基于深度学习的社交感知D2D同伴发现机制

Yunhan Long, R. Yamamoto, Taku Yamazaki, Y. Tanaka
{"title":"基于深度学习的社交感知D2D同伴发现机制","authors":"Yunhan Long, R. Yamamoto, Taku Yamazaki, Y. Tanaka","doi":"10.23919/ICACT.2019.8701911","DOIUrl":null,"url":null,"abstract":"With the demand for rapid exchanges of information, device to device (D2D) communications become one of the essential components of next-generation network architecture. To realize efficient D2D communication, peer discovery plays an important role since the discovery result strongly affects further performance. Most of the researches on peer discovery in D2D communication are based on discovering proximity devices to recognize nearby destination devices. In particular, some researches focus on time slot distribution to broadcast address information for discovering proximity devices. Moreover, other researches pay attention to user grouping with different beacon probing signals. However, these peer discovery mechanisms do not consider the risks that source devices may encounter malicious devices in real situations. As a solution to this, this paper proposes a peer discovery mechanism which applies the social network relationship information to exclude malicious devices. The proposed mechanism contributes to decrease the probability of encountering malicious devices and enhances the efficiency of peer discovery by excluding malicious devices. Simulations clarify that the base station (BS) extracts trusted candidates among devices to quantify the trust degree of devices based on the potential social information.","PeriodicalId":226261,"journal":{"name":"2019 21st International Conference on Advanced Communication Technology (ICACT)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"A Deep Learning Based Social-aware D2D Peer Discovery Mechanism\",\"authors\":\"Yunhan Long, R. Yamamoto, Taku Yamazaki, Y. Tanaka\",\"doi\":\"10.23919/ICACT.2019.8701911\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the demand for rapid exchanges of information, device to device (D2D) communications become one of the essential components of next-generation network architecture. To realize efficient D2D communication, peer discovery plays an important role since the discovery result strongly affects further performance. Most of the researches on peer discovery in D2D communication are based on discovering proximity devices to recognize nearby destination devices. In particular, some researches focus on time slot distribution to broadcast address information for discovering proximity devices. Moreover, other researches pay attention to user grouping with different beacon probing signals. However, these peer discovery mechanisms do not consider the risks that source devices may encounter malicious devices in real situations. As a solution to this, this paper proposes a peer discovery mechanism which applies the social network relationship information to exclude malicious devices. The proposed mechanism contributes to decrease the probability of encountering malicious devices and enhances the efficiency of peer discovery by excluding malicious devices. Simulations clarify that the base station (BS) extracts trusted candidates among devices to quantify the trust degree of devices based on the potential social information.\",\"PeriodicalId\":226261,\"journal\":{\"name\":\"2019 21st International Conference on Advanced Communication Technology (ICACT)\",\"volume\":\"41 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 21st International Conference on Advanced Communication Technology (ICACT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.23919/ICACT.2019.8701911\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 21st International Conference on Advanced Communication Technology (ICACT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/ICACT.2019.8701911","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9

摘要

随着信息快速交换的需求,设备到设备(D2D)通信成为下一代网络体系结构的重要组成部分之一。为了实现高效的D2D通信,对等体发现起着至关重要的作用,因为对等体发现的结果对进一步的性能影响很大。在D2D通信中,大多数对等体发现的研究都是基于发现邻近设备来识别附近的目的设备。特别是,一些研究侧重于时隙分布来广播地址信息,以发现邻近设备。此外,其他研究也关注不同信标探测信号下的用户分组。但是,这些对等体发现机制没有考虑源设备在实际情况下可能遇到恶意设备的风险。为了解决这一问题,本文提出了一种利用社交网络关系信息排除恶意设备的对等发现机制。该机制通过排除恶意设备,降低了遇到恶意设备的概率,提高了对等体发现的效率。仿真结果表明,基站(BS)基于潜在的社会信息,从设备中提取可信候选者,量化设备的信任程度。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
A Deep Learning Based Social-aware D2D Peer Discovery Mechanism
With the demand for rapid exchanges of information, device to device (D2D) communications become one of the essential components of next-generation network architecture. To realize efficient D2D communication, peer discovery plays an important role since the discovery result strongly affects further performance. Most of the researches on peer discovery in D2D communication are based on discovering proximity devices to recognize nearby destination devices. In particular, some researches focus on time slot distribution to broadcast address information for discovering proximity devices. Moreover, other researches pay attention to user grouping with different beacon probing signals. However, these peer discovery mechanisms do not consider the risks that source devices may encounter malicious devices in real situations. As a solution to this, this paper proposes a peer discovery mechanism which applies the social network relationship information to exclude malicious devices. The proposed mechanism contributes to decrease the probability of encountering malicious devices and enhances the efficiency of peer discovery by excluding malicious devices. Simulations clarify that the base station (BS) extracts trusted candidates among devices to quantify the trust degree of devices based on the potential social information.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Novel Ranging Code based on improved Logistic Map Chaotic Sequences A Learning Kit on IPv6 Deployment and its Security Challenges for Neophytes Cybercrime Countermeasure of Insider Threat Investigation A Novel Ultra-Wideband Antenna Operating in the frequency band of 2.5-40GHz Modelling Chlorophyll-a Concentration using Deep Neural Networks considering Extreme Data Imbalance and Skewness
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1