A Zero-Sum Game-Based Secure and Interference Mitigation Scheme for Socially Aware D2D Communication With Imperfect CSI

被引:12
作者
Gupta, Rajesh [1 ]
Tanwar, Sudeep [1 ]
机构
[1] Nirma Univ, Inst Technol, Dept Comp Sci & Engn, Ahmadabad 382481, Gujarat, India
来源
IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT | 2022年 / 19卷 / 03期
关键词
Device-to-device communication; Interference; NOMA; Game theory; Base stations; Games; 5G mobile communication; zero-sum game; heterogeneous networks; 5G; security; PHYSICAL-LAYER SECURITY; RESOURCE-ALLOCATION;
D O I
10.1109/TNSM.2022.3173305
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Device-to-device (D2D) communication is the most evolving technology in fifth-generation (5G) networks. It allows direct communication of devices in the proximity-with or without the base station help. This achieves high gain and low latency in communication and improves the network spectral efficiency. Despite the aforementioned challenges, interference and eavesdropping (by a malicious node) on D2D links/pairs are significant challenges. An eavesdropper can decode the information exchanged between the D2D devices. To mitigate the issues mentioned above nonorthogonal multiple access (NOMA) technique is quite helpful even in social scenarios. NOMA mitigates the interference issues in D2D communication, which increases the signal-to-interference-plus-noise ratio (SINR). Further, we used a zero-sum game approach to improve the data security and minimize eavesdropper's security risk on the D2D pair. It achieves the goal of the D2D transmitter, i.e., maximize the message security. Simulation results prove the proposed zero-sum game-based system's superiority, considering average network sum rate and average channel secrecy capacity.
引用
收藏
页码:3478 / 3486
页数:9
相关论文
共 21 条
[1]   Secrecy Ensured Socially Aware Resource Allocation in Device-to-Device Communications Underlaying HetNet [J].
Ahmed, Manzoor ;
Li, Yong ;
Zhuo Yinxiao ;
Sheraz, Muhammad ;
Xu, Dianlei ;
Jin, Depeng .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (05) :4933-4948
[2]   Socially Aware Secrecy-Ensured Resource Allocation in D2D Underlay Communication: An Overlapping Coalitional Game Scheme [J].
Ahmed, Manzoor ;
Shi, Han ;
Chen, Xinlei ;
Li, Yong ;
Waqas, Muhammad ;
Jin, Depeng .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2018, 17 (06) :4118-4133
[3]   A Zero-Sum Game Approach for Non-Orthogonal Multiple Access Systems: Legitimate Eavesdropper Case [J].
Alsaba, Yamen ;
Leow, Chee Yen ;
Rahim, Sharul Kamal Abdul .
IEEE ACCESS, 2018, 6 :58764-58773
[4]  
[Anonymous], ZERO SUM GAMES MIXED
[5]  
[Anonymous], 2 PERSON ZERO SUM GA
[6]   Cross-Layer Interference Management Scheme for D2D Mobile Users Using NOMA [J].
Budhiraja, Ishan ;
Kumar, Neeraj ;
Tyagi, Sudhanshu .
IEEE SYSTEMS JOURNAL, 2021, 15 (02) :3109-3120
[7]   Deep-Reinforcement-Learning-Based Proportional Fair Scheduling Control Scheme for Underlay D2D Communication [J].
Budhiraja, Ishan ;
Kumar, Neeraj ;
Tyagi, Sudhanshu .
IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (05) :3143-3156
[8]   Resource Allocation for Device-to-Device Communications Underlaying Heterogeneous Cellular Networks Using Coalitional Games [J].
Chen, Yali ;
Ai, Bo ;
Niu, Yong ;
Guan, Ke ;
Han, Zhu .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2018, 17 (06) :4163-4176
[9]   Guaranteeing secrecy using artificial noise [J].
Goel, Satashu ;
Negi, Rohit .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2008, 7 (06) :2180-2189
[10]   Secrecy-ensured NOMA-based cooperative D2D-aided fog computing under imperfect CSI [J].
Gupta, Rajesh ;
Tanwar, Sudeep ;
Kumar, Neeraj .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 59