Secrecy-oriented adaptive clustering scheme in device-to-device communications

Luke Zhang, Li Wang, Xiaojiang Du

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

This paper proposes a novel clustering scheme by considering both physical and social relationships among handheld terminals in device-to-device (D2D) communications. As social network activities grows explosively, social trust among mobile users based on their daily interactions has had an increasingly significant effect on behaviors and secrecy of D2D cluster communications. We modify the well-known Kmeans algorithm to characterize the formation of our D2D clusters by taking both physical distance and social trust among nodes into account. Numerical results demonstrate the advantages of our proposed scheme over other existing schemes in terms of system secrecy contribution.

Original languageEnglish
Title of host publicationWireless Algorithms, Systems, and Applications - 10th International Conference, WASA 2015, Proceedings
EditorsKuai Xu, Haojin Zhu
Pages725-734
Number of pages10
DOIs
StatePublished - 2015
Event10th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2015 - Qufu, China
Duration: 10 Aug 201512 Aug 2015

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9204
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference10th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2015
Country/TerritoryChina
CityQufu
Period10/08/1512/08/15

Keywords

  • Clustering
  • Device-to-Device communication
  • K-means algorithm
  • Social trust

Fingerprint

Dive into the research topics of 'Secrecy-oriented adaptive clustering scheme in device-to-device communications'. Together they form a unique fingerprint.

Cite this