A Learning Based Framework for Enhancing Physical Layer Security in Cooperative D2D Network

被引:2
作者
Ahmad, Noman [1 ]
Sidhu, Guftaar Ahmad Sardar [1 ]
Khan, Wali Ullah [2 ]
机构
[1] COMSATS Univ Islamabad, Dept Elect & Comp Engn, Pk Rd, Chak Shahzad, Islamabad 45550, Pakistan
[2] Univ Luxembourg, Interdisciplinary Ctr Secur Reliabil & Trust SnT, L-1511 Luxembourg, Luxembourg
关键词
device to device; secrecy rate; non orthogonal multiple access; amplify and forward; TO-DEVICE COMMUNICATION; CELLULAR NETWORKS; POWER ALLOCATION; MODE SELECTION; SPECTRUM; NOMA;
D O I
10.3390/electronics11233981
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Next-generation wireless communication networks demand high spectrum efficiency to serve the requirements of an enormous number of devices over a limited available frequency spectrum. Device-to-device (D2D) communication with spectrum reuse offers a potential solution to spectrum scarcity. On the other hand, non-orthogonal multiple access (NOMA) as a multiple-access approach has emerged as a key technology to re-use a spectrum among multiple users. A cellular users (CUs) can share their spectrum with D2D users (DUs) and in response, the D2D network can help relay the CU signal to achieve better secrecy from an eavesdropper. Power optimization is known to be a promising technique to enhance system performance in challenging communication environments. This work aimed to enhance the secrecy rate of the CUs where the D2D transmitter (DT) helps in relaying the CU's message under the amplify and forward (AF) protocol. A power optimization problem is considered under the quality of service constraints in terms of minimum rate requirements at the receivers and maximum power budgets at the transmitters. The problem is a non-convex complex optimization. A deep learning-based solution is proposed and promising results are obtained in terms of the secrecy rate of CU and the rate of D2D users.
引用
收藏
页数:14
相关论文
共 48 条
[41]   Deep Learning for Wireless Physical Layer: Opportunities and Challenges [J].
Wang, Tianqi ;
Wen, Chao-Kai ;
Wang, Hanqing ;
Gao, Feifei ;
Jiang, Tao ;
Jin, Shi .
CHINA COMMUNICATIONS, 2017, 14 (11) :92-111
[42]   Physical Layer Security in Heterogeneous Networks With Pilot Attack: A Stochastic Geometry Approach [J].
Wang, Wei ;
Teh, Kah Chan ;
Luo, Sheng ;
Li, Kwok Hung .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2018, 66 (12) :6437-6449
[43]   Joint beamforming and power allocation using deep learning for D2D communication in heterogeneous networks [J].
Wang, Yuejiao ;
Wang, Shenghui ;
Liu, Lu .
IET COMMUNICATIONS, 2020, 14 (18) :3095-3101
[44]   Exploiting Deep Learning for Secure Transmission in an Underlay Cognitive Radio Network [J].
Zhang, Miao ;
Cumanan, Kanapathippillai ;
Thiyagalingam, Jeyarajan ;
Tang, Yanqun ;
Wang, Wei ;
Ding, Zhiguo ;
Dobre, Octavia A. .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (01) :726-741
[45]   Mode Selection and Spectrum Partition for D2D Inband Communications: A Physical Layer Security Perspective [J].
Zhang, Yuanyu ;
Shen, Yulong ;
Jiang, Xiaohong ;
Kasahara, Shoji .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2019, 67 (01) :623-638
[46]   Tradeoff Between Delay and Physical Layer Security in Wireless Networks [J].
Zhong, Yi ;
Ge, Xiaohu ;
Han, Tao ;
Li, Qiang ;
Zhang, Jing .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2018, 36 (07) :1635-1647
[47]   Downlink Resource Reuse for Device-to-Device Communications Underlaying Cellular Networks [J].
Zhu, Daohua ;
Wang, Jiaheng ;
Swindlehurst, A. Lee ;
Zhao, Chunming .
IEEE SIGNAL PROCESSING LETTERS, 2014, 21 (05) :531-534
[48]  
Zuo Y, 2018, IEEE INT CONF COMMUN, P666, DOI 10.1109/ICCChina.2018.8641176