Browse > Article
http://dx.doi.org/10.3837/tiis.2019.09.009

MDS Coded Caching for Device-to-Device Content Sharing Against Eavesdropping  

Shi, Xin (College of Communications Engineering, Army Engineering University of PLA)
Wu, Dan (College of Communications Engineering, Army Engineering University of PLA)
Wang, Meng (College of Communications Engineering, Army Engineering University of PLA)
Yang, Lianxin (College of Communications Engineering, Army Engineering University of PLA)
Wu, Yan (College of Communications Engineering, Army Engineering University of PLA)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.13, no.9, 2019 , pp. 4484-4501 More about this Journal
Abstract
In this paper, we put forward a delay-aware secure maximum distance separable (MDS) coded caching scheme to resist the eavesdropping attacks for device-to-device (D2D) content sharing by combining MDS coding with distributed caching. In particular, we define the average system delay to show the potential coupling of delay-content awareness, and learn the secure constraints to ensure that randomly distributed eavesdroppers cannot obtain enough encoded packets to recover their desired contents. Accordingly, we model such a caching problem as an optimization problem to minimize the average system delay with secure constraints and simplify it to its convex relaxation. Then we develop a delay-aware secure MDS coded caching algorithm to obtain the optimal caching policy. Extensive numerical results are provided to demonstrate the excellent performance of our proposed algorithm. Compared with the random coded caching scheme, uniform coded caching scheme and popularity based coded caching scheme, our proposed scheme has 3.7%, 3.3% and 0.7% performance gains, respectively.
Keywords
D2D content sharing; MDS coded caching; secure constraints; eavesdropping; convex relaxation;
Citations & Related Records
Times Cited By KSCI : 1  (Citation Analysis)
연도 인용수 순위
1 L. Wang, H. Wu, Y. Ding, W. Chen, and H. V. Poor, "Hypergraph-Based Wireless Distributed Storage Optimization for Cellular D2D Underlays," IEEE Journal on Selected Areas in Communications, vol. 34, no. 10, pp. 2650-2666, Oct. 2016.   DOI
2 F. Gabry, V. Bioglio, and I. Land, "On edge caching in the presence of malicious users," in Proc. of 2016 IEEE International Conference on Communications Workshops, Kuala Lumpur, pp. 278-283, 2016.
3 D. Wu, L. Zhou, Y. Cai, H. Chao, and Y. Qian, "Physical-Social-Aware D2D Content Sharing Networks: A Provider-Demander Matching Game," IEEE Transactions on Vehicular Technology, vol. 67, no. 8, pp. 7538-7549, Aug. 2018.   DOI
4 M. Baldi, M. Bianchi, N. Maturo, and F. Chiaraluce, "A Physical Layer Secured Key Distribution Technique for IEEE 802.11g Wireless Networks," IEEE Wireless Communications Letters, vol. 2, no. 2, pp. 183-186, Apr. 2013.   DOI
5 T. T. Tran and H. Y. Kong, "CSI-Secured Orthogonal Jamming Method for Wireless Physical Layer Security," IEEE Communications Letters, vol. 18, no. 5, pp. 841-844, May 2014.   DOI
6 Y. Liu, H. Chen, and L. Wang, "Physical Layer Security for Next Generation Wireless Networks: Theories, Technologies, and Challenges," IEEE Communications Surveys & Tutorials, vol. 19, no. 1, pp. 347-376, 1st Quart., 2017.   DOI
7 L. Zhou, D. Wu, B. Zheng, and M. Guizani, "Joint physical-application layer security for wireless multimedia delivery," IEEE Communications Magazine, vol. 52, no. 3, pp. 66-72, Mar. 2014.   DOI
8 Y. Wu, D. Wu, L. Yang, and S. Xu, "Incentive-based cluster formation for D2D multicast content sharing," in Proc. of 2018 Asia-Pacific Conference on Communications, Ningbo, China, pp. 125-130, 2018.
9 J. Liao, K. Wong, Y. Zhang, Z. Zheng, and K. Yang, "MDS Coded Cooperative Caching for Heterogeneous Small Cell Networks," in Proc. of 2017 IEEE Global Communications Conference, Singapore, pp. 1-7, 2017.
10 W. Zhang, W. He, D. Wu, and Y. Cai, "Joint Mode Selection, Link Allocation and Power Control in Underlaying D2D Communication," KSII Transactions on Internet and Information Systems, vol. 10, no. 11, pp. 5209-5228, Nov. 2016.   DOI
11 M. Ji, A. M. Tulino, J. Llorca, and G. Caire, "On the average performance of caching and coded multicasting with random demands," in Proc. of 2014 International Symposium on Wireless Communications Systems, Barcelona, pp. 922-926, 2014.
12 L. Sun, Q. Du, P. Ren, and Y. Wang, "Two Birds With One Stone: Towards Secure and Interference-Free D2D Transmissions via Constellation Rotation," IEEE Transactions on Vehicular Technology, vol. 65, no. 10, pp. 8767-8774, Oct. 2016.   DOI
13 L. Sun and H. Xu, "Fountain-Coding-Based Secure Communications Exploiting Outage Prediction and Limited Feedback," IEEE Transactions on Vehicular Technology, vol. 68, no. 1, pp. 740-753, Jan. 2019.   DOI
14 M. Ji, G. Caire, and A. F. Molisch, "Wireless Device-to-Device Caching Networks: Basic Principles and System Performance," IEEE Journal on Selected Areas in Communications, vol. 34, no. 1, pp. 176-189, Jan. 2016.   DOI
15 S. Boyd and L. Vandenberghe, Convex Optimization, Cambridge University Press, 2004.
16 B. S. C. Choi and M. Gerla, "Wireless Interrupt: Inter-Device Signaling in Next Generation Wireless Networks," in Proc. of 2010 IEEE Conference on Computer Communications Workshops, San Diego, CA, pp. 1-5, 2010.
