浏览全部资源
扫码关注微信
1. 国家数字交换系统工程技术研究中心,河南 郑州 450002
2. 东南大学移动通信重点实验室,江苏 南京 211189
3. 移动互联网安全技术国家工程实验室,北京 100876
[ "陈亚军(1988-),男,河南商丘人,国家数字交换系统工程技术研究中心博士生,主要研究方向为无线物理层安全、D2D通信技术、无线定位技术等。" ]
[ "季新生(1968-),男,江苏南通人,国家数字交换系统工程技术中心教授、博士生导师,主要研究方向为移动通信网络、拟态安全等。" ]
[ "黄开枝(1973-),女,安徽滁州人,国家数字交换系统工程技术中心教授、博士生导师,主要研究方向为移动通信网络、物理层安全等。" ]
[ "康小磊(1986-),男,陕西咸阳人,国家数字交换系统工程技术研究中心博士生,主要研究方向为无线物理层安全、D2D通信技术等。" ]
网络出版日期:2016-08,
纸质出版日期:2016-08-25
移动端阅览
陈亚军, 季新生, 黄开枝, 等. 基于安全中断概率的D2D安全接入策略[J]. 通信学报, 2016,37(8):86-94.
Ya-jun CHEN, Xin-sheng JI, Kai-zhi HUANG, et al. Secrecy outage probability based access strategy for device-to-device communication underlaying cellular networks[J]. Journal on communications, 2016, 37(8): 86-94.
陈亚军, 季新生, 黄开枝, 等. 基于安全中断概率的D2D安全接入策略[J]. 通信学报, 2016,37(8):86-94. DOI: 10.11959/j.issn.1000-436x.2016159.
Ya-jun CHEN, Xin-sheng JI, Kai-zhi HUANG, et al. Secrecy outage probability based access strategy for device-to-device communication underlaying cellular networks[J]. Journal on communications, 2016, 37(8): 86-94. DOI: 10.11959/j.issn.1000-436x.2016159.
针对D2D蜂窝系统通信安全性受资源限制的问题,考虑到蜂窝链路和D2D链路的同频干扰能够为两者带来安全增益,基于此,提出一种基于安全中断概率的D2D用户接入策略。首先理论分析了蜂窝用户和D2D用户的安全中断概率,并给出了基于安全中断概率最小化的 D2D 用户功率优化算法。在上述分析的基础上,选择安全中断概率最小的D2D用户接入复用蜂窝用户的无线资源,同时提高D2D通信链路和蜂窝上行链路的安全性。最后,仿真结果证明了所提算法的有效性。
A secure access strategy for D2D (device-to-device) communications underlaying cellular networks based on the secrecy outage probability was proposed.Firstly
the secrecy outage probability in the worst case was derived and a transmission power optimization scheme for D2D pairs was given.An access control strategy was further presented to allow the D2D pair with the minimum secrecy outage probability to reuse the cellular resource
which improved the se-cure communications for D2D links and cellular uplinks.Finally
simulation results showed that the proposed scheme was effective.
JANIS P , YU C , DOPPLER K , et al . Device-to-device communication under-laying cellular communications systems [J ] . International Jounal Communications,Network and System Sciences , 2009 , 2 ( 3 ): 169 - 178 .
DOPPLER K , RINNE M , RIBEIRO C , et al . Device to-device com-munication as an underlay to LTE-advanced networks [J ] . IEEE Com-munications Magazine , 2009 , 47 ( 12 ): 42 - 49 .
FODOR , DAHLMAN G , MILDH E , et al . Design aspects of network assisted device-to-device communications [J ] . IEEE Communications.Magazine , 2012 , 50 ( 3 ): 170 - 177 .
DOPPLER K , RINNE M P , JANIS P , et al . Device-to-device commu-nications:functional prospects for LTE-advanced networks [C ] // IEEE International Conference on Communications . c 2009 : 1 - 6 .
