Wireless Powered D2D Communication Security Using LSTM in Emergency Communication System

This paper investigates the security of wireless-powered device-to-device (D2D) communication networks in an emergency communication system with multiple eavesdroppers, where an unmanned aerial vehicle (UAV) acts as a temporary base station providing wireless power for the D2D transmitters to guarantee power efficiency for the D2D network, and serving as cooperative jammer (CJ) to interfere with the eavesdroppers. Considering the privacy of D2D communication, we formulate the establishment of D2D pairs as a multi-class classification problem, and use the Long Short-Term Memory (LSTM) algorithm to classify potential D2D transmitters. Specifically, the LSTM algorithm is based on the remaining energy of the temporary base station, the mobile state of the potential D2D transmitter and the content request amount of the D2D receiver to establish D2D communication that achieves the optimal security performance. The simulation results show that the LSTM-based D2D establishment scheme can effectively improve the security capability of D2D communication, and prove that the amount of energy harvested by the D2D transmitter affects the security capacity of the D2D communication system.

[1]  Quoc V. Le,et al.  Sequence to Sequence Learning with Neural Networks , 2014, NIPS.

[2]  Adnan Yazici,et al.  Game theory based secure wireless powered D2D communications with cooperative jamming , 2017, 2017 Wireless Days.

[3]  Quoc-Tuan Vien,et al.  Disaster management communication networks: Challenges and architecture design , 2015, 2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops).

[4]  Wei Liang,et al.  JOINT CONTENT POPULARITY PREDICTION AND CONTENT DELIVERY POLICY FOR CACHE-ENABLED D2D NETWORKS: A DEEP REINFORCEMENT LEARNING APPROACH , 2018, 2018 IEEE Global Conference on Signal and Information Processing (GlobalSIP).

[5]  Yueming Cai,et al.  Physical–Social-Aware D2D Content Sharing Networks: A Provider–Demander Matching Game , 2018, IEEE Transactions on Vehicular Technology.

[6]  Wei Liang,et al.  Optimal Transmit Antenna Selection Strategy for MIMO Wiretap Channel Based on Deep Reinforcement Learning , 2018, 2018 IEEE/CIC International Conference on Communications in China (ICCC).

[7]  Xiang Cheng,et al.  Cooperation via Spectrum Sharing for Physical Layer Security in Device-to-Device Communications Underlaying Cellular Networks , 2016, 2015 IEEE Global Communications Conference (GLOBECOM).

[8]  Petar Popovski,et al.  Network-Assisted Device-to-Device (D2D) Direct Proximity Discovery with Underlay Communication , 2014, GLOBECOM 2014.

[9]  Zhu Han,et al.  Game-theoretic resource allocation methods for device-to-device communication , 2014, IEEE Wireless Communications.

[10]  Shengli Xie,et al.  Integrated energy and spectrum harvesting for 5G wireless communications , 2015, IEEE Network.

[11]  Zhu Han,et al.  A Prediction-Based Charging Policy and Interference Mitigation Approach in the Wireless Powered Internet of Things , 2019, IEEE Journal on Selected Areas in Communications.

[12]  Wei Liang,et al.  Dynamic Spectrum Access in Cognitive Radio Networks Using Deep Reinforcement Learning and Evolutionary Game , 2018, 2018 IEEE/CIC International Conference on Communications in China (ICCC).

[13]  Adnan Yazici,et al.  Secure Wireless Powered and Cooperative Jamming D2D Communications , 2018, IEEE Transactions on Green Communications and Networking.

[14]  He Chen,et al.  Harvest-Then-Cooperate: Wireless-Powered Cooperative Communications , 2014, IEEE Transactions on Signal Processing.