Joint power and access control for physical layer security in D2D communications underlaying cellular networks

Author(s):  
Rongqing Zhang ◽  
Xiang Cheng ◽  
Liuqing Yang
IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 53575-53586
Author(s):  
Majid H. Khoshafa ◽  
Telex M. N. Ngatched ◽  
Mohamed H. Ahmed ◽  
Ahmed Ibrahim

Author(s):  
Shiwei Yan ◽  
Yong Shang ◽  
Xiguang Zhang

In this paper, we investigate the Physical Layer Security (PLS) of a multiple friendly jammers and multiple users wireless system in Device-to-Device (D2D) communications underlaying cellular networks with an eavesdropper. The aim is to maximize the increase of secrecy capacity of the entire system through optimal power allocation and jamming matching under various practical constraints. Firstly, the total increase secrecy capacity of D2D pairs with the help of jamming is derived, then we obtain optimal jamming power for each D2D pair and formulate the D2D pairs and jammers matching problem in the weighted bipartite graph via designing the Kuhn-Munkres (KM) algorithm. Finally, numerical results demonstrate that our scheme could greatly improve the secrecy performance of heterogeneous D2D and cellular networks.


2013 ◽  
Vol 441 ◽  
pp. 951-954 ◽  
Author(s):  
Jia Jia Wang ◽  
Cheng Mei Li ◽  
Jian Jun Wu

In this paper, we propose a novel resource allocation criterion based on physical layer security, which means choosing the proper subcarrier to ensure the device to device (D2D) security capacity maximum based on guaranteeing the cellular users basic capacity. We analyze the relationship between D2D security capacity and D2D power. We also prove that the strategies based on the D2D secrecy rate maximum and cellular sum rate maximum are the same when the transmit SNR of BS is high enough. Through the numerical calculation and simulation analysis, we show that the resource allocation criterion proposed in this paper is valid and rational.


Author(s):  
Shijie WANG ◽  
Yuanyuan GAO ◽  
Xiaochen LIU ◽  
Guangna ZHANG ◽  
Nan SHA ◽  
...  

2016 ◽  
Vol 13 (Supplement2) ◽  
pp. 120-130 ◽  
Author(s):  
Xiaohui Qi ◽  
Kaizhi Huang ◽  
Zhihao Zhong ◽  
Xiaolei Kang ◽  
Zhou Zhong

Sign in / Sign up

Export Citation Format

Share Document