Malicious-Behavior-Aware D2D Link Selection Mechanism

Device-to-device (D2D) communications can effectively offload the traffic of cellular system in a distributed way. However, during the data forwarding process, malicious D2D users can intermittently discard data of other users, which seriously affects the data forwarding efficiency. Therefore, a malicious-forwarding-behavior-aware link selection mechanism (MBLS) is proposed in this paper to alleviate the influence of malicious attacks. User behaviors are analyzed according to the correlation between the social relationship and forwarding behavior of users, and the identification of malicious behavior is obtained by Elman neural network. Thus, malicious users can be detected, and then the optimal link can be selected. The simulation results show that the proposed mechanism can effectively detect the malicious behaviors of D2D users, notably improve the reliability of data transmission and significantly enhance the network performance.

[1]  Yong Wang,et al.  Energy-Efficient Optimal Relay Selection in Cooperative Cellular Networks Based on Double Auction , 2015, IEEE Transactions on Wireless Communications.

[2]  Jian Shen,et al.  A lightweight multi-layer authentication protocol for wireless body area networks , 2018, Future Gener. Comput. Syst..

[3]  Liang Deng,et al.  Modified Elman neural network based neural adaptive inverse control of rate-dependent hysteresis , 2016, 2016 International Joint Conference on Neural Networks (IJCNN).

[4]  Raed A. Abd-Alhameed,et al.  Secure device-to-device communication in LTE-A , 2014, IEEE Communications Magazine.

[5]  Wenjia Li,et al.  ART: An Attack-Resistant Trust Management Scheme for Securing Vehicular Ad Hoc Networks , 2016, IEEE Transactions on Intelligent Transportation Systems.

[6]  Honggang Wang,et al.  Social overlapping community-aware neighbor discovery for D2D communications , 2016, IEEE Wireless Communications.

[7]  Francesco De Pellegrini,et al.  On the achievable rate in a D2D cognitive secondary network under jamming attacks , 2014, 2014 9th International Conference on Cognitive Radio Oriented Wireless Networks and Communications (CROWNCOM).

[8]  Boleslaw K. Szymanski,et al.  Exploiting Friendship Relations for Efficient Routing in Mobile Social Networks , 2012, IEEE Transactions on Parallel and Distributed Systems.

[9]  Jianbo Li,et al.  MPAR: A movement pattern-aware optimal routing for social delay tolerant networks , 2015, Ad Hoc Networks.

[10]  Olga Galinina,et al.  On feasibility of 5G-grade dedicated RF charging technology for wireless-powered wearables , 2015, IEEE Wireless Communications.

[11]  Yanyan Wang,et al.  Dynamic Coding Control in Social Intermittent Connectivity Wireless Networks , 2016, IEEE Transactions on Vehicular Technology.

[12]  Huan Zhang,et al.  Secrecy Outage Performance for SIMO Underlay Cognitive Radio Systems With Generalized Selection Combining Over Nakagami-$m$ Channels , 2016, IEEE Transactions on Vehicular Technology.

[13]  Jianliang Xu,et al.  Spatial-aware interest group queries in location-based social networks , 2014, Data Knowl. Eng..

[14]  Junjie Yan,et al.  Social Attribute Aware Incentive Mechanism for Device-to-Device Video Distribution , 2017, IEEE Transactions on Multimedia.

[15]  B. Aazhang,et al.  Cellular networks with an overlaid device to device network , 2008, 2008 42nd Asilomar Conference on Signals, Systems and Computers.

[16]  Sungsoo Park,et al.  Capacity Enhancement Using an Interference Limited Area for Device-to-Device Uplink Underlaying Cellular Networks , 2011, IEEE Transactions on Wireless Communications.

[17]  Carl Wijting,et al.  Device-to-device communication as an underlay to LTE-advanced networks , 2009, IEEE Communications Magazine.

[18]  Tinghuai Ma,et al.  A novel subgraph K+\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$K^{+}$$\end{document}-isomorphism method in social , 2017, Soft Computing.

[19]  Aiqing Zhang,et al.  SeDS: Secure Data Sharing Strategy for D2D Communication in LTE-Advanced Networks , 2016, IEEE Transactions on Vehicular Technology.

