Font Size: a A A

Research On Social-relationship-based Physical Layer Transmission Security For D2D Networks

Posted on:2022-04-23Degree:MasterType:Thesis
Country:ChinaCandidate:J J FanFull Text:PDF
GTID:2518306563976849Subject:Communication and Information System
Abstract/Summary:PDF Full Text Request
With the large-scale popularization of mobile wireless devices,the demand for data transmission between devices in future wireless networks will increase exponentially,and the shortage of spectrum resources cannot be ignored.As a key technology of the nextgeneration mobile communication network,Device-to-Device(D2D)communication can improve the spectrum utilization and reduce the base station load,and has been applied in many fields.Considering the openness of wireless communication and various security threats such as eavesdropping and attacks,the privacy and confidentiality of data transmitted through wireless communication networks have become critical.Providing high-quality security services is the most important goal of wireless network design and development.Although traditional methods based on high-level encryption can provide security,the low hardware configuration of the device makes it not sufficient to implement complex encryption measures.Physical layer security utilizes the inherent randomness of the wireless channel in the physical layer to achieve confidentiality.This advantage makes physical layer security very suitable for implementation in 5G and higher-level complex networks.The interaction between mobile devices naturally forms social relationships.This paper uses social relationships as an internal incentive for cooperative jamming schemes and designs safe and effective optimization algorithms of social and physical layer.Specifically,the main research work of this paper is as follows:(1)Firstly,this paper surveys the overview,challenges and existing works of physical layer security.And this paper investigates physical layer security for D2 D communication and social attributes,including D2 D communication system,physical layer security technology and social attribute analysis basis,which lay the foundation for further schemes.(2)Secondly,considering the difference in mastered social information,this paper designs different methods for social attribute extraction and social relationship quantification based on historical records and time-interspace statistical characteristics.According to the historical records of communication interactions between devices,this paper applies Prophet time series model to create a reasonable and accurate prediction of social intimacy.According to time-interspace statistical characteristics,this paper formulates social relationships by using the probability distribution of communication duration and distance between devices.(3)Finally,based on the proposed social relationship quantification methods,this paper further designs cooperative jamming strategies of social layer and physical layer respectively in the scenarios where the channel state information is known and statistics are known.According to the channel state information of device communications,the scheme considers the security performance of physical layer and the social relationship of application layer,proposes the optimal matching problem between D2 D devices and cellular devices,and then applies Kuhn-Munkres(KM)algorithm to get the optimal solution.For the situation where the statistical property of channel state information between devices is known,this paper analyzes the connection outage probability and security outage probability of the system.In order to solve the contradiction between them,this paper optimizes the security transmission probability to ensure the reliability and security of the system.The paper consists of 5 chapters,including 20 figures,3 tables and 71 references.
Keywords/Search Tags:Device-to-Device (D2D) communications, physical layer security, cooperative jamming, social relationship, channel state information
PDF Full Text Request
Related items