2019
DOI: 10.1109/access.2019.2942214
|View full text |Cite
|
Sign up to set email alerts
|

Trust Evaluation and Covert Communication-Based Secure Content Delivery for D2D Networks: A Hierarchical Matching Approach

Abstract: In this paper, we investigate the secure content delivery issue for device-to-device networks based on the trust evaluation mechanism and covert communication model. Specifically, in order to stimulate the lasting and rational cooperation among mobile devices, we propose a trust evaluation mechanism, where the trust degree between two mobile devices can be obtained through historical assessed values. Simultaneously, a covert communication model is introduced to guarantee the undetectability of content delivery… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 14 publications
(3 citation statements)
references
References 40 publications
0
3
0
Order By: Relevance
“…The work in [20] proposes a power control scheme to guarantee the covert communications of a D2D pair, and evaluates the covert rate performance. In [21], the joint design of spectrum allocation and power control is proposed for maximizing the covert rate of a D2D pair, while the work in [22] investigates the user trust degree evaluation and spectrum allocation for achieving covert rate maximization. The authors in [23] propose two artificial noise injection schemes to confuse the detection of wardens and the maximum covert rate is further explored under each scheme.…”
Section: A Covert Communications In D2d Networkmentioning
confidence: 99%
“…The work in [20] proposes a power control scheme to guarantee the covert communications of a D2D pair, and evaluates the covert rate performance. In [21], the joint design of spectrum allocation and power control is proposed for maximizing the covert rate of a D2D pair, while the work in [22] investigates the user trust degree evaluation and spectrum allocation for achieving covert rate maximization. The authors in [23] propose two artificial noise injection schemes to confuse the detection of wardens and the maximum covert rate is further explored under each scheme.…”
Section: A Covert Communications In D2d Networkmentioning
confidence: 99%
“…The work in [13] unitized the spectrum reusing technology to implement covert communications for D2D content sharing, based on the trust evaluation mechanism. The authors in [14] further investigated the content delivery mode selection and resource management for covert communications.…”
Section: Introductionmentioning
confidence: 99%
“…To address the above-mentioned issues, matching theory based distributed scheme for the CRN with multiple heterogeneous users is advantageous. Some distributed and flexible methods based on matching theory are proposed to address the joint optimization issues of jammer selection and resource allocation for physical layer security [17]- [20].They prove that by utilizing matching theory, network users can make independent and rational strategic decisions, high-efficiency and low-complexity algorithms can be developed to model collaboration among many users. However, to the best of our knowledge, there is no literature on distributed matching mechanism to address the secure communication issue in CRNs with multiple nonaltruistic PUs, SUs, and eavesdroppers.…”
Section: Introductionmentioning
confidence: 99%