ALAM M , DU Y , RODRIGUEZ J , et al . Secure device-to-device communication in LTE-A [J ] . IEEE Communications Magazine , 2014 , 52 ( 4 ): 66 - 73 .
ZHU D H , SWINDLEHURST A L , FAKOORIAN S A A , et al . De-vice-to-device communications:the physical layer security advan-tage [C ] // 2014 IEEE International Conference on Acoustics,Speech and Signal Processing (ICASSP) . c 2014 : 1606 - 1610 .
康小磊 , 季新生 , 黄开枝 . 基于人工噪声辅助的D2D异构蜂窝安全通信方法 [J ] . 通信学报 , 2015 , 36 ( 10 ): 149 - 156 .
KANG X L , JI X S , HUANG K Z . Secure D2D underlaying cellular communication based on artificial noise assisted [J ] . Journal on Com-munications , 2015 , 36 ( 10 ): 149 - 156 .
YUE J , MA C , YU H , et al . Secrecy-based channel assignment for device-to-device communication:an auction approach [C ] // 2013 IEEE International Conference on Wireless Communications & Signal Processing (WCSP) . Hangzhou,China , c 2013 : 1 - 6 .
LIU Z , PENG T , XIANG S , et al . Mode selection for device-to-device (D2D) communication under LTE-Advance networks [C ] // 2012 IEEE International Conference on Communications (ICC) . c 2012 : 5563 - 5567 .
ZHANG R , CHENG X , YANG L . Cooperation via spectrum sharing for physical layer security in device-to-device communications under-laying cellular networks [C ] // 2015 IEEE Global Communications Conference (GLOBECOM) . c 2015 : 1 - 6 .
CHU Z , CUMANAN K , XU M , et al . Robust secrecy rate optimiza-tions for multiuser multiple-input-single-output channel with de-vice-to-device communications [J ] . IET Communications , 2015 , 9 ( 3 ): 396 - 403 .
ZHANG H , WANG T Y , SONG L Y , et al . Radio resource allocation for physical-layer security in D2D underlay communications [C ] // 2014 IEEE International Conference on Communications (ICC) . c 2014 : 2319 - 2324 .
KHISTI A , WORNELL G W . Secure transmission with multiple an-tennas:the MISOME channel [J ] . IEEE Transactions on Information Theory , 2010 , 56 ( 7 ): 3088 - 3104 .
ZHOU X , GANTI R K , ANDREWS J G , et al . On the throughput cost of physical layer security in decentralized wireless networks [J ] . IEEE Transactions on Wireless Communications , 2011 , 10 ( 8 ): 2764 - 2775 .
ZHOU X , MCKAY M R . Secure transmission with artificial noise over fading channels:achievable rate and optimal power allocation [J ] . IEEE Transactions on Vehicular Technology , 2010 , 59 ( 8 ): 3831 - 3842 .
BLOCH M , BARROS J , RODRIGUES M , et al . Wireless Informa-tion-theoretic Security [J ] . IEEE Transactions on Information Theory , 2011 , 54 ( 6 ): 2515 - 2534 .
BASHAR S , DING Z , LI Y . Rethinking the secrecy outage formulation:a secure transmission design perspective [J ] . IEEE Transac-tions on Wireless Communications , 2011 , 10 ( 4 ): 1212 - 1223 .
ZHOU X , MCKAY M R , MAHAM B , et al . Rethinking the secrecy outage formulation:a secure transmission design perspective [J ] . IEEE Communication Letters , 2011 , 15 ( 3 ): 302 - 304 .
ROH J C , RAO B D , MAHAM B , et al . Transmit beamforming in multiple-antenna systems with finite rate feedback:a VQ-based approach [J ] . IEEE Transactions on Information Theory , 2006 , 52 ( 3 ): 1101 - 1112 .
0
浏览量
1
下载量
2
CSCD
关联资源
相关文章
相关作者
相关机构