2015 IEEE International Conference on Communications (ICC) 2015
DOI: 10.1109/icc.2015.7249488
|View full text |Cite
|
Sign up to set email alerts
|

Secrecy-oriented partner selection based on social trust in device-to-device communications

Abstract: Device-to-device (D2D) communications recently have attracted broad attention owing to its potential ability to improve spectrum and energy efficiency within the existing cellular infrastructure. Lacking sophisticated control, D2D user equipments (DUEs) themselves are not powerful enough to resist eavesdropping or fight against security attacks. This work investigates selection of jamming partners for D2D users to thwart reception by social outcasts in D2D overlay, by exploiting social relationship to improve … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 16 publications
(6 citation statements)
references
References 22 publications
0
6
0
Order By: Relevance
“…Several researchers introduced node attributes to the cooperative jamming design and analyzed the impact of attributes on security performance of D2D communication. Wang et al [34] evaluated the trust degree of potential jammers and designed an algorithm to select a jammer and allocate transmission power to achieve secrecy-oriented D2D cooperation. Similarly, Wen et al [35] investigated the influence of node reputation on the secrecy performance and proposed a scheme for trustworthy-friendly jammer selection in perfect and statistical CSI scenarios.…”
Section: Related Workmentioning
confidence: 99%
“…Several researchers introduced node attributes to the cooperative jamming design and analyzed the impact of attributes on security performance of D2D communication. Wang et al [34] evaluated the trust degree of potential jammers and designed an algorithm to select a jammer and allocate transmission power to achieve secrecy-oriented D2D cooperation. Similarly, Wen et al [35] investigated the influence of node reputation on the secrecy performance and proposed a scheme for trustworthy-friendly jammer selection in perfect and statistical CSI scenarios.…”
Section: Related Workmentioning
confidence: 99%
“…Furthermore, for simplification, we assume that interference from candidate jammers to the destination node can be known in advance, then the jamming interference can be suppressed at the destination. Thus, we can have Cj,k(Ps,Pj)=qjlog21+Psgsdlog21+PsgskPjhjk+1++(1qj)log2(1+Psgsd)log2(1+Psgsk)+ where q j ∈[0,1] is the social trust index of jammers and it jointly indicates both the socially established mutual trust between them and physical link stability of the channel from jammer node to eavesdropper . Note that physical link stability can be evaluated by contact (encountering) duration and frequency for the neighbouring devices to form potential D2D links or finding friendly jammers .…”
Section: System Model and Problem Formulationmentioning
confidence: 99%
“…where q j 2 OE0, 1 is the social trust index of jammers and it jointly indicates both the socially established mutual trust between them and physical link stability of the channel from jammer node to eavesdropper [7]. Note that physical link stability can be evaluated by contact (encountering) duration and frequency for the neighbouring devices to form potential D2D links or finding friendly jammers [21].…”
Section: Problem Formulationmentioning
confidence: 99%
See 1 more Smart Citation
“…D2D communications are the direct communications between cellular user equipments (CUEs) in close proximity without the retransmission of the base statation (BS). Due to the open property of wireless channels and the access of D2D user equipments (DUEs), physical layer security of D2D underlaying cellular networks has drawn more and more attention in recent years [1]- [8]. In the majority of researches, DUEs were regarded as friendly jammers to improve the secrecy capacity of CUEs [1]- [5].…”
Section: Introductionmentioning
confidence: 99%