Chinese Journal of Network and Information Security ›› 2019, Vol. 5 ›› Issue (6): 31-41.doi: 10.11959/j.issn.2096-109x.2019060
• Papers • Previous Articles Next Articles
Zhangjian HUANG1,2,Guohua YE1,2,Zhiqiang YAO1,2()
Revised:
2019-07-11
Online:
2019-12-15
Published:
2019-12-14
Supported by:
CLC Number:
Zhangjian HUANG,Guohua YE,Zhiqiang YAO. D2D data sharing partner selection mechanism based on privacy degree and stability degree[J]. Chinese Journal of Network and Information Security, 2019, 5(6): 31-41.
[1] | PEDHADIYA M K , JHA R K , BHATT H G . Device to device communication:A survey[J]. Journal of Network and Computer Applications, 2019,129: 71-89. |
[2] | WU D , ZHOU L , CAI Y . Social-aware rate based content sharing mode selection for D2D content sharing scenarios[J]. IEEE Transactions on Multimedia, 2017,19(11): 2571-2582. |
[3] | JIANG J , ZHANG S , LI B ,et al. Maximized cellular traffic offloading via device-to-device content sharing[J]. IEEE Journal on Selected Areas in Communications, 2016,34(1): 82-91. |
[4] | MILITANO L , ARANITI G , CONDOLUCI M ,et al. Device-to-device communications for 5G internet of things[J]. EAI Endorsed Transactions on Internet of Things, 2015,15(1): 1-15. |
[5] | ZHANG A , CHEN J , HU R Q ,et al. SeDS:secure data sharing strategy for D2D communication in LTE-advanced networks[J]. IEEE Transactions on Vehicular Technology, 2016,65(4): 2659-2672. |
[6] | YU T , ZHOU Z , ZHANG D ,et al. Indapson:an incentive data plan sharing system based on self-organizing network[C]// IEEE Conference on Computer Communications. 2014: 1545-1553. |
[7] | HE J Z , WANG H B , ZHANG T . Incentive and selection for D2D content sharing:a comprehensive scoring mechanism[C]// 2016 IEEE 13th International Conference on Signal Processing (ICSP). 2016: 1208-1213. |
[8] | ZHOU R F , HWANG K . PowerTrust:a robust and scalable reputation system for trusted peer-to-peer computing[C]// IEEE Transactions on Parallel and Distributed Systems. 2007: 460-473. |
[9] | 华佳烽, 李凤华, 郭云川 ,等. 信息交换过程中的隐私保护技术研究[J]. 网络与信息安全学报, 2016,2(3): 28-38. |
HUA J W , LI F H , GUO Y C ,et al. Research on privacy protection technology in information exchange process[J]. Journal of Network and Information Security, 2016,2(3): 28-38. | |
[10] | WISHART R , HENRICKSEN K , INDULSKA J . Context privacy and obfuscation supported by dynamic context source discovery and processing in a context management system[C]// International Conference on Ubiquitous Intelligence and Computing. 2007: 929-940. |
[11] | FRANZ E , SPRINGER T , HARDER N . Enhancing privacy in social applications with the notion of group context[C]// 2012 International Conference for Internet Technology and Secured Transactions. 2012: 112-118. |
[12] | WANG M , YAN Z . Privacy-preserving authentication and key agreement protocols for D2D group communications[J]. IEEE Transactions on Industrial Informatics, 2018,14(8): 3637-3647. |
[13] | MOHSENI-EJIYEH A , ASHOURI-TALOUKI M , MAHDAVI M . A lightweight and secure data sharing protocol for D2D communications[C]// 2017 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC). 2017: 42-47. |
[14] | ZHANG A , WANG L , YE X ,et al. Light-weight and robust security-aware D2D-assist data transmission protocol for mobile-health systems[J]. IEEE Transactions on Information Forensics and Security, 2017,12(3): 662-675. |
[15] | YAN J , WU D , WANG R . Socially aware trust framework for multimedia delivery in D2D cooperative communication[J]. IEEE Transactions on Multimedia, 2019,21(3): 625-635. |
[16] | HE J , WANG H , CHU X ,et al. Incentive mechanism and content provider selection for device-to-device-based content sharing[J]. IEEE Transactions on Vehicular Technology, 2019. |
[17] | JAMEEL F , HAMID Z , JABEEN F ,et al. A survey of device-to-device communications:research issues and challenges[J]. IEEE Communications Surveys & Tutorials, 2018,20(3): 2133-2168. |
