Social Trust Aided D2D Communications: Performance Bound and Implementation Mechanism

In a device-to-device (D2D) communications underlaying cellular network, any user is a potential eavesdropper for the transmissions of others that occupy the same spectrum. The physical-layer security mechanism of theoretical secure capacity, which maximizes the rate of reliable communication from the source user to the legitimate receiver and ensure unauthorized users learn as little as information as possible, is typically employed to guarantee secure communications. As hand-held devices are carried by human beings, we may leverage their social trust to decrease the number of potential eavesdroppers. Aiming to establish a new paradigm for solving the challenging problem of security and efficiency tradeoff, we propose a social trust-aware D2D communication architecture that exploits the social-domain trust for securing the physical-domain communication. In order to understand the impact of social trust on the security of transmissions, we analyze the system ergodic rate of social trust aided communications via stochastic geometry, and our result based on a real data set shows that the proposed social trust aided D2D communication increases the system secrecy rate by about 63% compared with the scheme without considering social trust relation. Furthermore, in order to provide implementation mechanism, we utilize matching theory to implement efficient resource allocation among multiple users. Numerical results show that our proposed mechanism increases the system secrecy rate by 28% with fast convergence over the social oblivious approach.

[1]  Jianping Pan,et al.  Scheduling in a secure wireless network , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[2]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[3]  Walid Saad,et al.  A college admissions game for uplink user association in wireless small cell networks , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[4]  Martin E. Hellman,et al.  The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.

[5]  Zaher Dawy,et al.  Social Network Aware Device-to-Device Communication in Wireless Networks , 2015, IEEE Transactions on Wireless Communications.

[6]  Carl Wijting,et al.  Device-to-device communication as an underlay to LTE-advanced networks , 2009, IEEE Communications Magazine.

[7]  Miao Pan,et al.  Matching and Cheating in Device to Device Communications Underlying Cellular Networks , 2015, IEEE Journal on Selected Areas in Communications.

[8]  Xinbing Wang,et al.  Interference Exploitation in D2D-Enabled Cellular Networks: A Secrecy Perspective , 2015, IEEE Transactions on Communications.

[9]  Zhu Han,et al.  Social-Aware Peer Discovery for D2D Communications Underlaying Cellular Networks , 2015, IEEE Transactions on Wireless Communications.

[10]  Walid Saad,et al.  Matching theory for future wireless networks: fundamentals and applications , 2014, IEEE Communications Magazine.

[11]  Aleksandr Ometov,et al.  Toward trusted, social-aware D2D connectivity: bridging across the technology and sociality realms , 2016, IEEE Wireless Communications.

[12]  Jeffrey G. Andrews,et al.  Power Control for D2D Underlaid Cellular Networks: Modeling, Algorithms, and Analysis , 2013, IEEE Journal on Selected Areas in Communications.

[13]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.

[14]  Nei Kato,et al.  A stochastic geometry analysis of D2D overlaying multi-channel downlink cellular networks , 2015, 2015 IEEE Conference on Computer Communications (INFOCOM).

[15]  Xu Chen,et al.  A social group utility maximization framework with applications in database assisted spectrum access , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[16]  Jeffrey G. Andrews,et al.  Spectrum Sharing for Device-to-Device Communication in Cellular Networks , 2013, IEEE Transactions on Wireless Communications.

[17]  Xu Chen,et al.  Social trust and social reciprocity based cooperative D2D communications , 2013, MobiHoc.

[18]  Chuan Ma,et al.  Secrecy-Based Access Control for Device-to-Device Communication Underlaying Cellular Networks , 2013, IEEE Communications Letters.

[19]  Halim Yanikomeroglu,et al.  Device-to-device communication in 5G cellular networks: challenges, solutions, and future directions , 2014, IEEE Communications Magazine.

[20]  Jeffrey G. Andrews,et al.  Stochastic geometry and random graphs for the analysis and design of wireless networks , 2009, IEEE Journal on Selected Areas in Communications.

[21]  Olga Galinina,et al.  Network-Assisted Device-to-Device Connectivity: Contemporary Vision and Open Challenges , 2015 .

[22]  Zhu Han,et al.  Efficient resource allocation for mobile social networks in D2D communication underlaying cellular networks , 2014, 2014 IEEE International Conference on Communications (ICC).

[23]  George C. Polyzos,et al.  Security and performance challenges for user-centric wireless networking , 2014, IEEE Communications Magazine.

[24]  Xu Chen,et al.  SoCast: Social ties based cooperative video multicast , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.

[25]  Baochun Li,et al.  Seen as stable marriages , 2011, 2011 Proceedings IEEE INFOCOM.

[26]  Sheng Chen,et al.  Social-aware D2D communications: qualitative insights and quantitative analysis , 2014, IEEE Communications Magazine.

[27]  Zhu Han,et al.  Social-aware multi-file dissemination in Device-to-Device overlay networks , 2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[28]  Lifeng Wang,et al.  Safeguarding 5G wireless communication networks using physical layer security , 2015, IEEE Communications Magazine.

[29]  Hsiao-Chun Wu,et al.  Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.

[30]  Zhu Han,et al.  Coalitional Games for Resource Allocation in the Device-to-Device Uplink Underlaying Cellular Networks , 2014, IEEE Transactions on Wireless Communications.

[31]  Xuemin Shen,et al.  Operator controlled device-to-device communications in LTE-advanced networks , 2012, IEEE Wireless Communications.