Secure Transmission Design for Virtual Antenna Array-Aided Device-to-Device Multicast Communications

被引:3
作者
Hu, Xinyue [1 ,2 ]
Yi, Yibo [1 ]
Li, Kun [2 ]
Zhang, Hongwei [2 ]
Kai, Caihong [1 ]
机构
[1] Hefei Univ Technol, Sch Comp Sci & Informat Engn, Hefei 230009, Peoples R China
[2] Anhui Univ, Sch Elect & Informat Engn, Hefei 230601, Peoples R China
基金
中国国家自然科学基金;
关键词
Physical-layer security; virtual antenna array; D2D multicast communication; beamforming; RESOURCE-ALLOCATION; ARTIFICIAL-NOISE; SECRECY RATE; D2D; OPTIMIZATION; SELECTION; NETWORKS; OPERATOR;
D O I
10.1109/TWC.2022.3229077
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper investigates the physical-layer security in a Virtual Antenna Array (VAA)-aided Device-to-Device Multicast (D2DM) communication system, where the User Equipments (UEs) who cache the common content will form a VAA system and cooperatively multicast the content to UEs who desire it. Specifically, with the target of securing the VAA-aided D2DM communication under the threat of multiple eavesdroppers, we propose a secure beamforming scheme by jointly considering the formed VAA and the Base Station (BS). For obtaining the optimal beamforing vectors, a nonsmooth and nonconvex Weight Sum Rate Maximization Problem (WRMP) is formulated and solved using Successive Convex Approximation (SCA) approach. Furthermore, we consider the worst case that eavesdroppers cooperatively form a eavesdrop VAA to enhance the overhearing capacity. In the worst case, we modify the securing beamforming scheme, formulate the corresponding WRMP and solve it using a two-level optimization. Simulation results validate the improvements of the VAA-aided D2DM scheme in terms of communication security compared with conventional D2DM schemes.
引用
收藏
页码:4814 / 4827
页数:14
相关论文
共 42 条
[1]   Socially Aware Secrecy-Ensured Resource Allocation in D2D Underlay Communication: An Overlapping Coalitional Game Scheme [J].
Ahmed, Manzoor ;
Shi, Han ;
Chen, Xinlei ;
Li, Yong ;
Waqas, Muhammad ;
Jin, Depeng .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2018, 17 (06) :4118-4133
[2]   A Low-Complexity Multicast Scheduling for D2D-Aided F-RANs Using Network Coding [J].
Al-Abiad, Mohammed S. ;
Hossain, Md Jahangir .
IEEE WIRELESS COMMUNICATIONS LETTERS, 2021, 10 (11) :2484-2488
[3]   Improving Secrecy Rate and Social Welfare by NOMA Technique in D2D Communications Network [J].
Alibeigi, Maryam ;
Taherpour, Abbas ;
Gazor, Saeed .
IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, 2022, 6 (02) :907-916
[4]  
Bhardwaj B., 2014, IEEE WIRELESS COMMUN, V7, P546
[5]  
BRANDWOOD DH, 1983, IEE PROC-H, V130, P11
[6]  
Buratti C., 2009, P IEEE 69 VEH TECHN, P1
[7]   Energy-Efficient Resource Allocation for Secure D2D Communications Underlaying UAV-Enabled Networks [J].
Chen, Peixin ;
Zhou, Xuan ;
Zhao, Jian ;
Shen, Furao ;
Sun, Sumei .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2022, 71 (07) :7519-7531
[8]  
Dohler M., 2003, THESIS DEP ELECT ELE
[9]   Distributed Resource Allocation in Underlay Multicast D2D Communications [J].
Elnourani, Mohamed ;
Deshmukh, Siddharth ;
Beferull-Lozano, Baltasar .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2021, 69 (05) :3409-3422
[10]   Joint Task Offloading, D2D Pairing, and Resource Allocation in Device-Enhanced MEC: A Potential Game Approach [J].
Fang, Tao ;
Yuan, Feng ;
Ao, Liang ;
Chen, Jiaxin .
IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (05) :3226-3237