Secure Transmission Scheme Based on the Artificial Noise in D2D-Enabled Full-Duplex Cellular Networks

被引:2
作者
Chen Yajun [1 ]
Yi Ming [1 ]
Zhong Zhou [1 ]
Ma Keming [1 ]
Huang Kaizhi [1 ]
Ji Xinsheng [1 ,2 ,3 ]
机构
[1] China Natl Digital Switching Syst Engn & Technol, Zhengzhou 450002, Henan, Peoples R China
[2] Southeast Univ, Natl Mobile Commun Res Lab, Nanjing 211189, Jiangsu, Peoples R China
[3] Natl Engn Lab Mobile Networking Secur, Beijing 100876, Peoples R China
基金
中国国家自然科学基金;
关键词
D2D Communications; Artificial Noise; Secrecy Capacity; Successive Convex Approximation; Secure Power Allocation; TO-DEVICE COMMUNICATION; PHYSICAL-LAYER SECURITY; RESOURCE-ALLOCATION; UNDERLAY; POWER;
D O I
10.3837/tiis.2019.10.006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, a secure transmission scheme based on the artificial noise is proposed for D2D communications underlaying the full-duplex cellular network, and a secure power allocation scheme to maximize the overall secrecy rate of both the cellular user and D2D transmitter node is presented. Firstly, the full-duplex base station transmits the artificial noise to guarantee the secure communications when it receives signals of cellular uplinks. Under this secure framework, it is found that improving the transmission power of the cellular user or the D2D transmitter node will degrade the secrecy rate of the other, although will improve itself secrecy rate obviously. Hence, a secure power allocation scheme to maximize the overall secrecy rate is presented subject to the security requirement of the cellular user. However, the original power optimization problem is non-convex. To efficiently solve it, we recast the original problem into a convex program problem by utilizing the proper relaxation and the successive convex approximation algorithm. Simulation results evaluate the effectiveness of the proposed scheme.
引用
收藏
页码:4923 / 4939
页数:17
相关论文
共 25 条
[1]   Full-Duplex or Half-Duplex: A Bayesian Game for Wireless Networks with Heterogeneous Self-Interference Cancellation Capabilities [J].
Afifi, Wessam ;
Abdel-Rahman, Mohammad J. ;
Krunz, Marwan ;
MacKenzie, Allen B. .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2018, 17 (05) :1076-1089
[2]   Secure Device-to-Device Communication in LTE-A [J].
Alam, Muhammad ;
Yang, Du ;
Rodriguez, Jonathan ;
Abd-Alhameed, Raed A. .
IEEE COMMUNICATIONS MAGAZINE, 2014, 52 (04) :66-73
[3]   A sequential parametric convex approximation method with applications to nonconvex truss topology design problems [J].
Beck, Amir ;
Ben-Tal, Aharon ;
Tetruashvili, Luba .
JOURNAL OF GLOBAL OPTIMIZATION, 2010, 47 (01) :29-51
[4]   Physical Layer Network Security in the Full-Duplex Relay System [J].
Chen, Gaojie ;
Gong, Yu ;
Xiao, Pei ;
Chambers, Jonathon A. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (03) :574-583
[5]  
Chen Y., 2017, EURASIP J WIRELESS C, V178
[6]   Opportunistic access control for enhancing security in D2D-enabled cellular networks [J].
Chen, Yajun ;
Ji, Xinsheng ;
Huang, Kaizhi ;
Li, Bin ;
Kang, Xiaolei .
SCIENCE CHINA-INFORMATION SCIENCES, 2018, 61 (04)
[7]  
Cheng WC, 2013, IEEE INFOCOM SER, P3120
[8]   Resource Allocation for Secure Wireless Powered Integrated Multicast and Unicast Services With Full Duplex Self-Energy Recycling [J].
Chu, Zheng ;
Zhou, Fuhui ;
Xiao, Pei ;
Zhu, Zhengyu ;
Mi, De ;
Al-Dhahir, Naofal ;
Tafazolli, Rahim .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2019, 18 (01) :620-636
[9]  
Daohua Zhu, 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), P1606, DOI 10.1109/ICASSP.2014.6853869
[10]   Full-Duplex Bidirectional MIMO: Achievable Rates Under Limited Dynamic Range [J].
Day, Brian P. ;
Margetts, Adam R. ;
Bliss, Daniel W. ;
Schniter, Philip .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2012, 60 (07) :3702-3713