SGR-MOP Based Secrecy-Enabled Resource Allocation Scheme for 5G Networks

被引:0
作者
Rishav Dubey
Pavan Kumar Mishra
Sudhakar Pandey
机构
[1] Manipal University Jaipur,Department of Computer Science and Engineering
[2] National Institute of Technology Raipur,Department of Information Technology
来源
Journal of Network and Systems Management | 2023年 / 31卷
关键词
5 G Networks; D2D communication; Physical layer security; Power allocation; Resource allocation; Secrecy capacity;
D O I
暂无
中图分类号
学科分类号
摘要
The radio-cast nature of wireless communications is always exposed to the eavesdropping attack. To safeguard 5 G communications where both the CUs and Device to Device (D2D) users can communicate securely becomes a prime objection. To examine this issue we have investigated the eavesdropping attack in a considered 5 G Networks, and analysed the secrecy rate (SR), and data rate of the D2D communication enabled 5 G networks. Different from previous work mentioned in literature we have proposed a joint resource allocation and power allocation scheme with the constraint of unknown channel state information (CSI) of the presented eavesdropper (EDs) in a cell. We have proposed a Stackelberg game-based resource allocation scheme and a state of the art monarch butterflies optimization (MBO) based power allocation (SGR-MOP) scheme to enhance the SR of the CUs along with enhance the data rate of the cell as well. The proposed scheme is further subdivided into two sub-schemes where the resource allocation scheme is designed to form a group of CUs and D2D users to enhance the SR of the CUs. Moreover, the proposed power allocation scheme is designed to enhance the data rate of D2D users. We consider a scenario where the eNodeB (eNB) has all the channel state information (CSI) of the CUs and D2D users however, the presence of the eavesdropper is not known to the eNB. We have compared our proposed scheme with the existing related schemes mentioned in the literature. The simulation results display that our scheme outperforms compared with other related schemes.
引用
收藏
相关论文
共 70 条
[1]  
Clemm Alexander(2020)Network management 2030: operations and control of network 2030 services J. Netw. Syst. Manag. 28 721-750
[2]  
Zhani Mohamed Faten(2018)A survey on socially aware device-to-device communications IEEE Commun. Surv. Tutor. 20 2169-2197
[3]  
Boutaba Raouf(2020)Resource management in a containerized cloud: status and challenges J. Netw. Syst. Manag. 28 197-246
[4]  
Ahmed M(2021)Joint content-mobility priority modeling for cached content selection in D2D networks J. Netw. Syst. Manag. 29 1-37
[5]  
Li Y(2018)A survey of device-to-device communications: research issues and challenges IEEE Commun. Surv. Tutor. 20 2133-2168
[6]  
Waqas M(2020)Mixed uplink, downlink channel allocation and power allocation schemes for 5G networks Wirel. Pers. Commun. 112 2253-2274
[7]  
Sheraz M(2018)Social-aware joint mode selection and link allocation for device-to-device communication underlaying cellular networks China Commun. 15 92-107
[8]  
Jin D(1975)The wire-tap channel Bell Syst. Tech. J. 54 1355-1387
[9]  
Han Z(1978)The Gaussian wire-tap channel IEEE Trans. Inf. Theory 24 451-456
[10]  
Maenhaut Pieter-Jan(2020)Survey on physical layer security for 5G wireless networks Ann. Telecommun. 15 5651-5663