Improving Secrecy Performance via Device-to-Device Jamming in Cellular Networks

被引:0
作者
Ouyang, Jian [1 ]
Lin, Min [2 ]
Zhu, Wei-Ping [1 ,3 ]
An, Kang [4 ]
Wang, Lei [5 ]
机构
[1] Nanjing Univ Posts & Telecommun, Inst Signal Proc & Transmiss, Nanjing, Jiangsu, Peoples R China
[2] Nanjing Inst Telecommun Technol, Nanjing, Jiangsu, Peoples R China
[3] Concordia Univ, Dept Elect & Comp Engn, Montreal, PQ, Canada
[4] PLA Univ Sci & Technol, Coll Commun Engn, Nanjing, Jiangsu, Peoples R China
[5] Southeast Univ, Natl Mobile Commun Res Lab, Nanjing, Jiangsu, Peoples R China
来源
2016 8TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS & SIGNAL PROCESSING (WCSP) | 2016年
关键词
Ergodic secrecy capacity; cellular network; device-to-device communication; wiretap channel; COMMUNICATION;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we study the secrecy performance of a cellular network, where a device-to-device (D2D) communication shares the spectral resources with a multi-antenna base station (BS). By assuming known the channel state information (CSI) of the legitimate user and using the maximal ratio transmission (MRT) at the BS, we first derive a closed-form expression of the ergodic secrecy capacity (ESC) for the wiretap channel as well as the ergodic capacity (EC) for the D2D link. Then, we present a simple yet efficient power allocation scheme to maximize the secrecy performance while satisfying the D2D transmission requirement. Finally, numerical results are given to demonstrate the merit of our study, concluding that the interference from the D2D communication can be exploited as a friendly jammer to enhance the security transmission in cellular networks.
引用
收藏
页数:5
相关论文
共 18 条
  • [1] Secure Device-to-Device Communication in LTE-A
    Alam, Muhammad
    Yang, Du
    Rodriguez, Jonathan
    Abd-Alhameed, Raed A.
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2014, 52 (04) : 66 - 73
  • [2] [Anonymous], 2001, Wireless Communications: Principles and Practice
  • [3] [Anonymous], 2007, TABLE INTEGRALS SERI
  • [4] Wireless information-theoretic security
    Bloch, Matthieu
    Barros, Joao
    Rodrigues, Miguel R. D.
    McLaughlin, Steven W.
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) : 2515 - 2534
  • [5] Daohua Zhu, 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), P1606, DOI 10.1109/ICASSP.2014.6853869
  • [6] Solutions for the MIMO Gaussian Wiretap Channel With a Cooperative Jammer
    Fakoorian, S. Ali A.
    Swindlehurst, A. Lee
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2011, 59 (10) : 5013 - 5022
  • [7] Secrecy Outage in MISO Systems With Partial Channel Information
    Gerbracht, Sabrina
    Scheunert, Christian
    Jorswieck, Eduard A.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (02) : 704 - 716
  • [8] On Ergodic Secrecy Rate for Gaussian MISO Wiretap Channels
    Li, Jiangyuan
    Petropulu, Athina P.
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2011, 10 (04) : 1176 - 1187
  • [9] Ergodic Secrecy Sum-Rate for Downlink Multiuser MIMO Systems With Limited CSI Feedback
    Li, Na
    Tao, Xiaofeng
    Xu, Jin
    [J]. IEEE COMMUNICATIONS LETTERS, 2014, 18 (06) : 969 - 972
  • [10] QoS-Based Transmit Beamforming in the Presence of Eavesdroppers: An Optimized Artificial-Noise-Aided Approach
    Liao, Wei-Cheng
    Chang, Tsung-Hui
    Ma, Wing-Kin
    Chi, Chong-Yung
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2011, 59 (03) : 1202 - 1216