计算机科学 ›› 2019, Vol. 46 ›› Issue (10): 167-172.doi: 10.11896/jsjkx.180901776
张灿, 史鑫, 王萌
ZHANG Can, SHI Xin, WANG Meng
摘要: Device-to-Device(D2D)内容共享技术在使用户能够更加便捷、高效地获取内容的同时,也面临着更为严峻的安全挑战。针对窃听用户存在的D2D内容共享场景,通过设计基于最大距离可分(Maximum Distance Separable,MDS)码的D2D内容安全缓存机制,在提高缓存性能的同时实现内容共享的信息安全。首先,为了避开窃听用户并选择能够带来更好传输性能的内容提供者,提出了基于用户距离和社交信任度的内容提供者选择方案,以明确进行预缓存的用户。在此基础上,为了保证内容在D2D链路上的传输性能,并促使内容更多地缓存在用户更信任的内容提供者中,基于社交信任度和能效提出了社交相关能效的性能度量指标。然后,以最大化社交相关能效为目的,设计缓存内容布设方案,其核心优势在于:利用MDS编码特性提出安全缓存条件,从而在优化社交相关能效的基础上确保窃听用户无法获取足以恢复出原内容的编码块。最后,提出社交感知的基于MDS编码的D2D内容安全缓存算法。仿真分析表明,相比内容提供者随机选择的D2D内容安全缓存算法,所提算法的最优性能提升了15%;相比没有安全缓存条件的D2D内容缓存算法,所提算法虽然需要以42%的性能损失来确保信息安全,但其能够在内容提供者的缓存容量相对更小时实现性能最优。
中图分类号:
[1]LIN P,SONG Q,YU Y,et al.Extensive Cooperative Caching in D2D Integrated Cellular Networks[J].IEEE Communications Letters,2017,21(9):2101-2104. [2]WU D,ZHOU L,CAI Y,et al.Physical-Social-Aware D2D Con-tent Sharing Networks:A Provider-Demander Matching Game[J].IEEE Transactions on Vehicular Technology,2018,67(8):7538-7549. [3]YUAN X L,WANG X Y,WANG J F,et al.Enabling Secure and Efficient Video Delivery Through Encrypted in-Network Caching[J].IEEE Journal on Selected Areas in Communications,2016,34(8):1-1 [4]SENGUPTA A,TANDON R,CLANCYl T.Fundamental Li-mits of Caching with Secure Delivery[C]//IEEE International Conference on Communications Workshops.IEEE,2013. [5]AWAN Z H,SEZGIN A.Fundamental Limits of Caching in D2D Networks With Secure Delivery[C]//Proceedings of IEEE International Conference on Communication Workshop.London:IEEE Press,2015:464-469. [6]ZEWAIL A A,YENER A.Fundamental Limits of Secure Device-to-Device Coded Caching[C]//Proceedings of 50th Asilomar Conference on Signals,Systems and Computers.Pacific Grove:IEEE Press,2016:1414-1418 [7]ZEWAIL A A,YENER A.Coded Caching for Resolvable Networks with Security Requirements[C]//Proceedings of IEEE Conference on Communications and Network Security.Philadelphia:IEEE Press,2016:621-625 [8]RAVINDRAKUMAR V,PANDA P,KARAMCHANDANI N,et al.Private Coded Caching[J].IEEE Transactions on Information Forensics and Security,2018,13(3):685-694. [9]SU Z,XU Q C.Security-Aware Resource Allocation for Mobile Social Big Data:A Matching-Coalitional Game Solution[J].IEEE Transactions on Big Data,2017:PP(5):1-1. [10]WYNER A D.The Wire-Tap Channe[J].Bell System Technical Journal,1975,54(8):1355-1387. [11]CHEN Y J,JI X S,HUANG K Z,et al.Secrecy Outage Probability Based Access Strategy for Device-to-Device Communication Underlaying Cellular Networks[J].Chinese Journal on Communications,2016,37(8):86-94.(in Chinese) 陈亚军,季新生,黄开枝,等.基于安全中断概率的D2D安全接入策略[J].通信学报,2016,37(8):86-94. [12]LUO Y,CUI L,YANG Y.Research on Physical Layer Security in D2D Enabled Cellular Networks with an Active Eavesdropper[J].Chinese Journal of Signal Processing,2018,34(1):119-125.(in Chinese) 罗屹洁,崔丽,杨旸.D2D使能蜂窝网络中存在主动窃听者的物理层安全研究[J].信号处理,2018,34(1):119-125. [13]WANG L,WU H,LIU L,et al.Secrecy-Oriented Partner Selection Based on Social Trust in Device-to-Device Communications[C]//Proceedings of IEEE International Conference on Communications.London:IEEE Press,2015:7275-7279. [14]QU J,CAI Y,WU D,et al.Stackelberg Game Based Power Allocation for Physical Layer Security of Device-to-Device Communication underlaying Cellular Networks[J].Frequenz,2014,68(5/6):285-295. [15]GABRY F,BIOGLIO V,LAND I.On Edge Caching with Secrecy Constraints[C]//Proceedings of IEEE International Confe-rence on Communications.New Jersey:IEEE Press,2016:1-6. [16]WANG L,WU H.Jamming Partner Selection for Maximizing the Worst D2D Secrecy Rate Based on Social Trust[J].IEEE Transactions on Emerging Telecommunications Technologies,2017,28(2):1-11. [17]ZHANG G,YANG K,CHEN H H.Socially Aware Cluster Formation and Radio Resource Allocation in D2D Networks[J].IEEE Wireless Communications,2016,23(4):68-73. [18]ZHAO P,FENG L,YU P,et al.A Social-Aware Resource Allocation for 5G Device-to-Device Multicast Communication[J].IEEE Access,2017,5:15717-15730. [19]FENG L,ZHAO P,ZHOU F,et al.Resource Allocation for 5G D2D Multicast Content Sharing in Social-Aware Cellular Networks[J].IEEE Communications Magazine,2018,56(3):112-118. [20]JI M,CAIRE G,MOLISCH A.Wireless Device-to-Device Caching Networks:Basic Principles and System Performance[J].IEEE Journal on Selected Areas in Communications,2016,34(1):176-189. |
[1] | 徐光宪, 崔俊杰. 一种基于量子GHZ态的防窃听网络编码 Anti-eavesdropping Network Coding Based on Quantum GHZ State 计算机科学, 2020, 47(7): 314-321. https://doi.org/10.11896/jsjkx.190500168 |
[2] | 刘宴涛,王雪冰. 窃听攻击下子空间码的安全性 Security of Subspace Code against Wiretap Attacks 计算机科学, 2017, 44(Z6): 372-376. https://doi.org/10.11896/j.issn.1002-137X.2017.6A.084 |
[3] | 黄静,席博,李鹏,张帆,赵新杰. 一种基于量子密码的卫星网络窃听攻击检测方法 Method for Detecting Wiretapping Attack in Satellite Network Based on Quantum Cryptography 计算机科学, 2016, 43(7): 157-161. https://doi.org/10.11896/j.issn.1002-137X.2016.07.028 |
[4] | 赵佳佳,任平安. 基于抗窃听和拜占庭攻击的随机网络编码 Random Network Coding Based on Anti-eavesdropping and Byzantine Adversaries 计算机科学, 2014, 41(9): 174-177. https://doi.org/10.11896/j.issn.1002-137X.2014.09.033 |
[5] | 曹张华,吉晓东,刘敏. 网络编码在窃听网络中的应用 Application of Network Coding in Wiretap Network 计算机科学, 2013, 40(10): 144-147. |
|