D2D-Assisted Physical-Layer Security in Next-Generation Mobile Network

Device-to-device (D2D) communication is a promising technology to improve the next-generation mobile network. In this paper, we propose a D2D-assisted physical layer security scheme to protect D2D users from eavesdroppers. In the proposed scheme, each D2D transmission link will be protected by other D2D relay users. The relay users will manage the interference to suppress the eavesdroppers so that the eavesdroppers cannot decode the message correctly while keeping successful transmission for legitimate users. We propose to compute optimal transmitting power for each D2D relay so that it can provide the highest secrecy capacity for its data receiver. In this work, we focus on the data receivers at the edge of each D2D communication area because they receive the lowest signal-to-noise-and-interference-ratio (SINR) compared with other data receivers in the same communication area. Moreover, fairness is taken into consideration that all studied data receivers are equally protected from eavesdroppers. The simulation results demonstrate that in our proposed scheme, all D2D data receivers can achieve a high secure secrecy capacity.

[1]  Sherali Zeadally,et al.  A Survey of Device-to-Device Communications: Research Issues and Challenges , 2018, IEEE Communications Surveys & Tutorials.

[2]  Jeroen Wigard,et al.  Measured Uplink Interference Caused by Aerial Vehicles in LTE Cellular Networks , 2018, IEEE Wireless Communications Letters.

[3]  K. Shamganth,et al.  A survey on relay selection in cooperative device-to-device (D2D) communication for 5G cellular networks , 2017, 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS).

[4]  A. Robert Calderbank,et al.  Applications of LDPC Codes to the Wiretap Channel , 2004, IEEE Transactions on Information Theory.

[5]  Feng Ye,et al.  Incentive D2D Off-Loading Scheme for Energy Efficiency in the Next-Generation Mobile Networks , 2018, 2018 IEEE 88th Vehicular Technology Conference (VTC-Fall).

[6]  Moonsik Min Bounds on the Optimal Feedback Rate for Multi-Antenna Systems in Interference-Limited Cellular Networks , 2018, IEEE Transactions on Wireless Communications.

[7]  Lei Zheng,et al.  A Probabilistic Distance-Based Modeling and Analysis for Cellular Networks With Underlaying Device-to-Device Communications , 2017, IEEE Transactions on Wireless Communications.

[8]  Xinbing Wang,et al.  Interference Exploitation in D2D-Enabled Cellular Networks: A Secrecy Perspective , 2015, IEEE Transactions on Communications.

[9]  Ming Yi,et al.  Physical layer security in D2D-enabled cellular networks: Artificial noise assisted , 2017, 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[10]  Mansoor Shafi,et al.  Interference Cancellation With Jointly Optimized Transceivers in Multiuser Multicellular Networks , 2018, IEEE Transactions on Vehicular Technology.

[11]  Mingkai Chen,et al.  Optimization-Based Access Assignment Scheme for Physical-Layer Security in D2D Communications Underlaying a Cellular Network , 2018, IEEE Transactions on Vehicular Technology.