Springer Nature is making SARS-CoV-2 and COVID-19 research free. View research | View latest news | Sign up for updates

Opportunistic access control for enhancing security in D2D-enabled cellular networks

  • 112 Accesses

  • 5 Citations


In this paper, we investigate secure communication over cellular uplinks in device-to-device (D2D)-enabled cellular networks. We consider a more general scenario, in which multiple D2D pairs could simultaneously share the same resource block with a specific cellular user. First, an opportunistic access control scheme based on wireless channel gains is proposed, by which the candidate selected set of D2D pairs sharing the same resource block is determined. The proposed scheme could guarantee reliable communications for both cellular users and D2D pairs, and further could combat eavesdroppers while keeping the legitimate cellular user as non-intrusive as possible, regarding D2D pairs as friendly jammers in a non-collaborative way. Then, we derive theoretical results to characterize the security and reliability of the typical cellular and D2D links, respectively. To further support the performance of this hybrid network, we next present an interference threshold optimization model. Our aim is to minimize the connection outage probability (COP) of D2D pairs subject to the secrecy requirement of the cellular user. Finally, simulation results are presented to validate the effectiveness of our proposed scheme.

This is a preview of subscription content, log in to check access.


  1. 1

    Agiwal M, Roy A, Saxena N. Next generation 5G wireless networks: a comprehensive survey. IEEE Commun Surv Tut, 2016, 18: 1617–1655

  2. 2

    Asadi A, Wang Q, Mancuso V. A survey on device-to-device communication in cellular networks. IEEE Commun Surv Tut, 2014, 16: 1801–1819

  3. 3

    Phunchongharn P, Hossain E, Kim D I. Resource allocation for device-to-device communications underlaying LTEadvanced networks. IEEE Wirel Commun, 2013, 20: 91–100

  4. 4

    Ding G R, Wang J L, Wu Q H, et al. Cellular-base-station-assisted device-to-device communications in TV white space. IEEE J Sel Areas Commun, 2016, 34: 107–121

  5. 5

    Yu G D, Xu L K, Feng D Q. Joint mode selection and resource allocation for device-to-device communications. IEEE Trans Commun, 2014, 62: 3814–3824

  6. 6

    Li B, Fei Z S, Chen H B. Robust artificial noise-aided secure beamforming in wireless-powered non-regenerative relay.IEEE Access, 2016, 4: 7921–7929

  7. 7

    Li B, Fei Z S. Robust beamforming and cooperative jamming for secure transmission in DF relay systems. EURASIP J Wirel Commun, 2016, 1: 1–11

  8. 8

    Zhang L J, Jin L, Luo W Y, et al. Robust secure transmission for multiuser MISO systems with probabilistic QoS constraints. Sci China Inf Sci, 2016, 59: 022309

  9. 9

    Khisti A, Wornell G. Secure transmission with multiple antennas-part I: the MISOME wiretap channel. IEEE Trans Inf Theory, 2010, 56: 3088–3104

  10. 10

    Bloch M, Barros J, Rodrigues M R D, et al. Wireless information theoretic security. IEEE Trans Inf Theory, 2011, 54: 2515–2534

  11. 11

    Li B, Fei Z S, Chu Z, et al. Secure transmission for heterogeneous cellular networks with wireless information and power transfer. IEEE Syst J, 2017. doi: 10.1109/JSYST.2017.2713881

  12. 12

    Xiong J, Cheng L W, Ma D T, et al. Destination-aided cooperative jamming for dual-hop amplify-and-forward MIMO untrusted relay systems. IEEE Trans Veh Tech, 2016, 65: 7274–7284

  13. 13

    Cheng L W, Li W, Ma D T, et al. Moving window scheme for extracting secret keys in stationary environments. IET Commun, 2016, 10: 2206–2214

  14. 14

    Ji X S, Yang Y, Huang K Z, et al. Physical layer authentication scheme based on hash method. J Electron Inf Technol, 2016, 38: 2900–2907

  15. 15

    Alam M, Yang D, Rodriguez J, et al. Secure device-to-device communication in LTE-A. IEEE Commun Mag, 2014, 52: 66–73

  16. 16

    Zhu D H, Swindlehurst A L, Fakoorian S A A, et al. Device-to-device communications: the physical layer security advantage. In: Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Florence, 2014. 1606–1610

