Enhanced Physical Layer Security in D2D Spectrum Sharing Networks

被引:46
作者
Wang, Wei [1 ]
Teh, Kah Chan [1 ]
Hung, Kwok [1 ]
机构
[1] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore
关键词
Physical layer security; D2D communication; access control; secrecy throughput; stochastic geometry;
D O I
10.1109/LWC.2016.2634559
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this letter, the issue of security for device-todevice (D2D) underlaying cellular networks is considered. The cellular communication is overheard by randomly distributed eavesdroppers. By sharing the spectrum between D2D users and cellular users, the interference generated by D2D users is used as a source of jamming to confuse the eavesdroppers. We first derive the connection probability of the D2D links and the secrecy outage probability of the cellular link based on stochastic geometry tools. We then propose a joint guard zone and threshold-based access control scheme for the D2D users to maximize the achievable secrecy throughput. Moreover, when only the selection threshold is considered, a closed-form expression of the optimal selection threshold is derived. Simulation results show that improved secrecy throughput can be achieved by allowing the transmission of the D2D users.
引用
收藏
页码:106 / 109
页数:4
相关论文
共 12 条
[1]  
Boyd S, 2004, CONVEX OPTIMIZATION
[2]  
Chen Z, 2015, IEEE INT CONF COMM, P222, DOI 10.1109/ICCW.2015.7247182
[3]  
Chen Z, 2014, IEEE GLOB COMM CONF, P1540, DOI 10.1109/GLOCOM.2014.7037027
[4]  
Chiu S.N., 2013, Wiley Series in Probability and Statistics
[5]   Device-to-Device Communications Underlaying Cellular Networks [J].
Feng, Daquan ;
Lu, Lu ;
Yi Yuan-Wu ;
Li, Geoffrey Ye ;
Feng, Gang ;
Li, Shaoqian .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2013, 61 (08) :3541-3551
[6]   Spectrum Sharing for Device-to-Device Communication in Cellular Networks [J].
Lin, Xingqin ;
Andrews, Jeffrey G. ;
Ghosh, Amitava .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2014, 13 (12) :6727-6740
[7]   Interference Exploitation in D2D-Enabled Cellular Networks: A Secrecy Perspective [J].
Ma, Chuan ;
Liu, Jiaqi ;
Tian, Xiaohua ;
Yu, Hui ;
Cui, Ying ;
Wang, Xinbing .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2015, 63 (01) :229-242
[8]   Joint Scheduling and Resource Allocation for Device-to-Device Underlay Communication [J].
Wang, Feiran ;
Song, Lingyang ;
Han, Zhu ;
Zhao, Qun ;
Wang, Xiaoli .
2013 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2013, :134-139
[9]   Relay Selection for Secure Successive AF Relaying Networks With Untrusted Nodes [J].
Wang, Wei ;
Teh, Kah Chan ;
Li, Kwok Hung .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (11) :2466-2476
[10]   Generalized Relay Selection for Improved Security in Cooperative DF Relay Networks [J].
Wang, Wei ;
Teh, Kah Chan ;
Li, Kwok Hung .
IEEE WIRELESS COMMUNICATIONS LETTERS, 2016, 5 (01) :28-31