Advertisement

Opportunistic access control for enhancing security in D2D-enabled cellular networks

  • Yajun Chen
  • Xinsheng Ji
  • Kaizhi Huang
  • Bin Li
  • Xiaolei Kang
Research Paper

Abstract

In this paper, we investigate secure communication over cellular uplinks in device-to-device (D2D)-enabled cellular networks. We consider a more general scenario, in which multiple D2D pairs could simultaneously share the same resource block with a specific cellular user. First, an opportunistic access control scheme based on wireless channel gains is proposed, by which the candidate selected set of D2D pairs sharing the same resource block is determined. The proposed scheme could guarantee reliable communications for both cellular users and D2D pairs, and further could combat eavesdroppers while keeping the legitimate cellular user as non-intrusive as possible, regarding D2D pairs as friendly jammers in a non-collaborative way. Then, we derive theoretical results to characterize the security and reliability of the typical cellular and D2D links, respectively. To further support the performance of this hybrid network, we next present an interference threshold optimization model. Our aim is to minimize the connection outage probability (COP) of D2D pairs subject to the secrecy requirement of the cellular user. Finally, simulation results are presented to validate the effectiveness of our proposed scheme.

Keywords

device-to-device (D2D) communication opportunistic access control physical layer security (PHY-security) secrecy outage probability (SOP) connection outage probability (COP) 

Notes

Acknowledgements

This work was supported in part by National High Technology Research and Development Program of China (863) (Grant No. SS2015AA011306), Open Research Fund of National Mobile Communications Research Laboratory, Southeast University (Grant No. 2013D09) and National Natural Science Foundation of China (Grant Nos. 61379006, 61521003, 61401510).

