On energy efficient secure routing in multi-hop underlay D2D communications for IoT applications

被引:11
作者
Basak, Surajit [1 ]
Acharya, Tamaghna [2 ]
机构
[1] Guru Nanak Inst Technol, Dept Elect & Commun Engn, Kolkata 700114, India
[2] Indian Inst Engn Sci & Technol, Dept Elect & Telecommun Engn, Sibpur 711103, India
关键词
Spectrum sharing; Multi-hop device-to-device communication; Physical layer security; Secrecy energy efficiency; POWER ALLOCATION; SELECTION;
D O I
10.1016/j.adhoc.2020.102275
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a physical layer security based secure routing problem in a multi-hop cognitive radio enabled device-to-device (CRD2D) communication, under the threat of multiple randomly distributed eavesdroppers (EVEs), is studied. Delivery of confidential packets between a given legitimate D2D transmitter-receiver pair is targeted with the aid of multiple intermediate legitimate D2D nodes that share spectrum of a predefined licensed/primary user for their transmissions as unlicensed/secondary users and operate on the principle of randomized-and-forward relaying. In view of the energy limitations of the D2D nodes engaged in IoT applications, the secure routing problem aims to maximize the secrecy energy efficiency (SEE) under the constraints of - (i) minimum secrecy rate (ii) minimum signal-to-interference plus noise ratio at any D2D receiver (iii) maximum primary user outage loss in presence of the D2D transmission (iv) maximum retransmission attempts by any D2D nodes. Based on our analysis, an optimal routing algorithm is proposed. Simulation results illustrate the dependence of SEE on various critical system parameters. Further, complexity analysis and implementation issues are also presented for the proposed routing algorithm.
引用
收藏
页数:9
相关论文
共 27 条
[1]   Joint user selection, mode assignment, and power allocation in cognitive radio-assisted D2D networks [J].
Ahmad, Mushtaq ;
Naeem, Muhammad ;
Iqbal, Muhammad ;
Ejaz, Waleed ;
Anpalagan, Alagan .
IET COMMUNICATIONS, 2018, 12 (10) :1207-1214
[2]  
[Anonymous], 2016, 2016 23 INT C TEL IC
[3]  
Bertsekas Dimitri P., 1992, Data Networks
[4]   Wireless information-theoretic security [J].
Bloch, Matthieu ;
Barros, Joao ;
Rodrigues, Miguel R. D. ;
McLaughlin, Steven W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) :2515-2534
[5]   Optimal Routing for Multihop Social-Based D2D Communications in the Internet of Things [J].
Chen, Gaojie ;
Tang, Jinchuan ;
Coon, Justin P. .
IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (03) :1880-1889
[6]   A Survey on Multiple-Antenna Techniques for Physical Layer Security [J].
Chen, Xiaoming ;
Ng, Derrick Wing Kwan ;
Gerstacker, Wolfgang H. ;
Chen, Hsiao-Hwa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (02) :1027-1053
[7]  
Chiu SN, 2013, STOCHASTIC GEOMETRY
[8]  
Chze PLR, 2014, 2014 IEEE WORLD FORUM ON INTERNET OF THINGS (WF-IOT), P428, DOI 10.1109/WF-IoT.2014.6803204
[9]  
Daohua Zhu, 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), P1606, DOI 10.1109/ICASSP.2014.6853869
[10]  
Glissa G, 2016, IEEE GLOB COMM CONF