Wireless powered D2D communication security using LSTM in emergency communication system

Youbing Hu, Lixin Li, Huisheng Zhang, Wei Liang, Ang Gao

科研成果: 书/报告/会议事项章节会议稿件同行评审

2 引用 (Scopus)

摘要

This paper investigates the security of wireless-powered device-to-device (D2D) communication networks in an emergency communication system with multiple eavesdroppers, where an unmanned aerial vehicle (UAV) acts as a temporary base station providing wireless power for the D2D transmitters to guarantee power efficiency for the D2D network, and serving as cooperative jammer (CJ) to interfere with the eavesdroppers. Considering the privacy of D2D communication, we formulate the establishment of D2D pairs as a multi-class classification problem, and use the Long Short-Term Memory (LSTM) algorithm to classify potential D2D transmitters. Specifically, the LSTM algorithm is based on the remaining energy of the temporary base station, the mobile state of the potential D2D transmitter and the content request amount of the D2D receiver to establish D2D communication that achieves the optimal security performance. The simulation results show that the LSTM-based D2D establishment scheme can effectively improve the security capability of D2D communication, and prove that the amount of energy harvested by the D2D transmitter affects the security capacity of the D2D communication system.

源语言英语
主期刊名2019 28th Wireless and Optical Communications Conference, WOCC 2019 - Proceedings
出版商Institute of Electrical and Electronics Engineers Inc.
ISBN(电子版)9781728106601
DOI
出版状态已出版 - 5月 2019
活动28th Wireless and Optical Communications Conference, WOCC 2019 - Beijing, 中国
期限: 9 5月 201910 5月 2019

出版系列

姓名2019 28th Wireless and Optical Communications Conference, WOCC 2019 - Proceedings

会议

会议28th Wireless and Optical Communications Conference, WOCC 2019
国家/地区中国
Beijing
时期9/05/1910/05/19

指纹

探究 'Wireless powered D2D communication security using LSTM in emergency communication system' 的科研主题。它们共同构成独一无二的指纹。

引用此