Secrecy-based Channel Assignment for Device-to-Device Communication: An Auction Approach

被引:0
作者
Yue, Jianting [1 ,3 ]
Ma, Chuan [1 ]
Yu, Hui [1 ]
Yang, Zhen [2 ]
Gan, Xiaoying [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Elect Engn, Shanghai 200030, Peoples R China
[2] Shanghai Jiao Tong Univ, Shanghai, Peoples R China
[3] McMaster Univ, Dept Elect & Comp Engn, Hamilton, ON, Canada
来源
2013 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS AND SIGNAL PROCESSING (WCSP 2013) | 2013年
关键词
Device-to-device communication; secrecy outage probability; channel assignment; auction algorithm;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Device-to-device (D2D) communication has revealed great potential to satisfy the soaring wireless data demands. As a key point, interference management should be carefully investigated. Different from the view that D2D transmissions cause harmful interference to cellular communication when reusing the same channels, we deem such interference as a kind of spontaneous interference against eavesdropping and use this interference to guarantee the secrecy capacity of cellular communication. Hence D2D pairs could have their own D2D transmission without violating secrecy-based cellular communication. Also, we utilize secrecy outage probability to overcome the difficulty in accurately obtaining channel gains at the eavesdropper. On the other hand, we take the advantage of auction algorithm to derive the channel assignment policy, such that multiple D2D pairs are assigned different channels with low complexity. Simulation results demonstrate that our algorithm works well and converges quickly.
引用
收藏
页数:6
相关论文
共 25 条
[1]  
[Anonymous], CISC VIS NETW IND GL
[2]  
[Anonymous], P INT C WIR COMM SIG
[3]   Secrecy capacity of wireless channels [J].
Barros, Joao ;
Rodrigues, Miguel R. D. .
2006 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, VOLS 1-6, PROCEEDINGS, 2006, :356-+
[4]  
Bertsekas D.P., 2001, ENCY OPTIMIZATION
[5]   Device-to-Device Communication as an Underlay to LTE-Advanced Networks [J].
Doppler, Klaus ;
Rinne, Mika ;
Wijting, Carl ;
Ribeiro, Cassio B. ;
Hugl, Klaus .
IEEE COMMUNICATIONS MAGAZINE, 2009, 47 (12) :42-49
[6]   On the secrecy capacity of fading channels [J].
Gopala, Praveen Kumar ;
Lai, Lifeng ;
El Gamal, Hesham .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (10) :4687-4698
[7]  
Han T, 2012, 2012 IEEE 23RD INTERNATIONAL SYMPOSIUM ON PERSONAL INDOOR AND MOBILE RADIO COMMUNICATIONS (PIMRC), P559, DOI 10.1109/PIMRC.2012.6362848
[8]   Physical Layer Security Came: How to Date a Girl with Her Boyfriend on the Same Table [J].
Han, Zhu ;
Marina, Nonoslav ;
Debbah, Merouane ;
Hjorungnes, Are .
2009 INTERNATIONAL CONFERENCE ON GAME THEORY FOR NETWORKS (GAMENETS 2009), 2009, :287-+
[9]   Auction-based spectrum sharing [J].
Huang, J ;
Berry, RA ;
Honig, ML .
MOBILE NETWORKS & APPLICATIONS, 2006, 11 (03) :405-418
[10]   Cellular Networks with an Overlaid Device to Device Network [J].
Kaufman, Brett ;
Aazhang, Behnaam .
2008 42ND ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS, VOLS 1-4, 2008, :1537-1541