17 S. A. Saberali, L. Lampe, and I. F. Blake, "Decentralized Coded Caching Without File Splitting," IEEE Transactions on Wireless Communications, vol. 18, no. 2, pp. 1289-1303, Feb. 2019.   DOI
18 J. Pedersen, A. G. i. Amat, I. Andriyanova, and F. Brannstrom, "Optimizing MDS Coded Caching in Wireless Networks With Device-to-Device Communication," IEEE Transactions on Wireless Communications, vol. 18, no. 1, pp. 286-295, Jan. 2019.   DOI
19 T. D. Tran, T. D. Hoang, and L. B. Le, "Caching for Heterogeneous Small-Cell Networks With Bandwidth Allocation and Caching-Aware BS Association," IEEE Wireless Communications Letters, vol. 8, no. 1, pp. 49-52, Feb. 2019.   DOI
20 D. Wu, L. Zhou, and Y. Cai, "Social-Aware Rate Based Content Sharing Mode Selection for D2D Content Sharing Scenarios," IEEE Transactions on Multimedia, vol. 19, no. 11, pp. 2571-2582, Nov. 2017.   DOI
21 D. Wu, L. Zhou, Y. Cai, and Y. Qian, "Optimal Content Sharing Mode Selection for Social-Aware D2D Communications," IEEE Wireless Communications Letters, vol. 7, no. 6, pp. 910-913, Dec. 2018.   DOI
22 J. Qu, L. Zhou, G. Zhang, D. Wu, J. Zheng, and Y. Cai, "Secure Caching in D2D Content Sharing," in Proc. of 2018 IEEE International Conference on Communications Workshops, pp. 1-6, Kansas City, MO, 2018.
23 R. Wang, X. Peng, J. Zhang, and K. B. Letaief, "Mobility-aware caching for content-centric wireless networks: modeling and methodology," IEEE Communications Magazine, vol. 54, no. 8, pp. 77-83, Aug. 2016.   DOI
24 M. Sheng, C. Xu, J. Liu, J. Song, X. Ma, and J. Li, "Enhancement for content delivery with proximity communications in caching enabled wireless networks: architecture and challenges," IEEE Communications Magazine, vol. 54, no. 8, pp. 70-76, Aug. 2016.   DOI
25 D. Wu, L. Zhou, Y. Cai, and Y. Qian, "Collaborative Caching and Matching for D2D Content Sharing," IEEE Wireless Communications, vol. 25, no. 3, pp. 43-49, June 2018.   DOI
26 M. Ahmed, Y. Li, M. Waqas, M. Sheraz, D. Jin, and Z. Han, "A Survey on Socially Aware Device-to-Device Communications," IEEE Communications Surveys & Tutorials, vol. 20, no. 3, pp. 2169-2197, 3rd Quart., 2018.   DOI
27 C. E. Shannon, "Communication theory of secrecy systems," The Bell System Technical Journal, vol. 28, no. 4, pp. 656-715, 1949.   DOI
28 J. Liao, K. Wong, Y. Zhang, Z. Zheng, and K. Yang, "Coding, Multicast, and Cooperation for Cache- Enabled Heterogeneous Small Cell Networks," IEEE Transactions on Wireless Communications, vol. 16, no. 10, pp. 6838-6853, Oct. 2017.   DOI
29 M. Haus, M. Waqas, A. Y. Ding, Y. Li, S. Tarkoma, and J. Ott, "Security and Privacy in Device-to-Device (D2D) Communication: A Review," IEEE Communications Surveys & Tutorials, vol. 19, no. 2, pp. 1054-1079, 2nd Quart., 2017.   DOI
30 A. Zhang and X. Lin, "Security-Aware and Privacy-Preserving D2D Communications in 5G," IEEE Network, vol. 31, no. 4, pp. 70-77, 2017.   DOI
31 M. Ahmed, H. Shi, X. Chen, Y. Li, M. Waqas, and D. Jin, "Socially Aware Secrecy-Ensured Resource Allocation in D2D Underlay Communication: An Overlapping Coalitional Game Scheme," IEEE Transactions on Wireless Communications, vol. 17, no. 6, pp. 4118-4133, June 2018.   DOI
32 L. Wang, J. Liu, M. Chen, G. Gui, and H. Sari, "Optimization-Based Access Assignment Scheme for Physical-Layer Security in D2D Communications Underlaying a Cellular Network," IEEE Transactions on Vehicular Technology, vol. 67, no. 7, pp. 5766-5777, July 2018.   DOI
33 J. Wang, Y. Huang, S. Jin, R. Schober, X. You, and C. Zhao, "Resource Management for Device-to-Device Communication: A Physical Layer Security Perspective," IEEE Journal on Selected Areas in Communications, vol. 36, no. 4, pp. 946-960, Apr. 2018.   DOI
34 F. Gabry, V. Bioglio, and I. Land, "On edge caching with secrecy constraints," in Proc. of 2016 IEEE International Conference on Communications, Kuala Lumpur, pp. 1-6, 2016.
35 V. Bioglio, F. Gabry, and I. Land, "Optimizing MDS Codes for Caching at the Edge," in Proc. of 2015 IEEE Global Communications Conference, San Diego, CA, pp. 1-6, 2015.