institutional Repository

Social security aided D2D communications: performance bound and implementation mechanism

Social security aided D2D communications: performance bound and implementation mechanism
Social security aided D2D communications: performance bound and implementation mechanism

In a device-to-device (D2D) communications underlaying cellular network, any user is a potential eavesdropper for the transmissions of others that occupy the same spectrum. Physical-layer security mechanism is typically employed to guarantee secure communications, at the cost of reducing the system’s throughput. As hand-held devices are carried by human beings, we may leverage their social trust to decrease the number of potential eavesdroppers. Aiming to establish a new paradigm for solving the challenging problem of security and efficiency tradeoff, we propose a social security aware D2D communication architecture that exploits social-domain trust for securing physical-domain communication. In order to understand the impact of social trust on the security of transmissions, we analyze the system ergodic rate of social security aided communications via stochastic geometry, and our result based on a real dataset shows that the proposed social security aided D2D communication increases the system secrecy rate by about 63% compared to the scheme without considering social trust relation. Furthermore, in order to provide implementation mechanism, we utilize matching theory to implement efficient resource allocation among multiple users. Numerical results show that our proposed mechanism increases the system secrecy rate by 28% with fast convergence over the social oblivious approach.

Cellular networks, D2D communications, Device-to-device communication, Geometry, Interference, matching theory, Resource management, Security, Social trust, stochastic geometry, Stochastic processes
0733-8716
1-13
Zhao, Yulei
abf73a2f-fde2-4103-8c0c-d87055d933b3
Li, Yong
8de08585-c85d-4e0a-a9de-9d023499794a
Chen, Lin
9f2b5d5d-a212-45a4-b315-f8e1db189e5b
Cao, Yang
e1e35409-0fbb-4ce3-93e1-cd4a122c9d83
Chen, Sheng
9310a111-f79a-48b8-98c7-383ca93cbb80
Ge, Ning
2007bd68-f742-49e4-bbb4-8f77158f7e89
Zhao, Yulei
abf73a2f-fde2-4103-8c0c-d87055d933b3
Li, Yong
8de08585-c85d-4e0a-a9de-9d023499794a
Chen, Lin
9f2b5d5d-a212-45a4-b315-f8e1db189e5b
Cao, Yang
e1e35409-0fbb-4ce3-93e1-cd4a122c9d83
Chen, Sheng
9310a111-f79a-48b8-98c7-383ca93cbb80
Ge, Ning
2007bd68-f742-49e4-bbb4-8f77158f7e89

Zhao, Yulei, Li, Yong, Chen, Lin, Cao, Yang, Chen, Sheng and Ge, Ning (2018) Social security aided D2D communications: performance bound and implementation mechanism. IEEE Journal on Selected Areas in Communications, 1-13. (doi:10.1109/JSAC.2018.2825658).

Record type: Article

Abstract

In a device-to-device (D2D) communications underlaying cellular network, any user is a potential eavesdropper for the transmissions of others that occupy the same spectrum. Physical-layer security mechanism is typically employed to guarantee secure communications, at the cost of reducing the system’s throughput. As hand-held devices are carried by human beings, we may leverage their social trust to decrease the number of potential eavesdroppers. Aiming to establish a new paradigm for solving the challenging problem of security and efficiency tradeoff, we propose a social security aware D2D communication architecture that exploits social-domain trust for securing physical-domain communication. In order to understand the impact of social trust on the security of transmissions, we analyze the system ergodic rate of social security aided communications via stochastic geometry, and our result based on a real dataset shows that the proposed social security aided D2D communication increases the system secrecy rate by about 63% compared to the scheme without considering social trust relation. Furthermore, in order to provide implementation mechanism, we utilize matching theory to implement efficient resource allocation among multiple users. Numerical results show that our proposed mechanism increases the system secrecy rate by 28% with fast convergence over the social oblivious approach.

Text
Social Security Aided D2D Communications: Performance Bound and Implementation Mechanism - Accepted Manuscript
Download (1MB)

More information

Accepted/In Press date: 10 April 2018
e-pub ahead of print date: 11 April 2018
Keywords: Cellular networks, D2D communications, Device-to-device communication, Geometry, Interference, matching theory, Resource management, Security, Social trust, stochastic geometry, Stochastic processes

Identifiers

Local EPrints ID: 420503
URI: https://eprints.soton.ac.uk/id/eprint/420503
ISSN: 0733-8716
PURE UUID: 8a3d2021-82a4-46cb-9d9e-f7bfe73d9085

Catalogue record

Date deposited: 09 May 2018 16:30
Last modified: 16 Sep 2019 16:57

Export record

Altmetrics

Contributors

Author: Yulei Zhao
Author: Yong Li
Author: Lin Chen
Author: Yang Cao
Author: Sheng Chen
Author: Ning Ge

University divisions

Download statistics

Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.

View more statistics

Atom RSS 1.0 RSS 2.0

Contact ePrints Soton: eprints@soton.ac.uk

ePrints Soton supports OAI 2.0 with a base URL of https://eprints.soton.ac.uk/cgi/oai2

This repository has been built using EPrints software, developed at the University of Southampton, but available to everyone to use.

We use cookies to ensure that we give you the best experience on our website. If you continue without changing your settings, we will assume that you are happy to receive cookies on the University of Southampton website.

×