A Learning Based Framework for Enhancing Physical Layer Security in Cooperative D2D Network

被引:2
作者
Ahmad, Noman [1 ]
Sidhu, Guftaar Ahmad Sardar [1 ]
Khan, Wali Ullah [2 ]
机构
[1] COMSATS Univ Islamabad, Dept Elect & Comp Engn, Pk Rd, Chak Shahzad, Islamabad 45550, Pakistan
[2] Univ Luxembourg, Interdisciplinary Ctr Secur Reliabil & Trust SnT, L-1511 Luxembourg, Luxembourg
关键词
device to device; secrecy rate; non orthogonal multiple access; amplify and forward; TO-DEVICE COMMUNICATION; CELLULAR NETWORKS; POWER ALLOCATION; MODE SELECTION; SPECTRUM; NOMA;
D O I
10.3390/electronics11233981
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Next-generation wireless communication networks demand high spectrum efficiency to serve the requirements of an enormous number of devices over a limited available frequency spectrum. Device-to-device (D2D) communication with spectrum reuse offers a potential solution to spectrum scarcity. On the other hand, non-orthogonal multiple access (NOMA) as a multiple-access approach has emerged as a key technology to re-use a spectrum among multiple users. A cellular users (CUs) can share their spectrum with D2D users (DUs) and in response, the D2D network can help relay the CU signal to achieve better secrecy from an eavesdropper. Power optimization is known to be a promising technique to enhance system performance in challenging communication environments. This work aimed to enhance the secrecy rate of the CUs where the D2D transmitter (DT) helps in relaying the CU's message under the amplify and forward (AF) protocol. A power optimization problem is considered under the quality of service constraints in terms of minimum rate requirements at the receivers and maximum power budgets at the transmitters. The problem is a non-convex complex optimization. A deep learning-based solution is proposed and promising results are obtained in terms of the secrecy rate of CU and the rate of D2D users.
引用
收藏
页数:14
相关论文
共 48 条
  • [1] Abdelreheem A., 2019, P 2019 INT C COMP IN, P1
  • [2] Socially Aware Secrecy-Ensured Resource Allocation in D2D Underlay Communication: An Overlapping Coalitional Game Scheme
    Ahmed, Manzoor
    Shi, Han
    Chen, Xinlei
    Li, Yong
    Waqas, Muhammad
    Jin, Depeng
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2018, 17 (06) : 4118 - 4133
  • [3] Akkarajitsakul K, 2012, 2012 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS (IEEE ICCS 2012), P488, DOI 10.1109/ICCS.2012.6406196
  • [4] Dynamic User Clustering and Power Allocation for Uplink and Downlink Non-Orthogonal Multiple Access (NOMA) Systems
    Ali, Md Shipon
    Tabassum, Hina
    Hossain, Ekram
    [J]. IEEE ACCESS, 2016, 4 : 6325 - 6343
  • [5] Deep Learning Based Power Optimizing for NOMA Based Relay Aided D2D Transmissions
    Ali, Zain
    Sidhu, Guftaar Ahmad Sardar
    Gao, Feifei
    Jiang, Jing
    Wang, Xiaoyan
    [J]. IEEE TRANSACTIONS ON COGNITIVE COMMUNICATIONS AND NETWORKING, 2021, 7 (03) : 917 - 928
  • [6] Secure green D2D communication in OFDMA based networks with imperfect channel knowledge
    Arian, Fateme
    Javan, Mohammad Reza
    Yamchi, Nader Mokari
    [J]. WIRELESS NETWORKS, 2021, 27 (05) : 3147 - 3164
  • [7] Power allocation and resource assignment for secure D2D communication underlaying cellular networks: A Tabu search approach
    Ashtiani, Amirhossein Feizi
    Pierre, Samuel
    [J]. COMPUTER NETWORKS, 2020, 178
  • [8] Power Allocation and Receiver Design for D2D Assisted Cooperative Relaying Downlink Systems Using NOMA
    Cheng, Jie
    Li, Hui
    Guo, Yun Xiang
    Li, Huan Yu
    Xiao, Ke Xin
    [J]. IEEE ACCESS, 2020, 8 : 210663 - 210677
  • [9] A NOMA Scheme Exploiting Partial Similarity Among Users Bit Sequences
    Chraiti, Mohaned
    Ghrayeb, Ali
    Assi, Chadi
    [J]. IEEE TRANSACTIONS ON COMMUNICATIONS, 2018, 66 (10) : 4923 - 4935
  • [10] Exploration and Exploitation in Evolutionary Algorithms: A Survey
    Crepinsek, Matej
    Liu, Shih-Hsi
    Mernik, Marjan
    [J]. ACM COMPUTING SURVEYS, 2013, 45 (03)