[20]  Xu Chen,et al.  Exploiting Social Ties for Cooperative D2D Communications: A Mobile Social Networking Case , 2015, IEEE/ACM Transactions on Networking.

[21]  Liang Zhou,et al.  Mobile Device-to-Device Video Distribution , 2016, ACM Trans. Multim. Comput. Commun. Appl..

[22]  Anupam Kumar Bairagi,et al.  Trust based D2D communications for accessing services in Internet of Things , 2015, 2015 18th International Conference on Computer and Information Technology (ICCIT).

[23]  Xu Chen,et al.  Social trust and social reciprocity based cooperative D2D communications , 2013, MobiHoc.

[24]  Jia Guo,et al.  Trust Management for SOA-Based IoT and Its Application to Service Composition , 2016, IEEE Transactions on Services Computing.

[25]  Chuan Ma,et al.  Secrecy-Based Access Control for Device-to-Device Communication Underlaying Cellular Networks , 2013, IEEE Communications Letters.

[26]  Abraham Martín-Campillo,et al.  Energy-efficient forwarding mechanism for wireless opportunistic networks in emergency scenarios , 2012, Comput. Commun..

[27]  Stefan Parkvall,et al.  Design aspects of network assisted device-to-device communications , 2012, IEEE Communications Magazine.

[28]  Honggang Wang,et al.  Node Service Ability Aware Packet Forwarding Mechanism in Intermittently Connected Wireless Networks , 2016, IEEE Transactions on Wireless Communications.

[29]  Yu Zhang,et al.  Peer discovery for D2D communications based on social attribute and service attribute , 2017, J. Netw. Comput. Appl..

[30]  Yonggang Wen,et al.  Distributed Wireless Video Scheduling With Delayed Control Information , 2014, IEEE Transactions on Circuits and Systems for Video Technology.

[31]  Victor C. M. Leung,et al.  Joint Relay Scheduling, Channel Access, and Power Allocation for Green Cognitive Radio Communications , 2015, IEEE Journal on Selected Areas in Communications.

[32]  Olav Tirkkonen,et al.  Device-to-Device Communication Underlaying Cellular Communications Systems , 2009, Int. J. Commun. Netw. Syst. Sci..

[33]  Xiang Cheng,et al.  Efficiency Resource Allocation for Device-to-Device Underlay Communication Systems: A Reverse Iterative Combinatorial Auction Based Approach , 2012, IEEE Journal on Selected Areas in Communications.

[34]  Junjie Yan,et al.  Trust-Oriented Partner Selection in D2D Cooperative Communications , 2017, IEEE Access.

[35]  Xiaohu You,et al.  NER-DRP: Dissemination-based Routing Protocol with Network-layer Error Control for Intermittently Connected Mobile Networks , 2012, Mob. Networks Appl..

[36]  Gang Feng,et al.  Cooperative Media Access Control With Optimal Relay Selection in Error-Prone Wireless Networks , 2014, IEEE Transactions on Vehicular Technology.

[37]  Mohsen Guizani,et al.  Impact of Execution Time on Adaptive Wireless Video Scheduling , 2014, IEEE Journal on Selected Areas in Communications.

[38]  Sungsoo Park,et al.  Reliability Improvement Using Receive Mode Selection in the Device-to-Device Uplink Period Underlaying Cellular Networks , 2011, IEEE Transactions on Wireless Communications.

[39]  Jianliang Xu,et al.  Spatial-aware interest group queries in location-based social networks , 2012, Data Knowl. Eng..

[40]  Zhu Han,et al.  Resource allocation using a reverse iterative combinatorial auction for device-to-device underlay cellular networks , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[41]  Mohsen Guizani,et al.  Joint physical-application layer security for wireless multimedia delivery , 2014, IEEE Communications Magazine.

[42]  Wenjia Li,et al.  Policy-Based Secure and Trustworthy Sensing for Internet of Things in Smart Cities , 2018, IEEE Internet of Things Journal.

[43]  Hsiao-Hwa Chen,et al.  Intracluster Device-to-Device Relay Algorithm With Optimal Resource Utilization , 2013, IEEE Transactions on Vehicular Technology.

[44]  P Sreelakshmi,et al.  Leveraging Social Networks for P2P Content-Based File Sharing in Disconnected MANETs , 2015 .