References

  1. 1.
    Agiwal M, Roy A, Saxena N. Next generation 5G wireless networks: a comprehensive survey. IEEE Commun Surv Tut, 2016, 18: 1617–1655CrossRefGoogle Scholar
  2. 2.
    Asadi A, Wang Q, Mancuso V. A survey on device-to-device communication in cellular networks. IEEE Commun Surv Tut, 2014, 16: 1801–1819CrossRefGoogle Scholar
  3. 3.
    Phunchongharn P, Hossain E, Kim D I. Resource allocation for device-to-device communications underlaying LTEadvanced networks. IEEE Wirel Commun, 2013, 20: 91–100CrossRefGoogle Scholar
  4. 4.
    Ding G R, Wang J L, Wu Q H, et al. Cellular-base-station-assisted device-to-device communications in TV white space. IEEE J Sel Areas Commun, 2016, 34: 107–121CrossRefGoogle Scholar
  5. 5.
    Yu G D, Xu L K, Feng D Q. Joint mode selection and resource allocation for device-to-device communications. IEEE Trans Commun, 2014, 62: 3814–3824CrossRefGoogle Scholar
  6. 6.
    Li B, Fei Z S, Chen H B. Robust artificial noise-aided secure beamforming in wireless-powered non-regenerative relay.IEEE Access, 2016, 4: 7921–7929CrossRefGoogle Scholar
  7. 7.
    Li B, Fei Z S. Robust beamforming and cooperative jamming for secure transmission in DF relay systems. EURASIP J Wirel Commun, 2016, 1: 1–11Google Scholar
  8. 8.
    Zhang L J, Jin L, Luo W Y, et al. Robust secure transmission for multiuser MISO systems with probabilistic QoS constraints. Sci China Inf Sci, 2016, 59: 022309Google Scholar
  9. 9.
    Khisti A, Wornell G. Secure transmission with multiple antennas-part I: the MISOME wiretap channel. IEEE Trans Inf Theory, 2010, 56: 3088–3104CrossRefzbMATHGoogle Scholar
  10. 10.
    Bloch M, Barros J, Rodrigues M R D, et al. Wireless information theoretic security. IEEE Trans Inf Theory, 2011, 54: 2515–2534MathSciNetCrossRefzbMATHGoogle Scholar
  11. 11.
    Li B, Fei Z S, Chu Z, et al. Secure transmission for heterogeneous cellular networks with wireless information and power transfer. IEEE Syst J, 2017. doi: 10.1109/JSYST.2017.2713881Google Scholar
  12. 12.
    Xiong J, Cheng L W, Ma D T, et al. Destination-aided cooperative jamming for dual-hop amplify-and-forward MIMO untrusted relay systems. IEEE Trans Veh Tech, 2016, 65: 7274–7284CrossRefGoogle Scholar
  13. 13.
    Cheng L W, Li W, Ma D T, et al. Moving window scheme for extracting secret keys in stationary environments. IET Commun, 2016, 10: 2206–2214CrossRefGoogle Scholar
  14. 14.
    Ji X S, Yang Y, Huang K Z, et al. Physical layer authentication scheme based on hash method. J Electron Inf Technol, 2016, 38: 2900–2907Google Scholar
  15. 15.
    Alam M, Yang D, Rodriguez J, et al. Secure device-to-device communication in LTE-A. IEEE Commun Mag, 2014, 52: 66–73CrossRefGoogle Scholar
  16. 16.
    Zhu D H, Swindlehurst A L, Fakoorian S A A, et al. Device-to-device communications: the physical layer security advantage. In: Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), Florence, 2014. 1606–1610Google Scholar
  17. 17.
    Kang X L, Ji X S, Huang K Z. Secure D2D underlaying cellular communication based on artificial noise assisted. J Commun, 2015, 36: 149–156Google Scholar
  18. 18.
    Kang X L, Ji X S, Huang K Z, et al. Secure D2D communication underlaying cellular networks: artificial noise assisted. In: Proceedings of IEEE International Conference on Vehicular Technology (VTC), Montreal, 2016Google Scholar
  19. 19.
    Chen Y J, Ji X S, Huang K Z, et al. Secrecy-outage-probability-based access strategy for device-to-device communications underlaying cellular networks. J Commun, 2016, 37: 86–94Google Scholar
  20. 20.
    Yue J T, Ma C, Yu H, et al. Secrecy-based channel assignment for device-to-device communication: an auction approach. In: Proceedings of IEEE International Conference on Wireless Communications and Signal Processing (WCSP), Hangzhou, 2013. 1–6Google Scholar
  21. 21.
    Chu Z, Cumanan K, Xu M, et al. Robust secrecy rate optimizations for multiuser multiple-input-single-output channel with device-to-device communications. IET Commun, 2015, 9: 396–403CrossRefGoogle Scholar
  22. 22.
    Zhang H, Wang T Y, Song L Y, et al. Radio resource allocation for physical-layer security in D2D underlay communications. In: Proceedings of IEEE International Conference on Communications (ICC), Sydney, 2014. 2319–2324Google Scholar
  23. 23.
    Sun L, Du Q H, Ren P Y, et al. Two birds with one stone: towards secure and interference-free D2D transmissions via constellation rotation. IEEE Trans Veh Tech, 2016, 65: 8767–8774CrossRefGoogle Scholar
  24. 24.
    Li W, Wu H Q, Song M, et al. Secrecy-oriented resource sharing for cellular device-to-device underlay. In: Proceedings of IEEE International Conference on Global Communications Conference (GLOBECOM), San Diego, 2015. 1–5Google Scholar
  25. 25.
    Zhang R Q, Cheng X, Yang L Q. Cooperation via spectrum sharing for physical layer security in device-to-device communications underlaying cellular networks. IEEE Trans Wirel Commun, 2016, 15: 5651–5663CrossRefGoogle Scholar
  26. 26.
    Ma C, Liu J Q, Tian X H, et al. Interference exploitation in D2D-enabled cellular networks: a secrecy perspective. IEEE Trans Commun, 2015, 63: 229–242Google Scholar
  27. 27.
    Xu X M, He B, Yang W W, et al. Secure transmission design for cognitive radio networks with poisson distributed eavesdroppers. IEEE Trans Inf Foren Secur, 2016, 11: 373–387CrossRefGoogle Scholar
  28. 28.
    Wang C, Wang H M, Xia X G. Uncoordinated jammer selection for securing SIMOME wiretap channels: a stochastic geometry approach. IEEE Trans Wirel Commun, 2015, 14: 2596–2612CrossRefGoogle Scholar
  29. 29.
    Stoyan D, Kendall W S, Mecke J. Stochastic Geometry and Its Applications. 2nd ed. Hoboken: Wiley, 1996zbMATHGoogle Scholar
  30. 30.
    Wang C, Wang H M. Opportunistic jamming for enhancing security: stochastic geometry modeling and analysis. IEEE Trans Veh Tech, 2016, 14: 2596–2612Google Scholar
  31. 31.
    Zhou X Y, Ganti R, Andrews J, et al. Physical layer security in cellular networks: a stochastic geometry approach. IEEE Trans Wirel Commun, 2013, 12: 2776–2787CrossRefGoogle Scholar
  32. 32.
    Haenggi M, Ganti R K. Interference in large wireless networks. Found Trends Netw, 2008, 3: 127–248CrossRefzbMATHGoogle Scholar
  33. 33.
    Haenggi M. On distances in uniformly random networks. IEEE Trans Inf Theory, 2005, 51: 3584–3586MathSciNetCrossRefzbMATHGoogle Scholar

Copyright information

© Science China Press and Springer-Verlag GmbH Germany 2017

Authors and Affiliations

  • Yajun Chen
    • 1
  • Xinsheng Ji
    • 1
    • 2
    • 3
  • Kaizhi Huang
    • 1
  • Bin Li
    • 4
  • Xiaolei Kang
    • 1
  1. 1.National Digital Switching System Engineering & Technological R&D CenterZhengzhouChina
  2. 2.National Mobile Communications Research LaboratorySoutheast UniversityNanjingChina
  3. 3.National Engineering Lab for Mobile Networking SecurityBeijingChina
  4. 4.School of Information and ElectronicsBeijing Institute of TechnologyBeijingChina

Personalised recommendations