Optimal D2D power for secure D2D communication with random eavesdropper in 5G-IoT networks

被引:2
作者
Chandra, Saurabh [1 ]
Arya, Rajeev [1 ]
Singh, Maheshwari Prasad [2 ]
机构
[1] Natl Inst Technol, Dept Elect & Commun Engn, Wireless Sensor Network Lab, Patna, Bihar, India
[2] Natl Inst Technol Patna, Dept Comp Sci & Engn, Patna, India
关键词
5G; Device-to-Device (D2D) communication; Internet of Things; physical layer security; Poisson point process; secrecy transmission probability; PHYSICAL-LAYER SECURITY; RESOURCE-ALLOCATION; CELLULAR NETWORKS; ALGORITHM;
D O I
10.1002/cpe.7993
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In the rapidly evolving landscape of fifth generation Internet of Things (5G-IoT) networks, Device-to-Device (D2D) communication has emerged as a promising paradigm to enhance secrecy transmission rate (STR) and connectivity. However, the security of D2D communications in the presence of eavesdroppers remains a critical challenge. This article investigates the problem of optimizing D2D transmit power to achieve secure D2D communication while considering the presence of random eavesdroppers in 5G-IoT networks. We propose a novel secrecy-based power control approach (SRMWPCA) approach to model the random distribution of eavesdroppers in the network, taking into account their varying distances from D2D pairs and deliberately increasing interference at the eavesdropper's link. By leveraging tools from stochastic geometry, we derive an analytical expression for the secrecy transmission probability (STP), which quantifies the probability of eavesdroppers successfully decoding the D2D transmission. In this analysis, we have incorporated practical considerations such as channel fading, path loss, and interference from other devices. To enhance the security of D2D communication, we formulate an optimization problem to determine the optimal transmit power levels for D2D pairs, subject to constraints on the secrecy transmission probability and interference to the cellular network. We propose an efficient algorithm to find the power allocation that maximizes the secrecy outage performance while meeting these constraints. Simulation results demonstrate the effectiveness of the proposed approach in achieving secure D2D communication in 5G-IoT networks with random eavesdroppers. The performance of the proposed SRMWPCA approach improved by 23.25% and 20.9% compared with standard approaches in terms of the secrecy rate and throughput of the users from malicious attacks.
引用
收藏
页数:24
相关论文
共 34 条
[1]   Secrecy Ensured Socially Aware Resource Allocation in Device-to-Device Communications Underlaying HetNet [J].
Ahmed, Manzoor ;
Li, Yong ;
Zhuo Yinxiao ;
Sheraz, Muhammad ;
Xu, Dianlei ;
Jin, Depeng .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (05) :4933-4948
[2]   Limited Feedback Scheme for Device-to-Device Communications in 5G Cellular Networks with Reliability and Cellular Secrecy Outage Constraints [J].
Alavi, Faezeh ;
Yamchi, Nader Mokari ;
Javan, Mohammad R. ;
Cumanan, Kanapathippillai .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (09) :8072-8085
[3]   Improving Secrecy Rate and Social Welfare by NOMA Technique in D2D Communications Network [J].
Alibeigi, Maryam ;
Taherpour, Abbas ;
Gazor, Saeed .
IEEE TRANSACTIONS ON GREEN COMMUNICATIONS AND NETWORKING, 2022, 6 (02) :907-916
[4]   A new algorithm for generalized fractional programs [J].
Barros, AI ;
Frenk, JBG ;
Schaible, S ;
Zhang, S .
MATHEMATICAL PROGRAMMING, 1996, 72 (02) :147-175
[5]  
Chandra Saurabh, 2021, Intelligent and Converged Networks, V2, P295, DOI [10.23919/icn.2021.0021, 10.23919/ICN.2021.0021]
[6]   Reliability and age of information analysis of 5 G IoT for intelligent communication [J].
Chandra, Saurabh ;
Arya, Rajeev ;
Verma, Ajit Kumar ;
Prateek, Ajit Kumar .
COMPUTERS & ELECTRICAL ENGINEERING, 2022, 101
[7]   ALGORITHMS FOR GENERALIZED FRACTIONAL-PROGRAMMING [J].
CROUZEIX, JP ;
FERLAND, JA .
MATHEMATICAL PROGRAMMING, 1991, 52 (02) :191-207
[8]  
Dixon KR., INTRO STOCHASTIC MOD, DOI [10.1201/b11089-8, DOI 10.1201/B11089]
[9]   Device-to-Device Communication in Cellular Networks: A Survey [J].
Gandotra, Pimmy ;
Jha, Rakesh Kumar .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 71 :99-117
[10]   Robust Design of IRS-Aided Multi-Group Multicast System With Imperfect CSI [J].
Jiang, Weiheng ;
Xiong, Peiyun ;
Nie, Jiangtian ;
Ding, Zhiguo ;
Pan, Cunhua ;
Xiong, Zehui .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2023, 22 (09) :6314-6328