Interference Exploitation in D2D-Enabled Cellular Networks: A Secrecy Perspective

被引:131
作者
Ma, Chuan [1 ]
Liu, Jiaqi [1 ]
Tian, Xiaohua [2 ,3 ]
Yu, Hui [1 ]
Cui, Ying [1 ]
Wang, Xinbing [2 ,3 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Elect Engn, Shanghai 200240, Peoples R China
[2] Shanghai Jiao Tong Univ, Sch Elect Informat & Elect Engn, Shanghai 200240, Peoples R China
[3] Southeast Univ, Natl Mobile Commun Res Lab, Nanjing 210096, Jiangsu, Peoples R China
关键词
D2D communication; cellular network; physical layer security; link scheduling; stochastic geometry; TO-DEVICE COMMUNICATION; STOCHASTIC GEOMETRY; RESOURCE-ALLOCATION; UNDERLAY; SCHEME; DESIGN;
D O I
10.1109/TCOMM.2014.2379633
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Device-to-device (D2D) communication underlaying cellular networks is a promising technology to improve network resource utilization. In D2D-enabled cellular networks, interference generated by D2D communications is usually viewed as an obstacle to cellular communications. However, in this paper, we present a new perspective on the role of D2D interference by taking security issues into consideration. We consider a large-scale D2D-enabled cellular network with eavesdroppers overhearing cellular communications. Using stochastic geometry, we model such a network and analyze the signal-to-interference-plus-noise ratio (SINR) distributions, connection probabilities and secrecy probabilities of both the cellular and D2D links. We propose two criteria for guaranteeing performances of secure cellular communications, namely the strong and weak performance guarantee criteria. Based on the obtained analytical results of link characteristics, we design optimal D2D link scheduling schemes under these two criteria respectively. Both analytical and numerical results show that the interference from D2D communications can enhance physical layer security of cellular communications and at the same time create extra transmission opportunities for D2D users.
引用
收藏
页码:229 / 242
页数:14
相关论文
共 36 条
[1]   A Tractable Approach to Coverage and Rate in Cellular Networks [J].
Andrews, Jeffrey G. ;
Baccelli, Francois ;
Ganti, Radha Krishna .
IEEE TRANSACTIONS ON COMMUNICATIONS, 2011, 59 (11) :3122-3134
[2]  
[Anonymous], 2010, Handbook of Mathematical Functions
[3]  
[Anonymous], P 20 EUR WIR C
[4]  
[Anonymous], WIRELESS SECURITY CR
[5]  
[Anonymous], 2012, 22803 3GPP TR
[6]  
[Anonymous], 2009, PRELIMINARY WINNER S
[7]  
[Anonymous], 2013, SP130478 3GPP TR
[8]   An Aloha protocol for multihop mobile wireless networks [J].
Baccelli, F ;
Blaszczyszyn, B ;
Mühlethaler, P .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2006, 52 (02) :421-436
[9]  
CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
[10]   Modeling and Analysis of K-Tier Downlink Heterogeneous Cellular Networks [J].
Dhillon, Harpreet S. ;
Ganti, Radha Krishna ;
Baccelli, Francois ;
Andrews, Jeffrey G. .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2012, 30 (03) :550-560