Power allocation and resource assignment for secure D2D communication underlaying cellular networks: A Tabu search approach

被引:15
作者
Ashtiani, Amirhossein Feizi [1 ]
Pierre, Samuel [1 ]
机构
[1] Polytech Montreal, Dept Comp Engn & Software, Montreal, PQ, Canada
关键词
Device-to-device communication; Cellular network; Power allocation; RB Assignment; Tabu search; Secrecy-capacity; TO-DEVICE COMMUNICATIONS; MODE SELECTION; SYSTEMS;
D O I
10.1016/j.comnet.2020.107350
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The primary goal of introducing device-to-device (D2D) communication underlaying cellular systems is to increase spectral efficiency (ES). However, it can lead to performance degradation caused by severe interference between cellular and D2D links. In addition, due to the complexity of control and management, direct connections between nearby devices are vulnerable. Thus, D2D communication is not robust against security threats and eavesdropping. However, if the physical layer security (PLS) concept is taken into account, the interference can help reduce eavesdropping. In this work, we address power control and resource block (RB) assignment problem to improve security of D2D communication and cellular network while satisfying the minimum rate requirements and power budget of the users. To solve this problem, we employ a decomposition method and individually address the power allocation and the RB assignment problem with lower complexity. However, RB assignment problem reduces to the three-dimensional matching problem, which is under NP-hard category and an optimal solution can be obtained through a complicated method such as Brute-force search or branch-and-bound with exponential time complexity. We, therefore, propose an approach based on tabu search (TS) meta-heuristic algorithm with reduced time complexity to globally find the near-optimal RB assignment solution. Moreover, we evaluate the performance of proposed scheme with a genetic algorithm (GA) based approach and other baseline methods. Simulation results show that the applied TS algorithm outperforms the GA since it employs both exploitation and exploration through a memory-based local search method and a perturbation mechanism, respectively. However, the GA, as a population-based method, focuses only on exploration by searching the entire search space without concentration on the current solution.
引用
收藏
页数:13
相关论文
共 50 条
[1]   Socially Aware Secrecy-Ensured Resource Allocation in D2D Underlay Communication: An Overlapping Coalitional Game Scheme [J].
Ahmed, Manzoor ;
Shi, Han ;
Chen, Xinlei ;
Li, Yong ;
Waqas, Muhammad ;
Jin, Depeng .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2018, 17 (06) :4118-4133
[2]   Secrecy capacity of wireless channels [J].
Barros, Joao ;
Rodrigues, Miguel R. D. .
2006 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1-6, PROCEEDINGS, 2006, :356-+
[3]  
Cai XJ, 2015, IEEE ICC, P5429, DOI 10.1109/ICC.2015.7249187
[4]   Channel assignment problem in cellular systems: A new model and a tabu search algorithm [J].
Capone, A ;
Trubian, M .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 1999, 48 (04) :1252-1260
[5]  
Chen N., 2014, 2014 IEEE 80 VEHICUL, P1
[6]   Cellular-Base-Station-Assisted Device-to-Device Communications in TV White Space [J].
Ding, Guoru ;
Wang, Jinlong ;
Wu, Qihui ;
Yao, Yu-Dong ;
Song, Fei ;
Tsiftsis, Theodoros A. .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2016, 34 (01) :107-121
[7]   Device-to-Device Communication as an Underlay to LTE-Advanced Networks [J].
Doppler, Klaus ;
Rinne, Mika ;
Wijting, Carl ;
Ribeiro, Cassio B. ;
Hugl, Klaus .
IEEE COMMUNICATIONS MAGAZINE, 2009, 47 (12) :42-49
[8]   Mode Switching for Energy-Efficient Device-to-Device Communications in Cellular Networks [J].
Feng, Daquan ;
Yu, Guanding ;
Xiong, Cong ;
Yi Yuan-Wu ;
Li, Geoffrey Ye ;
Feng, Gang ;
Li, Shaoqian .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2015, 14 (12) :6993-7003
[9]   Device-to-Device Communications Underlaying Cellular Networks [J].
Feng, Daquan ;
Lu, Lu ;
Yi Yuan-Wu ;
Li, Geoffrey Ye ;
Feng, Gang ;
Li, Shaoqian .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2013, 61 (08) :3541-3551
[10]   A survey on device-to-device (D2D) communication: Architecture and security issues [J].
Gandotra, Pimmy ;
Jha, Rakesh Kumar ;
Jain, Sanjeev .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2017, 78 :9-29