Physical-Layer Security Enhancement via Relay-Aided D2D Communications Underlaying Cellular Networks

被引:6
作者
Moualeu, Jules M. [1 ]
Ngatched, Telex M. N. [2 ]
机构
[1] Univ Witwatersrand, Sch Elect & Informat Engn, ZA-2000 Johannesburg, South Africa
[2] Mem Univ, Fac Engn & Appl Sci, St John, NF A1B 3X5, Canada
来源
IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY | 2020年 / 1卷 / 01期
基金
加拿大自然科学与工程研究理事会;
关键词
Device-to-device communications; mutual outage probability; eta-mu fading; physical layer security; security provisioning; TO-DEVICE COMMUNICATION; RESOURCE-ALLOCATION; PERFORMANCE ANALYSIS; HUNGARIAN METHOD; SYSTEMS; SELECTION;
D O I
10.1109/OJCOMS.2020.2983538
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we propose a relay-assisted device-to-device (D2D) communication as an underlay in a cellular network, where two sequential best relay nodes based on different selection criteria are chosen. Novel analytical expressions of the secrecy outage probability (SOP) and the probability of nonzero secrecy capacity (PNSC) are derived to evaluate the secrecy performance of the cellular network. In addition, we derive a simple and explicit approximation of the SOP in the high signal-to-noise ratio (SNR) to gain some insights on how various system parameters affect the aforementioned secrecy performance. Also, for the sake of comparison, the analytical SOP expression when only the cellular network exists, i.e., without the interference of the D2D communication, is obtained. Furthermore, to assess the usefulness of the cooperation between the D2D communication and the cellular network, we derive an analytical expression for the mutual outage probability (MOP) which represents the true outage probability across both the cellular and D2D networks. An asymptotic analysis of the MOP in the high SNR regime is obtained and the diversity order is derived. Finally, our proposed mathematical framework is compared with Monte-Carlo simulations to verify the accuracy of the derivations.
引用
收藏
页码:413 / 427
页数:15
相关论文
共 47 条
[1]  
[Anonymous], 1986, INTEGRALS SERIES
[2]  
[Anonymous], White paper
[3]   A Survey on Device-to-Device Communication in Cellular Networks [J].
Asadi, Arash ;
Wang, Qing ;
Mancuso, Vincenzo .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (04) :1801-1819
[4]   Secrecy Capacity Analysis Over κ-μ Fading Channels: Theory and Applications [J].
Bhargav, Nidhi ;
Cotton, Simon L. ;
Simmons, David E. .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2016, 64 (07) :3011-3024
[5]   Wireless information-theoretic security [J].
Bloch, Matthieu ;
Barros, Joao ;
Rodrigues, Miguel R. D. ;
McLaughlin, Steven W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) :2515-2534
[6]   D2D for Intelligent Transportation Systems: A Feasibility Study [J].
Cheng, Xiang ;
Yang, Liuqing ;
Shen, Xia .
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS, 2015, 16 (04) :1784-1793
[7]   TOWARD PROXIMITY-AWARE INTERNETWORKING [J].
Corson, M. Scott ;
Laroia, Rajiv ;
Li, Junyi ;
Park, Vincent ;
Richardson, Tom ;
Tsirtsis, George .
IEEE WIRELESS COMMUNICATIONS, 2010, 17 (06) :26-33
[8]   Performance of Regenerative Relay-Assisted D2D Communication in Mixed Fading Channels [J].
Dixit, Dharmendra ;
Sahu, P. R. .
IEEE COMMUNICATIONS LETTERS, 2018, 22 (04) :864-867
[9]  
Doppler K., 2008, INNOVATIVE CONCEPTS
[10]   Device-to-Device Communication as an Underlay to LTE-Advanced Networks [J].
Doppler, Klaus ;
Rinne, Mika ;
Wijting, Carl ;
Ribeiro, Cassio B. ;
Hugl, Klaus .
IEEE COMMUNICATIONS MAGAZINE, 2009, 47 (12) :42-49