Secure D2D underlaying cellular communication based on artificial noise assisted
academic paper|更新时间:2024-06-05
|
Secure D2D underlaying cellular communication based on artificial noise assisted
Journal on CommunicationsVol. 36, Issue 10, Pages: 149-156(2015)
作者机构:
1. 国家数字交换系统工程技术研究中心,河南 郑州 450002
2. 移动互联网安全技术国家工程实验室,北京 100876
作者简介:
基金信息:
The National Natural Science Foundation of China(61379006);The National Natural Science Foundation of China(61401510);The National Natural Science Foundation of China(61471396);The National Natural Science Foundation of China(61501516);The National High Technology R&D Program of China(863 Pro-gram)(2014AA01A701)
Xiao-lei KANG, Xin-sheng JI, Kai-zhi HUANG. Secure D2D underlaying cellular communication based on artificial noise assisted[J]. Journal on Communications, 2015, 36(10): 149-156.
DOI:
Xiao-lei KANG, Xin-sheng JI, Kai-zhi HUANG. Secure D2D underlaying cellular communication based on artificial noise assisted[J]. Journal on Communications, 2015, 36(10): 149-156. DOI: 10.11959/j.issn.1000-436x.2015194.
Secure D2D underlaying cellular communication based on artificial noise assisted
A secure communication scheme based on artificial noise assisted from base station(BS)was proposed to improve the system secrecy rate of the D2D underlaying cellular.Firstly
the system secrecy rate was modeled.Then the BS with multi-antennas added artificial noise(AN)in cellular user’s signal as well as designed beam vectors of the desired signal and artificial noise to maximize system secrecy rate.In the end
a joint optimization scheme based on the fairness constraint was introduced to optimize beam vectors of the desired signal
the power allocation for BS’s information signal and AN and the D2D power control.Simulation results show that the system ergodic secrecy rate can be improved 2.7 bit·s
−1
·Hz
−1
more than the schemes based on SVD and zero-forcing at most.
关键词
Keywords
references
JANIS P , YU C H , DOPPLER K , et al . Device-to-device communication under-laying cellular communications systems [J ] . International Journal Communications Network and System Sciences , 2009 , 2 ( 3 ): 169 - 178 .
ALAM M , DU YANG , RODRIGUEZ J , et al . Secure device-to-device communication in LTE-A [J ] . IEEE Communications Magazine , 2014 , 52 ( 4 ): 66 - 73 .
YUE J T , MA C , YU H , et al . Secrecy-based channel assignment for device-to-device communication:an auction approach [A ] . 2013 International Conference on Wireless Communications & Signal Processing(WCSP) [C ] . Hangzhou,China , 2013 . 1 - 6 .
ZHU D H , SWINDLEHURST A L , FAKOORIAN S A A , et al . Device-to-device communications:the physical layer security advantage [A ] . 2014 IEEE International Conference on Acoustics,Speech and Signal Processing(ICASSP) [C ] . Florence , 2014 . 1606 - 1610 .
ZHANG H , WANG T Y , SONG L Y , et al . Radio resource allocation for physical-layer security in D2D underlay communications [A ] . 2014 IEEE International Conference on Communications(ICC) [C ] . Sydney,NSW , 2014 . 2319 - 2324 .
GOEL S , NEGI R . Guaranteeing secrecy using artificial noise [J ] . IEEE Transactions on Wireless Communications , 2008 , 7 ( 6 ): 2180 - 2189 .
LI J Y , PETROPULU A P . On ergodic secrecy rate for gaussian MISO wiretap channels [J ] . IEEE Transactions on Wireless Communications , 2011 , 10 ( 4 ): 1176 - 1187 .
XIONG Q , GONG Y , LIANG Y C , et al . Achieving secrecy of MISO fading wiretap channels via jamming and precoding with imperfect channel state information [J ] . IEEE Wireless Communications Letters , 2014 , 3 ( 4 ): 357 - 360 .
DONG L , HAN Z , PETROPULU A P , et al . Improving wireless physical layer security via cooperating relays [J ] . IEEE Transactions on Signal Processing , 2010 , 58 ( 3 ): 1875 - 1888 .
KHISTI A,WORNELL , GREGORY W . Secure transmission with multiple antennas—part I:the MISOME wiretap channel [J ] . IEEE Transactions on Information Theory , 2010 , 56 ( 7 ): 3088 - 3104 .