Secrecy-Based Access Control for Device-to-Device Communication Underlaying Cellular Networks

被引:125
作者
Yue, Jianting [1 ,2 ]
Ma, Chuan [2 ]
Yu, Hui [2 ]
Zhou, Wei [2 ]
机构
[1] McMaster Univ, Dept Elect & Comp Engn, Hamilton, ON, Canada
[2] Shanghai Jiao Tong Univ, Dept Elect Engn, Shanghai 200030, Peoples R China
关键词
Device-to-device communication; access control; secrecy outage probability; imperfect channel state information;
D O I
10.1109/LCOMM.2013.092813.131367
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Device-to-device (D2D) communication is a promising technology for wireless communication in the near future. Since D2D communication usually reuses the resource of cellular users, interference management is a key element. However, when secrecy capacity is taken into consideration, the interference caused by D2D communication could be taken advantage of as a kind of help against eavesdroppers. In this paper, we novelly introduce D2D communication into the problem of secrecy capacity, such that D2D pair could achieve its own transmission while the secrecy requirement of cellular communication is still satisfied. Moreover, we utilize secrecy outage probability to better depict the imperfect channel state information at the eavesdropper. We also derive the optimal transmission power and propose the access control mechanism.
引用
收藏
页码:2068 / 2071
页数:4
相关论文
共 16 条
[1]  
[Anonymous], P 18 EUR WIR C
[2]   Secrecy capacity of wireless channels [J].
Barros, Joao ;
Rodrigues, Miguel R. D. .
2006 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1-6, PROCEEDINGS, 2006, :356-+
[3]   Device-to-Device Communication as an Underlay to LTE-Advanced Networks [J].
Doppler, Klaus ;
Rinne, Mika ;
Wijting, Carl ;
Ribeiro, Cassio B. ;
Hugl, Klaus .
IEEE COMMUNICATIONS MAGAZINE, 2009, 47 (12) :42-49
[4]  
Dottling Martin., 2009, Radio Technologies and Concepts for IMT-Advanced
[5]   On the secrecy capacity of fading channels [J].
Gopala, Praveen Kumar ;
Lai, Lifeng ;
El Gamal, Hesham .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (10) :4687-4698
[6]  
Han T, 2012, 2012 IEEE 23RD INTERNATIONAL SYMPOSIUM ON PERSONAL INDOOR AND MOBILE RADIO COMMUNICATIONS (PIMRC), P559, DOI 10.1109/PIMRC.2012.6362848
[7]   Physical Layer Security Came: How to Date a Girl with Her Boyfriend on the Same Table [J].
Han, Zhu ;
Marina, Nonoslav ;
Debbah, Merouane ;
Hjorungnes, Are .
2009 INTERNATIONAL CONFERENCE ON GAME THEORY FOR NETWORKS (GAMENETS 2009), 2009, :287-+
[8]  
Jorgensen ML, 2007, GLOB TELECOMM CONF, P33
[9]  
Lee J., P 2012 IEEE INT C CO, P815
[10]   Distributed Network Secrecy [J].
Lee, Jemin ;
Conti, Andrea ;
Rabbachin, Alberto ;
Win, Moe Z. .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2013, 31 (09) :1889-1900