Optimization-Based Access Assignment Scheme for Physical-Layer Security in D2D Communications Underlaying a Cellular Network

被引:36
|
作者
Wang, Lei [1 ,2 ]
Liu, Jiaming [1 ]
Chen, Mingkai [1 ]
Gui, Guan [1 ]
Sari, Hikmet [1 ]
机构
[1] Nanjing Univ Posts & Telecommu, Natl Engn Res Ctr Commun & Network Technol, Nanjing 21003, Jiangsu, Peoples R China
[2] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710126, Shaanxi, Peoples R China
基金
中国国家自然科学基金;
关键词
Physical-layer security; D2D communication; stochastic geometry; access selection; optimization method; STOCHASTIC GEOMETRY; RESOURCE-ALLOCATION; INTERFERENCE; SELECTION;
D O I
10.1109/TVT.2017.2789022
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we consider physical-layer security for device-to-device (D2D) communications underlaying cellular networks in which cellular users are under threat from multiple eavesdroppers. We propose an access selection scheme for D2D users to protect cellular users against eavesdropping. Specifically, in our proposed scheme, multiple D2D users whose distance to the cellular user is more than the threshold we set will be selected to share the same spectrum as that of the cellular user, and the interference generated by the selected D2D users can be seen as a jamming measure to interrupt the eavesdropping. Then, we consider the secrecy throughput as a standard based on which the security performance of our proposed scheme is quantified, and we derive a closed-form expression for the secrecy throughput of a cellular user with the aid of stochastic geometry. Moreover, by using the optimization method, we prove the existence of optimal threshold and design an iterative algorithm based on the advance-and-retreat method to determine the optimal threshold. Simulation results show that our access selection scheme can effectively improve the physical-layer security of cellular users and that the maximum secrecy throughput can be achieved with the optimal threshold.
引用
收藏
页码:5766 / 5777
页数:12
相关论文
共 50 条
  • [1] Mobility-based Physical-layer Key Generation Scheme for D2D Communications Underlaying Cellular Network
    Du, Yuelin
    Liu, Jiaming
    Chen, Mingkai
    Wang, Lei
    Zheng, Baoyu
    [J]. 2018 10TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP), 2018,
  • [2] Physical Layer Security of D2D Communications Underlaying Cellular Networks
    Wang, Jiajia
    Li, Chengmei
    Wu, Jianjun
    [J]. MACHINERY ELECTRONICS AND CONTROL ENGINEERING III, 2014, 441 : 951 - 954
  • [3] Physical-Layer Security Enhancement via Relay-Aided D2D Communications Underlaying Cellular Networks
    Moualeu, Jules M.
    Ngatched, Telex M. N.
    [J]. IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2020, 1 (01): : 413 - 427
  • [4] Joint Power and Access Control for Physical Layer Security in D2D Communications Underlaying Cellular Networks
    Zhang, Rongqing
    Cheng, Xiang
    Yang, Liuqing
    [J]. 2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,
  • [5] Whale Optimization-Based Access Control Scheme in D2D Communication Underlaying Cellular Networks
    Jadav, Nilesh Kumar
    Tanwar, Sudeep
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2024, 21 (03): : 3416 - 3427
  • [6] Performance Optimization for D2D Communications With Opportunistic Relay and Physical-Layer Network Coding
    Lin, Shijun
    Li, Yong
    Ding, Haichuan
    Fang, Yuguang
    Shi, Jianghong
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (12) : 11928 - 11943
  • [7] Radio Resource Allocation for Physical-Layer Security in D2D Underlay Communications
    Zhang, Hang
    Wang, Tianyu
    Song, Lingyang
    Han, Zhu
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2014, : 2319 - 2324
  • [8] A scheme to improve fairness in D2D communications underlaying cellular networks
    Wang, Bin
    Meng, Wan-Ting
    Zhou, Wei-Feng
    Wang, Zhao-Feng
    [J]. Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2015, 38 (02): : 21 - 26
  • [9] Sparse Codes Allocation in D2D Communications Underlaying Cellular Network
    Li, Yue
    Sha, Xuejun
    Jiang, Fan
    Ye, Liang
    [J]. 2016 INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2016, : 948 - 952
  • [10] Resource Allocation for D2D Communications Underlaying a NOMA-Based Cellular Network
    Pan, Yijin
    Pan, Cunhua
    Yang, Zhaohui
    Chen, Ming
    [J]. IEEE WIRELESS COMMUNICATIONS LETTERS, 2018, 7 (01) : 130 - 133