浏览全部资源
扫码关注微信
1. 国家数字交换系统工程技术研究中心,河南 郑州 450002
2. 东南大学移动通信重点实验室,江苏 南京 211189
3. 移动互联网安全技术国家工程实验室,北京 100876
[ "陈亚军(1988-),男,河南商丘人,国家数字交换系统工程技术研究中心博士生,主要研究方向为无线物理层安全、D2D通信技术、无线定位技术等。" ]
[ "季新生(1968-),男,江苏南通人,国家数字交换系统工程技术中心教授、博士生导师,主要研究方向为移动通信网络、拟态安全等。" ]
[ "黄开枝(1973-),女,安徽滁州人,国家数字交换系统工程技术中心教授、博士生导师,主要研究方向为移动通信网络、物理层安全等。" ]
[ "杨静(1991-),女,重庆人,国家数字交换系统工程技术中心博士生,主要研究方向为移动通信网络、物理层认证等。" ]
[ "易鸣(1986-),男,湖北孝感人,国家数字交换系统工程技术中心讲师,主要研究方向为移动通信网络、物理层安全编码等。" ]
网络出版日期:2018-01,
纸质出版日期:2018-01-25
移动端阅览
陈亚军, 季新生, 黄开枝, 等. 蜂窝系统中机会D2D接入的安全传输方案[J]. 通信学报, 2018,39(1):126-136.
Yajun CHEN, Xinsheng JI, Kaizhi HUANG, et al. Secure opportunistic access control in D2D-enabled cellular network[J]. Journal on communications, 2018, 39(1): 126-136.
陈亚军, 季新生, 黄开枝, 等. 蜂窝系统中机会D2D接入的安全传输方案[J]. 通信学报, 2018,39(1):126-136. DOI: 10.11959/j.issn.1000-436x.2018016.
Yajun CHEN, Xinsheng JI, Kaizhi HUANG, et al. Secure opportunistic access control in D2D-enabled cellular network[J]. Journal on communications, 2018, 39(1): 126-136. DOI: 10.11959/j.issn.1000-436x.2018016.
由于终端资源受限,蜂窝上行链路传输的安全性难以保证。考虑到D2D(device-to-device)蜂窝系统中同频干扰能够带来安全增益,提出一种机会 D2D 接入的安全传输方案。该方案分别利用无线信道的方向性和增益刻画复用资源的D2D用户对蜂窝用户和其他D2D用户的干扰大小,为保证两者通信的可靠性,首先,选择满足干扰受限条件的D2D用户接入网络进行通信,而接入网络的D2D用户可看作蜂窝用户的友好干扰者为其带来安全增益。其次,采用泊松点过程(PPP
Poisson point process)对系统中的各节点进行建模,分别利用安全中断概率(SOP
secrecy outage probability)和连通中断概率(COP
connection outage probability)表征蜂窝用户通信的安全性和D2D用户通信的可靠性,并分析了干扰门限对两者通信性能的影响。然后,在保证蜂窝用户SOP性能需求的前提下,提出一种在满足蜂窝用户安全性的条件下,最小化D2D用户COP的优化模型,并利用联合搜索方法得到最佳干扰门限值。最后,仿真证明了所提方案的有效性。
The mutual interference between cellular links and D2D links can bring the secrecy gain to cellular users in D2D-enable cellular networks.To make full use of them
a cooperative secrecy transmission scheme was proposed based on wireless channels.The channel direction information and gains depict the interference from D2D links to cellular links and other D2D links in the proposed scheme.Firstly
only the D2D users which meet the limited interference conditions were accessed to cellular networks to ensure their reliable communications.It was assumed that legitimate users and eavesdroppers were independent two-dimensional homogeneous Poisson point processes (PPP) distribution.Then the security outage probability (SOP) was derived for cellular users and the connection outage probability (COP) for D2D users
and the impacts of interference thresholds were discussed on their performances.Next
an optimization model was given to minimize D2D users’ COP while ensuring the secrecy performance requirements of cellular users
thus achieving the optimal performance.Finally
simulation results verify the validity of the proposed scheme.
AGIWAL M , ROY A , SAXENA N . Next generation 5G wireless networks:a comprehensive survey [J ] . IEEE Communications Surveys& Tutorials , 2016 , 18 ( 3 ): 1617 - 1655 .
DING G , WANG J , WU Q , et al . Cellular-base-station-assisted device-to-device communications in TV white space [J ] . IEEE Journal on Selected Areas in Communications , 2016 , 34 ( 1 ): 107 - 121 .
ALAM M , DU Y , RODRIGUEZ J , et al . Secure device-to-device communication in LTE-A [J ] . IEEE Communications Magazine , 2014 , 52 ( 4 ): 66 - 73 .
ZHU D H , SWINDLEHURST A L , FAKOORIAN S A A , et al . Device-to-device communications:the physical layer security advantage [C ] // IEEE International Conference on Acoustics,Speech and Signal Processing (ICASSP) . 2014 : 1606 - 1610 .
