Abstract
This paper proposes a novel clustering scheme by considering both physical and social relationships among handheld terminals in device-to-device (D2D) communications. As social network activities grows explosively, social trust among mobile users based on their daily interactions has had an increasingly significant effect on behaviors and secrecy of D2D cluster communications. We modify the well-known K-means algorithm to characterize the formation of our D2D clusters by taking both physical distance and social trust among nodes into account. Numerical results demonstrate the advantages of our proposed scheme over other existing schemes in terms of system secrecy contribution.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Wang, L., Wu, H.: Fast pairing of device-to-device link underlay for spectrum sharing with cellular users. IEEE Commu. Lett. 18(10), 1803–1806 (2014)
Min, H., Seo, W., Lee, J., Park, S., Hong, D.: Reliability improvement using receive mode selection in the device-to-device uplink period underlaying cellular networks. IEEE ITWC 10(2), 413–418 (2011)
Wang, L., Araniti, G., Cao, C., Wang, W., Liu, Y.: Device-to-device users clustering based on physical and social characteristics. IEEE JDSN (2015)
Wen, S., Zhu, X., Lin, Z., Zhang, X., Yang, D.: Energy efficient power allocation schemes for device-to-device (D2D) communication. In: IEEE VTC Fall, Las Vegas, USA, pp. 1–5, September 2013
Tang, H., Ding, Z., Yoo, S.J.B., Hamalainen, J.: Outage constrained joint precoding for D2D underlay cellular networks. In: IEEE GLOBECOM, Atlanta, USA, pp. 3540–3545, December 2013
Wang, L., Tang, H., Ciemy, M.: Device-to-device link admission policy based on social interaction information. IEEE TVT 10(99), 1–7 (2014)
Chen, X., Ian Proulx, B., Gong, X., Zhang, J.: Social trust and social reciprocity based cooperative D2D communications. In: ACM MobiHoc, Bangalore, India, pp. 187–196, July 2013
Wang, Y., Wu, J.: Social-tie-based information dissemination in mobile opportunistic social networks. In: WWMMN, Madrid, Spain, pp. 1–6, June 2013
Chen, K.-C., Chiang, M., Poor, V.: From technological networks to social networks. IEEE JSAC 31(9), 548–572 (2013)
Gupta, U., Ranganathan, N.: A game theoretic approach for simultaneous compaction and equipartitioning of spatial data sets. IEEE TKDE 22(4), 465–478 (2010)
Park, G.Y., Kim, H., Jeong, H.W., Youn, H.Y.: A novel cluster head selection method based on k-means algorithm for energy efficient wireless sensor network. In: IEEE ICAINAW, Barcelona, Spain, pp. 910–915, March 2013
Acknowledgment
This work was supported in part by the National Natural Science Foundation of China (Grant No. 61201150), the Beijing Higher Education Young Elite Teacher Project (Grant No. YETP0442) as well as US National Science Foundation under grant CNS-1065444.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Zhang, L., Wang, L., Du, X. (2015). Secrecy-Oriented Adaptive Clustering Scheme in Device-to-Device Communications. In: Xu, K., Zhu, H. (eds) Wireless Algorithms, Systems, and Applications. WASA 2015. Lecture Notes in Computer Science(), vol 9204. Springer, Cham. https://doi.org/10.1007/978-3-319-21837-3_71
Download citation
DOI: https://doi.org/10.1007/978-3-319-21837-3_71
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-21836-6
Online ISBN: 978-3-319-21837-3
eBook Packages: Computer ScienceComputer Science (R0)