Promoting Security and Efficiency in D2D Underlay Communication: A Bargaining Game Approach

被引:0
|
作者
Zhou, Qihua [1 ]
Lu, Weifeng
Chen, Siguang
Yang, Lijun
Wang, Kun
机构
[1] Nanjing Univ Posts & Telecommun, Nanjing, Jiangsu, Peoples R China
来源
GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE | 2017年
关键词
Physical Layer Security; Bargaining Game; Jamming; D2D Communication;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Device-to-device (D2D) communication is a promising technology for expanding the next generation wireless cellular network. To deal with the security challenges and optimize the system communication quality, this paper investigates the security and efficiency problem in D2D underlay communication with the presence of malicious eavesdroppers. Fairness and strategy space of both D2D user equipment (DUE) and cellular user equipment (CUE) are taken into consideration under the control of proposed efficiency functions. Problems are formulated as a series of utility functions built on the unit price of jamming power and the amount of jamming service. Extracting system model into a price negotiation under Bargaining Game (PNBG) that a buyer and a seller both desiring maximum its profits, we solve the problems by reaching an agreement of the two sides. The step number of bargain process is also a restriction under consideration. For the Non-Step scheme, an Evaluation Function (EF) and a Comprehensive Utility Function (CUF) are demonstrated to analyze the negotiation process. For Step-Contained scheme, the step number of iteration is involved and an Attenuation Function (AF) is introduced to modify the Bargaining Game. Algorithms of two schemes are designed to derive the equilibrium point for reaching an agreement. Finally, simulations are illustrated for verifying proposed approach.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] RIS-Aided Physical Layer Security With Full-Duplex Jamming in Underlay D2D Networks
    Khalid, Waqas
    Yu, Heejung
    Do, Dinh-Thuan
    Kaleem, Zeeshan
    Noh, Song
    IEEE ACCESS, 2021, 9 (09): : 99667 - 99679
  • [22] Secure Transmissions of D2D Underlay Cellular Networks with Poisson Cluster Process
    Lyu, Jiawei
    Zheng, Tong-Xing
    Huang, Ke-Wen
    Feng, Yuehua
    Wang, Hui-Ming
    2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2019,
  • [23] Secure Transmission in Underlay D2D Communications Using Optimal Relay Selection
    Khoshafa, Majid H.
    Ngatched, Telex M. N.
    Ahmed, Mohamed H.
    2020 IEEE 92ND VEHICULAR TECHNOLOGY CONFERENCE (VTC2020-FALL), 2020,
  • [24] An Energy-Efficiency Game in Relay-Assisted D2D Networks with Malicious Devices
    Chorppath, Anil Kumar
    Zappone, Alessio
    Jorsweick, Eduard A.
    Alpcan, Tansu
    NETWORK GAMES, CONTROL, AND OPTIMIZATION, 2017, : 69 - 78
  • [25] Joint Spectrum and Power Allocation for Green D2D Communication with Physical Layer Security Consideration
    Chen, Hualiang
    Cai, Yueming
    Wu, Dan
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (03): : 1057 - 1073
  • [26] Security aspects of device-to-device (D2D) networks in wireless communication: a comprehensive survey
    Khan, Angshuman
    Das, Rupayan
    TELECOMMUNICATION SYSTEMS, 2022, 81 (04) : 625 - 642
  • [27] Security enhancement in cellular networks employing D2D friendly jammer for V2V communication
    Kumar, J. Senthil
    Gupta, Akhil
    Tanwar, Sudeep
    Kumar, Neeraj
    Akleylek, Sedat
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2023, 26 (02): : 865 - 878
  • [28] Optimal D2D power for secure D2D communication with random eavesdropper in 5G-IoT networks
    Chandra, Saurabh
    Arya, Rajeev
    Singh, Maheshwari Prasad
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2024, 36 (09)
  • [29] A Lightweight and Efficient Key Generation Scheme for D2D Communication
    Wu, Rongchun
    Lou, Chunwei
    Wang, Hao
    Li, Yuedi
    Xu, Hua
    Chen, Dajiang
    2020 INTERNATIONAL CONFERENCE ON SPACE-AIR-GROUND COMPUTING (SAGC 2020), 2020, : 93 - 94
  • [30] Physical-layer security enhancement using artificial noise for D2D communication in vehicular platooning networks
    Bang, Inkyu
    Kim, Jong-Hyun
    Kim, Taehoon
    ICT EXPRESS, 2022, 8 (04): : 600 - 605