Limited Feedback Scheme for Device-to-Device Communications in 5G Cellular Networks with Reliability and Cellular Secrecy Outage Constraints

被引:28
作者
Alavi, Faezeh [1 ]
Yamchi, Nader Mokari [2 ]
Javan, Mohammad R. [3 ]
Cumanan, Kanapathippillai [1 ]
机构
[1] Univ York, Dept Elect Engn, York YO10 5DD, N Yorkshire, England
[2] Tarbiat Modares Univ, ECE Dept, Tehran, Iran
[3] Shahrood Univ Technol, Dept Elect Engn, Shahrood, Iran
基金
欧盟地平线“2020”;
关键词
Device to device (D2D) communications; limited rate feedback; physical (PHY) layer security; particle swarm optimization; RADIO RESOURCE-ALLOCATION; PHYSICAL LAYER SECURITY; RATE OPTIMIZATIONS; CHANNEL; OFDMA; SELECTION;
D O I
10.1109/TVT.2017.2690521
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we propose a device-to-device (D2D) communication scenario underlaying a cellular network, where both D2D and cellular users (CUs) are discrete power-rate systems with limited feedback from the receivers. It is assumed that there exists an adversary which wants to eavesdrop on the information transmission from the base station to CUs. Since D2D communication shares the same spectrum with cellular network, cross interference must be considered. However, when secrecy capacity is considered, the interference caused by D2D communication can help to improve the secrecy communications by confusing the eavesdroppers. Since both systems share the same spectrum, cross interference must be considered. We formulate the proposed resource allocation into an optimization problem whose objective is to maximize the average transmission rate of D2D pair in the presence of the cellular communications under average transmission power constraint. For the cellular network, we require a minimum average achievable secrecy rate in the absence of D2D communication as well as a maximum secrecy outage probability in the presence of D2D communication which should be satisfied. Due to high complexity convex optimization methods, to solve the proposed optimization problem, we apply particle swarm optimization, which is an evolutionary approach. Moreover, we model and study the error in the feedback channel and the imperfectness of channel distribution information using parametric and nonparametric methods. Finally, the impact of different system parameters on the performance of the proposed scheme is investigated through simulations. The performance of the proposed scheme is evaluated using numerical results for different u scenarios.
引用
收藏
页码:8072 / 8085
页数:14
相关论文
共 48 条
[1]   Limited Rate Feedback Scheme for Resource Allocation in Secure Relay-Assisted OFDMA Networks [J].
Abedi, Mohammad Reza ;
Mokari, Nader ;
Javan, Mohammad Reza ;
Yanikomeroglu, Halim .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (04) :2604-2618
[2]   Radio resource allocation to provide physical layer security in relay-assisted cognitive radio networks [J].
Alavi, Faezeh ;
Saeedi, Hamid .
IET COMMUNICATIONS, 2015, 9 (17) :2124-2130
[3]  
Alavi F, 2015, IRAN CONF ELECTR ENG, P171, DOI 10.1109/IranianCEE.2015.7146204
[4]   A Survey on Device-to-Device Communication in Cellular Networks [J].
Asadi, Arash ;
Wang, Qing ;
Mancuso, Vincenzo .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (04) :1801-1819
[5]  
Ayoughi SA, 2015, IEEE ICC, P4321, DOI 10.1109/ICC.2015.7249002
[6]   The Degrees of Freedom of Full-Duplex Bidirectional Interference Networks With and Without a MIMO Relay [J].
Cheng, Zhiyu ;
Devroye, Natasha ;
Liu, Tang .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2016, 15 (04) :2912-2924
[7]   Robust secrecy rate optimisations for multiuser multiple-input-single-output channel with device-to-device communications [J].
Chu, Zheng ;
Cumanan, Kanapathippillai ;
Xu, Mai ;
Ding, Zhiguo .
IET COMMUNICATIONS, 2015, 9 (03) :396-403
[8]  
Cover TM., 1999, ELEMENTS INFORM THEO, DOI DOI 10.1002/047174882X
[9]   Evolution of Limited-Feedback CoMP Systems from 4G to 5G [J].
Cui, Qimei ;
Wang, Hui ;
Hu, Pengxiang ;
Tao, Xiaofeng ;
Zhang, Ping ;
Hamalainen, Jyri ;
Xia, Liang .
IEEE VEHICULAR TECHNOLOGY MAGAZINE, 2014, 9 (03) :94-103
[10]   Secure Communications With Cooperative Jamming: Optimal Power Allocation and Secrecy Outage Analysis [J].
Cumanan, Kanapathippillai ;
Alexandropoulos, George C. ;
Ding, Zhiguo ;
Karagiannidis, George K. .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2017, 66 (08) :7495-7505