  17. 17

    Kang X L, Ji X S, Huang K Z. Secure D2D underlaying cellular communication based on artificial noise assisted. J Commun, 2015, 36: 149–156

  18. 18

    Kang X L, Ji X S, Huang K Z, et al. Secure D2D communication underlaying cellular networks: artificial noise assisted. In: Proceedings of IEEE International Conference on Vehicular Technology (VTC), Montreal, 2016

  19. 19

    Chen Y J, Ji X S, Huang K Z, et al. Secrecy-outage-probability-based access strategy for device-to-device communications underlaying cellular networks. J Commun, 2016, 37: 86–94

  20. 20

    Yue J T, Ma C, Yu H, et al. Secrecy-based channel assignment for device-to-device communication: an auction approach. In: Proceedings of IEEE International Conference on Wireless Communications and Signal Processing (WCSP), Hangzhou, 2013. 1–6

  21. 21

    Chu Z, Cumanan K, Xu M, et al. Robust secrecy rate optimizations for multiuser multiple-input-single-output channel with device-to-device communications. IET Commun, 2015, 9: 396–403

  22. 22

    Zhang H, Wang T Y, Song L Y, et al. Radio resource allocation for physical-layer security in D2D underlay communications. In: Proceedings of IEEE International Conference on Communications (ICC), Sydney, 2014. 2319–2324

  23. 23

    Sun L, Du Q H, Ren P Y, et al. Two birds with one stone: towards secure and interference-free D2D transmissions via constellation rotation. IEEE Trans Veh Tech, 2016, 65: 8767–8774

  24. 24

    Li W, Wu H Q, Song M, et al. Secrecy-oriented resource sharing for cellular device-to-device underlay. In: Proceedings of IEEE International Conference on Global Communications Conference (GLOBECOM), San Diego, 2015. 1–5

  25. 25

    Zhang R Q, Cheng X, Yang L Q. Cooperation via spectrum sharing for physical layer security in device-to-device communications underlaying cellular networks. IEEE Trans Wirel Commun, 2016, 15: 5651–5663

  26. 26

    Ma C, Liu J Q, Tian X H, et al. Interference exploitation in D2D-enabled cellular networks: a secrecy perspective. IEEE Trans Commun, 2015, 63: 229–242

  27. 27

    Xu X M, He B, Yang W W, et al. Secure transmission design for cognitive radio networks with poisson distributed eavesdroppers. IEEE Trans Inf Foren Secur, 2016, 11: 373–387

  28. 28

    Wang C, Wang H M, Xia X G. Uncoordinated jammer selection for securing SIMOME wiretap channels: a stochastic geometry approach. IEEE Trans Wirel Commun, 2015, 14: 2596–2612

  29. 29

    Stoyan D, Kendall W S, Mecke J. Stochastic Geometry and Its Applications. 2nd ed. Hoboken: Wiley, 1996

  30. 30

    Wang C, Wang H M. Opportunistic jamming for enhancing security: stochastic geometry modeling and analysis. IEEE Trans Veh Tech, 2016, 14: 2596–2612

  31. 31

    Zhou X Y, Ganti R, Andrews J, et al. Physical layer security in cellular networks: a stochastic geometry approach. IEEE Trans Wirel Commun, 2013, 12: 2776–2787

  32. 32

    Haenggi M, Ganti R K. Interference in large wireless networks. Found Trends Netw, 2008, 3: 127–248

  33. 33

    Haenggi M. On distances in uniformly random networks. IEEE Trans Inf Theory, 2005, 51: 3584–3586

Download references


This work was supported in part by National High Technology Research and Development Program of China (863) (Grant No. SS2015AA011306), Open Research Fund of National Mobile Communications Research Laboratory, Southeast University (Grant No. 2013D09) and National Natural Science Foundation of China (Grant Nos. 61379006, 61521003, 61401510).

Author information

Correspondence to Yajun Chen.

Additional information

Conflict of interest The authors declare that they have no conflict of interest.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Chen, Y., Ji, X., Huang, K. et al. Opportunistic access control for enhancing security in D2D-enabled cellular networks. Sci. China Inf. Sci. 61, 042304 (2018). https://doi.org/10.1007/s11432-017-9160-y

Download citation


  • device-to-device (D2D) communication
  • opportunistic access control
  • physical layer security (PHY-security)
  • secrecy outage probability (SOP)
  • connection outage probability (COP)