CHU Z , CUMANAN K , XU M , et al . Robust secrecy rate optimizations for multiuser multiple-input-single-output channel with device-to-device communications [J ] . IET Communications , 2015 , 9 ( 3 ): 396 - 403 .
康小磊 , 季新生 , 黄开枝 . 基于人工噪声辅助的D2D异构蜂窝安全通信方法 [J ] . 通信学报 , 2015 , 36 ( 10 ): 149 - 156 .
KANG X L , JI X S , HUANG K Z . Secure D2D underlaying cellular communication based on artificial noise assisted [J ] . Journal on Communications , 2015 , 36 ( 10 ): 149 - 156 .
KANG X L , JI X S , HUANG K Z , et al . Secure D2D communication underlaying cellular networks:artificial noise assisted [C ] // IEEE International Conference on Vehicular Technology (VTC) . 2017 : 1 - 5 .
MA C , LIU J Q , TIAN X H , et al . Interference exploitation in D2D-enabled cellular networks:a secrecy perspective [J ] . IEEE Transactions on Communications , 2015 , 63 ( 1 ): 229 - 242 .
YUE J T , MA C , YU H , et al . Secrecy-based channel assignment for device-to-device communication:an auction approach [C ] // IEEE International Conference on Wireless Communications & Signal Processing (WCSP) . 2013 : 1 - 6 .
ZHANG R , CHENG X , YANG L . Cooperation via spectrum sharing for physical layer security in device-to-device communications underlaying cellular networks [J ] . IEEE Transactions on Wireless Communications , 2016 , 15 ( 8 ): 5651 - 5663 .
WANG L , WU H Q , SONG M , et al . Secrecy-oriented resource sharing for cellular device-to-device underlay [C ] // IEEE International Conference on Global Communications Conference (GLOBECOM) . 2015 : 1 - 5 .
SUN L , DU Q H , REN P Y , et al . Two birds with one stone:towards secure and interference-free D2D transmissions via constellation rotation [J ] . IEEE Transactions on Vehicular Technology , 2016 , 65 ( 10 ): 8767 - 8774 .
陈亚军 , 季新生 , 黄开枝 , 等 . 基于安全中断概率的D2D安全接入策略 [J ] . 通信学报 , 2016 , 37 ( 8 ): 86 - 94 .
CHEN Y J , JI X S , HUANG K Z , et al . Secrecy-outage- probability-based access strategy for device-to-device communications underlaying cellular networks [J ] . Journal on Communications , 2016 , 37 ( 8 ): 86 - 94 .
ZHANG H , WANG T Y , SONG L Y , et al . Radio resource allocation for physical-layer security in D2D underlay communications [C ] // IEEE International Conference on Communications (ICC) . 2014 : 2319 - 2324 .
KANG X L , JI X S , HUANG K Z , et al . Secure-oriented distributed access selection for D2D underlaying cellular networks [J ] . Electronics letters , 2017 , 53 ( 1 ): 32 - 34 .
WANG C , WANG H M , XIA X G , et al . Uncoordinated jammer selection for securing SIMOME wiretap channels:a stochastic geometry approach [J ] . IEEE Transactions on Wireless Communications , 2015 , 14 ( 5 ): 2596 - 2612 .
XU X , HE B , YANG W , et al . Secure transmission design for cognitive radio networks with poisson distributed eavesdroppers [J ] . IEEE Transactions on Information Forensics and Security , 2016 , 11 ( 2 ): 373 - 387 .
JUNE C R , BHASKAR D R . Transmit beamforming in multiple-antenna systems with finite rate feedback:a vq-based approach [J ] . IEEE Transactions on Information Theory , 2006 , 52 ( 3 ): 1101 - 1112 .
STOYAN D , KENDALL W , MECKE J . Stochastic geometry and its applications(2nd ed) [M ] . Hoboken,NJ,USA : Wiley , 1996 .
ALI O B S , CQARDINAL C , GAGNON F . Performance of optimum combining in a Possion field of interferes and rayleigh fading channels [J ] . IEEE Transactions on Wireless Communications , 2010 , 9 ( 8 ): 2461 - 2467 .
HAENGGI M , GANTI R K . Interference in large wireless networks [J ] . Foundations and Trends in Networking , 2008 , 3 ( 2 ): 127 - 248 .
HAENGGI M . On distances in uniformly random networks [J ] . IEEE Transactions on Information Theory , 2005 , 51 ( 10 ): 3584 - 3586 .
陈宝林 . 最优化理论与算法(第二版) [M ] . 北京 : 清华大学出版社 , 2005 .
CHEN B L . Optimization:theories and algorithms(2nd ed) [M ] . Beijing : Tsinghua University Press , 2005 .
0
浏览量
1208
下载量
1
CSCD
关联资源
相关文章
相关作者
相关机构