Improving physical layer security and efficiency in D2D underlay communication

被引:0
作者
Weifeng Lu
Xin Zheng
Jia Xu
Siguang Chen
Lijun Yang
机构
[1] Nanjing University of Posts and Telecommunications,School of Computer Science
[2] Nanjing University of Posts and Telecommunications,College of IoT
[3] Jiangsu Key Laboratory of Big Data Security and Intelligent Processing,undefined
来源
Wireless Networks | 2019年 / 25卷
关键词
Physical layer security; Bargaining game; Price bargain; Jamming power allocation; Device-to-device communication;
D O I
暂无
中图分类号
学科分类号
摘要
Device-to-device (D2D) communication is a core technology for expanding the next generation wireless cellular network. To deal with the security challenges and optimize the system communication quality, this paper investigates the security and efficiency problem of D2D underlay communication in a base station cell area with the presence of malicious eavesdroppers. Fairness and strategy space of both D2D User Equipment and Cellular User Equipment are taken into consideration under the control of Efficiency Functions. The optimization problems are formulated as a game model series of utility functions built on the unit price of jamming power and the amount of jamming service. We extracting the system into a price bargain game with a buyer and a seller both desiring maximum profits, a bargaining game approach is adopted to solve this problem by reaching an agreement of unit price. The step number of bargain process is also a restriction under consideration. For the non-steps model, an Evaluation Function and a Comprehensive Utility Function are demonstrated to analyze the bargain process. For steps-contained model, the step number of iteration is involved and an attenuation function is introduced to modify the bargaining game. The algorithms of two models are proposed to derive the equilibrium point for reaching an agreement. Finally, extensive simulations are illustrated for verifying proposed theory.
引用
收藏
页码:4569 / 4584
页数:15
相关论文
共 100 条
  • [1] Gandotra P(2017)A survey on device-to-device (D2D) communication: architecture and security issues Journal of Network & Computer Applications 78 9-29
  • [2] Jha RK(2017)Energy efficiency in MIMO underlay and overlay device-to-device communications and cognitive radio systems Mathematics 65 1026-1041
  • [3] Jain S(2016)Device-to-device communication for mobile multimedia in emerging 5G networks ACM Transactions on Multimedia Computing Communications & Applications 12 75-376
  • [4] Zappone A(2017)Physical layer security for next generation wireless networks: theories, technologies, and challenges IEEE Communications Surveys & Tutorials 19 347-1079
  • [5] Matthiesen B(2017)Security and privacy in device-to-device (D2D) communication: a review IEEE Communications Surveys & Tutorials 19 1054-6364
  • [6] Jorswieck EA(2015)Incentive mechanisms for time window dependent tasks in mobile crowdsensing IEEE Transactions on Wireless Communications 14 6353-715
  • [7] Liu J(1949)Communication theory of secrecy systems Bell Labs Technical Journal 28 656-1562
  • [8] Kato N(2017)Incentivize maximum continuous time Interval coverage under budget constraint in mobile crowd sensing Wireless Networks 23 1549-1387
  • [9] Ujikawa H(1975)The wire-tap channel Bell System Technical Journal 54 1355-456
  • [10] Liu Y(1978)The gaussian wire-tap channel IEEE Transactions on Information Theory 24 451-1725