[18] | JENSEN C D , KORSGAARD T R . Dynamics of trust evolution:auto-configuration of dispositional trust dynamics[C]// International Conference on Security and Cryptography. 2008: 509-517. |
[19] | BAI B , WANG L , HAN Z ,et al. Caching based socially-aware D2D communications in wireless content delivery networks:a hypergraph framework[J]. IEEE Wireless Communications, 2016,23(4): 74-81. |
[20] | JING L , NG M K , HUANG J Z . An entropy weighting k-means algorithm for subspace clustering of high-dimensional sparse data[J]. IEEE Transactions on Knowledge & Data Engineering, 2007(8): 1026-1041. |
[21] | 张近乐, 任杰 . 熵理论中熵及熵权计算式的不足与修正[J]. 统计与信息论坛, 2011,26(1): 3-5. |
ZHANG J L , REN J . The deficiencies and amendments of the calculation formulate of entropy and entropy weight in the theory of entropy[J]. Statistics & Information Forum, 2011,26(1): 3-5. | |
[22] | JIN B , JIANG D , XIONG J ,et al. D2D data privacy protection mechanism based on reliability and homomorphic encryption[J]. IEEE Access, 2018,6: 51140-51150. |
[1] | Xianyi CHEN, Jun GU, Kai YAN, Dong JIANG, Linfeng XU, Zhangjie FU. Double adversarial attack against license plate recognition system [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 16-27. |
[2] | Tianpeng YE, Xiang LIN, Jianhua LI, Xuankai ZHANG, Liwen XU. Personalized lightweight distributed network intrusion detection system in fog computing [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 28-37. |
[3] | Lijun ZU, Yalin CAO, Xiaohua MEN, Zhihui LYU, Jiawei YE, Hongyi LI, Liang ZHANG. Adaptive selection method of desensitization algorithm based on privacy risk assessment [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 49-59. |
[4] | Ruiqi XIA, Manman LI, Shaozhen CHEN. Identification on the structures of block ciphers using machine learning [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 79-89. |
[5] | Jingyi YUAN, Zichuan LI, Guojun PENG. EN-Bypass: a security assessment method on e-mail user interface notification [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 90-101. |
[6] | Feng YU, Qingxin LIN, Hui LIN, Xiaoding WANG. Privacy-enhanced federated learning scheme based on generative adversarial networks [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 113-122. |
[7] | Chuntao ZHU, Chengxi YIN, Bolin ZHANG, Qilin YIN, Wei LU. Forgery face detection method based on multi-domain temporal features mining [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 123-134. |
[8] | Xiaomeng LI, Daidou GUO, Xunfang ZHUO, Heng YAO, Chuan QIN. Carrier-independent screen-shooting resistant watermarking based on information overlay superimposition [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 135-149. |
[9] | Zhao CAI, Tao JING, Shuang REN. Survey on Ethereum phishing detection technology [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 21-32. |
[10] | Yan PAN, Wei LIN, Yuefei ZHU. Progressive active inference method of protocol state machine [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 81-93. |
[11] | Pan YANG, Fei KANG, Hui SHU, Yuyao HUANG, Xiaoshao LYU. Binary program taint analysis optimization method based on function summary [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 115-131. |
[12] | Tian XIAO, Zhihao JIANG, Peng TANG, Zheng HUANG, Jie GUO, Weidong QIU. High-performance directional fuzzing scheme based on deep reinforcement learning [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 132-142. |
[13] | Chenghao YUAN, Yong LI, Shuang REN. Dynamic multi-keyword searchable encryption scheme [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 143-153. |
[14] | Zezhou HOU, Jiongjiong REN, Shaozhen CHEN. Security evaluation for parameters of SIMON-like cipher based on neural network distinguisher [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 154-163. |
[15] | Xuejing GUO, Yixiang FANG, Yi ZHAO, Tianzhu ZHANG, Wenchao ZENG, Junxiang WANG. Traditional guidance mechanism based deep robust watermarking [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 175-183. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|