Joint Spectrum and Power Allocation for Green D2D Communication with Physical Layer Security Consideration

被引:6
作者
Chen, Hualiang [1 ]
Cai, Yueming [1 ]
Wu, Dan [1 ]
机构
[1] PLA Univ Sci & Technol, Coll Commun Engn, Nanjing 210007, Jiangsu, Peoples R China
来源
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS | 2015年 / 9卷 / 03期
基金
中国国家自然科学基金;
关键词
Untrusted relay; physical layer security; device-to-device communication; energy efficiency; TO-DEVICE COMMUNICATION; TRADEOFF;
D O I
10.3837/tiis.2015.03.012
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we consider cooperative D2D communications in cellular networks. More precisely, a cellular user leases part of its spectrum to facilitate the D2D communication with a goal of improving the energy efficiency of a D2D pair. However the D2D pair is untrusted to the cellular user, such resource sharing may result in the information of this cellular user unsecured. In order to motivate the cellular user's generosity, this D2D pair needs to help the cellular user maintain a target secrecy rate. To address this issue, we formulate a joint spectrum and power allocation problem to maximize the energy efficiency of the D2D communication while guaranteeing the physical layer security of the cellular user. Then, a theorem is proved to indicate the best resource allocation strategy, and accordingly, an algorithm is proposed to find the best solution to this resource allocation problem. Numerical results are finally presented to verify the validity and effectiveness of the proposed algorithm.
引用
收藏
页码:1057 / 1073
页数:17
相关论文
共 16 条
[1]   A Survey on Device-to-Device Communication in Cellular Networks [J].
Asadi, Arash ;
Wang, Qing ;
Mancuso, Vincenzo .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (04) :1801-1819
[2]   Coalition Formation Game for Green Resource Management in D2D Communications [J].
Chen, Hualiang ;
Wu, Dan ;
Cai, Yueming .
IEEE COMMUNICATIONS LETTERS, 2014, 18 (08) :1395-1398
[3]   Device-to-Device Communication as an Underlay to LTE-Advanced Networks [J].
Doppler, Klaus ;
Rinne, Mika ;
Wijting, Carl ;
Ribeiro, Cassio B. ;
Hugl, Klaus .
IEEE COMMUNICATIONS MAGAZINE, 2009, 47 (12) :42-49
[4]   Design Aspects of Network Assisted Device-to-Device Communications [J].
Fodor, Gabor ;
Dahlman, Erik ;
Mildh, Gunnar ;
Parkvall, Stefan ;
Reider, Norbert ;
Miklos, Gyorgy ;
Turanyi, Zoltan .
IEEE COMMUNICATIONS MAGAZINE, 2012, 50 (03) :170-177
[5]   On the Reliability-Security Tradeoff and Secrecy Throughput in Cooperative ARQ [J].
Guan, Xinrong ;
Cai, Yueming ;
Yang, Weiwei .
IEEE COMMUNICATIONS LETTERS, 2014, 18 (03) :479-482
[6]   Increasing Secrecy Capacity via Joint Design of Cooperative Beamforming and Jamming [J].
Guan, Xinrong ;
Cai, Yueming ;
Yang, Weiwei ;
Cheng, Yunpeng ;
Hu, Junquan .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2012, 6 (04) :1041-1062
[7]   The Role of an Untrusted Relay in Secret Communication [J].
He, Xiang ;
Yener, Aylin .
2008 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS, VOLS 1-6, 2008, :2212-2216
[8]   An Overview of 3GPP Device-to-Device Proximity Services [J].
Lin, Xingqin ;
Andrews, Jeffrey G. ;
Ghosh, Amitabha ;
Ratasuk, Rapeepat .
IEEE COMMUNICATIONS MAGAZINE, 2014, 52 (04) :40-48
[9]   Heuristic Algorithms for Optimization of Energy Consumption in Wireless Access Networks [J].
Lorincz, Josip ;
Capone, Antonio ;
Begusic, Dinko .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2011, 5 (04) :626-648
[10]   Secure Communication using an Untrusted Relay via Sources and Channels [J].
Milosavljevic, Nebojsa ;
Gastpar, Michael ;
Ramchandran, Kannan .
2009 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1- 4, 2009, :2457-2461