Physical Layer Security of D2D Communications Underlaying Cellular Networks

2013 ◽  
Vol 441 ◽  
pp. 951-954 ◽  
Author(s):  
Jia Jia Wang ◽  
Cheng Mei Li ◽  
Jian Jun Wu

In this paper, we propose a novel resource allocation criterion based on physical layer security, which means choosing the proper subcarrier to ensure the device to device (D2D) security capacity maximum based on guaranteeing the cellular users basic capacity. We analyze the relationship between D2D security capacity and D2D power. We also prove that the strategies based on the D2D secrecy rate maximum and cellular sum rate maximum are the same when the transmit SNR of BS is high enough. Through the numerical calculation and simulation analysis, we show that the resource allocation criterion proposed in this paper is valid and rational.

IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 53575-53586
Author(s):  
Majid H. Khoshafa ◽  
Telex M. N. Ngatched ◽  
Mohamed H. Ahmed ◽  
Ahmed Ibrahim

Entropy ◽  
2019 ◽  
Vol 21 (11) ◽  
pp. 1038 ◽  
Author(s):  
Woong Son ◽  
Han Seung Jang ◽  
Bang Chul Jung

In this paper, we propose a pseudo-random beamforming (PRBF) technique for improving physical-layer security (PLS) in multiple input multiple output (MIMO) downlink cellular networks consisting of a legitimate base station (BS), multiple legitimate mobile stations (MSs) and potential eavesdroppers. The legitimate BS can obtain available potential eavesdroppers’ channel state information (CSI), which is registered in an adjacent cell. In the proposed PRBF technique, the legitimate BS pseudo-randomly generates multiple candidates of the transmit beamforming (BF) matrix, in which each transmit BF matrix consists of multiple orthonormal BF vectors and shares BF information with legitimate MSs before data transmission. Each legitimate MS generates receive BF vectors to maximize the receive signal-to-interference-plus-noise (SINR) for all pseudo-randomly generated transmit beams and calculates the corresponding SINR. Then, each legitimate MS sends a single beam index and the corresponding SINR value of the BF vector that maximizes the received SINR for each BF matrix since a single spatial stream is sent to each legitimate MS. Based on the feedback information from legitimate MSs and the CSI from the legitimate BS to eavesdroppers, the legitimate BS selects the optimal transmit BF matrix and the legitimate MSs that maximizes secrecy sum-rate. We also propose a codebook-based opportunistic feedback (CO-FB) strategy to reduce feedback overhead at legitimate MSs. Based on extensive computer simulations, the proposed PRBF with the proposed CO-FB significantly outperforms the conventional random beamforming (RBF) with the conventional opportunistic feedback (O-FB) strategies in terms of secrecy sum-rate and required feedback bits.


Author(s):  
Shijie WANG ◽  
Yuanyuan GAO ◽  
Xiaochen LIU ◽  
Guangna ZHANG ◽  
Nan SHA ◽  
...  

Sensors ◽  
2021 ◽  
Vol 21 (4) ◽  
pp. 1439
Author(s):  
Janghyuk Youn ◽  
Woong Son ◽  
Bang Chul Jung

Recently, reconfigurable intelligent surfaces (RISs) have received much interest from both academia and industry due to their flexibility and cost-effectiveness in adjusting the phase and amplitude of wireless signals with low-cost passive reflecting elements. In particular, many RIS-aided techniques have been proposed to improve both data rate and energy efficiency for 6G wireless communication systems. In this paper, we propose a novel RIS-based channel randomization (RCR) technique for improving physical-layer security (PLS) for a time-division duplex (TDD) downlink cellular wire-tap network which consists of a single base station (BS) with multiple antennas, multiple legitimate pieces of user equipment (UE), multiple eavesdroppers (EVEs), and multiple RISs. We assume that only a line-of-sight (LOS) channel exists among the BS, the RISs, and the UE due to propagation characteristics of tera-hertz (THz) spectrum bands that may be used in 6G wireless communication systems. In the proposed technique, each RIS first pseudo-randomly generates multiple reflection matrices and utilizes them for both pilot signal duration (PSD) in uplink and data transmission duration (DTD) in downlink. Then, the BS estimates wireless channels of UE with reflection matrices of all RISs and selects the UE that has the best secrecy rate for each reflection matrix generated. It is shown herein that the proposed technique outperforms the conventional techniques in terms of achievable secrecy rates.


Symmetry ◽  
2020 ◽  
Vol 13 (1) ◽  
pp. 5
Author(s):  
Pengfei Hou ◽  
Jianping Gong ◽  
Jumin Zhao

In this paper, we proposed a scheme that Injects artificial noise from the tag end (IANT) to enhance the physical layer security of the ambient backscatter communication (ABC) system. The difference between the ABC system and the traditional radio frequency identification system is whether it uses the radio frequency (RF) signals in the environment to supply energy and modulation information for passive tags. In the IANT scheme, we select the best tag to communicate with the reader according to the channel quality between tags and reader, and at the same time select another tag to generate artificial noise that affects the receiving effect of the eavesdropper. This paper uses the method of generating noise copies in the reader to reduce the interference of artificial noise on the signal received by the reader. The simulation results show that with the increase in channel quality between tags and reader and the increase in the number of tags, the proposed IANT scheme is significantly superior to the contrast scheme in terms of system achievable secrecy rate, effectively enhancing the physical layer security of the ABC system.


2016 ◽  
Vol 13 (Supplement2) ◽  
pp. 120-130 ◽  
Author(s):  
Xiaohui Qi ◽  
Kaizhi Huang ◽  
Zhihao Zhong ◽  
Xiaolei Kang ◽  
Zhou Zhong

Sign in / Sign up

Export Citation Format

Share Document