Abstract
In this paper, we investigate the secure content delivery issue for device-to-device networks based on the trust evaluation mechanism and covert communication model. Specifically, in order to stimulate the lasting and rational cooperation among mobile devices, we propose a trust evaluation mechanism, where the trust degree between two mobile devices can be obtained through historical assessed values. Simultaneously, a covert communication model is introduced to guarantee the undetectability of content delivery, which helps to stop malicious wardens adopting some coming external attacks. In this way, the availability and dependability of content sharing, as well the confidentiality and integrity of transmitted contents cam be guaranteed. Then, combining security-aware metrics, in terms of trust degree and covert rate, with physical layer transmission performances, in terms of achievable rate and successful delivery probability, we propose the definition of secrecy-aware effective rate to serve as a guidance on the joint optimization issue of content delivery mode selection and resource management, which is formulated as a social welfare maximization problem. To solve the complex problem tactfully, it is decoupled into two subproblems, i.e., mode selection which is a many-to-one matching problem, and resource management which is a one-to-one matching problem. By analyzing the interaction between two issues, a novel hierarchical stable matching algorithm is proposed to obtain three-dimension stable matching results. Its properties, such as stability, convergence, optimality, and complexity, are theoretically analyzed and proved. Finally, extensive numerical results are provided to demonstrate the advantages of our proposed algorithms.
Highlights
There exist three main categories roles for the mobile devices in a typical D2D content sharing scenario. i) Some mobile devices who have content requests are denoted as demanders. ii) Some mobile devices who have stored some popular contents previously and can serve as content transmitters for the moment are taken as potential providers. iii) Other mobile devices act as ordinary cellular users
Precise co-channel interference coordination is required to guarantee the covert communication between potential providers and demanders, as well meet the quality of service (QoS) requirements of both cellular users and D2D pairs, which can be achieved through efficient resource management mechanisms
Combining security-aware metrics, in terms of trust degree and covert rate, with physical layer transmission performances, in terms of achievable rate and successful delivery probability (SDP), we propose a novel definition of secrecy-aware effective rate to serve as a guidance on the joint optimization issue of content delivery mode selection and resource management, which is formulated as a social welfare maximization problem
Summary
The covert communication model can be exploited to provide content delivery with a high level of security assurance With this regard, precise co-channel interference coordination is required to guarantee the covert communication between potential providers and demanders, as well meet the quality of service (QoS) requirements of both cellular users and D2D pairs, which can be achieved through efficient resource management mechanisms. Considering the various security threats in D2D content sharing scenarios, we propose the trust evaluation mechanism and covert communication model to guarantee the availability and dependability of content sharing, as well the confidentiality and integrity of transmitted contents In the former, mobile devices obtain their trust degrees towards others by exploiting their own historical assessed values. It is of great significance to provide D2D content sharing with high security assurance
Published Version (
Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have