期刊文献+

社交感知的D2D内容安全缓存算法 被引量:1

Social-aware D2D Secure Caching Algorithm
下载PDF
导出
摘要 Device-to-Device(D2D)内容共享技术在使用户能够更加便捷、高效地获取内容的同时,也面临着更为严峻的安全挑战。针对窃听用户存在的D2D内容共享场景,通过设计基于最大距离可分(Maximum Distance Separable,MDS)码的D2D内容安全缓存机制,在提高缓存性能的同时实现内容共享的信息安全。首先,为了避开窃听用户并选择能够带来更好传输性能的内容提供者,提出了基于用户距离和社交信任度的内容提供者选择方案,以明确进行预缓存的用户。在此基础上,为了保证内容在D2D链路上的传输性能,并促使内容更多地缓存在用户更信任的内容提供者中,基于社交信任度和能效提出了社交相关能效的性能度量指标。然后,以最大化社交相关能效为目的,设计缓存内容布设方案,其核心优势在于:利用MDS编码特性提出安全缓存条件,从而在优化社交相关能效的基础上确保窃听用户无法获取足以恢复出原内容的编码块。最后,提出社交感知的基于MDS编码的D2D内容安全缓存算法。仿真分析表明,相比内容提供者随机选择的D2D内容安全缓存算法,所提算法的最优性能提升了15%;相比没有安全缓存条件的D2D内容缓存算法,所提算法虽然需要以42%的性能损失来确保信息安全,但其能够在内容提供者的缓存容量相对更小时实现性能最优。 Device-to-Device (D2D) content sharing technology is faced with some serious security challenges,which can be adopted to make users more conveniently and efficiently obtain contents.For D2D content sharing scenarios with eavesdroppers,secure caching mechanism based on Maximum Distance Separable (MDS) coding was designed to improve caching performance and meet security requirement.Firstly,content provider selection scheme based on users’ distance and social trust was designed to avoid that the eavesdroppers were selected to cache contents,and select content providers who could obtain higher transmission performance.Based on this,social- related energy efficiency was proposed to ensure the transmission performance and make contents be cached in the content providers that users believed in by using social trust and energy efficiency.Further,content caching placement was designed by maximizing social- related energy efficiency,whose core advantage is that secrecy constraints based on MDS coding was proposed to achieve that eavesdroppers could not obtain enough encoded packets to recover original contents.Finally,social-aware D2D secure caching algorithm based on MDS coding was proposed.Simulation results show that compared with the D2D content secure caching algorithm that content providers are selected randomly,the optimal performance of the proposed algorithm is improved by 15%.Compared with the D2D content caching algorithm without secrecy constraints,the proposed algorithm needs to achieve information security with a performance loss of 42%,but it can achieve its optimal performance when the content provider’s cache capacity is lower.
作者 张灿 史鑫 王萌 ZHANG Can;SHI Xin;WANG Meng(College of Communications Engineering,Army Engineering University of PLA,Nanjing 210007,China)
出处 《计算机科学》 CSCD 北大核心 2019年第10期167-172,共6页 Computer Science
基金 国家自然科学基金(61671474) 江苏省优秀青年基金(BK20170089)资助
关键词 D2D内容共享 窃听 社交信任度 编码缓存 安全缓存 Device-to-Device content sharing Eavesdropping Social trust Coded caching Secure caching
  • 相关文献

参考文献2

二级参考文献19

  • 1JANIS P, YU C, DOPPLER K, et al. Device-to-device communicationunder-laying cellular communications systems[J]. International JounalCommunications, Network and System Sciences, 2009,2(3):169-178.
  • 2DOPPLER K, RINNE M, R1BEIRO C, et al. Device to-device com-munication as an underlay to LTE-advanced networks[J]. IEEE Com-munications Magazine, 2009, 47(12): 42-49.
  • 3FODOR, DAHLMAN Q MILDH E, et al. Design aspects of networkassisted device-to-device communications[J]. IEEE Communications.Magazine, 2012, 50(3): 170-177.
  • 4DOPPLER K, RINNE M P, JANIS P, et al. Device-to-device commu-nications: functional prospects for LTE-advanced networks[C]//IEEEInternational Conference on Communications. c2009: 1-6.
  • 5ALAM M, DU Y, RODRIGUEZ J, et al. Secure device-to-devicecommunication in LTE-A[J]. IEEE Communications Magazine, 2014,52(4): 66-73.
  • 6ZHU D H, SWINDLEHURST A L, FAKOORIAN S A A, et al. De-vice-to-device communications: the physical layer security advan-tage[C]//2014 IEEE International Conference on Acoustics, Speechand Signal Processing (ICASSP). c2014: 1606-1610.
  • 7YUE J, MA C, YU H, et al. Secrecy-based channel assignment fordevice-to-device communication: an auction approach[C]//2013 IEEEInternational Conference on Wireless Communications & SignalProcessing (WCSP). Hangzhou, China, c2013: 1-6.
  • 8LIU Z, PENG T, XIANG S, et al. Mode selection for device-to-device(D2D) communication under LTE-Advance networks[C]//2012 IEEEInternational Conference on Communications (ICC). c2012: 5563-5567.
  • 9ZHANG R, CHENG X, YANG L. Cooperation via spectrum sharingfor physical layer security in device-to-device communications under-laying cellular networks[C]//2015 IEEE Global CommunicationsConference (GLOBECOM). c2015: 1-6.
  • 10CHU Z, CUMANAN K, XU M, et al. Robust secrecy rate optimiza-tions for multiuser multiple-input-single-output channel with de-vice-to-device communications [J]. IET Communications, 2015,9 (3):396-403.

共引文献6

同被引文献2

引证文献1

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部