Ya-jun CHEN, Xin-sheng JI, Kai-zhi HUANG, et al. Secrecy outage probability based access strategy for device-to-device communication underlaying cellular networks[J]. Journal on Communications, 2016, 37(8): 86-94.
DOI:
Ya-jun CHEN, Xin-sheng JI, Kai-zhi HUANG, et al. Secrecy outage probability based access strategy for device-to-device communication underlaying cellular networks[J]. Journal on Communications, 2016, 37(8): 86-94. DOI: 10.11959/j.issn.1000-436x.2016159.
Secrecy outage probability based access strategy for device-to-device communication underlaying cellular networks
A secure access strategy for D2D (device-to-device) communications underlaying cellular networks based on the secrecy outage probability was proposed.Firstly
the secrecy outage probability in the worst case was derived and a transmission power optimization scheme for D2D pairs was given.An access control strategy was further presented to allow the D2D pair with the minimum secrecy outage probability to reuse the cellular resource
which improved the se-cure communications for D2D links and cellular uplinks.Finally
simulation results showed that the proposed scheme was effective.
关键词
Keywords
references
JANIS P , YU C , DOPPLER K , et al . Device-to-device communication under-laying cellular communications systems [J ] . International Jounal Communications,Network and System Sciences , 2009 , 2 ( 3 ): 169 - 178 .
DOPPLER K , RINNE M , RIBEIRO C , et al . Device to-device com-munication as an underlay to LTE-advanced networks [J ] . IEEE Com-munications Magazine , 2009 , 47 ( 12 ): 42 - 49 .
FODOR , DAHLMAN G , MILDH E , et al . Design aspects of network assisted device-to-device communications [J ] . IEEE Communications.Magazine , 2012 , 50 ( 3 ): 170 - 177 .
DOPPLER K , RINNE M P , JANIS P , et al . Device-to-device commu-nications:functional prospects for LTE-advanced networks [C ] // IEEE International Conference on Communications . c 2009 : 1 - 6 .
ALAM M , DU Y , RODRIGUEZ J , et al . Secure device-to-device communication in LTE-A [J ] . IEEE Communications Magazine , 2014 , 52 ( 4 ): 66 - 73 .
ZHU D H , SWINDLEHURST A L , FAKOORIAN S A A , et al . De-vice-to-device communications:the physical layer security advan-tage [C ] // 2014 IEEE International Conference on Acoustics,Speech and Signal Processing (ICASSP) . c 2014 : 1606 - 1610 .
KANG X L , JI X S , HUANG K Z . Secure D2D underlaying cellular communication based on artificial noise assisted [J ] . Journal on Com-munications , 2015 , 36 ( 10 ): 149 - 156 .
YUE J , MA C , YU H , et al . Secrecy-based channel assignment for device-to-device communication:an auction approach [C ] // 2013 IEEE International Conference on Wireless Communications & Signal Processing (WCSP) . Hangzhou,China , c 2013 : 1 - 6 .
LIU Z , PENG T , XIANG S , et al . Mode selection for device-to-device (D2D) communication under LTE-Advance networks [C ] // 2012 IEEE International Conference on Communications (ICC) . c 2012 : 5563 - 5567 .
ZHANG R , CHENG X , YANG L . Cooperation via spectrum sharing for physical layer security in device-to-device communications under-laying cellular networks [C ] // 2015 IEEE Global Communications Conference (GLOBECOM) . c 2015 : 1 - 6 .
CHU Z , CUMANAN K , XU M , et al . Robust secrecy rate optimiza-tions for multiuser multiple-input-single-output channel with de-vice-to-device communications [J ] . IET Communications , 2015 , 9 ( 3 ): 396 - 403 .
ZHANG H , WANG T Y , SONG L Y , et al . Radio resource allocation for physical-layer security in D2D underlay communications [C ] // 2014 IEEE International Conference on Communications (ICC) . c 2014 : 2319 - 2324 .
KHISTI A , WORNELL G W . Secure transmission with multiple an-tennas:the MISOME channel [J ] . IEEE Transactions on Information Theory , 2010 , 56 ( 7 ): 3088 - 3104 .
ZHOU X , GANTI R K , ANDREWS J G , et al . On the throughput cost of physical layer security in decentralized wireless networks [J ] . IEEE Transactions on Wireless Communications , 2011 , 10 ( 8 ): 2764 - 2775 .
ZHOU X , MCKAY M R . Secure transmission with artificial noise over fading channels:achievable rate and optimal power allocation [J ] . IEEE Transactions on Vehicular Technology , 2010 , 59 ( 8 ): 3831 - 3842 .
BLOCH M , BARROS J , RODRIGUES M , et al . Wireless Informa-tion-theoretic Security [J ] . IEEE Transactions on Information Theory , 2011 , 54 ( 6 ): 2515 - 2534 .
BASHAR S , DING Z , LI Y . Rethinking the secrecy outage formulation:a secure transmission design perspective [J ] . IEEE Transac-tions on Wireless Communications , 2011 , 10 ( 4 ): 1212 - 1223 .
ZHOU X , MCKAY M R , MAHAM B , et al . Rethinking the secrecy outage formulation:a secure transmission design perspective [J ] . IEEE Communication Letters , 2011 , 15 ( 3 ): 302 - 304 .
ROH J C , RAO B D , MAHAM B , et al . Transmit beamforming in multiple-antenna systems with finite rate feedback:a VQ-based approach [J ] . IEEE Transactions on Information Theory , 2006 , 52 ( 3 ): 1101 - 1112 .