| D2D communication technology can improve network spectral efficiency and energy efficiency and reduce transmission delay, shunt base station load. On the basis of analyzing the research status of D2D communication technology at home and abroad, most researches on D2D communication consider the use of its physical domain information. In mobile social network, the social information between users plays an important role in maintaining the stability of communication, improving system throughput capacity, security performance. Therefore, in this paper,we focus on wireless resource management of D2D communication in mobile social network.This paper focuses on the introduction of social factors into the D2D communication system, and studies the spectrum resource sharing in the D2D communication reuse mode and the security performance improvement in the dedicated mode of D2D communication.Firstly, the problem of spectrum resource sharing in D2D communication reuse mode is modeled in the single cell base station scenario. Considering the social interaction information and physical channel information between D2D links, the transmission success rate in single time slot and multi-time slot transmission scenario is analyzed separately. The social factors were introduced into the capacity optimization problem, and the proposed scheme was verified by the simulation experiment. Simulation results show that the performance of the system based on social-driven D2D spectrum resource sharing scheme is better than that without consideration of social information.Then, based on the physical layer security problem in D2D communication, this paper introduces the social factors in the cooperative jamming mechanism in the single-cell base station scenario, considering the social interaction information, social trust information and The optimal transmission node and the optimal cooperative node selection scheme are designed to enhance the security transmission performance of the system.The simulation results of the proposed scheme are verified. The simulation results show that the scheme proposed in this paper has a certain theoretical and practical significance compared with the situation without taking into account the social information, the security and reliability of the system are improved. |