Secure Power and Subcarrier Auction in Uplink Full-Duplex Cellular Networks

被引:0
作者
Li Mingliang [1 ]
Guo Yunfei [1 ]
Huang Kaizhi [1 ]
Guo Fei [1 ]
机构
[1] Natl Digital Switching Syst Engn & Technol R&D Ct, Zhengzhou 450002, Henan Province, Peoples R China
基金
国家高技术研究发展计划(863计划);
关键词
uplink auction; physical layer security; full-duplex; self-interference; RESOURCE-ALLOCATION; WIRELESS; COMMUNICATION;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
We consider a cellular network with a full-duplex base station, multiple uplink users and an eavesdropper. The full-duplex base station transmits jamming signals to degrade the eavesdropper channel when receiving secure multi-user signals. To maximize the secrecy rate of uplink communications, we propose a distributed ascending-clock auction (ACA) algorithm to allocate subcarriers and jamming power. Specifically, the impact of the self-interference of the full-duplex base station on the secrecy rate is considered. The proposed algorithm consists of two parts. Firstly, subcarriers and the jamming power are respectively priced by the base station. Secondly, users select the subcarrier and the jamming power based on the price. Moreover, the convergence of the proposed auction algorithm is mathematically proved. Simulation results show that the proposed auction algorithm is more beneficial to improve the uplink secrecy performance compared to traditional auction algorithms.
引用
收藏
页码:157 / 165
页数:9
相关论文
共 20 条
[1]   An efficient dynamic auction for heterogeneous commodities [J].
Ausubel, Lawrence M. .
AMERICAN ECONOMIC REVIEW, 2006, 96 (03) :602-629
[2]   An Auction Mechanism for Power Allocation in Multi-Source Multi-Relay Cooperative Wireless Networks [J].
Baidas, Mohammed W. ;
MacKenzie, Allen B. .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2012, 11 (09) :3250-3260
[3]   Wireless information-theoretic security [J].
Bloch, Matthieu ;
Barros, Joao ;
Rodrigues, Miguel R. D. ;
McLaughlin, Steven W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) :2515-2534
[4]   Physical Layer Network Security in the Full-Duplex Relay System [J].
Chen, Gaojie ;
Gong, Yu ;
Xiao, Pei ;
Chambers, Jonathon A. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (03) :574-583
[5]  
DERRICK W K N, 2015, ARXIV150601853
[6]  
Di BY, 2014, IEEE CONF COMPUT, P197, DOI 10.1109/INFCOMW.2014.6849223
[7]   Physical Layer Security Came: How to Date a Girl with Her Boyfriend on the Same Table [J].
Han, Zhu ;
Marina, Nonoslav ;
Debbah, Merouane ;
Hjorungnes, Are .
2009 INTERNATIONAL CONFERENCE ON GAME THEORY FOR NETWORKS (GAMENETS 2009), 2009, :287-+
[8]   Optimal Power Allocation for Multicarrier Secure Communications in Full-Duplex Decode-and-Forward Relay Networks [J].
Huang, Xiaobin ;
He, Jing ;
Li, Quanzhong ;
Zhang, Qi ;
Qin, Jiayin .
IEEE COMMUNICATIONS LETTERS, 2014, 18 (12) :2169-2172
[9]   Secure Communication via Sending Artificial Noise by the Receiver: Outage Secrecy Capacity/Region Analysis [J].
Li, Wei ;
Ghogho, Mounir ;
Chen, Bin ;
Xiong, Chunlin .
IEEE COMMUNICATIONS LETTERS, 2012, 16 (10) :1628-1631
[10]   Destination Assisted Cooperative Jamming for Wireless Physical-Layer Security [J].
Liu, Yupeng ;
Li, Jiangyuan ;
Petropulu, Athina P. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (04) :682-694