Physical Layer Secrecy and Transmission Resiliency of Device-to-Device Communications

被引:3
作者
Letafati, Mehdi [1 ]
Kuhestani, Ali [1 ,2 ]
Ng, Derrick Wing Kwan [3 ]
Beshkani, Mohammad Reza Ahmadi [1 ]
机构
[1] Sharif Univ Technol, Elect Engn Dept, Tehran, Iran
[2] Qom Univ Technol, Elect & Comp Engn, Qom, Iran
[3] Univ New South Wales, Sch Elect Engn & Telecommun, Kensington, NSW, Australia
来源
2020 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM) | 2020年
关键词
D O I
10.1109/GLOBECOM42002.2020.9322227
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, by taking into account the requirements of information secrecy and transmission resiliency, we present a comprehensive scheme enabling secure device-to-device (D2D) networks, where a single-antenna transmitter communicates with a half-duplex single-antenna receiver in the presence of a passive eavesdropper and an adversary jammer. Motivated by physical layer security techniques, artificial noise injection scheme is proposed to ensure communication secrecy. To improve the resiliency against jamming attack, the D2D nodes utilize the frequency hopping technique. Under this system model, we examine the achievable ergodic secrecy rate (ESR) by deriving a new closed-form expression. Furthermore, the optimal power allocation between the artificial noise and data signal is studied for maximizing the ESR. Numerical examples and discussions are provided to depict the efficiency of our proposed scheme compared with the state-of-the-arts.
引用
收藏
页数:6
相关论文
共 13 条
[1]   A Survey on Multiple-Antenna Techniques for Physical Layer Security [J].
Chen, Xiaoming ;
Ng, Derrick Wing Kwan ;
Gerstacker, Wolfgang H. ;
Chen, Hsiao-Hwa .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2017, 19 (02) :1027-1053
[2]   Wireless Positioning in IoT: A Look at Current and Future Trends [J].
Figueiredo e Silva, Pedro ;
Kaseva, Ville ;
Lohan, Elena Simona .
SENSORS, 2018, 18 (08)
[3]  
Jeffrey A., 2007, Table of Integrals, Series, and Products
[4]  
Letafati M., 2020, IEEE INT CONF COMM, P1
[5]   Three-Hop Untrusted Relay Networks With Hardware Imperfections and Channel Estimation Errors for Internet of Things [J].
Letafati, Mehdi ;
Kuhestani, Ali ;
Behroozi, Hamid .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 :2856-2868
[6]  
Li T., 2018, WIRELESS COMMUNICATI
[7]   Full-Duplex Cyber-Weapon With Massive Arrays [J].
Nam-Phong Nguyen ;
Hien Quoc Ngo ;
Duong, Trung Q. ;
Hoang Duong Tuan ;
da Costa, Daniel Benevides .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2017, 65 (12) :5544-5558
[8]  
Saedi H., 2019, WIREL NETW
[9]   Spread-Spectrum Techniques for Bio-Friendly Underwater Acoustic Communications [J].
Sherlock, Benjamin ;
Neasham, Jeffrey A. ;
Tsimenidis, Charalampos C. .
IEEE ACCESS, 2018, 6 :4506-4520
[10]  
Song TL, 2016, INT CONF COMPUT NETW, P346